Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ProduKey.exe

Overview

General Information

Sample Name:ProduKey.exe
Analysis ID:800703
MD5:9260e593a0f2d798fddc16a7b19ad808
SHA1:8b3736186f9963a5cedd4a2d8dca66041799d0cd
SHA256:bace5e41e07df9f71b07828dacfde462ce609fa1cd387c7e1cc4aacc59cf00e5
Infos:

Detection

Score:0
Range:0 - 100
Whitelisted:true
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the product ID of Windows
Extensive use of GetProcAddress (often used to hide API calls)
Uses code obfuscation techniques (call, push, ret)
Queries the product ID of Microsoft Office
Contains functionality to dynamically determine API calls
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • ProduKey.exe (PID: 4460 cmdline: C:\Users\user\Desktop\ProduKey.exe MD5: 9260E593A0F2D798FDDC16A7B19AD808)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ProduKey.exeReversingLabs: Detection: 55%
Source: ProduKey.exeVirustotal: Detection: 50%Perma Link
Source: ProduKey.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: ProduKey.exeStatic PE information: certificate valid
Source: Binary string: c:\Projects\VS2005\ProduKey\Release\ProduKey.pdb source: ProduKey.exe
Source: C:\Users\user\Desktop\ProduKey.exeCode function: 0_2_0040867D FindFirstFileA,FindNextFileA,0_2_0040867D
Source: ProduKey.exeString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
Source: ProduKey.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
Source: ProduKey.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
Source: ProduKey.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: ProduKey.exeString found in binary or memory: http://www.nirsoft.net/
Source: ProduKey.exeString found in binary or memory: http://www.nirsoft.net/utils/product_cd_key_viewer.html
Source: ProduKey.exeString found in binary or memory: http://www.nirsoft.net/utils/product_cd_key_viewer.html/stext/shtml/sverhtml/sxml/stab/scomma/stabul
Source: C:\Users\user\Desktop\ProduKey.exeCode function: 0_2_0040455B OpenClipboard,0_2_0040455B
Source: ProduKey.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: ProduKey.exeReversingLabs: Detection: 55%
Source: ProduKey.exeVirustotal: Detection: 50%
Source: ProduKey.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\ProduKey.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: ProduKey.exeString found in binary or memory: 3http://crl.usertrust.com/AddTrustExternalCARoot.crl05
Source: classification engineClassification label: clean48.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\ProduKey.exeFile opened: C:\Users\user\Desktop\ProduKey.cfgJump to behavior
Source: C:\Users\user\Desktop\ProduKey.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OfficeJump to behavior
Source: ProduKey.exeStatic PE information: certificate valid
Source: ProduKey.exeStatic PE information: section name: RT_CURSOR
Source: ProduKey.exeStatic PE information: section name: RT_BITMAP
Source: ProduKey.exeStatic PE information: section name: RT_ICON
Source: ProduKey.exeStatic PE information: section name: RT_MENU
Source: ProduKey.exeStatic PE information: section name: RT_DIALOG
Source: ProduKey.exeStatic PE information: section name: RT_STRING
Source: ProduKey.exeStatic PE information: section name: RT_ACCELERATOR
Source: ProduKey.exeStatic PE information: section name: RT_GROUP_ICON
Source: ProduKey.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\Projects\VS2005\ProduKey\Release\ProduKey.pdb source: ProduKey.exe
Source: C:\Users\user\Desktop\ProduKey.exeCode function: 0_2_0040EAD0 push eax; ret 0_2_0040EAE4
Source: C:\Users\user\Desktop\ProduKey.exeCode function: 0_2_0040EAD0 push eax; ret 0_2_0040EB0C
Source: C:\Users\user\Desktop\ProduKey.exeCode function: 0_2_00401309 push ecx; ret 0_2_00401319
Source: C:\Users\user\Desktop\ProduKey.exeCode function: 0_2_0040180A GetDlgItem,LoadLibraryA,GetProcAddress,FreeLibrary,0_2_0040180A
Source: C:\Users\user\Desktop\ProduKey.exeCode function: 0_2_0040C73D RegOpenKeyExA,memset,memset,memset,memset,memset,GetPrivateProfileStringA,RegCloseKey,RegOpenKeyExA,RegCloseKey,RegOpenKeyExA,memset,RegCloseKey,RegOpenKeyExA,RegCloseKey,RegOpenKeyExA,RegCloseKey,0_2_0040C73D
Source: C:\Users\user\Desktop\ProduKey.exeCode function: 0_2_00401ACF LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00401ACF
Source: C:\Users\user\Desktop\ProduKey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ProduKey.exeWindow / User API: foregroundWindowGot 510Jump to behavior
Source: C:\Users\user\Desktop\ProduKey.exeWindow / User API: foregroundWindowGot 413Jump to behavior
Source: C:\Users\user\Desktop\ProduKey.exeCode function: 0_2_0040867D FindFirstFileA,FindNextFileA,0_2_0040867D
Source: C:\Users\user\Desktop\ProduKey.exeCode function: 0_2_0040180A GetDlgItem,LoadLibraryA,GetProcAddress,FreeLibrary,0_2_0040180A
Source: C:\Users\user\Desktop\ProduKey.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
Source: C:\Users\user\Desktop\ProduKey.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
Source: C:\Users\user\Desktop\ProduKey.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion DigitalProductIDJump to behavior
Source: C:\Users\user\Desktop\ProduKey.exeCode function: 0_2_004092C5 GetVersionExA,0_2_004092C5
Source: C:\Users\user\Desktop\ProduKey.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\16.0\Registration\{90160000-002A-0000-1000-0000000FF1CE} ProductIDJump to behavior
Source: C:\Users\user\Desktop\ProduKey.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\16.0\Registration\{90160000-002A-0000-1000-0000000FF1CE} DigitalProductIDJump to behavior
Source: C:\Users\user\Desktop\ProduKey.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\16.0\Registration\{90160000-002A-0000-1000-0000000FF1CE} DigitalProductId4Jump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2
Command and Scripting Interpreter
Path InterceptionPath Interception1
Obfuscated Files or Information
OS Credential Dumping1
Application Window Discovery
Remote Services1
Clipboard Data
Exfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Native API
Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager23
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ProduKey.exe55%ReversingLabs
ProduKey.exe50%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.nirsoft.net/utils/product_cd_key_viewer.html/stext/shtml/sverhtml/sxml/stab/scomma/stabulProduKey.exefalse
    high
    http://www.nirsoft.net/ProduKey.exefalse
      high
      http://www.nirsoft.net/utils/product_cd_key_viewer.htmlProduKey.exefalse
        high
        No contacted IP infos
        Joe Sandbox Version:36.0.0 Rainbow Opal
        Analysis ID:800703
        Start date and time:2023-02-07 18:26:35 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 5m 55s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:ProduKey.exe
        Detection:CLEAN
        Classification:clean48.winEXE@1/0@0/0
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 99.7% (good quality ratio 95.9%)
        • Quality average: 86.5%
        • Quality standard deviation: 24.7%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 48
        • Number of non-executed functions: 85
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtQueryValueKey calls found.
        No simulations
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):6.479180238883247
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.83%
        • Windows Screen Saver (13104/52) 0.13%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:ProduKey.exe
        File size:96464
        MD5:9260e593a0f2d798fddc16a7b19ad808
        SHA1:8b3736186f9963a5cedd4a2d8dca66041799d0cd
        SHA256:bace5e41e07df9f71b07828dacfde462ce609fa1cd387c7e1cc4aacc59cf00e5
        SHA512:0f2a95f78387b6c4d0c92fd2ef09d7c54c001caed53a63e99af4a19bc92ae0f9dd7a4b655f43667221169d2151a37872ddba3166f74a446be7f06862a4fe3535
        SSDEEP:1536:QuSJT0fl+h17f8OOaC4ujuZkbqYsh/Oud84KTEAUo2Gye42sbiE2:7SJT0fEhhfQH6ZkbqYshTLTGye45R2
        TLSH:F2936B43B7E04471E6E30A712ABA97368EF57D705538C90F57505A8B6CB07C0EE2A39B
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+q..J...J...J..'i_..J...i...J..'i...J...EB..J...J...K....m..J....c..J....g..J..Rich.J..........PE..L....O.X...................
        Icon Hash:54b26869f8c8cc00
        Entrypoint:0x4010e0
        Entrypoint Section:.text
        Digitally signed:true
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:
        Time Stamp:0x58EB4FC1 [Mon Apr 10 09:26:25 2017 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:db1e107cc62854bf6b319abbe0feb186
        Signature Valid:true
        Signature Issuer:CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
        Signature Validation Error:The operation completed successfully
        Error Number:0
        Not Before, Not After
        • 9/12/2014 2:00:00 AM 9/13/2019 1:59:59 AM
        Subject Chain
        • CN=Nir Sofer, O=Nir Sofer, STREET=5 Hashoshanim st., L=Ramat Gan, S=Gush Dan, PostalCode=52583, C=IL
        Version:3
        Thumbprint MD5:20080320FBD46305C5578175AB0A9EAA
        Thumbprint SHA-1:A80BAEDA573DF2712F23A41857E648475EAC9BA5
        Thumbprint SHA-256:EAFCB355770E7E64E5559482605D7801F30FEE6B159BF91196D5C9DC6B2419AC
        Serial:1AF0660E837A35A2CD92EC613FC15DB8
        Instruction
        push 00000070h
        push 0040F3F0h
        call 00007FF59CC303F9h
        xor ebx, ebx
        push ebx
        mov edi, dword ptr [0040F108h]
        call edi
        cmp word ptr [eax], 5A4Dh
        jne 00007FF59CC30231h
        mov ecx, dword ptr [eax+3Ch]
        add ecx, eax
        cmp dword ptr [ecx], 00004550h
        jne 00007FF59CC30224h
        movzx eax, word ptr [ecx+18h]
        cmp eax, 0000010Bh
        je 00007FF59CC30231h
        cmp eax, 0000020Bh
        je 00007FF59CC30217h
        mov dword ptr [ebp-1Ch], ebx
        jmp 00007FF59CC30239h
        cmp dword ptr [ecx+00000084h], 0Eh
        jbe 00007FF59CC30204h
        xor eax, eax
        cmp dword ptr [ecx+000000F8h], ebx
        jmp 00007FF59CC30220h
        cmp dword ptr [ecx+74h], 0Eh
        jbe 00007FF59CC301F4h
        xor eax, eax
        cmp dword ptr [ecx+000000E8h], ebx
        setne al
        mov dword ptr [ebp-1Ch], eax
        mov dword ptr [ebp-04h], ebx
        push 00000002h
        call dword ptr [0040F370h]
        pop ecx
        or dword ptr [00412EBCh], FFFFFFFFh
        or dword ptr [00412EC0h], FFFFFFFFh
        call dword ptr [0040F36Ch]
        mov ecx, dword ptr [0041217Ch]
        mov dword ptr [eax], ecx
        call dword ptr [0040F368h]
        mov ecx, dword ptr [00412178h]
        mov dword ptr [eax], ecx
        mov eax, dword ptr [0040F364h]
        mov eax, dword ptr [eax]
        mov dword ptr [00412EB8h], eax
        call 00007FF59CC3034Fh
        cmp dword ptr [00412000h], ebx
        jne 00007FF59CC3021Eh
        push 004012CAh
        call dword ptr [0040F31Ch]
        pop ecx
        call 00007FF59CC30324h
        Programming Language:
        • [RES] VS2005 build 50727
        • [LNK] VS2005 build 50727
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x108340xf0.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x130000x39b4.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x14a000x2ed0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0xf3d00x1c.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0xf0000x394.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000xdc3f0xde00False0.5847585867117117data6.373935270388497IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0xf0000x2a5e0x2c00False0.46351207386363635data5.673793868405335IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x120000xec40x200False0.20703125data1.1949104842322338IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x130000x39b40x3a00False0.31654094827586204data4.101674932157477IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountry
        RT_CURSOR0x136e80x134dataEnglishUnited States
        RT_BITMAP0x1381c0x3e8Device independent bitmap graphic, 112 x 16 x 4, image size 896, 16 important colorsHebrewIsrael
        RT_BITMAP0x13c040xd8Device independent bitmap graphic, 14 x 14 x 4, image size 112, resolution 3780 x 3780 px/mEnglishUnited States
        RT_BITMAP0x13cdc0xd8Device independent bitmap graphic, 14 x 14 x 4, image size 112, resolution 3780 x 3780 px/mEnglishUnited States
        RT_ICON0x13db40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640HebrewIsrael
        RT_ICON0x1409c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192HebrewIsrael
        RT_ICON0x141c40x128Device independent bitmap graphic, 16 x 32 x 4, image size 192HebrewIsrael
        RT_MENU0x142ec0x73adataEnglishUnited States
        RT_MENU0x14a280x20cdataEnglishUnited States
        RT_DIALOG0x14c340xa2dataHebrewIsrael
        RT_DIALOG0x14cd80x296dataHebrewIsrael
        RT_DIALOG0x14f700xabcdataHebrewIsrael
        RT_DIALOG0x15a2c0xfadataHebrewIsrael
        RT_STRING0x15b280x230dataEnglishUnited States
        RT_STRING0x15d580x52dataEnglishUnited States
        RT_STRING0x15dac0x128dataEnglishUnited States
        RT_STRING0x15ed40x4cMatlab v4 mat-file (little endian) S, numeric, rows 0, columns 0EnglishUnited States
        RT_STRING0x15f200x50dataEnglishUnited States
        RT_STRING0x15f700xd6Matlab v4 mat-file (little endian) P, numeric, rows 0, columns 0EnglishUnited States
        RT_STRING0x160480x5adataEnglishUnited States
        RT_STRING0x160a40x42dataEnglishUnited States
        RT_STRING0x160e80x6adataEnglishUnited States
        RT_STRING0x161540x78dataEnglishUnited States
        RT_STRING0x161cc0x6cMatlab v4 mat-file (little endian) Q, numeric, rows 0, columns 0EnglishUnited States
        RT_STRING0x162380x62dataEnglishUnited States
        RT_ACCELERATOR0x1629c0x70dataHebrewIsrael
        RT_GROUP_CURSOR0x1630c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
        RT_GROUP_ICON0x163200x22dataHebrewIsrael
        RT_GROUP_ICON0x163440x14dataHebrewIsrael
        RT_VERSION0x163580x2dcdataHebrewIsrael
        RT_MANIFEST0x166340x380ASCII text, with very long lines (435), with CRLF line terminatorsEnglishUnited States
        DLLImport
        MPR.dllWNetOpenEnumA, WNetEnumResourceA, WNetCloseEnum
        msvcrt.dll_cexit, _XcptFilter, _exit, _c_exit, _onexit, __dllonexit, _purecall, exit, _strlwr, _itoa, strchr, strtoul, _memicmp, __setusermatherr, _initterm, __getmainargs, qsort, _acmdln, malloc, free, ??2@YAPAXI@Z, ??3@YAXPAX@Z, atof, atoi, _strnicmp, _mbsicmp, _stricmp, _strcmpi, strrchr, strncat, sprintf, _adjust_fdiv, __p__commode, __p__fmode, __set_app_type, _controlfp, _except_handler3, memset, memcpy
        COMCTL32.dllCreateToolbarEx, ImageList_Create, ImageList_ReplaceIcon, ImageList_SetImageCount, ImageList_AddMasked
        WS2_32.dllgethostbyname, WSAStartup, WSACleanup, htons, WSAGetLastError, connect, WSAAsyncSelect, gethostbyaddr, closesocket, WSASetLastError
        KERNEL32.dllOpenProcess, CreateThread, ResumeThread, ReadProcessMemory, ExitProcess, CreateFileA, GetStartupInfoA, GetFileSize, GetModuleFileNameA, GetTimeFormatA, GetCurrentProcessId, SetErrorMode, DeleteFileA, GetStdHandle, EnumResourceNamesA, WritePrivateProfileStringA, GetPrivateProfileIntA, MultiByteToWideChar, GetFileAttributesA, LoadLibraryExA, GetLastError, FindNextFileA, FindFirstFileA, GetLogicalDrives, GetComputerNameA, GetDriveTypeA, WideCharToMultiByte, GetPrivateProfileStringA, Sleep, GetCurrentProcess, CompareFileTime, FileTimeToLocalFileTime, FreeLibrary, FileTimeToSystemTime, GetProcAddress, LoadLibraryA, GetModuleHandleA, FormatMessageA, GetTempFileNameA, FindClose, GetWindowsDirectoryA, ReadFile, GetDateFormatA, GetSystemDirectoryA, GetVersionExA, WriteFile, CloseHandle, GetTempPathA, GlobalAlloc, LocalFree, GlobalLock, GlobalUnlock
        USER32.dllSetTimer, PostQuitMessage, TrackPopupMenu, EndDeferWindowPos, KillTimer, GetFocus, TranslateMessage, DispatchMessageA, DestroyWindow, ModifyMenuA, CreateDialogParamA, LoadStringA, BeginDeferWindowPos, GetMessageA, IsDialogMessageA, DeferWindowPos, RegisterWindowMessageA, SetCursor, GetSysColorBrush, ChildWindowFromPoint, ShowWindow, LoadCursorA, EndDialog, GetDlgItem, CreateWindowExA, SetDlgItemInt, SendDlgItemMessageA, GetDlgItemInt, SetDlgItemTextA, GetDlgItemTextA, SetWindowTextA, RegisterClassA, UpdateWindow, GetSystemMetrics, PostMessageA, SetMenu, LoadAcceleratorsA, SetWindowPos, DefWindowProcA, TranslateAcceleratorA, MessageBoxA, GetWindowPlacement, SendMessageA, GetWindowRect, LoadImageA, LoadIconA, GetWindowLongA, SetWindowLongA, InvalidateRect, SetFocus, MapWindowPoints, GetSysColor, GetClassNameA, GetMenu, CloseClipboard, GetParent, OpenClipboard, EmptyClipboard, GetDC, GetSubMenu, EnableMenuItem, MoveWindow, ReleaseDC, CheckMenuItem, GetMenuItemCount, GetClientRect, LoadMenuA, GetMenuStringA, SetClipboardData, EnableWindow, GetCursorPos, DialogBoxParamA, GetDlgCtrlID, DestroyMenu, EnumChildWindows, GetMenuItemInfoA, GetWindowTextA
        GDI32.dllGetTextExtentPoint32A, SetBkColor, GetStockObject, GetDeviceCaps, SetTextColor, CreateFontIndirectA, SetBkMode, DeleteObject
        comdlg32.dllGetSaveFileNameA, GetOpenFileNameA, FindTextA
        ADVAPI32.dllRegUnLoadKeyA, RegConnectRegistryA, RegEnumValueA, RegDeleteValueA, RegQueryInfoKeyA, RegOpenKeyExA, RegCloseKey, RegEnumKeyExA, RegQueryValueExA, RegSetValueExA, RegDeleteKeyA, RegLoadKeyA
        SHELL32.dllShellExecuteA, SHBrowseForFolderA, SHGetMalloc, SHGetPathFromIDListA, ShellExecuteExA
        ole32.dllCoInitialize, CoUninitialize
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        HebrewIsrael
        Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Target ID:0
        Start time:18:27:36
        Start date:07/02/2023
        Path:C:\Users\user\Desktop\ProduKey.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\Desktop\ProduKey.exe
        Imagebase:0x400000
        File size:96464 bytes
        MD5 hash:9260E593A0F2D798FDDC16A7B19AD808
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low

        Reset < >

          Execution Graph

          Execution Coverage:16.8%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:4.1%
          Total number of Nodes:1655
          Total number of Limit Nodes:66
          execution_graph 7319 40eb49 7320 40eb4e 7319->7320 7323 401062 7320->7323 7324 40103c 2 API calls 7323->7324 7325 40106b 7324->7325 7338 405250 7339 405268 7338->7339 7340 40547c 7339->7340 7341 4052a5 7339->7341 7342 4040c5 14 API calls 7339->7342 7343 4052b3 7341->7343 7413 403eb6 7341->7413 7345 4052a0 7342->7345 7344 4052c1 7343->7344 7422 404d48 memset 7343->7422 7348 4052d3 7344->7348 7427 401a57 memset 7344->7427 7402 404b55 7345->7402 7351 4052ef 7348->7351 7352 4040c5 14 API calls 7348->7352 7353 40530f 7351->7353 7354 4040c5 14 API calls 7351->7354 7352->7351 7355 40531d 7353->7355 7432 4044f4 7353->7432 7358 40530a 7354->7358 7357 40532b 7355->7357 7435 4044c9 7355->7435 7360 405339 7357->7360 7441 40d61b SendMessageA 7357->7441 7361 404b55 7 API calls 7358->7361 7363 405347 7360->7363 7364 405092 4 API calls 7360->7364 7361->7353 7365 405353 7363->7365 7442 40459e 7363->7442 7364->7363 7367 40535f 7365->7367 7451 40455b 7365->7451 7368 40536b 7367->7368 7460 404c86 7367->7460 7371 405379 7368->7371 7467 404540 7368->7467 7373 40538c 7371->7373 7470 40d62e PostMessageA 7371->7470 7375 4053bd 7373->7375 7471 40ddd4 7373->7471 7376 4053d2 7375->7376 7480 404ce0 memset 7375->7480 7379 4053e4 7376->7379 7485 406472 7376->7485 7382 4053f6 7379->7382 7489 406451 7379->7489 7385 405404 7382->7385 7493 404db0 7382->7493 7388 405412 7385->7388 7507 404519 7385->7507 7391 405420 7388->7391 7512 4044ab 7388->7512 7393 405430 7391->7393 7515 404c59 7391->7515 7395 405440 7393->7395 7396 404c59 19 API calls 7393->7396 7399 405452 7395->7399 7520 406b96 7395->7520 7396->7395 7398 405464 7398->7340 7523 4056ea 7398->7523 7399->7398 7400 406b88 4 API calls 7399->7400 7400->7398 7403 4056a0 SendMessageA 7402->7403 7404 404b62 7403->7404 7526 4097d6 LoadCursorA SetCursor 7404->7526 7406 404b67 7527 4072a1 7406->7527 7410 404b84 7411 4056a0 SendMessageA 7410->7411 7412 404b91 7411->7412 7412->7341 7414 403dee 15 API calls 7413->7414 7415 403ec9 memset 7414->7415 7557 409370 GetModuleFileNameA 7415->7557 7417 403ef2 7558 408b01 memset ShellExecuteExA 7417->7558 7419 403eff 7420 403f10 7419->7420 7421 403f04 DestroyWindow 7419->7421 7420->7343 7421->7420 7559 403f29 memset 7422->7559 7425 404dad 7425->7344 7621 40197b memset 7427->7621 7430 401ab3 7430->7348 7431 401a8c ShellExecuteA 7431->7348 7433 4040c5 14 API calls 7432->7433 7434 40450c 7433->7434 7436 4040c5 14 API calls 7435->7436 7437 4044e1 7436->7437 7438 404020 18 API calls 7437->7438 7439 4044e7 InvalidateRect 7438->7439 7439->7357 7441->7360 7636 406b4d 7442->7636 7444 4045b1 7445 4045d3 7444->7445 7446 4045b5 OpenClipboard 7444->7446 7645 4054ff SetFocus 7445->7645 7446->7445 7447 4045c5 7446->7447 7639 4094fe EmptyClipboard 7447->7639 7450 4045df 7450->7365 7452 406b4d SendMessageA 7451->7452 7453 40456e 7452->7453 7454 404590 7453->7454 7455 404572 OpenClipboard 7453->7455 7650 4054ff SetFocus 7454->7650 7455->7454 7457 404582 7455->7457 7459 4094fe 7 API calls 7457->7459 7458 40459c 7458->7367 7459->7454 7461 406b4d SendMessageA 7460->7461 7462 404c9b 7461->7462 7466 404ccb 7462->7466 7651 4027e0 7462->7651 7465 404cde 7465->7368 7654 4054ff SetFocus 7466->7654 7468 4040c5 14 API calls 7467->7468 7469 404558 7468->7469 7469->7371 7470->7373 7655 40dda1 7471->7655 7474 40dda1 strncat 7475 4053a4 7474->7475 7476 40e094 7475->7476 7477 407fee 2 API calls 7476->7477 7478 4053b2 7477->7478 7479 4054ff SetFocus 7478->7479 7479->7375 7481 403f29 18 API calls 7480->7481 7482 404d26 7481->7482 7483 404d45 7482->7483 7484 404766 18 API calls 7482->7484 7483->7376 7484->7483 7486 40647b 7485->7486 7487 4060a2 SendMessageA 7486->7487 7488 406492 7487->7488 7488->7379 7490 40645a 7489->7490 7491 4060a2 SendMessageA 7490->7491 7492 406471 7491->7492 7492->7382 7659 4093d9 GetTempPathA 7493->7659 7495 404dc5 7496 404766 18 API calls 7495->7496 7497 404dd3 7496->7497 7498 404e25 7497->7498 7499 404dd8 OpenClipboard 7497->7499 7498->7385 7500 404df7 GetLastError 7499->7500 7501 404de8 7499->7501 7503 404df4 7500->7503 7662 409cb1 EmptyClipboard 7501->7662 7504 404e18 DeleteFileA 7503->7504 7505 40d8a3 6 API calls 7503->7505 7504->7498 7506 404e17 7505->7506 7506->7504 7508 4040c5 14 API calls 7507->7508 7509 404531 7508->7509 7673 40d62e PostMessageA 7509->7673 7511 40453d 7511->7388 7513 4040c5 14 API calls 7512->7513 7514 4044c0 7513->7514 7516 404766 18 API calls 7515->7516 7517 404c6f 7516->7517 7518 404c7f 7517->7518 7674 408f52 ShellExecuteA 7517->7674 7518->7393 7675 40a53b 7520->7675 7524 4056f5 GetModuleHandleA FindTextA 7523->7524 7525 405749 7523->7525 7524->7340 7525->7340 7526->7406 7531 406ba4 7527->7531 7530 4097c9 SetCursor 7530->7410 7532 406bb0 7531->7532 7533 406c19 7532->7533 7539 40a43b 7532->7539 7549 406755 7533->7549 7552 40a06b SendMessageA 7539->7552 7541 40a446 7542 406bf7 7541->7542 7553 40a00d SendMessageA 7541->7553 7544 40a419 7542->7544 7554 40a06b SendMessageA 7544->7554 7546 40a422 7555 40a00d SendMessageA 7546->7555 7548 40a437 7548->7533 7556 409f4e SendMessageA 7549->7556 7551 404b7f 7551->7530 7552->7541 7553->7541 7554->7546 7555->7548 7556->7551 7557->7417 7558->7419 7560 407c3f 12 API calls 7559->7560 7561 403f63 7560->7561 7562 407c3f 12 API calls 7561->7562 7563 403f74 7562->7563 7564 407c3f 12 API calls 7563->7564 7565 403f84 7564->7565 7566 407c3f 12 API calls 7565->7566 7567 403f90 7566->7567 7568 407c3f 12 API calls 7567->7568 7569 403fa5 7568->7569 7570 407c3f 12 API calls 7569->7570 7571 403fb1 7570->7571 7572 407c3f 12 API calls 7571->7572 7573 403fc5 7572->7573 7574 407c3f 12 API calls 7573->7574 7575 403fd5 7574->7575 7587 408b73 memset 7575->7587 7578 407c3f 12 API calls 7579 403ffa 7578->7579 7593 408d55 7579->7593 7582 404766 7597 4070bc 7582->7597 7585 4047af 7585->7425 7586 40d8a3 6 API calls 7586->7585 7588 403ff1 7587->7588 7591 408ba9 7587->7591 7588->7578 7589 408bba sprintf 7589->7591 7590 408be3 memcpy 7590->7591 7591->7589 7591->7590 7591->7591 7592 408c13 memcpy 7591->7592 7592->7588 7592->7591 7594 408d62 7593->7594 7595 408d64 GetSaveFileNameA 7593->7595 7594->7595 7596 404016 7595->7596 7596->7425 7596->7582 7598 406c2a 3 API calls 7597->7598 7599 4070ce 7598->7599 7618 4096fd CreateFileA 7599->7618 7601 4070d6 7602 404794 7601->7602 7619 4097d6 LoadCursorA SetCursor 7601->7619 7602->7585 7602->7586 7604 4070f2 7605 407122 7604->7605 7606 406695 WriteFile 7604->7606 7607 407138 7605->7607 7608 407151 7605->7608 7609 405c6a WriteFile 7605->7609 7606->7605 7607->7608 7611 405cca 2 API calls 7607->7611 7610 4060cc SendMessageA 7608->7610 7609->7607 7617 407158 7610->7617 7611->7608 7612 405fc3 SendMessageA 7612->7617 7613 40719b 7614 4071d7 CloseHandle 7613->7614 7616 4066ad WriteFile 7613->7616 7620 4097c9 SetCursor 7614->7620 7616->7614 7617->7612 7617->7613 7618->7601 7619->7604 7620->7602 7622 402134 3 API calls 7621->7622 7623 4019bf 7622->7623 7624 4019e1 strchr 7623->7624 7625 401a19 strrchr 7623->7625 7633 401a13 7623->7633 7626 4019ef 7624->7626 7624->7633 7627 401a27 strchr 7625->7627 7625->7633 7634 409396 GetFileAttributesA 7626->7634 7629 401a35 7627->7629 7635 409396 GetFileAttributesA 7629->7635 7630 4019fd 7632 409476 memcpy 7630->7632 7630->7633 7632->7633 7633->7430 7633->7431 7634->7630 7635->7630 7646 40a56d 7636->7646 7638 406b68 7638->7444 7640 409510 GlobalAlloc 7639->7640 7641 409561 CloseClipboard 7639->7641 7643 409535 GlobalLock memcpy GlobalUnlock SetClipboardData 7640->7643 7644 40955f 7640->7644 7641->7445 7643->7644 7644->7641 7645->7450 7649 409fb7 SendMessageA 7646->7649 7648 40a576 7648->7638 7649->7648 7650->7458 7652 407fee 2 API calls 7651->7652 7653 4027f7 7652->7653 7653->7466 7654->7465 7656 40ddcd 7655->7656 7657 40ddd1 7656->7657 7658 40ddae strncat 7656->7658 7657->7474 7658->7656 7660 409408 GetTempFileNameA 7659->7660 7661 4093fa GetWindowsDirectoryA 7659->7661 7660->7495 7661->7660 7672 409716 CreateFileA 7662->7672 7664 409cc9 7665 409d40 GetLastError 7664->7665 7666 409cd2 GetFileSize GlobalAlloc 7664->7666 7669 409d49 CloseClipboard 7665->7669 7667 409cf5 GlobalLock ReadFile 7666->7667 7668 409d29 GetLastError 7666->7668 7667->7668 7670 409d13 GlobalUnlock SetClipboardData 7667->7670 7671 409d32 CloseHandle 7668->7671 7669->7503 7670->7671 7671->7669 7672->7664 7673->7511 7674->7518 7676 40a4ba 2 API calls 7675->7676 7679 40a543 7676->7679 7677 406ba2 7677->7399 7679->7677 7681 409e83 SendMessageA 7679->7681 7682 409e99 SendMessageA 7679->7682 7681->7679 7682->7679 5394 4010e0 5413 4012d0 5394->5413 5396 4010ec GetModuleHandleA 5397 4010fe __set_app_type __p__fmode __p__commode 5396->5397 5399 401190 5397->5399 5400 4011a4 5399->5400 5401 401198 __setusermatherr 5399->5401 5414 4012b8 _controlfp 5400->5414 5401->5400 5403 4011a9 _initterm __getmainargs _initterm 5404 401200 GetStartupInfoA 5403->5404 5406 401234 GetModuleHandleA 5404->5406 5415 404e27 5406->5415 5409 401254 5410 401265 _cexit 5409->5410 5411 40125e exit 5409->5411 5412 40129a 5410->5412 5411->5410 5413->5396 5414->5403 5464 40a4cc 5415->5464 5417 404e3b 5418 404e49 CoInitialize 5417->5418 5419 404e3f 5417->5419 5469 4018bc 5418->5469 5419->5409 5422 404e7d 5473 4043a7 ??2@YAPAXI 5422->5473 5424 404e86 5481 4089a5 5424->5481 5429 404ed7 5513 407da7 memset 5429->5513 5430 404eaf 5500 40820f memset 5430->5500 5436 4087a8 _stricmp 5438 404eed 5436->5438 5437 404ec7 5506 4087d7 5437->5506 5440 404ef1 5438->5440 5441 404f0f 5438->5441 5527 40385f RegDeleteKeyA 5440->5527 5442 404f25 5441->5442 5529 404b92 5441->5529 5446 404ef6 5442->5446 5518 4046c8 5442->5518 5528 403a2b ??3@YAXPAX 5446->5528 5448 404f3b 5521 40d722 5448->5521 5449 404eff 5451 4087d7 3 API calls 5449->5451 5451->5419 5452 404f42 5524 40d5fd GetModuleHandleA LoadAcceleratorsA 5452->5524 5454 404f4a 5525 40d62e PostMessageA 5454->5525 5456 404f56 KiUserCallbackDispatcher 5457 404fcd WSACleanup CoUninitialize 5456->5457 5459 404f6a 5456->5459 5457->5446 5460 404fbf KiUserCallbackDispatcher 5459->5460 5461 404f97 IsDialogMessageA 5459->5461 5462 404f8b IsDialogMessageA 5459->5462 5526 40d5e4 TranslateAcceleratorA 5459->5526 5460->5457 5460->5459 5461->5460 5463 404fa9 TranslateMessage DispatchMessageA 5461->5463 5462->5460 5462->5461 5463->5460 5547 40a22e LoadLibraryA 5464->5547 5467 40a504 5467->5417 5468 40a4ed MessageBoxA 5468->5417 5470 4018c5 LoadLibraryA 5469->5470 5471 4018ea SetErrorMode WSAStartup 5469->5471 5470->5471 5472 4018d9 GetProcAddress 5470->5472 5471->5422 5472->5471 5474 4043ce 5473->5474 5475 4043d9 ??2@YAPAXI 5474->5475 5476 4043f6 GetModuleHandleA LoadIconA 5475->5476 5477 4043ee 5475->5477 5480 40443b 5476->5480 5553 40bbf2 5477->5553 5480->5424 5578 408630 free free 5481->5578 5483 408ae5 5579 408540 5483->5579 5488 408aba 5488->5483 5491 408559 4 API calls 5488->5491 5489 408a65 free 5490 4089de 5489->5490 5490->5483 5490->5488 5490->5489 5582 408559 5490->5582 5587 40858f 5490->5587 5598 409425 5490->5598 5606 408943 5490->5606 5494 408acb 5491->5494 5495 40858f 6 API calls 5494->5495 5495->5483 5496 4087a8 5498 4087b0 5496->5498 5499 404eab 5496->5499 5498->5499 5609 40878f 5498->5609 5499->5429 5499->5430 5614 407d7f 5500->5614 5505 403a2b ??3@YAXPAX 5505->5437 5647 408630 free free 5506->5647 5508 4087df 5648 401000 5508->5648 5512 4087ee 5512->5419 5514 407d7f 2 API calls 5513->5514 5515 407dd8 5514->5515 5652 407913 5515->5652 5668 40da4a GetModuleHandleA RegisterClassA 5518->5668 5520 4046cf GetModuleHandleA CreateWindowExA 5520->5448 5522 40d732 ShowWindow KiUserCallbackDispatcher 5521->5522 5522->5452 5524->5454 5525->5456 5526->5459 5527->5446 5528->5449 5669 40c510 5529->5669 5531 404c51 5531->5442 5532 404bd7 _stricmp 5533 404baf 5532->5533 5533->5531 5533->5532 5535 404c0b 5533->5535 5672 40389d _stricmp 5533->5672 5535->5531 5685 403dee 5535->5685 5543 404c2a 5721 404738 5543->5721 5548 40a246 GetProcAddress 5547->5548 5549 40a26e #17 5547->5549 5550 40a256 5548->5550 5551 40a25f FreeLibrary 5548->5551 5552 40a26a 5549->5552 5550->5551 5551->5549 5551->5552 5552->5467 5552->5468 5558 4060ff memset ??2@YAPAXI 5553->5558 5557 40bc05 5557->5476 5559 40612d ??2@YAPAXI 5558->5559 5561 40614e ??2@YAPAXI 5559->5561 5563 40616f ??2@YAPAXI 5561->5563 5565 406190 5563->5565 5566 4034c0 5565->5566 5567 4034e6 5566->5567 5568 4034df 5566->5568 5567->5557 5570 4034af 5568->5570 5573 40847c 5570->5573 5574 408486 5573->5574 5575 408497 ??2@YAPAXI memset memcpy 5573->5575 5574->5575 5577 4034be 5574->5577 5576 4084da ??3@YAXPAX 5575->5576 5575->5577 5576->5577 5577->5567 5578->5490 5580 404e9a 5579->5580 5581 408546 free 5579->5581 5580->5496 5581->5580 5583 408572 5582->5583 5584 408567 free 5582->5584 5586 409425 3 API calls 5583->5586 5585 40857d 5584->5585 5585->5490 5586->5585 5588 40859e 5587->5588 5588->5588 5589 4085c8 5588->5589 5590 4085bf free 5588->5590 5592 409425 3 API calls 5589->5592 5591 4085d2 5590->5591 5593 4085e2 free 5591->5593 5594 4085eb 5591->5594 5592->5591 5595 4085f7 memcpy 5593->5595 5596 409425 3 API calls 5594->5596 5595->5490 5597 4085f6 5596->5597 5597->5595 5599 409472 5598->5599 5600 40942c malloc 5598->5600 5599->5490 5602 409468 5600->5602 5603 40944d 5600->5603 5602->5490 5604 409461 free 5603->5604 5605 409451 memcpy 5603->5605 5604->5602 5605->5604 5607 408559 4 API calls 5606->5607 5608 40894c 5607->5608 5608->5490 5612 408530 5609->5612 5613 408452 _stricmp 5612->5613 5613->5498 5627 409370 GetModuleFileNameA 5614->5627 5616 407d89 5628 409b9a strrchr 5616->5628 5619 408181 5620 408188 5619->5620 5620->5620 5630 4075bc 5620->5630 5623 4075bc 3 API calls 5624 4081c3 EnumResourceNamesA EnumResourceNamesA 5623->5624 5635 407de5 5624->5635 5627->5616 5629 407d8f GetModuleHandleA 5628->5629 5629->5619 5642 40ead0 5630->5642 5633 407624 5633->5623 5634 407614 WritePrivateProfileStringA 5634->5633 5636 40ead0 5635->5636 5637 407df2 memset 5636->5637 5638 407e14 LoadStringA 5637->5638 5641 407e2a 5638->5641 5640 404ebe 5640->5505 5641->5638 5641->5640 5644 407993 _itoa 5641->5644 5643 4075c9 memset GetPrivateProfileStringA 5642->5643 5643->5633 5643->5634 5645 4075bc 3 API calls 5644->5645 5646 4079c5 5645->5646 5646->5641 5647->5508 5649 401006 free 5648->5649 5650 40100d 5648->5650 5649->5650 5651 408630 free free 5650->5651 5651->5512 5663 409396 GetFileAttributesA 5652->5663 5654 40791c 5662 404edc 5654->5662 5664 4076c4 GetPrivateProfileIntA 5654->5664 5656 40794d 5665 4076a0 GetPrivateProfileStringA 5656->5665 5658 407969 5666 4076a0 GetPrivateProfileStringA 5658->5666 5660 40797a 5667 4076a0 GetPrivateProfileStringA 5660->5667 5662->5436 5663->5654 5664->5656 5665->5658 5666->5660 5667->5662 5668->5520 5729 4073f7 5669->5729 5673 4038b2 _stricmp 5672->5673 5674 4038ae 5672->5674 5675 4038c3 5673->5675 5676 4038c7 _stricmp 5673->5676 5674->5533 5675->5533 5677 4038d8 5676->5677 5678 4038dc _stricmp 5676->5678 5677->5533 5679 4038f1 _stricmp 5678->5679 5680 4038ed 5678->5680 5681 403902 5679->5681 5682 403906 _stricmp 5679->5682 5680->5533 5681->5533 5683 403917 5682->5683 5684 40391b _mbsicmp 5682->5684 5683->5533 5684->5533 5686 403e02 5685->5686 5687 403e0c memset 5685->5687 5785 40385f RegDeleteKeyA 5686->5785 5778 409370 GetModuleFileNameA 5687->5778 5690 403e07 5692 403eb0 5690->5692 5691 403e35 strrchr 5693 403e4a 5691->5693 5699 403a66 5692->5699 5779 40b277 5693->5779 5700 4087a8 _stricmp 5699->5700 5704 403a82 5700->5704 5701 403ce1 5705 403cec 5701->5705 5702 40878f _stricmp 5702->5704 5703 409476 memcpy 5703->5704 5704->5701 5704->5702 5704->5703 5706 403dea 5705->5706 5707 403d01 5705->5707 5709 404ab4 5706->5709 5707->5706 5708 40878f _stricmp 5707->5708 5708->5707 5710 404af8 5709->5710 5714 404ac3 5709->5714 5842 4097d6 LoadCursorA SetCursor 5710->5842 5712 40878f _stricmp 5712->5714 5713 404b19 5715 4087a8 _stricmp 5713->5715 5714->5710 5714->5712 5838 406f1b 5714->5838 5717 404b3e 5715->5717 5718 404b50 SetCursor 5717->5718 5843 4068b6 5717->5843 5718->5543 5868 406f5d 5721->5868 5724 404492 5725 4044a9 5724->5725 5726 40449d 5724->5726 5725->5531 5936 40bbb8 5726->5936 5730 40740a 5729->5730 5741 40685a 5730->5741 5733 407c3f 12 API calls 5735 407469 5733->5735 5734 4074f7 ??2@YAPAXI ??2@YAPAXI 5736 407541 5734->5736 5737 407536 5734->5737 5735->5733 5735->5734 5751 406ceb 5736->5751 5762 405596 5737->5762 5740 407582 5740->5533 5742 406861 ??3@YAXPAX 5741->5742 5743 406868 5741->5743 5742->5743 5744 406876 5743->5744 5745 40686f ??3@YAXPAX 5743->5745 5746 406880 ??3@YAXPAX 5744->5746 5747 406887 5744->5747 5745->5744 5746->5747 5748 4068a1 ??2@YAPAXI ??2@YAPAXI 5747->5748 5766 405581 5747->5766 5748->5735 5769 4067a2 5751->5769 5754 408559 4 API calls 5755 406d07 5754->5755 5756 408559 4 API calls 5755->5756 5757 406d11 5756->5757 5758 408559 4 API calls 5757->5758 5759 406d1b 5758->5759 5760 408559 4 API calls 5759->5760 5761 406d25 5760->5761 5761->5740 5763 4055a0 ??2@YAPAXI 5762->5763 5764 40559d 5762->5764 5765 4055c6 5763->5765 5764->5763 5765->5736 5765->5765 5767 405591 ??3@YAXPAX 5766->5767 5768 405587 ??3@YAXPAX 5766->5768 5767->5748 5768->5767 5770 408540 free 5769->5770 5771 4067ab 5770->5771 5772 408540 free 5771->5772 5773 4067b3 5772->5773 5774 408540 free 5773->5774 5775 4067bb 5774->5775 5776 408540 free 5775->5776 5777 4067c3 5776->5777 5777->5754 5778->5691 5780 40b28e 5779->5780 5799 401ff1 5780->5799 5785->5690 5786 40d7f5 5787 40d800 5786->5787 5788 40d807 memset 5786->5788 5811 40d7d7 5787->5811 5790 40d805 5788->5790 5791 403ea5 5790->5791 5814 40d74a 5790->5814 5793 4067c5 5791->5793 5794 4067d1 5793->5794 5795 4067dc 5793->5795 5821 406266 5794->5821 5797 406824 5795->5797 5824 406273 5795->5824 5797->5692 5800 402013 5799->5800 5801 402004 WritePrivateProfileStringA 5799->5801 5807 401f76 GetPrivateProfileStringA 5800->5807 5802 402025 5801->5802 5804 409b35 5802->5804 5808 4092c5 5804->5808 5807->5802 5809 4092d4 GetVersionExA 5808->5809 5810 403e9e 5808->5810 5809->5810 5810->5786 5812 40d7e1 GetWindowPlacement 5811->5812 5813 40d7f4 5811->5813 5812->5813 5813->5790 5815 40d7d3 5814->5815 5816 40d759 5814->5816 5815->5791 5816->5815 5817 40d78d GetSystemMetrics 5816->5817 5817->5815 5818 40d7a1 GetSystemMetrics 5817->5818 5818->5815 5819 40d7af 5818->5819 5819->5815 5820 40d7b8 SetWindowPos 5819->5820 5820->5815 5827 4061aa 5821->5827 5833 40620a 5824->5833 5828 406204 5827->5828 5829 4061b9 memset 5827->5829 5828->5795 5829->5828 5831 4061d0 5829->5831 5831->5828 5832 40a111 SendMessageA 5831->5832 5832->5831 5834 40625c 5833->5834 5835 406213 5833->5835 5834->5797 5835->5834 5837 40a136 SendMessageA 5835->5837 5837->5835 5839 406f20 5838->5839 5846 406db8 5839->5846 5842->5713 5844 4068c3 5843->5844 5845 4068f0 qsort 5844->5845 5845->5718 5855 406c2a ??2@YAPAXI 5846->5855 5848 406e21 5850 406e32 _mbsicmp _mbsicmp 5848->5850 5854 406e8c 5848->5854 5849 406dc7 5849->5848 5851 406ded atoi 5849->5851 5850->5848 5853 406dfe 5851->5853 5852 4095d5 _memicmp 5852->5854 5853->5714 5854->5852 5854->5853 5858 406ca3 ??3@YAXPAX 5855->5858 5859 406c5c 5855->5859 5858->5849 5859->5858 5860 406767 5859->5860 5861 406794 5860->5861 5862 406779 5860->5862 5864 40a298 5861->5864 5862->5859 5867 40a111 SendMessageA 5864->5867 5866 40a2b3 5866->5862 5867->5866 5869 406c2a 3 API calls 5868->5869 5870 406f6f 5869->5870 5871 406f80 GetStdHandle 5870->5871 5872 406f77 5870->5872 5874 406f7d 5871->5874 5894 4096fd CreateFileA 5872->5894 5875 4070a0 5874->5875 5876 406f96 5874->5876 5878 4097f0 6 API calls 5875->5878 5895 4097d6 LoadCursorA SetCursor 5876->5895 5879 404762 5878->5879 5879->5724 5880 406fa2 5881 406fd2 5880->5881 5896 406695 5880->5896 5883 406fea 5881->5883 5887 407005 5881->5887 5899 405c6a 5881->5899 5883->5887 5905 405cca 5883->5905 5886 40703a 5888 407088 5886->5888 5919 4066ad 5886->5919 5887->5886 5913 4097f0 5887->5913 5890 407090 CloseHandle 5888->5890 5891 407099 5888->5891 5890->5891 5922 4097c9 SetCursor 5891->5922 5894->5874 5895->5880 5923 405d5e 5896->5923 5900 405c72 5899->5900 5901 405cb6 5899->5901 5900->5901 5904 4096d5 WriteFile 5900->5904 5902 4096d5 WriteFile 5901->5902 5903 405cc4 5902->5903 5903->5883 5904->5900 5906 40ead0 5905->5906 5907 405cd7 memset 5906->5907 5908 405d4a 5907->5908 5912 405cfb 5907->5912 5909 4096d5 WriteFile 5908->5909 5910 405d57 5909->5910 5910->5887 5911 4096d5 WriteFile 5911->5912 5912->5908 5912->5911 5914 409808 5913->5914 5915 4097fe GetLastError 5913->5915 5916 409810 5914->5916 5929 40972f 5914->5929 5915->5914 5916->5886 5920 405d5e WriteFile 5919->5920 5921 4066bb 5920->5921 5921->5888 5922->5879 5926 4096d5 5923->5926 5925 405d6b 5925->5881 5927 4096df 5926->5927 5927->5927 5928 4096e6 WriteFile 5927->5928 5928->5925 5930 409766 FormatMessageA 5929->5930 5931 40974f LoadLibraryExA 5929->5931 5933 4097ae sprintf MessageBoxA 5930->5933 5934 40977f LocalFree 5930->5934 5931->5930 5932 409761 5931->5932 5932->5930 5933->5916 5934->5933 5941 402e10 5936->5941 5940 40bbe2 5942 402e20 5941->5942 5943 402e16 FreeLibrary 5941->5943 5944 408289 5942->5944 5943->5942 5945 408299 5944->5945 5946 40828f FreeLibrary 5944->5946 5945->5940 5946->5945 5959 401062 5962 40103c 5959->5962 5961 40106b 5963 401045 _onexit 5962->5963 5964 40104b __dllonexit 5962->5964 5963->5964 5964->5961 8369 4021fc 8370 402200 8369->8370 8371 402224 8369->8371 8370->8371 8372 402208 8370->8372 8373 4020ca 2 API calls 8371->8373 8374 402211 8372->8374 8377 402101 8372->8377 8375 402234 8373->8375 8378 40210a 8377->8378 8379 40211d 8377->8379 8383 401e67 RegSetValueExA 8378->8383 8384 401eec RegQueryValueExA 8379->8384 8382 40211b 8382->8374 8383->8382 8384->8382 6201 405108 6202 4051d0 6201->6202 6203 405120 6201->6203 6204 405213 6202->6204 6205 4051d9 6202->6205 6206 405126 6203->6206 6207 4051c7 6203->6207 6296 4045e1 6204->6296 6208 4051f1 6205->6208 6209 4051de 6205->6209 6211 40512b 6206->6211 6212 40519d 6206->6212 6235 40460a 6207->6235 6216 403a66 2 API calls 6208->6216 6214 4051e3 SetFocus 6209->6214 6215 405177 6209->6215 6220 405130 6211->6220 6221 40517c 6211->6221 6217 4051a4 PostMessageA 6212->6217 6218 4051b9 GetFocus 6212->6218 6214->6215 6226 40523b 6215->6226 6300 406f34 6215->6300 6222 4051f7 6216->6222 6217->6215 6218->6215 6219 405151 6223 4040c5 14 API calls 6219->6223 6224 405156 6220->6224 6225 405138 6220->6225 6221->6215 6283 404440 GetCursorPos GetSubMenu 6221->6283 6222->6207 6232 40520a 6222->6232 6223->6215 6224->6215 6277 4066be 6224->6277 6225->6215 6265 404020 6225->6265 6259 40d8dc 6226->6259 6288 405092 6232->6288 6304 4056a0 6235->6304 6239 40463b 6308 4060bf 6239->6308 6243 404667 6244 404020 18 API calls 6243->6244 6245 40466d 6244->6245 6352 4097c9 SetCursor 6245->6352 6247 404672 6353 4054ff SetFocus 6247->6353 6249 40467d 6250 404696 6249->6250 6354 406b88 6249->6354 6252 4056a0 SendMessageA 6250->6252 6253 4046a3 6252->6253 6254 4046c5 6253->6254 6357 40d8a3 6253->6357 6254->6219 6260 40d951 6259->6260 6261 40d90a 6259->6261 6260->6261 7143 40800e 6260->7143 6263 405249 6261->6263 7142 40d83b DefWindowProcA 6261->7142 6266 4060cc SendMessageA 6265->6266 6267 404039 6266->6267 6268 407c3f 12 API calls 6267->6268 6269 404042 sprintf 6268->6269 6270 406729 3 API calls 6269->6270 6271 40405f 6270->6271 6272 407c3f 12 API calls 6271->6272 6276 404084 6271->6276 6275 40406c sprintf 6272->6275 6275->6276 6276->6276 7151 40d6ba 6276->7151 6278 4060cc SendMessageA 6277->6278 6281 4066cf 6278->6281 6279 4066f7 6279->6215 6281->6279 6282 405f3b 2 API calls 6281->6282 7156 405fc3 6281->7156 6282->6281 6284 406729 3 API calls 6283->6284 6285 404470 6284->6285 6286 4040c5 14 API calls 6285->6286 6287 404475 TrackPopupMenu 6286->6287 6287->6215 6289 4050a9 6288->6289 7163 40dd7c 6289->7163 6292 4050ee 7167 4054ff SetFocus 6292->7167 6295 4050f9 6295->6215 6297 4045ec 6296->6297 6298 404020 18 API calls 6297->6298 6299 4045ff 6298->6299 6301 406f41 6300->6301 6302 406f46 6300->6302 7174 4068fc 6301->7174 6302->6226 6360 408c45 SendMessageA 6304->6360 6306 404636 6307 4097d6 LoadCursorA SetCursor 6306->6307 6307->6239 6361 409ef5 SendMessageA 6308->6361 6310 40464f 6311 40d4e3 6310->6311 6312 40d514 6311->6312 6313 40d4ff 6311->6313 6315 40d533 6312->6315 6318 40d527 6312->6318 6313->6312 6314 40d508 6313->6314 6386 40cc60 6314->6386 6316 40d54f 6315->6316 6319 40d546 6315->6319 6320 40d56b 6316->6320 6323 40d562 6316->6323 6411 40d191 6318->6411 6419 40cb46 memset memset 6319->6419 6324 40d576 6320->6324 6325 40d57e 6320->6325 6440 40d109 memset 6323->6440 6446 40d33f GetLogicalDrives 6324->6446 6329 40d583 6325->6329 6330 40d58b 6325->6330 6326 40465a 6343 405f3b 6326->6343 6349 4060a2 6326->6349 6459 40d200 6329->6459 6332 40d590 6330->6332 6333 40d5a4 6330->6333 6480 40d31d 6332->6480 6336 40d5d3 6333->6336 6337 40d5a9 6333->6337 6334 40d57c 6334->6326 6336->6326 6362 40cfc7 6336->6362 6486 40cf3e 6337->6486 6341 40d5cb 6494 40b58b 6341->6494 6344 405fbd 6343->6344 6346 405f48 6343->6346 6344->6243 6346->6344 6347 405f9f 6346->6347 7124 409ec9 SendMessageA 6346->7124 6347->6346 7125 409f28 SendMessageA 6347->7125 7126 40a208 SendMessageA 6349->7126 6351 4060b9 6351->6243 6352->6247 6353->6249 7127 40a509 6354->7127 6358 4097f0 6 API calls 6357->6358 6359 40d8b2 6358->6359 6359->6254 6360->6306 6361->6310 6505 40a7b6 GetComputerNameA 6362->6505 6364 40cfdb GetCurrentProcess 6506 408b42 GetModuleHandleA GetProcAddress 6364->6506 6368 40d012 memset 6508 4091ec 6368->6508 6369 40d055 memset 6518 409df6 6369->6518 6374 40d102 6374->6326 6378 40d0b6 6524 409476 6378->6524 6380 40d0cf 6527 407c3f 6380->6527 6383 409476 memcpy 6384 40d0e8 6383->6384 6543 405de7 6384->6543 6388 40cc74 memset 6386->6388 6389 40ccd5 6388->6389 6389->6389 6390 40cced memset 6389->6390 6391 407c3f 12 API calls 6390->6391 6392 40cd23 sprintf 6391->6392 6894 409e22 SendMessageA 6392->6894 6394 40cd48 6395 40cd65 RegConnectRegistryA 6394->6395 6895 40abdb 6394->6895 6397 40cdc2 RegOpenKeyExA 6395->6397 6398 40cd87 6395->6398 6399 40cdf8 RegCloseKey 6397->6399 6400 40cde8 6397->6400 6402 40cdbc 6398->6402 6908 401d0a 6398->6908 6404 40cdfd 6399->6404 6403 40cafc 125 API calls 6400->6403 6402->6397 6402->6404 6407 40cdf3 RegCloseKey 6403->6407 6405 40ce12 6404->6405 6409 401d0a 12 API calls 6404->6409 6405->6326 6407->6399 6409->6405 6410 40cda7 RegConnectRegistryA 6410->6402 6985 408852 6411->6985 6413 40d1f1 6414 408540 free 6413->6414 6415 40d1f9 6414->6415 6415->6326 6417 40d1ba 6417->6413 6418 40cc60 156 API calls 6417->6418 6996 40985c 6417->6996 6418->6417 6420 409476 memcpy 6419->6420 6421 40cb9a strrchr 6420->6421 6422 40cbcf 6421->6422 6423 40cbab strrchr 6421->6423 7003 40a7b6 GetComputerNameA 6422->7003 6423->6422 6425 40cbbe 6423->6425 6427 409476 memcpy 6425->6427 6426 40cbdd 7004 409b5d 6426->7004 6427->6422 6430 40cbfb RegUnLoadKeyA RegLoadKeyA 6432 40cc21 RegOpenKeyExA 6430->6432 6433 40cc56 6430->6433 6435 40cc52 RegUnLoadKeyA 6432->6435 6436 40cc3b 6432->6436 6433->6326 6435->6433 6438 40cafc 125 API calls 6436->6438 6439 40cc49 RegCloseKey 6438->6439 6439->6435 6441 40d13c 6440->6441 7038 409396 GetFileAttributesA 6441->7038 6443 40d173 6444 40cb46 144 API calls 6443->6444 6445 40d187 6443->6445 6444->6445 6445->6326 6451 40d362 6446->6451 6447 40d375 memset 7039 409225 6447->7039 6448 40d4da 6448->6334 6451->6447 6451->6448 6455 40d427 _stricmp 6451->6455 6458 40d109 146 API calls 6451->6458 7042 408722 6451->7042 7047 409396 GetFileAttributesA 6451->7047 7048 40867d 6451->7048 7054 4083db 6451->7054 6455->6451 6456 40d440 memset 6455->6456 6456->6451 6458->6451 6460 407c3f 12 API calls 6459->6460 6461 40d213 6460->6461 7057 409e22 SendMessageA 6461->7057 6463 40d21f WNetOpenEnumA 6464 40d314 6463->6464 6465 40d23b 6463->6465 6464->6326 6466 407c3f 12 API calls 6465->6466 6467 40d24a 6466->6467 7058 409e22 SendMessageA 6467->7058 6469 40d256 WNetEnumResourceA 6470 40d275 6469->6470 6471 40d30c WNetCloseEnum 6469->6471 6472 408559 4 API calls 6470->6472 6471->6464 6473 40d29c WNetEnumResourceA 6472->6473 6475 40d304 6473->6475 6477 40d2c5 6473->6477 6476 408540 free 6475->6476 6476->6471 6477->6475 6478 40d200 166 API calls 6477->6478 7059 40ce1c 6477->7059 6478->6477 6481 40d333 6480->6481 6482 40d326 6480->6482 6483 40d200 170 API calls 6481->6483 6484 40ce1c 166 API calls 6482->6484 6485 40d331 6483->6485 6484->6485 6485->6326 6487 40aa46 2 API calls 6486->6487 6488 40cf5b 6487->6488 6489 40cfbe 6488->6489 6490 40aa46 2 API calls 6488->6490 6489->6326 6489->6341 6491 40cf6d 6490->6491 6491->6489 6493 40cc60 156 API calls 6491->6493 7105 40aae7 sprintf 6491->7105 6493->6491 6499 40b659 6494->6499 6503 40b5b5 6494->6503 6495 40b68e 6496 40b694 free 6495->6496 6497 40b69d 6495->6497 6496->6497 6497->6334 6498 40aa46 2 API calls 6498->6503 6499->6495 7106 403458 6499->7106 6502 40b611 free 6502->6503 6503->6498 6503->6499 6503->6502 6504 409425 3 API calls 6503->6504 6504->6503 6505->6364 6507 408b65 RegOpenKeyExA 6506->6507 6507->6368 6507->6369 6509 4091fb GetSystemDirectoryA 6508->6509 6510 40920c 6508->6510 6509->6510 6511 40cafc 6510->6511 6553 40c73d RegOpenKeyExA 6511->6553 6514 40cb42 RegCloseKey 6514->6369 6515 40cb2b 6516 40c73d 123 API calls 6515->6516 6517 40cb39 RegCloseKey 6516->6517 6517->6514 6888 409db8 6518->6888 6521 409e06 GetSystemFirmwareTable 6522 409e1d 6521->6522 6522->6374 6523 40a80b memset 6522->6523 6523->6378 6526 40947d memcpy 6524->6526 6526->6380 6528 407c48 6527->6528 6530 407c4d 6527->6530 6891 40781b 6528->6891 6531 407c82 6530->6531 6532 407c67 GetModuleHandleA 6530->6532 6540 407d73 6530->6540 6534 407c8b 6531->6534 6535 407cde 6531->6535 6533 407cf1 LoadStringA 6532->6533 6538 407cfa 6533->6538 6536 4076dc 3 API calls 6534->6536 6537 407c2e GetModuleHandleA 6535->6537 6539 407cab 6536->6539 6537->6533 6538->6540 6542 407d1d memcpy 6538->6542 6539->6538 6541 407cc5 GetModuleHandleA 6539->6541 6540->6383 6541->6533 6542->6540 6544 405e10 6543->6544 6547 405df7 6543->6547 6545 405e50 6544->6545 6546 405e30 free 6544->6546 6548 409425 3 API calls 6545->6548 6551 405e60 6546->6551 6547->6544 6549 405e39 memcpy 6547->6549 6548->6551 6550 405e85 6549->6550 6550->6374 6552 405e6a memcpy 6551->6552 6552->6550 6554 40c9a0 6553->6554 6555 40c77a memset memset memset 6553->6555 6614 409b24 6554->6614 6609 401f0a RegQueryValueExA 6555->6609 6560 401f0a RegQueryValueExA 6565 40c7ed 6560->6565 6561 40ca3d RegOpenKeyExA 6563 40ca88 6561->6563 6564 40ca59 6561->6564 6562 40c9ad RegOpenKeyExA 6562->6561 6566 40c9c9 memset 6562->6566 6570 40ca90 RegOpenKeyExA 6563->6570 6567 407c3f 12 API calls 6564->6567 6568 401f0a RegQueryValueExA 6565->6568 6569 401f0a RegQueryValueExA 6566->6569 6571 40ca63 6567->6571 6572 40c805 6568->6572 6578 40c9f5 6569->6578 6573 40caac 6570->6573 6574 40cacf 6570->6574 6576 40befd 22 API calls 6571->6576 6583 407c3f 12 API calls 6572->6583 6590 40c81a 6572->6590 6579 407c3f 12 API calls 6573->6579 6617 40c2b2 RegOpenKeyExA 6574->6617 6582 40ca7b RegCloseKey 6576->6582 6577 40ca09 6580 40befd 22 API calls 6577->6580 6578->6577 6584 407c3f 12 API calls 6578->6584 6585 40cab6 6579->6585 6588 40ca34 RegCloseKey 6580->6588 6582->6570 6583->6590 6584->6577 6592 40befd 22 API calls 6585->6592 6586 40c8d7 6611 40befd 6586->6611 6587 40c846 memset memset 6601 40c87f 6587->6601 6588->6561 6590->6586 6590->6587 6593 40cac6 RegCloseKey 6592->6593 6593->6574 6597 40c92e 6597->6554 6599 40c943 RegOpenKeyExA 6597->6599 6599->6554 6600 40c95f 6599->6600 6605 40befd 22 API calls 6600->6605 6602 40c8ab GetPrivateProfileStringA 6601->6602 6602->6586 6607 40c997 RegCloseKey 6605->6607 6607->6554 6610 401f2d 6609->6610 6610->6560 6662 40b8bd memset memset memset 6611->6662 6615 4092c5 GetVersionExA 6614->6615 6616 409b29 6615->6616 6616->6561 6616->6562 6618 40c348 6617->6618 6619 40c2dd memset 6617->6619 6625 40c61b RegOpenKeyExA 6618->6625 6716 401ec5 RegEnumKeyExA 6619->6716 6621 40c30c 6622 40c33d RegCloseKey 6621->6622 6717 40bdbf memset sprintf RegOpenKeyExA 6621->6717 6731 401ec5 RegEnumKeyExA 6621->6731 6622->6618 6626 40c6a1 6625->6626 6627 40c643 memset 6625->6627 6632 40c6a7 RegOpenKeyExA 6626->6632 6630 40c66c 6627->6630 6629 40c698 RegCloseKey 6629->6626 6630->6629 6763 40c34d memset sprintf RegOpenKeyExA 6630->6763 6795 401ec5 RegEnumKeyExA 6630->6795 6633 40c739 6632->6633 6634 40c6cd memset 6632->6634 6640 40bc45 6633->6640 6805 401ec5 RegEnumKeyExA 6634->6805 6636 40c72e RegCloseKey 6636->6633 6638 40c6fd 6638->6636 6806 40c53d atof 6638->6806 6814 401ec5 RegEnumKeyExA 6638->6814 6641 40ead0 6640->6641 6642 40bc52 RegOpenKeyExA 6641->6642 6643 40bdb8 6642->6643 6646 40bc7d 6642->6646 6657 40b715 RegOpenKeyExA 6643->6657 6644 40bc8d RegOpenKeyExA 6644->6646 6645 40bdaf RegCloseKey 6645->6643 6646->6644 6646->6645 6647 401ec5 RegEnumKeyExA 6646->6647 6648 40bd81 RegCloseKey 6646->6648 6649 40bcba RegOpenKeyExA 6646->6649 6647->6646 6648->6646 6649->6646 6650 40bcd7 RegOpenKeyExA 6649->6650 6651 40bd53 RegCloseKey 6650->6651 6652 40bcee sprintf 6650->6652 6651->6646 6653 402134 3 API calls 6652->6653 6654 40bd30 6653->6654 6850 40b6a4 6654->6850 6658 40b73a 6657->6658 6659 40b74f RegOpenKeyExA 6657->6659 6871 40aef5 6658->6871 6659->6514 6659->6515 6663 40b92a 6662->6663 6664 40b93d 6662->6664 6665 401f0a RegQueryValueExA 6663->6665 6666 40b95a 6664->6666 6667 401f0a RegQueryValueExA 6664->6667 6665->6664 6669 40b9d1 6666->6669 6676 401eec RegQueryValueExA 6666->6676 6667->6666 6674 40ba2c 6669->6674 6710 401dec RegQueryInfoKeyA 6669->6710 6671 40b984 6671->6669 6677 401eec RegQueryValueExA 6671->6677 6678 40b074 6674->6678 6676->6671 6677->6669 6711 40a80b memset 6678->6711 6680 40b08f 6681 409476 memcpy 6680->6681 6682 40b0a4 6681->6682 6683 409476 memcpy 6682->6683 6684 40b0b7 6683->6684 6685 409476 memcpy 6684->6685 6686 40b0c7 6685->6686 6687 40b131 6686->6687 6688 40b0e2 6686->6688 6689 40b137 6687->6689 6690 40b14e 6687->6690 6691 40b14c 6688->6691 6712 40a877 memset 6688->6712 6692 40a877 3 API calls 6689->6692 6690->6691 6697 40a877 3 API calls 6690->6697 6693 40b1a8 6691->6693 6698 409476 memcpy 6691->6698 6692->6691 6696 409476 memcpy 6693->6696 6709 40b1c5 6696->6709 6700 40b16d 6697->6700 6698->6693 6699 40b114 WideCharToMultiByte 6699->6691 6700->6691 6702 409476 memcpy 6700->6702 6701 40b237 6703 40b26a RegCloseKey 6701->6703 6705 405de7 6 API calls 6701->6705 6702->6691 6703->6597 6704 40b1d6 _stricmp 6706 40b1f1 _stricmp 6704->6706 6704->6709 6707 40b24b _mbsicmp 6705->6707 6708 40b20a _stricmp 6706->6708 6706->6709 6707->6703 6708->6709 6709->6701 6709->6704 6710->6674 6711->6680 6713 40a8c9 6712->6713 6713->6713 6714 40a994 memset memcpy 6713->6714 6715 40a9d0 6713->6715 6714->6715 6715->6691 6715->6699 6716->6621 6718 40be21 memset 6717->6718 6719 40bef7 6717->6719 6732 402134 6718->6732 6719->6621 6725 40bef1 RegCloseKey 6725->6719 6726 40be98 RegOpenKeyExA 6727 40be8d 6726->6727 6727->6725 6727->6726 6728 40b753 23 API calls 6727->6728 6759 401ec5 RegEnumKeyExA 6727->6759 6730 40bece RegCloseKey 6728->6730 6730->6727 6731->6621 6760 401f5d RegOpenKeyExA 6732->6760 6734 402174 6739 40b753 memset 6734->6739 6735 40214f 6735->6734 6736 401f0a RegQueryValueExA 6735->6736 6737 402164 RegCloseKey 6736->6737 6737->6734 6740 401f0a RegQueryValueExA 6739->6740 6741 40b78d 6740->6741 6742 40b8b6 memset 6741->6742 6761 40a80b memset 6741->6761 6758 401ec5 RegEnumKeyExA 6742->6758 6744 40b7b4 6745 401f0a RegQueryValueExA 6744->6745 6746 40b7ce 6745->6746 6762 401dec RegQueryInfoKeyA 6746->6762 6748 40b835 6749 409476 memcpy 6748->6749 6750 40b854 6749->6750 6751 409476 memcpy 6750->6751 6752 40b867 6751->6752 6753 407c3f 12 API calls 6752->6753 6754 40b874 6753->6754 6755 409476 memcpy 6754->6755 6756 40b885 6755->6756 6757 405de7 6 API calls 6756->6757 6757->6742 6758->6727 6759->6727 6760->6735 6761->6744 6762->6748 6764 40c3b9 6763->6764 6765 40c3cf sprintf RegOpenKeyExA 6763->6765 6766 407c3f 12 API calls 6764->6766 6767 40c401 6765->6767 6768 40c417 sprintf RegOpenKeyExA 6765->6768 6769 40c3be 6766->6769 6770 407c3f 12 API calls 6767->6770 6771 40c478 sprintf RegOpenKeyExA 6768->6771 6772 40c44e 6768->6772 6796 40bf30 memset RegEnumValueA 6769->6796 6776 40c406 6770->6776 6773 40c4d8 6771->6773 6774 40c4ae 6771->6774 6777 407c3f 12 API calls 6772->6777 6804 401f5d RegOpenKeyExA 6773->6804 6778 407c3f 12 API calls 6774->6778 6781 40bf30 27 API calls 6776->6781 6782 40c453 6777->6782 6783 40c4b3 6778->6783 6785 40c412 RegCloseKey 6781->6785 6786 40b8bd 22 API calls 6782->6786 6787 40b8bd 22 API calls 6783->6787 6784 40c4ec 6788 40c509 6784->6788 6791 407c3f 12 API calls 6784->6791 6785->6768 6789 40c473 RegCloseKey 6786->6789 6790 40c4d3 RegCloseKey 6787->6790 6788->6630 6789->6771 6790->6773 6792 40c4f8 6791->6792 6793 40bf30 27 API calls 6792->6793 6794 40c504 RegCloseKey 6793->6794 6794->6788 6795->6630 6797 40c066 RegCloseKey 6796->6797 6798 40bf98 6796->6798 6797->6765 6799 40bf9d _strnicmp 6798->6799 6800 40c034 RegEnumValueA 6799->6800 6801 40bfb7 memset 6799->6801 6800->6797 6800->6799 6802 40bfe4 6801->6802 6802->6800 6803 40b8bd 22 API calls 6802->6803 6803->6802 6804->6784 6805->6638 6807 40c616 6806->6807 6808 40c55f memset memset sprintf 6806->6808 6807->6638 6809 402134 3 API calls 6808->6809 6810 40c5c3 sprintf RegOpenKeyExA 6809->6810 6810->6807 6811 40c5fa 6810->6811 6815 40c06d memset 6811->6815 6814->6638 6840 40bb75 6815->6840 6817 40c0a1 RegOpenKeyExA 6819 40c0d7 RegOpenKeyExA 6817->6819 6820 40c11f memset 6817->6820 6822 40c116 RegCloseKey 6819->6822 6823 40c0eb 6819->6823 6848 401ec5 RegEnumKeyExA 6820->6848 6822->6820 6824 40b8bd 22 API calls 6823->6824 6825 40c10d RegCloseKey 6824->6825 6825->6822 6826 40c155 RegOpenKeyExA 6828 40c14d 6826->6828 6829 40c177 memset 6826->6829 6827 40c2a8 RegCloseKey 6827->6807 6828->6826 6828->6827 6849 401ec5 RegEnumKeyExA 6828->6849 6830 401f0a RegQueryValueExA 6829->6830 6833 40c1a0 6830->6833 6832 409476 memcpy 6832->6833 6833->6832 6834 40befd 22 API calls 6833->6834 6835 401f0a RegQueryValueExA 6833->6835 6837 40c1e1 memset sprintf 6833->6837 6839 40bb75 12 API calls 6833->6839 6836 40c27d RegCloseKey 6834->6836 6835->6833 6836->6828 6838 402134 3 API calls 6837->6838 6838->6833 6839->6833 6841 40bb9e 6840->6841 6842 40bb7e 6840->6842 6843 407c3f 12 API calls 6841->6843 6842->6841 6844 40bb83 6842->6844 6845 40bba8 6843->6845 6846 407c3f 12 API calls 6844->6846 6845->6817 6847 40bb8e 6846->6847 6847->6817 6848->6828 6849->6828 6851 401f0a RegQueryValueExA 6850->6851 6852 40b6d5 6851->6852 6857 401dec RegQueryInfoKeyA 6852->6857 6854 40b711 RegCloseKey 6854->6651 6855 40b6e1 6855->6854 6858 40aca4 6855->6858 6857->6855 6859 40ae1b 6858->6859 6870 40a80b memset 6859->6870 6861 40ae72 6862 409476 memcpy 6861->6862 6863 40ae97 6862->6863 6864 409476 memcpy 6863->6864 6865 40aeca 6864->6865 6866 409476 memcpy 6865->6866 6867 40aedd 6866->6867 6868 405de7 6 API calls 6867->6868 6869 40aeee 6868->6869 6869->6854 6870->6861 6884 401ec5 RegEnumKeyExA 6871->6884 6873 40b06d RegCloseKey 6873->6659 6874 40af35 RegOpenKeyExA 6880 40af22 6874->6880 6875 40aef5 11 API calls 6875->6880 6877 40b03f RegCloseKey 6877->6880 6879 401f0a RegQueryValueExA 6879->6880 6880->6873 6880->6874 6880->6875 6880->6877 6880->6879 6882 409476 memcpy 6880->6882 6883 405de7 6 API calls 6880->6883 6885 40a80b memset 6880->6885 6886 401dec RegQueryInfoKeyA 6880->6886 6887 401ec5 RegEnumKeyExA 6880->6887 6882->6880 6883->6877 6884->6880 6885->6880 6886->6880 6887->6880 6889 409de9 6888->6889 6890 409dbd GetModuleHandleA GetProcAddress GetProcAddress 6888->6890 6889->6521 6889->6522 6890->6889 6892 407824 ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 6891->6892 6893 40789c 6891->6893 6892->6893 6893->6530 6894->6394 6896 40abf9 6895->6896 6937 40aa46 memset 6896->6937 6899 40ac13 gethostbyname 6900 40ac1d 6899->6900 6902 40ac9b 6899->6902 6900->6902 6941 40832e 6900->6941 6902->6395 6902->6405 6904 40ac41 memset 6944 4082e6 6904->6944 6961 401cc8 6908->6961 6911 401de3 6911->6402 6911->6410 6914 401ddd 6916 401c87 11 API calls 6914->6916 6916->6911 6918 401dd5 6919 401c87 11 API calls 6918->6919 6919->6914 6920 401d53 6920->6918 6970 401c47 6920->6970 6921 401d9c 6921->6918 6976 401c66 6921->6976 6926 401d71 6927 401ce6 11 API calls 6926->6927 6929 401d79 6927->6929 6928 401ce6 11 API calls 6930 401dc1 6928->6930 6929->6918 6973 401c9c 6929->6973 6930->6918 6933 401c9c 11 API calls 6930->6933 6934 401d97 6933->6934 6979 401c87 6934->6979 6936 401c47 11 API calls 6936->6934 6939 40aa6f 6937->6939 6938 40aa93 atoi 6938->6939 6940 40aacd 6938->6940 6939->6938 6939->6940 6940->6899 6940->6900 6950 40829a 6941->6950 6945 40829a 6 API calls 6944->6945 6946 4082f0 6945->6946 6947 408319 6946->6947 6948 40829a 6 API calls 6947->6948 6949 408320 6948->6949 6949->6902 6951 4082d0 6950->6951 6952 4082a2 LoadLibraryA 6950->6952 6951->6902 6951->6904 6958 408257 6952->6958 6955 408289 FreeLibrary 6956 4082c2 LoadLibraryA 6955->6956 6957 408257 3 API calls 6956->6957 6957->6951 6959 408288 6958->6959 6960 40825d GetProcAddress GetProcAddress GetProcAddress 6958->6960 6959->6951 6959->6955 6960->6959 6982 401acf LoadLibraryA 6961->6982 6964 401ce6 6965 401acf 11 API calls 6964->6965 6966 401ceb 6965->6966 6966->6914 6967 401c32 6966->6967 6968 401acf 11 API calls 6967->6968 6969 401c37 6968->6969 6969->6918 6969->6920 6969->6921 6971 401acf 11 API calls 6970->6971 6972 401c4c GetLastError 6971->6972 6972->6918 6972->6926 6974 401acf 11 API calls 6973->6974 6975 401ca1 6974->6975 6975->6936 6977 401acf 11 API calls 6976->6977 6978 401c6b 6977->6978 6978->6918 6978->6928 6980 401acf 11 API calls 6979->6980 6981 401c8c 6980->6981 6981->6918 6983 401aea 10 API calls 6982->6983 6984 401ba9 6982->6984 6983->6984 6984->6911 6984->6964 7001 409716 CreateFileA 6985->7001 6987 40885f 6988 4088a3 6987->6988 6989 408867 GetFileSize 6987->6989 6988->6417 6990 408540 free 6989->6990 6991 408878 6990->6991 6992 408559 4 API calls 6991->6992 6993 408881 6992->6993 7002 408d36 ReadFile 6993->7002 6995 40888a CloseHandle 6995->6988 6998 409875 6996->6998 7000 40986e 6996->7000 6997 409883 strchr 6997->6998 6998->6997 6999 4098b6 memcpy 6998->6999 6998->7000 6999->6998 7000->6417 7001->6987 7002->6995 7003->6426 7005 4092c5 GetVersionExA 7004->7005 7006 409b62 7005->7006 7006->6430 7007 402fb0 GetCurrentProcess 7006->7007 7020 402f05 7007->7020 7010 402fd6 7025 402ed0 7010->7025 7011 402fce GetLastError 7012 403012 7011->7012 7017 402e64 7012->7017 7018 402e74 7017->7018 7019 402e6a FreeLibrary 7017->7019 7018->6430 7019->7018 7035 402e44 7020->7035 7022 402f10 7023 402f14 GetProcAddress 7022->7023 7024 402f25 7022->7024 7023->7024 7024->7010 7024->7011 7026 402e44 LoadLibraryA 7025->7026 7027 402edb 7026->7027 7028 402ef0 7027->7028 7029 402edf GetProcAddress 7027->7029 7030 402e99 7028->7030 7029->7028 7031 402e44 LoadLibraryA 7030->7031 7032 402ea4 7031->7032 7033 402ea8 GetProcAddress 7032->7033 7034 402eb9 GetLastError CloseHandle 7032->7034 7033->7034 7034->7012 7036 402e60 7035->7036 7037 402e49 LoadLibraryA 7035->7037 7036->7022 7037->7022 7038->6443 7040 409234 GetWindowsDirectoryA 7039->7040 7041 409245 memset GetDriveTypeA 7039->7041 7040->7041 7041->6451 7043 4083db FindClose 7042->7043 7044 408730 7043->7044 7045 409476 memcpy 7044->7045 7046 408746 7045->7046 7046->6451 7047->6451 7049 4086ac FindNextFileA 7048->7049 7050 40868c FindFirstFileA 7048->7050 7051 4086c1 7049->7051 7053 4086c6 7049->7053 7050->7053 7052 4083db FindClose 7051->7052 7052->7053 7053->6451 7055 4083e4 FindClose 7054->7055 7056 4083ee 7054->7056 7055->7056 7056->6451 7057->6463 7058->6469 7077 408958 MultiByteToWideChar 7059->7077 7062 407c3f 12 API calls 7063 40ce87 sprintf 7062->7063 7083 409e22 SendMessageA 7063->7083 7065 40cea9 7084 402f3f 7065->7084 7067 40ced5 7068 40cf26 7067->7068 7071 40cf1b 7067->7071 7076 40cc60 156 API calls 7067->7076 7088 40880b WideCharToMultiByte 7067->7088 7069 408540 free 7068->7069 7070 40cf2e 7069->7070 7073 408540 free 7070->7073 7093 402f82 7071->7093 7074 40cf36 7073->7074 7074->6477 7076->7067 7078 408975 7077->7078 7079 408998 memset 7077->7079 7080 408559 4 API calls 7078->7080 7079->7062 7081 408981 7080->7081 7082 40898b MultiByteToWideChar 7081->7082 7082->7079 7083->7065 7085 402f58 7084->7085 7086 402f4b 7084->7086 7085->7067 7097 402e79 7086->7097 7089 40884a 7088->7089 7090 40882a 7088->7090 7089->7067 7091 408559 4 API calls 7090->7091 7092 408835 WideCharToMultiByte 7091->7092 7092->7089 7094 402f99 7093->7094 7095 402f8b 7093->7095 7094->7068 7096 402e79 2 API calls 7095->7096 7096->7094 7102 402e21 7097->7102 7100 402e93 7100->7085 7101 402e85 GetProcAddress 7101->7100 7103 402e33 7102->7103 7104 402e26 LoadLibraryA 7102->7104 7103->7100 7103->7101 7104->7103 7105->6491 7112 4032c5 7106->7112 7109 403466 CreateThread 7110 40348b ResumeThread 7109->7110 7111 4034a8 Sleep 7109->7111 7110->7111 7111->6495 7111->6499 7113 4032ce 7112->7113 7115 4032d3 7112->7115 7116 4031c9 7113->7116 7115->7109 7115->7111 7119 40318f 7116->7119 7120 4031c8 ??2@YAPAXI memset 7119->7120 7121 403198 7119->7121 7120->7115 7122 4031a2 CloseHandle 7121->7122 7123 4031b9 ??3@YAXPAX 7121->7123 7122->7121 7123->7120 7124->6346 7125->6347 7126->6351 7133 40a4ba 7127->7133 7129 40a511 7130 406b94 7129->7130 7138 409e83 SendMessageA 7129->7138 7139 409e99 SendMessageA 7129->7139 7130->6250 7140 40a06b SendMessageA 7133->7140 7135 40a4c3 7141 40a07f SendMessageA 7135->7141 7137 40a4c9 7137->7129 7138->7129 7139->7129 7140->7135 7141->7137 7142->6263 7144 408024 EnumChildWindows 7143->7144 7145 40802c 7143->7145 7144->7145 7146 408032 EnumChildWindows 7145->7146 7147 40803a 7145->7147 7146->7147 7150 408f16 GetWindowLongA SetWindowLongA 7147->7150 7149 408042 7149->6261 7150->7149 7152 40d6c3 7151->7152 7153 4040bf 7151->7153 7155 409e22 SendMessageA 7152->7155 7153->6219 7155->7153 7159 40a1bf 7156->7159 7158 405fdc 7158->6281 7162 40a093 SendMessageA 7159->7162 7161 40a1d8 7161->7158 7162->7161 7168 40dd6a 7163->7168 7166 40d62e PostMessageA 7166->6292 7167->6295 7171 407fee 7168->7171 7170 4050ca 7170->6292 7170->7166 7172 407c2e GetModuleHandleA 7171->7172 7173 408006 DialogBoxParamA 7172->7173 7173->7170 7175 4060cc SendMessageA 7174->7175 7176 406912 7175->7176 7185 4066fe 7176->7185 7178 405fc3 SendMessageA 7179 406920 7178->7179 7179->7178 7180 406975 7179->7180 7181 406973 7179->7181 7182 4060a2 SendMessageA 7180->7182 7181->6302 7183 406982 SendMessageA 7182->7183 7184 4060a2 SendMessageA 7183->7184 7184->7181 7188 40a35c SendMessageA 7185->7188 7189 40670f 7188->7189 7190 40a37e 7188->7190 7189->7179 7190->7189 7192 40a39c 7190->7192 7194 40a1f0 SendMessageA 7190->7194 7192->7189 7195 40a093 SendMessageA 7192->7195 7194->7190 7195->7189 7205 40da0b 7208 4034f5 7205->7208 7207 40da13 7209 403506 7208->7209 7210 4034fe ExitProcess 7208->7210 7209->7207 7211 40d99c 7212 40d9a8 7211->7212 7213 40d9c8 7212->7213 7214 40847c 4 API calls 7212->7214 7215 40da30 DefWindowProcA 7213->7215 7216 40d9de KiUserCallbackDispatcher 7213->7216 7214->7213 7217 40da1a 7215->7217 7216->7217 5947 403a21 5950 403965 5947->5950 5951 403978 GetClientRect 5950->5951 5952 403a1f 5950->5952 5957 40d696 GetWindowRect 5951->5957 5954 403990 5958 40d672 GetWindowRect 5954->5958 5956 403999 BeginDeferWindowPos DeferWindowPos DeferWindowPos DeferWindowPos KiUserCallbackDispatcher 5956->5952 5957->5954 5958->5956 7196 4021aa 7199 402179 7196->7199 7198 4021ca 7200 402185 7199->7200 7201 402197 GetPrivateProfileIntA 7199->7201 7204 401f93 memset _itoa WritePrivateProfileStringA 7200->7204 7201->7198 7203 402192 7203->7198 7204->7203 7954 403933 7957 40d62e PostMessageA 7954->7957 7956 40393d 7957->7956 5965 4047b6 6002 408047 5965->6002 5969 4048e5 #6 SendMessageA 6011 409923 GetModuleHandleA LoadImageA 5969->6011 5971 40492d CreateToolbarEx GetModuleHandleA CreateWindowExA 5972 40c510 27 API calls 5971->5972 5973 40498f 5972->5973 6012 406827 5973->6012 5978 408047 12 API calls 5979 4049bf _stricmp 5978->5979 5981 4049f9 5979->5981 5982 4049fe 5979->5982 6096 40385f RegDeleteKeyA 5981->6096 5984 4087a8 _stricmp 5982->5984 5985 404a0e 5984->5985 5986 403dee 15 API calls 5985->5986 5987 404a22 5986->5987 5988 403cec _stricmp 5987->5988 5989 404a29 5988->5989 6021 4054ff SetFocus 5989->6021 5991 404a3f 6022 409d54 5991->6022 5993 404a4a 6028 405688 5993->6028 6001 404aac 6097 407c2e 6002->6097 6005 408060 6100 407714 6005->6100 6006 4048d8 6010 40d65f KiUserCallbackDispatcher 6006->6010 6008 408070 6104 407ab3 6008->6104 6010->5969 6011->5971 6121 40a32c 6012->6121 6015 40b452 6128 4062a6 6015->6128 6018 40b483 6135 4063d1 6018->6135 6019 4049a5 6019->5978 6021->5991 6023 409d63 6022->6023 6024 409d7f 6022->6024 6150 409c03 6023->6150 6024->5993 6027 409d73 GetTempPathA 6027->6024 6154 409e38 SendMessageA 6028->6154 6030 404a86 6031 403a4f 6030->6031 6032 405688 2 API calls 6031->6032 6033 403a65 RegisterWindowMessageA 6032->6033 6034 4040c5 6033->6034 6157 409b4d 6034->6157 6039 4040fe 6173 406729 6039->6173 6043 40d6d7 5 API calls 6044 40412e 6043->6044 6045 404142 6044->6045 6046 40a3e7 2 API calls 6044->6046 6047 40d6d7 5 API calls 6045->6047 6046->6045 6048 40415d 6047->6048 6049 404171 6048->6049 6051 40a3e7 2 API calls 6048->6051 6050 40d6d7 5 API calls 6049->6050 6052 40418c 6050->6052 6051->6049 6053 4041a0 6052->6053 6054 40a3e7 2 API calls 6052->6054 6055 406729 3 API calls 6053->6055 6054->6053 6056 4041b0 6055->6056 6057 40d6d7 5 API calls 6056->6057 6058 4041d4 6057->6058 6059 4041e6 6058->6059 6060 40a3e7 2 API calls 6058->6060 6061 40d6d7 5 API calls 6059->6061 6060->6059 6062 404204 6061->6062 6063 404216 6062->6063 6064 40a3e7 2 API calls 6062->6064 6065 40d6d7 5 API calls 6063->6065 6064->6063 6066 40422c 6065->6066 6180 4060cc 6066->6180 6069 40d6d7 5 API calls 6070 404245 6069->6070 6183 40956c 6070->6183 6072 40425f 6073 40956c 3 API calls 6072->6073 6074 40427c 6073->6074 6075 40956c 3 API calls 6074->6075 6076 404299 6075->6076 6077 40956c 3 API calls 6076->6077 6078 4042b7 6077->6078 6079 40956c 3 API calls 6078->6079 6080 4042d8 6079->6080 6081 4060cc SendMessageA 6080->6081 6082 4042e6 6081->6082 6083 40d6d7 5 API calls 6082->6083 6084 4042fe 6083->6084 6085 40d6d7 5 API calls 6084->6085 6086 404319 6085->6086 6087 40432b 6086->6087 6088 40a3e7 2 API calls 6086->6088 6089 40956c 3 API calls 6087->6089 6088->6087 6090 40434c 6089->6090 6091 40956c 3 API calls 6090->6091 6092 40436a 6091->6092 6093 40956c 3 API calls 6092->6093 6094 4043a4 6092->6094 6093->6092 6095 403870 SetTimer 6094->6095 6095->6001 6096->5982 6098 407c37 GetModuleHandleA 6097->6098 6099 407c3e LoadMenuA 6097->6099 6098->6099 6099->6005 6099->6006 6103 407719 6100->6103 6101 407732 sprintf 6101->6008 6102 407740 6102->6008 6103->6101 6103->6102 6105 40ead0 6104->6105 6106 407ac3 GetMenuItemCount 6105->6106 6107 407c27 6106->6107 6113 407ae1 6106->6113 6107->6006 6108 407ae6 memset GetMenuItemInfoA 6108->6113 6109 407b3d memset strchr 6109->6113 6110 407ab3 3 API calls 6110->6113 6112 407be1 ModifyMenuA 6112->6113 6113->6107 6113->6108 6113->6109 6113->6110 6113->6112 6114 4076dc _itoa 6113->6114 6117 40762a 6114->6117 6118 40ead0 6117->6118 6119 407637 memset GetPrivateProfileStringA 6118->6119 6120 407680 6119->6120 6120->6113 6122 40a333 6121->6122 6123 40499a 6121->6123 6122->6123 6125 40a171 6122->6125 6123->6015 6126 40a19c SendMessageA 6125->6126 6127 40a18d 6125->6127 6126->6122 6127->6126 6129 4062ef 6128->6129 6130 4062bf ImageList_Create ImageList_SetImageCount SendMessageA 6128->6130 6131 406328 11 API calls 6129->6131 6132 4062f8 ImageList_Create ImageList_SetImageCount SendMessageA 6129->6132 6130->6129 6144 40a27b 6131->6144 6132->6131 6134 4063ca GetModuleHandleA LoadIconA ImageList_ReplaceIcon 6134->6018 6134->6019 6136 406450 6135->6136 6137 4063da 6135->6137 6136->6019 6138 405688 2 API calls 6137->6138 6139 4063e6 ImageList_Create ImageList_SetImageCount 6138->6139 6148 409902 GetModuleHandleA LoadImageA 6139->6148 6141 406412 ImageList_AddMasked 6149 409902 GetModuleHandleA LoadImageA 6141->6149 6143 40642c ImageList_AddMasked SendMessageA 6143->6136 6147 40a06b SendMessageA 6144->6147 6146 40a28f SendMessageA 6146->6134 6147->6146 6148->6141 6149->6143 6153 409370 GetModuleFileNameA 6150->6153 6152 409c09 GetFileAttributesA 6152->6024 6152->6027 6153->6152 6155 409e58 SendMessageA 6154->6155 6155->6030 6158 4092c5 GetVersionExA 6157->6158 6159 4040d0 6158->6159 6160 40d6d7 6159->6160 6161 40d6e1 6160->6161 6162 40d6fd 6160->6162 6186 4095aa 6161->6186 6164 40d711 6162->6164 6165 40d702 EnableMenuItem 6162->6165 6189 409599 EnableMenuItem 6164->6189 6167 4040ec 6165->6167 6167->6039 6168 40a3e7 6167->6168 6190 409fdf SendMessageA 6168->6190 6170 40a3f5 6191 409ff5 SendMessageA 6170->6191 6172 40a415 6172->6039 6174 406732 6173->6174 6175 406746 6173->6175 6174->6175 6176 406739 6174->6176 6197 409fb7 SendMessageA 6175->6197 6192 40a2f9 6176->6192 6179 40410e 6179->6043 6200 409fcb SendMessageA 6180->6200 6182 404237 6182->6069 6184 409574 6183->6184 6185 409577 GetMenu GetSubMenu CheckMenuItem 6183->6185 6184->6185 6185->6072 6187 4095b2 6186->6187 6188 4095b3 GetMenu GetSubMenu EnableMenuItem 6186->6188 6187->6188 6188->6167 6189->6167 6190->6170 6191->6172 6198 409fcb SendMessageA 6192->6198 6194 40a326 6194->6179 6196 40a307 6196->6194 6199 409f9a SendMessageA 6196->6199 6197->6179 6198->6196 6199->6196 6200->6182

          Control-flow Graph

          C-Code - Quality: 97%
          			E0040C73D(char _a4, void* _a8, intOrPtr* _a12) {
          				void* _v8;
          				void _v147;
          				int _v148;
          				void _v283;
          				char _v284;
          				void _v419;
          				char _v420;
          				void _v683;
          				char _v684;
          				void _v947;
          				char _v948;
          				void* __ebx;
          				void* __esi;
          				void* _t79;
          				long _t80;
          				long _t83;
          				long _t85;
          				void* _t90;
          				void* _t94;
          				intOrPtr* _t107;
          				intOrPtr _t125;
          				int _t128;
          				intOrPtr _t134;
          				intOrPtr* _t139;
          				void* _t145;
          				intOrPtr* _t148;
          				char* _t159;
          				intOrPtr _t160;
          				char* _t161;
          				CHAR* _t167;
          				char* _t170;
          				char _t174;
          				void* _t176;
          				void* _t177;
          				void* _t178;
          
          				_t79 = _a8;
          				_t178 = _t177 - 0x3b0;
          				 *(_a4 + 0x1dc) = _t79;
          				_t156 =  &_v8;
          				_t150 = 0;
          				_t80 = RegOpenKeyExA(_t79, "Microsoft\\Windows NT\\CurrentVersion", 0, 0x20019,  &_v8); // executed
          				if(_t80 != 0) {
          					L22:
          					if(E00409B24() == 0 || RegOpenKeyExA(_a8, "Microsoft\\Windows\\CurrentVersion", _t150, 0x20019,  &_v8) != 0) {
          						L29:
          						_t83 = RegOpenKeyExA(_a8, "Microsoft\\Internet Explorer\\Registration", _t150, 0x20019,  &_v8); // executed
          						if(_t83 != 0) {
          							_t164 = _a4;
          							_t167 = 0x40f469;
          						} else {
          							_t94 = E00407C3F(0x7e4);
          							_t164 = _a4;
          							_t167 = 0x40f469;
          							E0040BEFD(_a4, _t94, _v8, 3, 0x40f469, 0x40f469, 1); // executed
          							RegCloseKey(_v8); // executed
          							_t150 = 0;
          						}
          						_t85 = RegOpenKeyExA(_a8, "Microsoft\\Exchange\\Setup", _t150, 0x20019,  &_v8); // executed
          						_t206 = _t85;
          						if(_t85 == 0) {
          							_t150 = 0x899;
          							E0040BEFD(_t164, E00407C3F(0x899), _v8, 5, _t167, _t167, 1);
          							RegCloseKey(_v8);
          						}
          						_t168 = _a8;
          						E0040C2B2(_t156, _t164, _a8); // executed
          						E0040C61B(_t156, _t164, _a8); // executed
          						E0040C6A7(_t150, _t164, _t168); // executed
          						E0040BC45(_t156, _t206, _t164, _t168); // executed
          						_t90 = E0040B715(_t156, _t164, _t168); // executed
          						return _t90;
          					} else {
          						_v148 = _t150;
          						memset( &_v147, _t150, 0x80);
          						_t170 =  &_v148;
          						E00401F0A(0x80, _t156, _t170, _v8, "ProductName");
          						_pop(_t156);
          						if(_v148 != _t150) {
          							L28:
          							E0040BEFD(_a4,  &_v148, _v8, 1, 0x40f469, 0x40f469, 1);
          							RegCloseKey(_v8);
          							goto L29;
          						}
          						_t107 = E00407C3F(0x7d0);
          						_t159 = _t170;
          						do {
          							_t156 =  *_t107;
          							_t107 = _t107 + 1;
          							 *_t159 = _t156;
          							_t159 = _t159 + 1;
          						} while (_t156 != 0);
          						_t150 = 0;
          						goto L28;
          					}
          				}
          				_v148 = 0;
          				memset( &_v147, 0, 0x80);
          				_v420 = 0;
          				memset( &_v419, 0, 0x80);
          				_v948 = 0;
          				memset( &_v947, 0, 0x104);
          				E00401F0A(0x80,  &_v8,  &_v148, _v8, "ProductName"); // executed
          				E00401F0A(0x80,  &_v8,  &_v420, _v8, "CSDVersion"); // executed
          				E00401F0A(0x104, _t156,  &_v948, _v8, "PathName"); // executed
          				_t178 = _t178 + 0x3c;
          				if(_v148 != 0) {
          					L5:
          					if(_a12 == _t150) {
          						L15:
          						_t174 = _a4;
          						 *(_t174 + 0x1f0) = _t150;
          						 *(_t174 + 0x1f4) = _t150;
          						E0040BEFD(_t174,  &_v148, _v8, 1,  &_v948,  &_v420, 1); // executed
          						RegCloseKey(_v8); // executed
          						if( *(_t174 + 0x1f0) != _t150 ||  *(_t174 + 0x1f4) == _t150) {
          							_t125 =  *0x4126f8; // 0xbc25b0
          							if( *((intOrPtr*)(_t125 + 0x590)) != _t150 && RegOpenKeyExA(_a8, "Microsoft\\Windows NT\\CurrentVersion\\DefaultProductKey", _t150, 0x20019,  &_v8) == 0) {
          								_t156 = _t174;
          								_t128 =  *(_t174 + 0x1f0);
          								if(_t128 != _t150) {
          									 *((intOrPtr*)(_t128 + 0x3a4)) = 1;
          								}
          								E0040BEFD(_t156,  &_v148, _v8, 1,  &_v948,  &_v420, 1);
          								RegCloseKey(_v8);
          							}
          						}
          						goto L22;
          					}
          					_t134 =  *0x4126f8; // 0xbc25b0
          					if( *((intOrPtr*)(_t134 + 0x580)) == _t150) {
          						goto L15;
          					}
          					_v684 = _t150;
          					memset( &_v683, _t150, 0x104);
          					_v284 = _t150;
          					memset( &_v283, _t150, 0x80);
          					_t139 = _a12;
          					_t178 = _t178 + 0x18;
          					_t156 = _t139 + 1;
          					do {
          						_t160 =  *_t139;
          						_t139 = _t139 + 1;
          					} while (_t160 != _t150);
          					if(_t139 - _t156 + 0xd >= 0x104) {
          						_v684 = _t150;
          					} else {
          						E00409ADF( &_v684, _a12, "prodspec.ini");
          						_pop(_t156);
          					}
          					GetPrivateProfileStringA("Product Specification", "Product", 0x40f469,  &_v284, 0x80,  &_v684); // executed
          					if(_v284 != _t150) {
          						_t145 = 0;
          						do {
          							_t156 =  *((intOrPtr*)(_t176 + _t145 - 0x118));
          							 *((char*)(_t176 + _t145 - 0x90)) = _t156;
          							_t145 = _t145 + 1;
          						} while (_t156 != _t150);
          					}
          					goto L15;
          				} else {
          					_t148 = E00407C3F(0x7d0);
          					_t161 =  &_v148;
          					do {
          						_t156 =  *_t148;
          						_t148 = _t148 + 1;
          						 *_t161 = _t156;
          						_t161 = _t161 + 1;
          					} while (_t156 != 0);
          					_t150 = 0;
          					goto L5;
          				}
          			}






































          0x0040c740
          0x0040c746
          0x0040c74f
          0x0040c755
          0x0040c75e
          0x0040c767
          0x0040c774
          0x0040c9a0
          0x0040c9a7
          0x0040ca3d
          0x0040ca4f
          0x0040ca57
          0x0040ca88
          0x0040ca8b
          0x0040ca59
          0x0040ca5e
          0x0040ca63
          0x0040ca68
          0x0040ca76
          0x0040ca7e
          0x0040ca84
          0x0040ca84
          0x0040caa2
          0x0040caa8
          0x0040caaa
          0x0040caac
          0x0040cac1
          0x0040cac9
          0x0040cac9
          0x0040cacf
          0x0040cad4
          0x0040cadb
          0x0040cae2
          0x0040cae9
          0x0040caf0
          0x0040caf9
          0x0040c9c9
          0x0040c9d2
          0x0040c9d8
          0x0040c9ea
          0x0040c9f0
          0x0040c9fc
          0x0040c9fd
          0x0040ca17
          0x0040ca2f
          0x0040ca37
          0x00000000
          0x0040ca37
          0x0040ca04
          0x0040ca09
          0x0040ca0b
          0x0040ca0b
          0x0040ca0d
          0x0040ca0e
          0x0040ca10
          0x0040ca11
          0x0040ca15
          0x00000000
          0x0040ca15
          0x0040c9a7
          0x0040c783
          0x0040c789
          0x0040c79a
          0x0040c7a0
          0x0040c7b5
          0x0040c7bb
          0x0040c7d3
          0x0040c7e8
          0x0040c800
          0x0040c805
          0x0040c80e
          0x0040c82c
          0x0040c82f
          0x0040c8ec
          0x0040c8ec
          0x0040c90c
          0x0040c912
          0x0040c918
          0x0040c920
          0x0040c92c
          0x0040c936
          0x0040c941
          0x0040c95f
          0x0040c961
          0x0040c969
          0x0040c96b
          0x0040c96b
          0x0040c992
          0x0040c99a
          0x0040c99a
          0x0040c941
          0x00000000
          0x0040c92c
          0x0040c835
          0x0040c840
          0x00000000
          0x00000000
          0x0040c854
          0x0040c85a
          0x0040c86b
          0x0040c871
          0x0040c876
          0x0040c879
          0x0040c87c
          0x0040c87f
          0x0040c87f
          0x0040c881
          0x0040c882
          0x0040c88d
          0x0040c8a5
          0x0040c88f
          0x0040c89d
          0x0040c8a2
          0x0040c8a2
          0x0040c8c9
          0x0040c8d5
          0x0040c8d7
          0x0040c8d9
          0x0040c8d9
          0x0040c8e0
          0x0040c8e7
          0x0040c8e8
          0x0040c8d9
          0x00000000
          0x0040c810
          0x0040c815
          0x0040c81a
          0x0040c820
          0x0040c820
          0x0040c822
          0x0040c823
          0x0040c825
          0x0040c826
          0x0040c82a
          0x00000000
          0x0040c82a

          APIs
          • RegOpenKeyExA.KERNELBASE(?,Microsoft\Windows NT\CurrentVersion,00000000,00020019,?), ref: 0040C767
          • memset.MSVCRT ref: 0040C789
          • memset.MSVCRT ref: 0040C7A0
          • memset.MSVCRT ref: 0040C85A
          • memset.MSVCRT ref: 0040C871
          • GetPrivateProfileStringA.KERNEL32(Product Specification,Product,0040F469,?,00000080,?), ref: 0040C8C9
          • RegCloseKey.KERNELBASE(?), ref: 0040C920
          • RegCloseKey.ADVAPI32(?), ref: 0040C99A
          • RegOpenKeyExA.ADVAPI32(?,Microsoft\Windows NT\CurrentVersion\DefaultProductKey,00000000,00020019,?), ref: 0040C955
            • Part of subcall function 00407C3F: GetModuleHandleA.KERNEL32(00000000,?,?,?,004074B9,?,00000000), ref: 00407C68
            • Part of subcall function 00407C3F: LoadStringA.USER32 ref: 00407CF2
            • Part of subcall function 00407C3F: memcpy.MSVCRT ref: 00407D31
          • memset.MSVCRT ref: 0040C7BB
            • Part of subcall function 00401F0A: RegQueryValueExA.KERNELBASE(?,d!@,00000000,?,?,000003FF,?,?,?,00402164,?,000003FF,000003FF), ref: 00401F23
          • RegOpenKeyExA.ADVAPI32(?,Microsoft\Windows\CurrentVersion,00000000,00020019,?), ref: 0040C9BF
          • memset.MSVCRT ref: 0040C9D8
          • RegCloseKey.ADVAPI32(?), ref: 0040CA37
          • RegOpenKeyExA.KERNELBASE(?,Microsoft\Internet Explorer\Registration,00000000,00020019,?), ref: 0040CA4F
          • RegCloseKey.KERNELBASE(?), ref: 0040CA7E
          • RegOpenKeyExA.KERNELBASE(?,Microsoft\Exchange\Setup,00000000,00020019,?), ref: 0040CAA2
          • RegCloseKey.ADVAPI32(?), ref: 0040CAC9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$CloseOpen$String$HandleLoadModulePrivateProfileQueryValuememcpy
          • String ID: CSDVersion$Microsoft\Exchange\Setup$Microsoft\Internet Explorer\Registration$Microsoft\Windows NT\CurrentVersion$Microsoft\Windows NT\CurrentVersion\DefaultProductKey$Microsoft\Windows\CurrentVersion$PathName$Product$Product Specification$ProductName$prodspec.ini
          • API String ID: 863424103-2459169945
          • Opcode ID: 2f1ae3630423fb6f94f2999e834ce3867e05bd29bf800bfc63ea9038b4619e0b
          • Instruction ID: 89fe104b12c181dfcffe6dd1a7b5e5f4c638de4d53f192457852ed34a3777f68
          • Opcode Fuzzy Hash: 2f1ae3630423fb6f94f2999e834ce3867e05bd29bf800bfc63ea9038b4619e0b
          • Instruction Fuzzy Hash: E0A1B271A00219FFDB21EB65DC81FEB7BACAF05304F0441BAF508B6192D7785E489B99
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          C-Code - Quality: 95%
          			E0040C06D(void* __ecx) {
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				long _t68;
          				void* _t73;
          				long _t76;
          				int _t111;
          				void* _t114;
          				void* _t116;
          				int _t121;
          				void* _t128;
          				void* _t130;
          				void* _t132;
          				void* _t133;
          
          				_t114 = __ecx;
          				_t128 = _t130 - 0x68;
          				_t111 = 0;
          				 *((char*)(_t128 - 0x30)) = 0;
          				memset(_t128 - 0x2f, 0, 0x80);
          				 *(_t128 + 0x5c) = 0;
          				 *(_t128 + 0x60) = 0;
          				E0040BB75( *((intOrPtr*)(_t128 + 0x78)), _t128 - 0x30);
          				_t132 = _t130 - 0x698 + 0x10;
          				 *((intOrPtr*)(_t128 + 0x54)) = 1;
          				if( *((intOrPtr*)(_t128 + 0x78)) >= 0xe) {
          					 *((intOrPtr*)(_t128 + 0x54)) = 4;
          				}
          				_t68 = RegOpenKeyExA( *(_t128 + 0x74), "ProductID", _t111, 0xf003f, _t128 + 0x5c); // executed
          				if(_t68 == 0) {
          					if(RegOpenKeyExA( *(_t128 + 0x74), "DigitalProductID", _t111, 0xf003f, _t128 + 0x60) == 0) {
          						E0040B8BD(_t114,  *((intOrPtr*)(_t128 + 0x70)), _t128 - 0x30,  *(_t128 + 0x5c), 0x40f469,  *(_t128 + 0x60), 0x40f469, 2,  *((intOrPtr*)(_t128 + 0x7c)), 0x40f469, 0x40f469, 1);
          						RegCloseKey( *(_t128 + 0x60));
          					}
          					RegCloseKey( *(_t128 + 0x5c));
          				}
          				_t121 = 0xff;
          				 *(_t128 + 0x58) = _t111;
          				 *(_t128 - 0x230) = _t111;
          				memset(_t128 - 0x22f, _t111, 0xff);
          				_t73 = E00401EC5(0xff,  *(_t128 + 0x74), _t111, _t128 - 0x230); // executed
          				_t133 = _t132 + 0x18;
          				while(_t73 == 0) {
          					_t76 = RegOpenKeyExA( *(_t128 + 0x74), _t128 - 0x230, _t111, 0x20019, _t128 + 0x64); // executed
          					if(_t76 == 0) {
          						 *(_t128 - 0x130) = _t111;
          						memset(_t128 - 0x12f, _t111, _t121);
          						_t127 = _t128 - 0x130;
          						E00401F0A(_t121, _t114, _t128 - 0x130,  *(_t128 + 0x64), "ProductName"); // executed
          						_t133 = _t133 + 0x14;
          						if( *(_t128 - 0x130) != _t111) {
          							L12:
          							E00409476(0x80, _t128 - 0x30, _t128 - 0x130);
          							_t111 = 0;
          							_t121 = 0xff;
          						} else {
          							E00401F0A(_t121, _t114, _t127,  *(_t128 + 0x64), "ConvertToEdition"); // executed
          							_pop(_t116);
          							if( *(_t128 - 0x130) != _t111) {
          								goto L12;
          							} else {
          								E00401F0A(_t121, _t116, _t127,  *(_t128 + 0x64), "ProductNameNonQualified"); // executed
          								if( *(_t128 - 0x130) != _t111) {
          									goto L12;
          								} else {
          									 *(_t128 - 0x630) = _t111;
          									memset(_t128 - 0x62f, _t111, 0x3ff);
          									sprintf(_t128 - 0x630, "Microsoft\\Windows\\CurrentVersion\\Uninstall\\%s", _t128 - 0x230);
          									E00402134(_t127,  *((intOrPtr*)( *((intOrPtr*)(_t128 + 0x70)) + 0x1dc)), _t128 - 0x630, "DisplayName", _t121); // executed
          									_t133 = _t133 + 0x28;
          									if( *(_t128 - 0x130) == _t111) {
          										E0040BB75( *((intOrPtr*)(_t128 + 0x78)), _t128 - 0x30);
          									} else {
          										goto L12;
          									}
          								}
          							}
          						}
          						_pop(_t114);
          						E0040BEFD( *((intOrPtr*)(_t128 + 0x70)), _t128 - 0x30,  *(_t128 + 0x64), 2,  *((intOrPtr*)(_t128 + 0x7c)), 0x40f469,  *((intOrPtr*)(_t128 + 0x54))); // executed
          						RegCloseKey( *(_t128 + 0x64)); // executed
          					}
          					 *(_t128 + 0x58) =  *(_t128 + 0x58) + 1;
          					_t73 = E00401EC5(_t121,  *(_t128 + 0x74),  *(_t128 + 0x58), _t128 - 0x230); // executed
          					_t133 = _t133 + 0xc;
          				}
          				return _t73;
          			}

















          0x0040c06d
          0x0040c06e
          0x0040c07b
          0x0040c087
          0x0040c08a
          0x0040c096
          0x0040c099
          0x0040c09c
          0x0040c0a1
          0x0040c0a8
          0x0040c0af
          0x0040c0b1
          0x0040c0b1
          0x0040c0d1
          0x0040c0d5
          0x0040c0e9
          0x0040c108
          0x0040c110
          0x0040c110
          0x0040c119
          0x0040c119
          0x0040c11f
          0x0040c12d
          0x0040c130
          0x0040c136
          0x0040c148
          0x0040c14d
          0x0040c2a0
          0x0040c169
          0x0040c171
          0x0040c180
          0x0040c186
          0x0040c195
          0x0040c19b
          0x0040c1a0
          0x0040c1a9
          0x0040c237
          0x0040c246
          0x0040c24b
          0x0040c24d
          0x0040c1af
          0x0040c1b9
          0x0040c1c5
          0x0040c1c6
          0x00000000
          0x0040c1c8
          0x0040c1d2
          0x0040c1df
          0x00000000
          0x0040c1e1
          0x0040c1ee
          0x0040c1f4
          0x0040c20c
          0x0040c227
          0x0040c22c
          0x0040c235
          0x0040c25b
          0x00000000
          0x00000000
          0x00000000
          0x0040c235
          0x0040c1df
          0x0040c1c6
          0x0040c260
          0x0040c278
          0x0040c280
          0x0040c280
          0x0040c286
          0x0040c298
          0x0040c29d
          0x0040c29d
          0x0040c2af

          APIs
          • memset.MSVCRT ref: 0040C08A
          • RegOpenKeyExA.KERNELBASE(?,ProductID,00000000,000F003F,?,?,?), ref: 0040C0D1
          • RegOpenKeyExA.ADVAPI32(?,DigitalProductID,00000000,000F003F,?,?,?), ref: 0040C0E5
          • RegCloseKey.ADVAPI32(?,?,?), ref: 0040C110
          • RegCloseKey.ADVAPI32(?,?,?), ref: 0040C119
          • memset.MSVCRT ref: 0040C136
          • RegOpenKeyExA.KERNELBASE(?,?,00000000,00020019,?,?,?,?,?,?,?,?,?), ref: 0040C169
          • memset.MSVCRT ref: 0040C186
            • Part of subcall function 00401F0A: RegQueryValueExA.KERNELBASE(?,d!@,00000000,?,?,000003FF,?,?,?,00402164,?,000003FF,000003FF), ref: 00401F23
          • memset.MSVCRT ref: 0040C1F4
          • sprintf.MSVCRT ref: 0040C20C
            • Part of subcall function 00402134: RegCloseKey.KERNELBASE(?,000003FF), ref: 0040216E
          • RegCloseKey.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040C280
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Closememset$Open$QueryValuesprintf
          • String ID: ConvertToEdition$DigitalProductID$DisplayName$Microsoft\Windows\CurrentVersion\Uninstall\%s$ProductID$ProductName$ProductNameNonQualified
          • API String ID: 4153920573-3786628886
          • Opcode ID: 42d0bb4ae8faf92211928f32afe96cafbe48130fd5398bc368d234c6df37b995
          • Instruction ID: 17a31d91986c2938db73b06899a3cda4d2c46c2a9cde59d7237f82d5fe52a8b0
          • Opcode Fuzzy Hash: 42d0bb4ae8faf92211928f32afe96cafbe48130fd5398bc368d234c6df37b995
          • Instruction Fuzzy Hash: A151707194024CAEDF21EFA5CC81EEE3BADBB44344F04017AF904B21A2D3399E49DB65
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          C-Code - Quality: 72%
          			E004062A6(void* __esi) {
          				void* _v20;
          				void* _v28;
          				void* _v40;
          				void* _t20;
          				long _t28;
          				long _t31;
          				intOrPtr* _t34;
          				long _t35;
          				intOrPtr* _t38;
          				void* _t42;
          				int _t43;
          				void* _t45;
          				long* _t46;
          				long* _t47;
          
          				_t42 = __esi;
          				_t34 = __imp__ImageList_SetImageCount;
          				_t38 = ImageList_Create;
          				if( *((intOrPtr*)(__esi + 0x1a4)) != 0) {
          					_t31 = ImageList_Create(0x10, 0x10, 0x19, 1, 1);
          					_t47 = __esi + 0x198;
          					 *_t47 = _t31;
          					 *_t34(_t31, 1);
          					SendMessageA( *(__esi + 0x190), 0x1003, 1,  *_t47); // executed
          				}
          				if( *((intOrPtr*)(_t42 + 0x1a8)) != 0) {
          					_t28 =  *_t38(0x20, 0x20, 0x19, 1, 1);
          					_t46 = _t42 + 0x19c;
          					 *_t46 = _t28;
          					 *_t34(_t28, 1);
          					SendMessageA( *(_t42 + 0x190), 0x1003, 0,  *_t46);
          				}
          				_t43 = 0x10;
          				 *(_t42 + 0x194) = GetModuleHandleA(_t43);
          				_v20 = LoadImageA(GetModuleHandleA(0), 0x85, 0, _t43, _t43, 0x1000);
          				_t20 = LoadImageA(GetModuleHandleA(0), 0x86, 0, 0x10, 0x10, 0x1000);
          				_t45 = _t20;
          				 *_t34( *(_t42 + 0x194), 0, _t43, 0x19, 1, 1);
          				_t35 = GetSysColor(0xf);
          				ImageList_AddMasked( *(_t42 + 0x194), _v28, _t35);
          				ImageList_AddMasked( *(_t42 + 0x194), _t45, _t35);
          				DeleteObject(_v40);
          				DeleteObject(_t45);
          				return E0040A27B( *(_t42 + 0x190),  *(_t42 + 0x194));
          			}

















          0x004062a6
          0x004062af
          0x004062b7
          0x004062bd
          0x004062c9
          0x004062cd
          0x004062d4
          0x004062d7
          0x004062e9
          0x004062e9
          0x004062f6
          0x00406302
          0x00406306
          0x0040630d
          0x00406310
          0x00406322
          0x00406322
          0x00406330
          0x0040633d
          0x0040635e
          0x00406375
          0x0040637f
          0x00406381
          0x00406391
          0x0040639e
          0x004063a8
          0x004063b4
          0x004063b7
          0x004063d0

          APIs
          • ImageList_Create.COMCTL32(00000010,00000010,00000019,00000001,00000001,00000000,?), ref: 004062C9
          • ImageList_SetImageCount.COMCTL32(00000000,00000001), ref: 004062D7
          • SendMessageA.USER32(?,00001003,00000001,?), ref: 004062E9
          • ImageList_Create.COMCTL32(00000020,00000020,00000019,00000001,00000001,00000000,?), ref: 00406302
          • ImageList_SetImageCount.COMCTL32(00000000,00000001), ref: 00406310
          • SendMessageA.USER32(?,00001003,00000000,?), ref: 00406322
          • GetModuleHandleA.KERNEL32(00000010,00000010,00000019,00000001,00000001,00000000,?), ref: 00406333
          • GetModuleHandleA.KERNEL32(00000000), ref: 00406343
          • LoadImageA.USER32 ref: 0040635A
          • GetModuleHandleA.KERNEL32(00000000), ref: 00406362
          • LoadImageA.USER32 ref: 00406375
          • ImageList_SetImageCount.COMCTL32(?,00000000), ref: 00406381
          • GetSysColor.USER32(0000000F), ref: 00406385
          • ImageList_AddMasked.COMCTL32(?,00000001,00000000), ref: 0040639E
          • ImageList_AddMasked.COMCTL32(?,00000000,00000000), ref: 004063A8
          • DeleteObject.GDI32(?), ref: 004063B4
          • DeleteObject.GDI32(00000000), ref: 004063B7
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Image$List_$CountHandleModule$CreateDeleteLoadMaskedMessageObjectSend$Color
          • String ID:
          • API String ID: 1402380124-0
          • Opcode ID: b0a71af7c13c1d3a9646c943d6bb8ac48b3b6636949e90c24aa39a3b535041e0
          • Instruction ID: ef437634802c0f8593373c4151400824c734c6e78cd70dfdfe96a1fd0efcfe5a
          • Opcode Fuzzy Hash: b0a71af7c13c1d3a9646c943d6bb8ac48b3b6636949e90c24aa39a3b535041e0
          • Instruction Fuzzy Hash: 2B317F31280348BFFA316B61DC06FC67BA9FB88B04F010839F3596A1E1C6F274549A18
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 146 40bc45-40bc77 call 40ead0 RegOpenKeyExA 149 40bdb8-40bdbc 146->149 150 40bc7d-40bc88 146->150 151 40bd97-40bda9 call 401ec5 150->151 154 40bc8d-40bca4 RegOpenKeyExA 151->154 155 40bdaf-40bdb2 RegCloseKey 151->155 156 40bd8a-40bd94 154->156 157 40bcaa-40bcb5 154->157 155->149 156->151 158 40bd69-40bd7b call 401ec5 157->158 161 40bd81-40bd84 RegCloseKey 158->161 162 40bcba-40bcd1 RegOpenKeyExA 158->162 161->156 163 40bcd7-40bcec RegOpenKeyExA 162->163 164 40bd5c-40bd66 162->164 165 40bd53-40bd56 RegCloseKey 163->165 166 40bcee-40bd51 sprintf call 402134 call 40b6a4 RegCloseKey 163->166 164->158 165->164 166->165
          C-Code - Quality: 58%
          			E0040BC45(void* __ecx, void* __eflags, intOrPtr _a4, void* _a8) {
          				void* _v8;
          				void* _v12;
          				int _v16;
          				int _v20;
          				void* _v24;
          				long _v288;
          				char _v1312;
          				char _v2336;
          				char _v4384;
          				void* __esi;
          				long _t45;
          				void* _t48;
          				long _t51;
          				void* _t55;
          				long _t58;
          				long _t61;
          				int _t77;
          				void* _t79;
          
          				_t75 = __ecx;
          				E0040EAD0(0x111c, __ecx);
          				_t77 = 0;
          				_v8 = 0;
          				_t45 = RegOpenKeyExA(_a8, "Adobe", 0, 0x20019,  &_v8); // executed
          				if(_t45 == 0) {
          					_push( &_v1312);
          					_v16 = 0;
          					_push(0);
          					while(1) {
          						_push(_v8);
          						_t48 = E00401EC5(0x3ff); // executed
          						_t79 = _t79 + 0xc;
          						if(_t48 != 0) {
          							break;
          						}
          						_a8 = _t77;
          						_t51 = RegOpenKeyExA(_v8,  &_v1312, _t77, 0x20019,  &_a8); // executed
          						if(_t51 != 0) {
          							L11:
          							_v16 = _v16 + 1;
          							_push( &_v1312);
          							_push(_v16);
          							continue;
          						}
          						_push( &_v2336);
          						_v20 = _t77;
          						_push(_t77);
          						while(1) {
          							_push(_a8);
          							_t55 = E00401EC5(0x3ff); // executed
          							_t79 = _t79 + 0xc;
          							if(_t55 != 0) {
          								break;
          							}
          							_v12 = _t77;
          							_t58 = RegOpenKeyExA(_a8,  &_v2336, _t77, 0x20019,  &_v12); // executed
          							if(_t58 == 0) {
          								_v24 = _t77;
          								_t61 = RegOpenKeyExA(_v12, "Registration", _t77, 0x20019,  &_v24); // executed
          								if(_t61 == 0) {
          									_v288 = _t61;
          									sprintf( &_v4384, "%s %s",  &_v1312,  &_v2336);
          									_t78 =  &_v288;
          									E00402134( &_v288, _v12, "Installer", "Path", 0x104);
          									_t79 = _t79 + 0x20;
          									E0040B6A4(_t75,  &_v288, _a4,  &_v4384, _v24, _t78);
          									RegCloseKey(_v24);
          									_t77 = 0;
          								}
          								RegCloseKey(_v12); // executed
          							}
          							_v20 = _v20 + 1;
          							_push( &_v2336);
          							_push(_v20);
          						}
          						RegCloseKey(_a8);
          						goto L11;
          					}
          					return RegCloseKey(_v8);
          				}
          				return _t45;
          			}





















          0x0040bc45
          0x0040bc4d
          0x0040bc65
          0x0040bc70
          0x0040bc73
          0x0040bc77
          0x0040bc83
          0x0040bc84
          0x0040bc87
          0x0040bd97
          0x0040bd97
          0x0040bd9f
          0x0040bda4
          0x0040bda9
          0x00000000
          0x00000000
          0x0040bc9d
          0x0040bca0
          0x0040bca4
          0x0040bd8a
          0x0040bd8a
          0x0040bd93
          0x0040bd94
          0x00000000
          0x0040bd94
          0x0040bcb0
          0x0040bcb1
          0x0040bcb4
          0x0040bd69
          0x0040bd69
          0x0040bd71
          0x0040bd76
          0x0040bd7b
          0x00000000
          0x00000000
          0x0040bcca
          0x0040bccd
          0x0040bcd1
          0x0040bce5
          0x0040bce8
          0x0040bcec
          0x0040bcee
          0x0040bd0e
          0x0040bd25
          0x0040bd2b
          0x0040bd30
          0x0040bd43
          0x0040bd4b
          0x0040bd51
          0x0040bd51
          0x0040bd56
          0x0040bd56
          0x0040bd5c
          0x0040bd65
          0x0040bd66
          0x0040bd66
          0x0040bd84
          0x00000000
          0x0040bd84
          0x00000000
          0x0040bdb2
          0x0040bdbc

          APIs
          • RegOpenKeyExA.KERNELBASE(?,?,00000000,00020019,?), ref: 0040BCA0
          • RegCloseKey.ADVAPI32(?), ref: 0040BD84
          • RegOpenKeyExA.KERNELBASE(?,Adobe,00000000,00020019,?), ref: 0040BC73
            • Part of subcall function 00401EC5: RegEnumKeyExA.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?), ref: 00401EE4
          • RegCloseKey.ADVAPI32(?), ref: 0040BDB2
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: CloseOpen$Enum
          • String ID: %s %s$Adobe$Installer$Path$Registration
          • API String ID: 2405484398-749104014
          • Opcode ID: 37e36cab5502024957e1061bd9b290c5346aa24695d22ce388a156261b215221
          • Instruction ID: 3d9d02df14edbda81bbc41b24b47b15c7df725d8365267db9a209b612df55d88
          • Opcode Fuzzy Hash: 37e36cab5502024957e1061bd9b290c5346aa24695d22ce388a156261b215221
          • Instruction Fuzzy Hash: 1741E7B294011DBADF219B91DC41EEFBB7CEF04754F0080B2B908B2191E7359B599FA9
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          C-Code - Quality: 83%
          			E00404E27(void* __ecx, void* __edx, void* __eflags, intOrPtr _a12) {
          				char _v408;
          				char* _v420;
          				struct HWND__* _v424;
          				intOrPtr _v428;
          				struct HWND__* _v824;
          				char _v1088;
          				char _v1140;
          				struct tagMSG _v1176;
          				void* __edi;
          				void* __esi;
          				void* _t27;
          				int _t37;
          				int _t39;
          				int _t49;
          				struct HWND__* _t52;
          				int _t55;
          				struct HWND__* _t57;
          				int _t59;
          				int _t64;
          				struct HWND__* _t70;
          				void* _t75;
          				intOrPtr* _t76;
          
          				_push(_t75);
          				_t27 = E0040A4CC(__eflags);
          				if(_t27 != 0) {
          					_t70 = 0;
          					__imp__CoInitialize(0); // executed
          					E004018BC();
          					SetErrorMode(0x8001); // executed
          					_push( &_v408);
          					_push(0x101); // executed
          					L0040132C(); // executed
          					E004087F0(__eflags);
          					E004043A7( &_v1088, _t75);
          					_v420 =  &_v1140;
          					E004089A5(__eflags,  &_v1140, _a12);
          					_t37 = E004087A8(_v428, "/savelangfile");
          					__eflags = _t37;
          					if(_t37 < 0) {
          						E00407DA7(); // executed
          						_t39 = E004087A8(_v420, "/deleteregkey");
          						__eflags = _t39;
          						if(_t39 < 0) {
          							__eflags =  *((intOrPtr*)(_v420 + 0x30)) - 1;
          							if(__eflags < 0) {
          								L11:
          								_t83 =  &_v1088;
          								E004046C8( &_v1088);
          								E0040D722( &_v1088);
          								E0040D5FD( &_v1088);
          								E0040D62E(_t83, 0x419);
          								_t76 = GetMessageA;
          								_t49 = GetMessageA( &_v1176, _t70, _t70, _t70); // executed
          								__eflags = _t49;
          								if(_t49 == 0) {
          									L19:
          									L00401332();
          									__imp__CoUninitialize();
          									L7:
          									E00403A2B(_t49,  &_v1088);
          									E004087D7( &_v1140);
          									_t52 = _t70;
          									L2:
          									return _t52;
          								}
          								do {
          									_t55 = E0040D5E4( &_v1088,  &(_v1176.wParam));
          									__eflags = _t55;
          									if(_t55 != 0) {
          										goto L18;
          									}
          									_t57 =  *0x412794; // 0x0
          									__eflags = _t57 - _t70;
          									if(_t57 == _t70) {
          										L16:
          										_t59 = IsDialogMessageA(_v824,  &(_v1176.wParam)); // executed
          										__eflags = _t59;
          										if(_t59 == 0) {
          											TranslateMessage( &(_v1176.wParam));
          											DispatchMessageA( &(_v1176.wParam)); // executed
          										}
          										goto L18;
          									}
          									_t64 = IsDialogMessageA(_t57,  &(_v1176.wParam));
          									__eflags = _t64;
          									if(_t64 != 0) {
          										goto L18;
          									}
          									goto L16;
          									L18:
          									_t49 =  *_t76( &(_v1176.wParam), _t70, _t70, _t70); // executed
          									__eflags = _t49;
          								} while (_t49 != 0);
          								goto L19;
          							}
          							_t49 = E00404B92( &_v1088, __eflags);
          							__eflags = _t49;
          							if(_t49 == 0) {
          								goto L11;
          							}
          							_t70 = _v424;
          							goto L7;
          						}
          						_t49 = E0040385F();
          						goto L7;
          					}
          					 *0x412a70 = 0x412160;
          					E00403A2B(E0040820F(),  &_v1088);
          					E004087D7( &_v1140);
          					_t52 = 0;
          					goto L2;
          				}
          				_t52 = _t27 + 1;
          				goto L2;
          			}

























          0x00404e35
          0x00404e36
          0x00404e3d
          0x00404e49
          0x00404e4c
          0x00404e52
          0x00404e5c
          0x00404e69
          0x00404e6a
          0x00404e6f
          0x00404e78
          0x00404e81
          0x00404e8e
          0x00404e95
          0x00404ea6
          0x00404eab
          0x00404ead
          0x00404ed7
          0x00404ee8
          0x00404eed
          0x00404eef
          0x00404f16
          0x00404f1a
          0x00404f32
          0x00404f32
          0x00404f36
          0x00404f3d
          0x00404f45
          0x00404f51
          0x00404f56
          0x00404f64
          0x00404f66
          0x00404f68
          0x00404fcd
          0x00404fcd
          0x00404fd2
          0x00404ef6
          0x00404efa
          0x00404f03
          0x00404f08
          0x00404e40
          0x00404e46
          0x00404e46
          0x00404f70
          0x00404f79
          0x00404f7e
          0x00404f80
          0x00000000
          0x00000000
          0x00404f82
          0x00404f87
          0x00404f89
          0x00404f97
          0x00404fa3
          0x00404fa5
          0x00404fa7
          0x00404fae
          0x00404fb9
          0x00404fb9
          0x00000000
          0x00404fa7
          0x00404f91
          0x00404f93
          0x00404f95
          0x00000000
          0x00000000
          0x00000000
          0x00404fbf
          0x00404fc7
          0x00404fc9
          0x00404fc9
          0x00000000
          0x00404f70
          0x00404f20
          0x00404f25
          0x00404f27
          0x00000000
          0x00000000
          0x00404f29
          0x00000000
          0x00404f29
          0x00404ef1
          0x00000000
          0x00404ef1
          0x00404eaf
          0x00404ec2
          0x00404ecb
          0x00404ed0
          0x00000000
          0x00404ed0
          0x00404e3f
          0x00000000

          APIs
            • Part of subcall function 0040A4CC: MessageBoxA.USER32 ref: 0040A4FA
          • CoInitialize.OLE32(00000000), ref: 00404E4C
          • SetErrorMode.KERNELBASE(00008001,?,00000000), ref: 00404E5C
          • WSAStartup.WS2_32(00000101,?), ref: 00404E6F
            • Part of subcall function 00407DA7: memset.MSVCRT ref: 00407DC5
          • KiUserCallbackDispatcher.NTDLL ref: 00404F64
          • IsDialogMessageA.USER32(00000000,?,?,?,00000000), ref: 00404F91
          • IsDialogMessageA.USER32(?,?,?,?,00000000), ref: 00404FA3
          • TranslateMessage.USER32(?), ref: 00404FAE
          • DispatchMessageA.USER32 ref: 00404FB9
          • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000,?,00000000), ref: 00404FC7
          • WSACleanup.WS2_32 ref: 00404FCD
          • CoUninitialize.OLE32(?,00000000), ref: 00404FD2
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Message$CallbackDialogDispatcherUser$CleanupDispatchErrorInitializeModeStartupTranslateUninitializememset
          • String ID: /deleteregkey$/savelangfile
          • API String ID: 4040013963-4127792980
          • Opcode ID: caa6eafc7bc68cfecc9a263428d1dd10884d39a2a9968c1ab802fbdca453c81d
          • Instruction ID: fff23fc833980d83a4cc391ec65c513dde3e2fbeff2dcd1e083f360bedff1e51
          • Opcode Fuzzy Hash: caa6eafc7bc68cfecc9a263428d1dd10884d39a2a9968c1ab802fbdca453c81d
          • Instruction Fuzzy Hash: 6D4151B150434A9BD710FBA2DD4596B73ACAF84348F40483FB680F7192DB78DD0987AA
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          C-Code - Quality: 74%
          			E004047B6(void* __ecx, void* __eflags) {
          				void* __ebx;
          				void* __esi;
          				struct HWND__* _t99;
          				void* _t103;
          				struct HWND__* _t105;
          				intOrPtr _t112;
          				intOrPtr* _t119;
          				void* _t133;
          				void* _t134;
          				void* _t144;
          				intOrPtr _t147;
          				void* _t151;
          				void* _t152;
          				char* _t162;
          				void* _t164;
          				void* _t165;
          				void* _t167;
          				void* _t169;
          				char* _t171;
          				void* _t173;
          				void* _t176;
          
          				_t176 = __eflags;
          				_t171 = _t173 - 0x78;
          				 *((char*)(_t171 - 0x27)) = 1;
          				_t134 = __ecx;
          				 *(_t171 - 0x30) = 0;
          				 *((intOrPtr*)(_t171 - 0x2c)) = 0;
          				 *((char*)(_t171 - 0x28)) = 0;
          				 *((char*)(_t171 - 0x26)) = 0;
          				 *((char*)(_t171 - 0x25)) = 0;
          				asm("stosd");
          				asm("stosd");
          				 *((intOrPtr*)(_t171 - 0x1c)) = 6;
          				 *((intOrPtr*)(_t171 - 0x18)) = 0x9c5b;
          				 *((char*)(_t171 - 0x14)) = 4;
          				 *((char*)(_t171 - 0x13)) = 0;
          				 *((char*)(_t171 - 0x12)) = 0;
          				 *((char*)(_t171 - 0x11)) = 0;
          				asm("stosd");
          				asm("stosd");
          				 *(_t171 - 8) = 1;
          				 *((intOrPtr*)(_t171 - 4)) = 0x9c41;
          				 *_t171 = 4;
          				 *((char*)(_t171 + 1)) = 0;
          				 *((char*)(_t171 + 2)) = 0;
          				 *((char*)(_t171 + 3)) = 0;
          				asm("stosd");
          				asm("stosd");
          				 *((intOrPtr*)(_t171 + 0xc)) = 5;
          				 *((intOrPtr*)(_t171 + 0x10)) = 0x9c44;
          				 *((char*)(_t171 + 0x14)) = 4;
          				 *((char*)(_t171 + 0x15)) = 0;
          				 *((char*)(_t171 + 0x16)) = 0;
          				 *((char*)(_t171 + 0x17)) = 0;
          				asm("stosd");
          				asm("stosd");
          				 *((intOrPtr*)(_t171 + 0x20)) = 2;
          				 *((intOrPtr*)(_t171 + 0x24)) = 0x9c48;
          				 *((char*)(_t171 + 0x28)) = 4;
          				 *((char*)(_t171 + 0x29)) = 0;
          				 *((char*)(_t171 + 0x2a)) = 0;
          				 *((char*)(_t171 + 0x2b)) = 0;
          				asm("stosd");
          				asm("stosd");
          				 *((intOrPtr*)(_t171 + 0x34)) = 3;
          				 *((intOrPtr*)(_t171 + 0x38)) = 0x9c49;
          				 *((char*)(_t171 + 0x3c)) = 4;
          				 *((char*)(_t171 + 0x3d)) = 0;
          				 *((char*)(_t171 + 0x3e)) = 0;
          				 *((char*)(_t171 + 0x3f)) = 0;
          				asm("stosd");
          				asm("stosd");
          				 *((intOrPtr*)(_t171 + 0x48)) = 0;
          				 *((intOrPtr*)(_t171 + 0x4c)) = 0x9c4e;
          				 *((char*)(_t171 + 0x50)) = 4;
          				 *((char*)(_t171 + 0x51)) = 0;
          				 *((char*)(_t171 + 0x52)) = 0;
          				 *((char*)(_t171 + 0x53)) = 0;
          				asm("stosd");
          				asm("stosd");
          				 *((intOrPtr*)(_t171 + 0x5c)) = 4;
          				 *((intOrPtr*)(_t171 + 0x60)) = 0x9c42;
          				 *((char*)(_t171 + 0x64)) = 4;
          				 *((char*)(_t171 + 0x65)) = 0;
          				 *((char*)(_t171 + 0x66)) = 0;
          				 *((char*)(_t171 + 0x67)) = 0;
          				 *(_t171 + 0x70) =  *(_t171 + 0x70) | 0xffffffff;
          				asm("stosd");
          				_t165 = 0x66;
          				asm("stosd");
          				 *((intOrPtr*)(__ecx + 0x11c)) = E00408047(0, _t165);
          				_t99 = E0040D65F(__ecx);
          				__imp__#6(0x50000000, 0x40f469,  *((intOrPtr*)(__ecx + 0x108)), 0x101, _t152, _t164, _t133); // executed
          				 *(__ecx + 0x114) = _t99;
          				SendMessageA(_t99, 0x404, 1, _t171 + 0x70);
          				_t103 = CreateToolbarEx( *(_t134 + 0x108), 0x50010900, 0x102, 7, 0, E00409923(), _t171 - 0x30, 8, 0x10, 0x10, 0x70, 0x10, 0x14); // executed
          				 *(_t134 + 0x118) = _t103;
          				_t105 = CreateWindowExA(0, "SysListView32", 0, 0x50810809, 0, 0, 0x190, 0xc8,  *(_t134 + 0x108), 0x103, GetModuleHandleA(0), 0); // executed
          				E0040C510( *((intOrPtr*)(_t134 + 0x290)), _t176, _t105, 1);
          				E00406827( *((intOrPtr*)(_t134 + 0x290)));
          				E0040B452( *((intOrPtr*)(_t134 + 0x290)));
          				_t167 = 0x68;
          				 *((intOrPtr*)( *((intOrPtr*)(_t134 + 0x290)) + 0x878)) =  *((intOrPtr*)(_t134 + 0x114));
          				 *((intOrPtr*)(_t134 + 0x170)) = E00408047( *((intOrPtr*)(_t134 + 0x114)), _t167);
          				_t112 =  *((intOrPtr*)(_t134 + 0x29c));
          				if( *((intOrPtr*)(_t112 + 0x30)) <= 0) {
          					_t144 = 0x40f469;
          				} else {
          					if( *((intOrPtr*)(_t112 + 0x1c)) <= 0) {
          						_t144 = 0;
          					} else {
          						_t144 =  *((intOrPtr*)( *((intOrPtr*)(_t112 + 0xc)))) +  *((intOrPtr*)(_t112 + 0x10));
          					}
          				}
          				_push("/noloadsettings");
          				_push(_t144);
          				L0040107A();
          				if(_t112 == 0) {
          					E0040385F();
          				}
          				if(E004087A8( *((intOrPtr*)(_t134 + 0x29c)), "/nosavereg") >= 0) {
          					 *(_t134 + 0x17c) = 1;
          				}
          				E00403DEE(_t134, 0); // executed
          				_t169 = _t134;
          				E00403CEC(_t169);
          				 *((intOrPtr*)( *((intOrPtr*)(_t169 + 0x28c)))) = 1;
          				E004054FF( *((intOrPtr*)(_t169 + 0x290)));
          				_t162 = _t169 + 0x180;
          				_t119 = E00409D54();
          				 *((intOrPtr*)(_t171 + 0x74)) = _t119;
          				_t85 = _t119 + 1; // 0x1
          				_t151 = _t85;
          				do {
          					_t147 =  *_t119;
          					_t119 = _t119 + 1;
          				} while (_t147 != 0);
          				if(_t119 - _t151 + 0xc >= 0x104) {
          					 *_t162 = 0;
          				} else {
          					E00409ADF(_t162,  *((intOrPtr*)(_t171 + 0x74)), "report.html");
          					_pop(_t147);
          				}
          				E00405688( *((intOrPtr*)(_t169 + 0x290)), 0x30, 1);
          				E00403A4F(_t169);
          				 *((intOrPtr*)(_t169 + 0x294)) = RegisterWindowMessageA("commdlg_FindReplace");
          				E004040C5(0, _t147, _t169);
          				return E00403870(_t169);
          			}
























          0x004047b6
          0x004047b7
          0x004047c1
          0x004047ca
          0x004047ce
          0x004047d1
          0x004047d4
          0x004047d7
          0x004047da
          0x004047e0
          0x004047e1
          0x004047e2
          0x004047e9
          0x004047f0
          0x004047f4
          0x004047f7
          0x004047fa
          0x00404802
          0x00404803
          0x00404804
          0x0040480b
          0x00404812
          0x00404816
          0x00404819
          0x0040481c
          0x00404824
          0x00404825
          0x00404826
          0x0040482d
          0x00404834
          0x00404838
          0x0040483b
          0x0040483e
          0x00404846
          0x00404847
          0x00404848
          0x0040484f
          0x00404856
          0x0040485a
          0x0040485d
          0x00404860
          0x00404868
          0x00404869
          0x0040486a
          0x00404871
          0x00404878
          0x0040487c
          0x0040487f
          0x00404882
          0x0040488a
          0x0040488b
          0x0040488c
          0x0040488f
          0x00404896
          0x0040489a
          0x0040489d
          0x004048a0
          0x004048a8
          0x004048a9
          0x004048aa
          0x004048b1
          0x004048b8
          0x004048bc
          0x004048bf
          0x004048c2
          0x004048c5
          0x004048ce
          0x004048d1
          0x004048d2
          0x004048d8
          0x004048e0
          0x004048fa
          0x0040490c
          0x00404912
          0x00404943
          0x0040494a
          0x0040497b
          0x0040498a
          0x00404995
          0x004049a0
          0x004049b3
          0x004049b4
          0x004049bf
          0x004049c5
          0x004049ce
          0x004049e3
          0x004049d0
          0x004049d3
          0x004049df
          0x004049d5
          0x004049da
          0x004049da
          0x004049d3
          0x004049e8
          0x004049ed
          0x004049ee
          0x004049f7
          0x004049f9
          0x004049f9
          0x00404a10
          0x00404a12
          0x00404a12
          0x00404a1d
          0x00404a22
          0x00404a24
          0x00404a32
          0x00404a3a
          0x00404a3f
          0x00404a45
          0x00404a4a
          0x00404a4d
          0x00404a4d
          0x00404a50
          0x00404a50
          0x00404a52
          0x00404a53
          0x00404a61
          0x00404a75
          0x00404a63
          0x00404a6d
          0x00404a72
          0x00404a72
          0x00404a81
          0x00404a88
          0x00404a9a
          0x00404aa0
          0x00404ab3

          APIs
            • Part of subcall function 00408047: LoadMenuA.USER32 ref: 0040804F
            • Part of subcall function 0040D65F: KiUserCallbackDispatcher.NTDLL(?,?,004048E5), ref: 0040D66B
          • #6.COMCTL32(50000000,0040F469,?,00000101), ref: 004048FA
          • SendMessageA.USER32(00000000,00000404,00000001,?), ref: 00404912
            • Part of subcall function 00409923: GetModuleHandleA.KERNEL32(00000000,0040492D,?,00000008,00000010,00000010,00000070,00000010,00000014), ref: 00409925
            • Part of subcall function 00409923: LoadImageA.USER32 ref: 00409939
          • CreateToolbarEx.COMCTL32(?,50010900,00000102,00000007,00000000,00000000,?,00000008,00000010,00000010,00000070,00000010,00000014), ref: 00404943
          • GetModuleHandleA.KERNEL32(00000000), ref: 00404950
          • CreateWindowExA.USER32 ref: 0040497B
            • Part of subcall function 0040B452: GetModuleHandleA.KERNEL32(00000000,?,004049A5,00000000,00000001), ref: 0040B45C
            • Part of subcall function 0040B452: LoadIconA.USER32(00000000,00000066), ref: 0040B465
            • Part of subcall function 0040B452: ImageList_ReplaceIcon.COMCTL32(?,00000000,00000000), ref: 0040B474
          • _stricmp.MSVCRT(0040F469,/noloadsettings,00000000,00000001), ref: 004049EE
          • RegisterWindowMessageA.USER32(commdlg_FindReplace,00000030,00000001,00000000,/nosavereg,00000000,00000001), ref: 00404A92
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: HandleLoadModule$CreateIconImageMessageWindow$CallbackDispatcherList_MenuRegisterReplaceSendToolbarUser_stricmp
          • String ID: /noloadsettings$/nosavereg$SysListView32$commdlg_FindReplace$report.html
          • API String ID: 3242087448-1039663613
          • Opcode ID: c6e68bdaabeb019ec5d0643ccfab1f25574304fe8519e35c04f5005505400366
          • Instruction ID: 0e8a5125ad51f1b816e76ce34d49f9e35a9deb2930445265d707596dacd4574b
          • Opcode Fuzzy Hash: c6e68bdaabeb019ec5d0643ccfab1f25574304fe8519e35c04f5005505400366
          • Instruction Fuzzy Hash: 5091C171604388EFEB11DF78C885BDA3FA1AF55304F04447DFA44AB292C7B99948CB69
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 280 4010e0-4010fc call 4012d0 GetModuleHandleA 283 40111d-401120 280->283 284 4010fe-401109 280->284 286 401149-401196 __set_app_type __p__fmode __p__commode call 4012ca 283->286 284->283 285 40110b-401114 284->285 288 401135-401139 285->288 289 401116-40111b 285->289 294 4011a4-4011fe call 4012b8 _initterm __getmainargs _initterm 286->294 295 401198-4011a3 __setusermatherr 286->295 288->283 290 40113b-40113d 288->290 289->283 292 401122-401129 289->292 293 401143-401146 290->293 292->283 296 40112b-401133 292->296 293->286 299 401200-401208 294->299 300 40123a-40123d 294->300 295->294 296->293 303 40120a-40120c 299->303 304 40120e-401211 299->304 301 401217-40121b 300->301 302 40123f-401243 300->302 306 401221-401232 GetStartupInfoA 301->306 307 40121d-40121f 301->307 302->300 303->299 303->304 304->301 305 401213-401214 304->305 305->301 308 401234-401238 306->308 309 401245-401247 306->309 307->305 307->306 310 401248-40124f GetModuleHandleA call 404e27 308->310 309->310 312 401254-40125c 310->312 313 401265-4012a5 _cexit call 401309 312->313 314 40125e-40125f exit 312->314 314->313
          C-Code - Quality: 83%
          			_entry_(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
          				struct HINSTANCE__* _t33;
          				intOrPtr* _t35;
          				intOrPtr* _t36;
          				void* _t39;
          				void _t41;
          				intOrPtr _t48;
          				signed int _t50;
          				int _t52;
          				intOrPtr _t55;
          				signed int _t56;
          				signed int _t57;
          				intOrPtr _t62;
          				intOrPtr _t63;
          				intOrPtr* _t65;
          				void* _t66;
          				intOrPtr* _t70;
          				int _t71;
          				void* _t72;
          				intOrPtr _t80;
          
          				_t66 = __edx;
          				_push(0x70);
          				_push(0x40f3f0);
          				E004012D0(__ebx, __edi, __esi);
          				_t33 = GetModuleHandleA(0);
          				if(_t33->i != 0x5a4d) {
          					L4:
          					 *(_t72 - 0x1c) = 0;
          				} else {
          					_t65 =  *((intOrPtr*)(_t33 + 0x3c)) + _t33;
          					if( *_t65 != 0x4550) {
          						goto L4;
          					} else {
          						_t56 =  *(_t65 + 0x18) & 0x0000ffff;
          						if(_t56 == 0x10b) {
          							__eflags =  *((intOrPtr*)(_t65 + 0x74)) - 0xe;
          							if( *((intOrPtr*)(_t65 + 0x74)) <= 0xe) {
          								goto L4;
          							} else {
          								_t57 = 0;
          								__eflags =  *(_t65 + 0xe8);
          								goto L9;
          							}
          						} else {
          							if(_t56 == 0x20b) {
          								__eflags =  *((intOrPtr*)(_t65 + 0x84)) - 0xe;
          								if( *((intOrPtr*)(_t65 + 0x84)) <= 0xe) {
          									goto L4;
          								} else {
          									_t57 = 0;
          									__eflags =  *(_t65 + 0xf8);
          									L9:
          									_t9 = __eflags != 0;
          									__eflags = _t9;
          									 *(_t72 - 0x1c) = _t57 & 0xffffff00 | _t9;
          								}
          							} else {
          								goto L4;
          							}
          						}
          					}
          				}
          				 *(_t72 - 4) = 0;
          				__set_app_type(2);
          				 *0x412ebc =  *0x412ebc | 0xffffffff;
          				 *0x412ec0 =  *0x412ec0 | 0xffffffff;
          				_t35 = __p__fmode();
          				_t62 =  *0x41217c; // 0x0
          				 *_t35 = _t62;
          				_t36 = __p__commode();
          				_t63 =  *0x412178; // 0x0
          				 *_t36 = _t63;
          				 *0x412eb8 =  *_adjust_fdiv;
          				_t39 = E004012CA();
          				_t80 =  *0x412000; // 0x1
          				if(_t80 == 0) {
          					__setusermatherr(E004012CA);
          					_pop(_t63);
          				}
          				E004012B8(_t39);
          				_push(0x40f3c8);
          				_push(0x40f3c4);
          				L004012B2();
          				_t41 =  *0x412174; // 0x0
          				 *(_t72 - 0x20) = _t41;
          				 *(_t72 - 0x30) = __getmainargs(_t72 - 0x2c, _t72 - 0x28, _t72 - 0x24,  *0x412170, _t72 - 0x20);
          				_push(0x40f3c0);
          				_push(0x40f394); // executed
          				L004012B2(); // executed
          				_t70 =  *_acmdln;
          				 *((intOrPtr*)(_t72 - 0x34)) = _t70;
          				if( *_t70 != 0x22) {
          					while(1) {
          						__eflags =  *_t70 - 0x20;
          						if(__eflags <= 0) {
          							goto L17;
          						}
          						_t70 = _t70 + 1;
          						 *((intOrPtr*)(_t72 - 0x34)) = _t70;
          					}
          				} else {
          					do {
          						_t70 = _t70 + 1;
          						 *((intOrPtr*)(_t72 - 0x34)) = _t70;
          						_t55 =  *_t70;
          					} while (_t55 != 0 && _t55 != 0x22);
          					if( *_t70 == 0x22) {
          						L16:
          						_t70 = _t70 + 1;
          						 *((intOrPtr*)(_t72 - 0x34)) = _t70;
          					}
          				}
          				L17:
          				_t48 =  *_t70;
          				if(_t48 != 0 && _t48 <= 0x20) {
          					goto L16;
          				}
          				 *(_t72 - 0x4c) = 0;
          				GetStartupInfoA(_t72 - 0x78);
          				_t88 =  *(_t72 - 0x4c) & 0x00000001;
          				if(( *(_t72 - 0x4c) & 0x00000001) == 0) {
          					_t50 = 0xa;
          				} else {
          					_t50 =  *(_t72 - 0x48) & 0x0000ffff;
          				}
          				_t52 = E00404E27(_t63, _t66, _t88, GetModuleHandleA(0), 0, _t70, _t50); // executed
          				_t71 = _t52;
          				 *(_t72 - 0x7c) = _t71;
          				if( *(_t72 - 0x1c) == 0) {
          					exit(_t71);
          				}
          				__imp___cexit();
          				 *(_t72 - 4) =  *(_t72 - 4) | 0xffffffff;
          				return E00401309(_t71);
          			}






















          0x004010e0
          0x004010e0
          0x004010e2
          0x004010e7
          0x004010f5
          0x004010fc
          0x0040111d
          0x0040111d
          0x004010fe
          0x00401101
          0x00401109
          0x00000000
          0x0040110b
          0x0040110b
          0x00401114
          0x00401135
          0x00401139
          0x00000000
          0x0040113b
          0x0040113b
          0x0040113d
          0x00000000
          0x0040113d
          0x00401116
          0x0040111b
          0x00401122
          0x00401129
          0x00000000
          0x0040112b
          0x0040112b
          0x0040112d
          0x00401143
          0x00401143
          0x00401143
          0x00401146
          0x00401146
          0x00000000
          0x00000000
          0x00000000
          0x0040111b
          0x00401114
          0x00401109
          0x00401149
          0x0040114e
          0x00401155
          0x0040115c
          0x00401163
          0x00401169
          0x0040116f
          0x00401171
          0x00401177
          0x0040117d
          0x00401186
          0x0040118b
          0x00401190
          0x00401196
          0x0040119d
          0x004011a3
          0x004011a3
          0x004011a4
          0x004011a9
          0x004011ae
          0x004011b3
          0x004011b8
          0x004011bd
          0x004011dc
          0x004011df
          0x004011e4
          0x004011e9
          0x004011f6
          0x004011f8
          0x004011fe
          0x0040123a
          0x0040123a
          0x0040123d
          0x00000000
          0x00000000
          0x0040123f
          0x00401240
          0x00401240
          0x00401200
          0x00401200
          0x00401200
          0x00401201
          0x00401204
          0x00401206
          0x00401211
          0x00401213
          0x00401213
          0x00401214
          0x00401214
          0x00401211
          0x00401217
          0x00401217
          0x0040121b
          0x00000000
          0x00000000
          0x00401221
          0x00401228
          0x0040122e
          0x00401232
          0x00401247
          0x00401234
          0x00401234
          0x00401234
          0x0040124f
          0x00401254
          0x00401256
          0x0040125c
          0x0040125f
          0x0040125f
          0x00401265
          0x0040129a
          0x004012a5

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
          • String ID:
          • API String ID: 3662548030-0
          • Opcode ID: f33d7c5d1d16797c1bae12c4f7a21bf94294873571fa73cb12498cd8bb01800b
          • Instruction ID: 3526d41b544f5bcebf3a1e734330deeb32a70226eb28397dfd7ddac2b227193d
          • Opcode Fuzzy Hash: f33d7c5d1d16797c1bae12c4f7a21bf94294873571fa73cb12498cd8bb01800b
          • Instruction Fuzzy Hash: 1A416C70C40204DFCB24DFA4D988AA97BB4BB09325F24417FE961F76E1D3784886CB58
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          C-Code - Quality: 100%
          			E0040BDBF(void* __ecx, intOrPtr _a4, void* _a8, intOrPtr _a12) {
          				void* _v8;
          				int _v12;
          				void _v267;
          				char _v268;
          				void _v531;
          				char _v532;
          				void _v787;
          				char _v788;
          				void* __esi;
          				long _t44;
          				void* _t54;
          				void* _t65;
          				void* _t72;
          				void* _t73;
          				void* _t75;
          
          				_t65 = __ecx;
          				_v8 = 0;
          				_v788 = 0;
          				memset( &_v787, 0, 0xff);
          				sprintf( &_v788, "%s\\Registration", _a12);
          				_t73 = _t72 + 0x18;
          				_t44 = RegOpenKeyExA(_a8,  &_v788, 0, 0x20019,  &_v8); // executed
          				if(_t44 == 0) {
          					_v532 = 0;
          					memset( &_v531, 0, 0x104);
          					E00402134( &_v532, _a8, _a12, "InstallDir", 0x104);
          					E0040B753(_t65, _a4, _v8, _a12,  &_v532);
          					_v12 = 0;
          					_v268 = 0;
          					memset( &_v267, 0, 0xff);
          					_t54 = E00401EC5(0xff, _v8, 0,  &_v268);
          					_t75 = _t73 + 0x34;
          					while(_t54 == 0) {
          						_a8 = 0;
          						if(RegOpenKeyExA(_v8,  &_v268, 0, 0x20019,  &_a8) == 0) {
          							E0040B753(_t65, _a4, _a8, _a12,  &_v532);
          							RegCloseKey(_a8);
          						}
          						_v12 = _v12 + 1;
          						_t54 = E00401EC5(0xff, _v8, _v12,  &_v268);
          						_t75 = _t75 + 0xc;
          					}
          					return RegCloseKey(_v8);
          				}
          				return _t44;
          			}


















          0x0040bdbf
          0x0040bdda
          0x0040bddd
          0x0040bde3
          0x0040bdf7
          0x0040bdfc
          0x0040be13
          0x0040be1b
          0x0040be2e
          0x0040be34
          0x0040be4b
          0x0040be5f
          0x0040be6d
          0x0040be70
          0x0040be76
          0x0040be88
          0x0040be93
          0x0040beed
          0x0040beac
          0x0040beb7
          0x0040bec9
          0x0040bed1
          0x0040bed1
          0x0040bed3
          0x0040bee5
          0x0040beea
          0x0040beea
          0x00000000
          0x0040bef6
          0x0040befa

          APIs
          • memset.MSVCRT ref: 0040BDE3
          • sprintf.MSVCRT ref: 0040BDF7
          • RegOpenKeyExA.KERNELBASE(?,?,00000000,00020019,?), ref: 0040BE13
          • memset.MSVCRT ref: 0040BE34
            • Part of subcall function 00402134: RegCloseKey.KERNELBASE(?,000003FF), ref: 0040216E
            • Part of subcall function 0040B753: memset.MSVCRT ref: 0040B773
          • memset.MSVCRT ref: 0040BE76
            • Part of subcall function 00401EC5: RegEnumKeyExA.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?), ref: 00401EE4
          • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0040BEAF
          • RegCloseKey.ADVAPI32(?), ref: 0040BED1
          • RegCloseKey.ADVAPI32(?), ref: 0040BEF4
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$Close$Open$Enumsprintf
          • String ID: %s\Registration$InstallDir
          • API String ID: 592545096-1170865778
          • Opcode ID: 7831669a2025019af229ad70793520924726913a11168384c264a7c77efd1c1f
          • Instruction ID: ce1667ac2714ca1ebab7d24492391edfcef0557958508a8d9178513886d9adbd
          • Opcode Fuzzy Hash: 7831669a2025019af229ad70793520924726913a11168384c264a7c77efd1c1f
          • Instruction Fuzzy Hash: 0231387690011CBBCF219F95DC81EEEBB7CEB48304F0444B6BA18A2162D7759F949BA4
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 336 40c53d-40c559 atof 337 40c616-40c618 336->337 338 40c55f-40c5f8 memset * 2 sprintf call 402134 sprintf RegOpenKeyExA 336->338 338->337 341 40c5fa-40c608 call 40c06d 338->341 343 40c60d-40c610 RegCloseKey 341->343 343->337
          C-Code - Quality: 85%
          			E0040C53D(void* __ebx, void* __esi, intOrPtr _a4, void* _a8, char* _a12) {
          				void* _v8;
          				intOrPtr _v12;
          				void _v311;
          				char _v312;
          				void _v575;
          				char _v576;
          				long _t21;
          				void* _t40;
          
          				_t21 = atof(_a12);
          				asm("fistp qword [ebp-0x8]");
          				_t41 = _v12;
          				_pop(_t40);
          				if(_v12 > 8) {
          					_v312 = 0;
          					memset( &_v311, 0, 0x12b);
          					_v576 = 0;
          					memset( &_v575, 0, 0x104);
          					sprintf( &_v312, "%s\\Common\\InstallRoot", _a12);
          					E00402134( &_v576, _a8,  &_v312, "Path", 0x104); // executed
          					sprintf( &_v312, "%s\\Registration", _a12);
          					_t21 = RegOpenKeyExA(_a8,  &_v312, 0, 0x20019,  &_v8); // executed
          					if(_t21 == 0) {
          						E0040C06D(_t40, _a4, _v8, _t41,  &_v576);
          						return RegCloseKey(_v8);
          					}
          				}
          				return _t21;
          			}











          0x0040c54a
          0x0040c54f
          0x0040c552
          0x0040c558
          0x0040c559
          0x0040c570
          0x0040c576
          0x0040c589
          0x0040c58f
          0x0040c5a3
          0x0040c5be
          0x0040c5d2
          0x0040c5ee
          0x0040c5f8
          0x0040c608
          0x00000000
          0x0040c610
          0x0040c5f8
          0x0040c618

          APIs
          • atof.MSVCRT ref: 0040C54A
          • memset.MSVCRT ref: 0040C576
          • memset.MSVCRT ref: 0040C58F
          • sprintf.MSVCRT ref: 0040C5A3
            • Part of subcall function 00402134: RegCloseKey.KERNELBASE(?,000003FF), ref: 0040216E
          • sprintf.MSVCRT ref: 0040C5D2
          • RegOpenKeyExA.KERNELBASE(?,?,00000000,00020019,?), ref: 0040C5EE
            • Part of subcall function 0040C06D: memset.MSVCRT ref: 0040C08A
            • Part of subcall function 0040C06D: RegOpenKeyExA.KERNELBASE(?,ProductID,00000000,000F003F,?,?,?), ref: 0040C0D1
            • Part of subcall function 0040C06D: RegOpenKeyExA.ADVAPI32(?,DigitalProductID,00000000,000F003F,?,?,?), ref: 0040C0E5
            • Part of subcall function 0040C06D: RegCloseKey.ADVAPI32(?,?,?), ref: 0040C110
            • Part of subcall function 0040C06D: RegCloseKey.ADVAPI32(?,?,?), ref: 0040C119
            • Part of subcall function 0040C06D: memset.MSVCRT ref: 0040C136
          • RegCloseKey.ADVAPI32(?,?,?,?,?), ref: 0040C610
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Closememset$Open$sprintf$atof
          • String ID: %s\Common\InstallRoot$%s\Registration$Path
          • API String ID: 2435959710-693043179
          • Opcode ID: 1133dbba29eed74e74e862956469d8ddbc79ef93eb13eb2e4e46bdbc54963eb8
          • Instruction ID: ed5f932e63c39f812747897d316acb67fb9b024130e5cc55aad5ef4b0aebc27f
          • Opcode Fuzzy Hash: 1133dbba29eed74e74e862956469d8ddbc79ef93eb13eb2e4e46bdbc54963eb8
          • Instruction Fuzzy Hash: 16210B7290115CBADF20AF91DD85EDE7B7DEB44348F1004B6B904B20A1D339AF58DB68
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 344 40b074-40b0cf call 40a80b call 409476 * 3 353 40b0d1-40b0d9 344->353 354 40b0dc-40b0e0 344->354 353->354 355 40b131-40b135 354->355 356 40b0e2-40b0e9 354->356 357 40b137-40b14c call 40a877 355->357 358 40b14e-40b152 355->358 359 40b189-40b18f 356->359 360 40b0ef-40b112 call 40a877 356->360 374 40b188 357->374 358->359 362 40b154-40b174 call 40a877 358->362 363 40b191-40b1a8 call 409476 359->363 364 40b1a9-40b1ce call 409476 359->364 360->363 372 40b114-40b12f WideCharToMultiByte 360->372 362->363 378 40b176-40b183 call 409476 362->378 363->364 376 40b1d0-40b1ef call 405532 _stricmp 364->376 377 40b237-40b23b 364->377 372->359 374->359 385 40b1f1-40b208 _stricmp 376->385 386 40b22c-40b235 376->386 381 40b270-40b274 377->381 382 40b23d-40b246 call 405de7 377->382 378->374 387 40b24b-40b268 _mbsicmp 382->387 385->386 389 40b20a-40b21b _stricmp 385->389 386->376 386->377 387->381 388 40b26a 387->388 388->381 389->386 390 40b21d-40b226 389->390 390->386 391 40b228 390->391 391->386
          C-Code - Quality: 86%
          			E0040B074(void* __eflags, intOrPtr _a4, intOrPtr _a8, char* _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28, intOrPtr _a32, intOrPtr* _a36, intOrPtr _a40) {
          				signed int _v8;
          				intOrPtr _v12;
          				intOrPtr _v24;
          				intOrPtr _v28;
          				char _v159;
          				char _v420;
          				char _v549;
          				char _v678;
          				char _v807;
          				char _v936;
          				char _v948;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				intOrPtr* _t63;
          				intOrPtr _t68;
          				intOrPtr _t71;
          				void* _t74;
          				char* _t75;
          				char* _t76;
          				void* _t94;
          				void* _t97;
          				void* _t100;
          				int _t116;
          				intOrPtr _t117;
          				intOrPtr _t119;
          				intOrPtr _t122;
          				intOrPtr _t126;
          				void* _t127;
          
          				_v8 = _v8 & 0x00000000;
          				E0040A80B( &_v948);
          				E00409476(0x80,  &_v936, _a8);
          				E00409476(0x104,  &_v420, _a28);
          				E00409476(0x80,  &_v159, _a32);
          				_t63 = _a36;
          				if(_t63 != 0) {
          					_v28 =  *_t63;
          					_v24 =  *((intOrPtr*)(_t63 + 4));
          				}
          				if(_a40 != 4) {
          					if(_a20 != 0x10) {
          						if(_a20 < 0x44) {
          							L12:
          							if( *_a12 == 0) {
          								L14:
          								_v12 = _a24;
          								_t68 = E00409476(0x80,  &_v549, _a4 + 0x768);
          								_t126 = _a4;
          								_t116 = 0;
          								_pop(_t100);
          								if( *((intOrPtr*)(_t126 + 0x2c)) <= 0) {
          									L21:
          									if(_v8 == 0) {
          										L24:
          										return _t68;
          									}
          									_t71 = E00405DE7(_t126, _t100,  &_v948); // executed
          									_t117 = _t71;
          									_t56 = _t117 + 0x10e; // 0x10e
          									_t68 = _t56;
          									_push("BBBBB-BBBBB-BBBBB-BBBBB-BBBBB");
          									_push(_t68);
          									 *((intOrPtr*)(_t126 + 0x1f4)) = _t117;
          									L00401086();
          									if(_t68 != 0) {
          										goto L24;
          									}
          									 *((intOrPtr*)(_t126 + 0x1f0)) = _t117;
          									return _t68;
          								} else {
          									goto L15;
          								}
          								do {
          									L15:
          									_t127 = E00405532(_t126, _t116);
          									_push( &_v549);
          									_t44 = _t127 + 0x18f; // 0x18f
          									_t74 = _t44;
          									L0040107A();
          									_t100 = _t74;
          									if(_t74 == 0) {
          										_t75 =  &_v678;
          										_push(_t75);
          										_t46 = _t127 + 0x10e; // 0x10e
          										_t94 = _t46;
          										L0040107A();
          										_t100 = _t94;
          										if(_t75 == 0) {
          											_t76 =  &_v678;
          											_push(_t76);
          											L0040107A();
          											_t100 = _t94;
          											if(_t76 == 0 &&  *((intOrPtr*)(_t127 + 0x3a8)) == _v12) {
          												_v8 = _v8 & 0x00000000;
          											}
          										}
          									}
          									_t68 = _a4;
          									_t116 = _t116 + 1;
          									_t126 = _t68;
          								} while (_t116 <  *((intOrPtr*)(_t68 + 0x2c)));
          								goto L21;
          							}
          							L13:
          							_v8 = 1;
          							E00409476(0x80,  &_v807, _a12);
          							goto L14;
          						}
          						_t119 = _a16;
          						_v8 = 1;
          						E0040A877( &_v678, _t119 + 0x34);
          						if( *_a12 != 0) {
          							goto L13;
          						}
          						_push(_t119 + 8);
          						_t97 = 0x20;
          						E00409476(_t97,  &_v807);
          						L11:
          						goto L12;
          					}
          					_v8 = 1;
          					E0040A877( &_v678, _a16);
          					goto L11;
          				}
          				if(_a20 < 0x338) {
          					goto L12;
          				}
          				_t122 = _a16;
          				_v8 = 1;
          				E0040A877( &_v678, _t122 + 0x328);
          				if( *_a12 != 0) {
          					goto L13;
          				}
          				WideCharToMultiByte(0, 0, _t122 + 8, 0xffffffff,  &_v807, 0x20, 0, 0);
          				goto L12;
          			}
































          0x0040b07d
          0x0040b08a
          0x0040b09f
          0x0040b0b2
          0x0040b0c2
          0x0040b0c7
          0x0040b0cf
          0x0040b0d6
          0x0040b0d9
          0x0040b0d9
          0x0040b0e0
          0x0040b135
          0x0040b152
          0x0040b189
          0x0040b18f
          0x0040b1a9
          0x0040b1ac
          0x0040b1c0
          0x0040b1c5
          0x0040b1c8
          0x0040b1cd
          0x0040b1ce
          0x0040b237
          0x0040b23b
          0x0040b274
          0x0040b274
          0x0040b274
          0x0040b246
          0x0040b24b
          0x0040b24d
          0x0040b24d
          0x0040b253
          0x0040b258
          0x0040b259
          0x0040b25f
          0x0040b268
          0x00000000
          0x00000000
          0x0040b26a
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x0040b1d0
          0x0040b1d0
          0x0040b1d6
          0x0040b1de
          0x0040b1df
          0x0040b1df
          0x0040b1e6
          0x0040b1ee
          0x0040b1ef
          0x0040b1f1
          0x0040b1f7
          0x0040b1f8
          0x0040b1f8
          0x0040b1ff
          0x0040b207
          0x0040b208
          0x0040b20a
          0x0040b210
          0x0040b212
          0x0040b21a
          0x0040b21b
          0x0040b228
          0x0040b228
          0x0040b21b
          0x0040b208
          0x0040b22c
          0x0040b22f
          0x0040b233
          0x0040b233
          0x00000000
          0x0040b1d0
          0x0040b191
          0x0040b19c
          0x0040b1a3
          0x00000000
          0x0040b1a8
          0x0040b154
          0x0040b161
          0x0040b168
          0x0040b174
          0x00000000
          0x00000000
          0x0040b179
          0x0040b17c
          0x0040b183
          0x0040b188
          0x00000000
          0x0040b188
          0x0040b140
          0x0040b147
          0x00000000
          0x0040b147
          0x0040b0e9
          0x00000000
          0x00000000
          0x0040b0ef
          0x0040b0ff
          0x0040b106
          0x0040b112
          0x00000000
          0x00000000
          0x0040b129
          0x00000000

          APIs
            • Part of subcall function 0040A80B: memset.MSVCRT ref: 0040A827
            • Part of subcall function 00409476: memcpy.MSVCRT ref: 00409496
          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000020,00000000,00000000), ref: 0040B129
          • _stricmp.MSVCRT(0000018F,?,00000000), ref: 0040B1E6
          • _stricmp.MSVCRT(0000010E,?,00000000), ref: 0040B1FF
          • _stricmp.MSVCRT(0000010E,?,00000000), ref: 0040B212
          • _mbsicmp.MSVCRT ref: 0040B25F
            • Part of subcall function 0040A877: memset.MSVCRT ref: 0040A8A2
            • Part of subcall function 0040A877: memset.MSVCRT ref: 0040A9A9
            • Part of subcall function 0040A877: memcpy.MSVCRT ref: 0040A9BA
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: _stricmpmemset$memcpy$ByteCharMultiWide_mbsicmp
          • String ID: BBBBB-BBBBB-BBBBB-BBBBB-BBBBB$D
          • API String ID: 1462258883-2179375097
          • Opcode ID: b5bf7b64d9b46d8c9195b61299b8bee05336ff5067ea744eee82584c5ca7a521
          • Instruction ID: df699da2307093237189341cb777bfb5d23401d34c32f8727aa4b00fdb1d6329
          • Opcode Fuzzy Hash: b5bf7b64d9b46d8c9195b61299b8bee05336ff5067ea744eee82584c5ca7a521
          • Instruction Fuzzy Hash: 50518D72A00209AFDB11DF61D844BDF73A8EF44354F1000AAF849B7292D778AE85CB99
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 392 40cfc7-40cfef call 40a7b6 GetCurrentProcess call 408b42 397 40cff1 392->397 398 40cff6-40d010 RegOpenKeyExA 392->398 397->398 399 40d012-40d047 memset call 4091ec call 40cafc 398->399 400 40d055-40d083 memset call 409df6 398->400 408 40d04c-40d04f RegCloseKey 399->408 404 40d088-40d08b 400->404 406 40d102-40d106 404->406 407 40d08d-40d095 404->407 409 40d097-40d099 407->409 410 40d09b-40d09d 407->410 408->400 409->410 411 40d0ab-40d0fd call 40a80b call 409476 call 407c3f call 409476 call 405de7 409->411 412 40d0a3-40d0a5 410->412 413 40d09f-40d0a1 410->413 411->406 412->406 414 40d0a7-40d0a9 412->414 413->411 413->412 414->406 414->411
          C-Code - Quality: 92%
          			E0040CFC7(void* __ecx, void* __eflags, intOrPtr _a4) {
          				void* _v12;
          				int _v16;
          				int _v20;
          				char _v24;
          				void _v287;
          				char _v288;
          				intOrPtr _v296;
          				char _v962;
          				char _v1220;
          				char _v1232;
          				char _v2200;
          				void _v2255;
          				char _v2256;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				long _t29;
          				char _t34;
          				void* _t57;
          				void* _t58;
          				int _t61;
          				void* _t64;
          
          				_t54 = __ecx;
          				E0040A7B6(__ecx, _a4);
          				_t61 = 0x20019;
          				if(E00408B42(_t54, GetCurrentProcess()) != 0) {
          					_t61 = 0x20119;
          				}
          				_t29 = RegOpenKeyExA(0x80000002, "Software", 0, _t61,  &_v12); // executed
          				if(_t29 == 0) {
          					_v288 = 0;
          					memset( &_v287, 0, 0x104);
          					_t64 = _t64 + 0xc;
          					E004091EC( &_v288);
          					_pop(_t58);
          					E0040CAFC(_t58, _a4, _v12,  &_v288); // executed
          					RegCloseKey(_v12);
          				}
          				_v24 = 0;
          				_v20 = 0;
          				_v16 = 0;
          				_v2256 = 0;
          				memset( &_v2255, 0, 0x3ff);
          				_t34 = E00409DF6( &_v24,  &_v2256);
          				if(_t34 > 0x38) {
          					_t34 = _v2200;
          					if(_t34 >= 0x61 && _t34 <= 0x7a) {
          						L11:
          						E0040A80B( &_v1232);
          						E00409476(0x80,  &_v962,  &_v2200);
          						E00409476(0x80,  &_v1220, E00407C3F(0x7d1));
          						_pop(_t57);
          						_v296 = 1;
          						return E00405DE7(_a4, _t57,  &_v1232);
          					}
          					if(_t34 >= 0x41 && _t34 <= 0x5a) {
          						goto L11;
          					}
          					if(_t34 >= 0x30 && _t34 <= 0x39) {
          						goto L11;
          					}
          				}
          				return _t34;
          			}

























          0x0040cfc7
          0x0040cfd6
          0x0040cfdb
          0x0040cfef
          0x0040cff1
          0x0040cff1
          0x0040d008
          0x0040d010
          0x0040d01f
          0x0040d025
          0x0040d030
          0x0040d034
          0x0040d039
          0x0040d047
          0x0040d04f
          0x0040d04f
          0x0040d062
          0x0040d065
          0x0040d068
          0x0040d06b
          0x0040d071
          0x0040d083
          0x0040d08b
          0x0040d08d
          0x0040d095
          0x0040d0ab
          0x0040d0b1
          0x0040d0ca
          0x0040d0e3
          0x0040d0e8
          0x0040d0f3
          0x00000000
          0x0040d0fd
          0x0040d09d
          0x00000000
          0x00000000
          0x0040d0a5
          0x00000000
          0x00000000
          0x0040d0a5
          0x0040d106

          APIs
            • Part of subcall function 0040A7B6: GetComputerNameA.KERNEL32 ref: 0040A7CE
          • GetCurrentProcess.KERNEL32 ref: 0040CFE0
            • Part of subcall function 00408B42: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process), ref: 00408B54
            • Part of subcall function 00408B42: GetProcAddress.KERNEL32(00000000), ref: 00408B5B
          • RegOpenKeyExA.KERNELBASE(80000002,Software,00000000,00020019,?), ref: 0040D008
          • memset.MSVCRT ref: 0040D025
          • RegCloseKey.ADVAPI32(?), ref: 0040D04F
          • memset.MSVCRT ref: 0040D071
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$AddressCloseComputerCurrentHandleModuleNameOpenProcProcess
          • String ID: Software
          • API String ID: 527347678-2393246361
          • Opcode ID: 638622e4a4ce547630301f39cf173de8db1fa1c190fdcd1af68593db282d8bc5
          • Instruction ID: 728bec28de1998f0db0da52364eac1917539ebc98261409a6dee968ab94316d4
          • Opcode Fuzzy Hash: 638622e4a4ce547630301f39cf173de8db1fa1c190fdcd1af68593db282d8bc5
          • Instruction Fuzzy Hash: F0319271D0011C6ADB20AB95DC45BDEB7BDAF05304F4040BBE64CB2192DA385E8A8FA9
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          C-Code - Quality: 100%
          			E00403965(void* __edi) {
          				struct HDWP__* _v8;
          				int _v12;
          				int _v16;
          				struct tagRECT _v32;
          				void* _t26;
          				int _t30;
          				int _t40;
          				int _t43;
          
          				if( *((intOrPtr*)(__edi + 0x140)) != 0) {
          					GetClientRect( *(__edi + 0x108),  &_v32);
          					_v12 = E0040D696(__edi);
          					_t30 = E0040D672(__edi);
          					_t43 = _v32.right - _v32.left;
          					_v16 = _t30;
          					_v8 = BeginDeferWindowPos(3);
          					DeferWindowPos(_v8,  *(__edi + 0x118), 0, 0, 0, _t43, _v16, 4);
          					DeferWindowPos(_v8,  *(__edi + 0x114), 0, 0, _v32.bottom - _v12 + 1, _t43, _v12, 6);
          					DeferWindowPos(_v8,  *( *((intOrPtr*)(__edi + 0x290)) + 0x190), 0, 0, _v16, _t43, _v32.bottom - _v32.top - _v16 - _v12, 4);
          					_t40 = EndDeferWindowPos(_v8); // executed
          					return _t40;
          				}
          				return _t26;
          			}











          0x00403972
          0x00403984
          0x00403991
          0x00403994
          0x0040399f
          0x004039a7
          0x004039b5
          0x004039c7
          0x004039e8
          0x00403a0e
          0x00403a17
          0x00000000
          0x00403a1e
          0x00403a20

          APIs
          • GetClientRect.USER32 ref: 00403984
            • Part of subcall function 0040D696: GetWindowRect.USER32 ref: 0040D6A9
            • Part of subcall function 0040D672: GetWindowRect.USER32 ref: 0040D685
          • BeginDeferWindowPos.USER32 ref: 004039AA
          • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004039C7
          • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004039E8
          • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000004), ref: 00403A0E
          • KiUserCallbackDispatcher.NTDLL(?), ref: 00403A17
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Window$Defer$Rect$BeginCallbackClientDispatcherUser
          • String ID:
          • API String ID: 466569379-0
          • Opcode ID: 3639b7cbe27ba7c4e648dacbc40f91d7a7b1184fefeaa190cdc13b6764be2fb4
          • Instruction ID: 627d5c0f42b4538ef7562c728db4d9480c0b49ddde14cd9d31dacdfe74534590
          • Opcode Fuzzy Hash: 3639b7cbe27ba7c4e648dacbc40f91d7a7b1184fefeaa190cdc13b6764be2fb4
          • Instruction Fuzzy Hash: 59218072900209FFEB119BE8DE49FEEBB79FB08700F104165FA15B61A0C7752E549B64
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 431 40d99c-40d9ac call 4012d0 434 40d9c8-40d9dc call 408342 431->434 435 40d9ae-40d9c3 call 40847c 431->435 439 40da30-40da3c DefWindowProcA 434->439 440 40d9de-40d9fc KiUserCallbackDispatcher 434->440 435->434 442 40da42-40da47 call 401309 439->442 441 40da1a-40da1e 440->441 443 40da20-40da26 call 40836e 441->443 444 40da2b-40da2e 441->444 443->444 444->442
          C-Code - Quality: 70%
          			E0040D99C(void* __ebx, void* __edi, void* __esi, void* __eflags) {
          				long _t26;
          				signed int _t29;
          				intOrPtr* _t40;
          				void* _t42;
          
          				_push(0x10);
          				_push(0x410818);
          				E004012D0(__ebx, __edi, __esi);
          				if( *(_t42 + 0xc) == 1) {
          					_t32 =  *( *(_t42 + 0x14));
          					_t37 =  *(_t42 + 8);
          					 *( *( *(_t42 + 0x14)) + 0x108) =  *(_t42 + 8);
          					E0040847C(0x412124, _t32, _t37);
          				}
          				_t40 = E00408342(0x412124,  *(_t42 + 8));
          				 *((intOrPtr*)(_t42 - 0x20)) = _t40;
          				if(_t40 == 0) {
          					_t26 = DefWindowProcA( *(_t42 + 8),  *(_t42 + 0xc),  *(_t42 + 0x10),  *(_t42 + 0x14)); // executed
          				} else {
          					 *(_t42 - 0x1c) =  *(_t42 - 0x1c) & 0x00000000;
          					 *(_t42 - 4) =  *(_t42 - 4) & 0x00000000;
          					_t29 =  *((intOrPtr*)( *_t40))( *(_t42 + 0xc),  *(_t42 + 0x10),  *(_t42 + 0x14)); // executed
          					 *(_t42 - 0x1c) = _t29;
          					 *(_t42 - 4) =  *(_t42 - 4) | 0xffffffff;
          					if( *(_t42 + 0xc) == 2) {
          						E0040836E(0x412124, _t40);
          					}
          					_t26 =  *(_t42 - 0x1c);
          				}
          				return E00401309(_t26);
          			}







          0x0040d99c
          0x0040d99e
          0x0040d9a3
          0x0040d9ac
          0x0040d9b1
          0x0040d9b3
          0x0040d9b6
          0x0040d9c3
          0x0040d9c3
          0x0040d9d5
          0x0040d9d7
          0x0040d9dc
          0x0040da3c
          0x0040d9de
          0x0040d9de
          0x0040d9e2
          0x0040d9f3
          0x0040d9f5
          0x0040d9f8
          0x0040da1e
          0x0040da26
          0x0040da26
          0x0040da2b
          0x0040da2b
          0x0040da47

          APIs
          • KiUserCallbackDispatcher.NTDLL(00000001,?,?,?,?,?,?,?,?,00410818,00000010), ref: 0040D9F3
            • Part of subcall function 0040847C: ??2@YAPAXI@Z.MSVCRT ref: 004084B1
            • Part of subcall function 0040847C: memset.MSVCRT ref: 004084C2
            • Part of subcall function 0040847C: memcpy.MSVCRT ref: 004084CE
            • Part of subcall function 0040847C: ??3@YAXPAX@Z.MSVCRT ref: 004084DB
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ??2@??3@CallbackDispatcherUsermemcpymemset
          • String ID: $!A$$!A$$!A
          • API String ID: 1389461279-1179211498
          • Opcode ID: 38fcb589930a946565b5d63972170345bba8eebeed9bd9c63f9be120238b0cb3
          • Instruction ID: 71ee5c206ec63a89738b0f005ccb17fb78b7d67ab1475d6e5f4411d71129de79
          • Opcode Fuzzy Hash: 38fcb589930a946565b5d63972170345bba8eebeed9bd9c63f9be120238b0cb3
          • Instruction Fuzzy Hash: D3115731A00209EFCF11DF94C905AAE3BB1FF08320F10806AF955B62A1C77989609F69
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 448 40b8bd-40b928 memset * 3 449 40b92a-40b938 call 401f0a 448->449 450 40b93f-40b943 448->450 454 40b93d-40b93e 449->454 452 40b961-40b965 450->452 453 40b945-40b95e call 401f0a 450->453 456 40b96b-40b989 call 401eec 452->456 457 40b9fe 452->457 453->452 454->450 467 40b992-40b9a4 456->467 468 40b98b 456->468 458 40ba02-40ba0f 457->458 461 40ba11-40ba18 458->461 462 40ba1a-40ba1e 458->462 464 40ba27-40ba2d call 401dec 461->464 465 40ba20-40ba24 462->465 466 40ba2e-40ba5e call 40b074 462->466 464->466 465->464 470 40b9a6-40b9b6 467->470 471 40b9f8-40b9fc 467->471 468->467 470->471 474 40b9b8-40b9cc call 401eec 470->474 471->457 471->458 477 40b9d1-40b9d6 474->477 477->471 478 40b9d8-40b9f2 477->478 478->471
          C-Code - Quality: 57%
          			E0040B8BD(void* __ecx, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28, intOrPtr _a32, intOrPtr _a36, intOrPtr _a40, intOrPtr _a44) {
          				signed int _v12;
          				signed int _v16;
          				void* _v20;
          				signed int _v24;
          				void* _v39;
          				char _v40;
          				void _v175;
          				char _v176;
          				void _v439;
          				char _v440;
          				char _v448;
          				char _v449;
          				char _v450;
          				void* _v2444;
          				void _v2495;
          				char _v2496;
          				void* __esi;
          				void* _t72;
          				void* _t78;
          				char _t83;
          				void* _t90;
          				void* _t93;
          				char* _t102;
          
          				_t90 = __ecx;
          				_v176 = 0;
          				memset( &_v175, 0, 0x80);
          				_v440 = 0;
          				memset( &_v439, 0, 0x104);
          				_v2496 = 0;
          				memset( &_v2495, 0, 0x800);
          				_v16 = _v16 & 0x00000000;
          				_v12 = 0x800;
          				if(_a12 != 0) {
          					E00401F0A(0x80, _t90,  &_v176, _a12, _a16); // executed
          					_pop(_t90);
          				}
          				if(_a28 == 4) {
          					_t102 =  &_v440;
          					E00401F0A(0x104, _t90, _t102, _a20, "SQLPath");
          					_pop(_t90);
          					_a32 = _t102;
          				}
          				if(_a20 == 0) {
          					L12:
          					_v12 = _v12 & 0x00000000;
          					goto L13;
          				} else {
          					_v12 = 0x800;
          					_t78 = E00401EEC(_t90, _a20, _a24,  &_v2496,  &_v12); // executed
          					if(_t78 == 0) {
          						_v16 = 1;
          					}
          					_v40 = 0;
          					asm("stosd");
          					asm("stosd");
          					asm("stosd");
          					asm("stosw");
          					if(_v12 >= 0x34) {
          						_t93 = 0xf;
          						asm("repe cmpsb");
          						if(0 == 0) {
          							_v12 = 0x800;
          							_t83 = E00401EEC(_t93, _a20, _a40,  &_v2496,  &_v12); // executed
          							if(_t83 == 0) {
          								_a44 = 4;
          								_v16 = 1;
          								_v448 = _t83;
          								_v449 = _t83;
          								_v450 = _t83;
          							}
          						}
          					}
          					if(_v16 != 0) {
          						L13:
          						_v24 = _v24 & 0x00000000;
          						_t117 = _a20;
          						asm("stosd");
          						if(_a20 == 0) {
          							__eflags = _a12;
          							if(__eflags == 0) {
          								L18:
          								_t72 = E0040B074(_t117, _a4, _a8,  &_v176,  &_v2496, _v12, _a28, _a32, _a36,  &_v24, _a44); // executed
          								return _t72;
          							}
          							_push( &_v24);
          							_push(_a12);
          							L17:
          							E00401DEC();
          							goto L18;
          						}
          						_push( &_v24);
          						_push(_a20);
          						goto L17;
          					} else {
          						goto L12;
          					}
          				}
          			}


























          0x0040b8bd
          0x0040b8d8
          0x0040b8df
          0x0040b8f3
          0x0040b8fa
          0x0040b90e
          0x0040b915
          0x0040b91a
          0x0040b925
          0x0040b928
          0x0040b938
          0x0040b93e
          0x0040b93e
          0x0040b943
          0x0040b94f
          0x0040b955
          0x0040b95d
          0x0040b95e
          0x0040b95e
          0x0040b965
          0x0040b9fe
          0x0040b9fe
          0x00000000
          0x0040b96b
          0x0040b979
          0x0040b97f
          0x0040b989
          0x0040b98b
          0x0040b98b
          0x0040b998
          0x0040b99f
          0x0040b9a0
          0x0040b9a1
          0x0040b9a2
          0x0040b9a4
          0x0040b9a8
          0x0040b9b4
          0x0040b9b6
          0x0040b9c6
          0x0040b9cc
          0x0040b9d6
          0x0040b9d8
          0x0040b9df
          0x0040b9e6
          0x0040b9ec
          0x0040b9f2
          0x0040b9f2
          0x0040b9d6
          0x0040b9b6
          0x0040b9fc
          0x0040ba02
          0x0040ba02
          0x0040ba08
          0x0040ba0e
          0x0040ba0f
          0x0040ba1a
          0x0040ba1e
          0x0040ba2e
          0x0040ba55
          0x0040ba5e
          0x0040ba5e
          0x0040ba23
          0x0040ba24
          0x0040ba27
          0x0040ba27
          0x00000000
          0x0040ba2d
          0x0040ba14
          0x0040ba15
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x0040b9fc

          APIs
          • memset.MSVCRT ref: 0040B8DF
          • memset.MSVCRT ref: 0040B8FA
          • memset.MSVCRT ref: 0040B915
            • Part of subcall function 00401F0A: RegQueryValueExA.KERNELBASE(?,d!@,00000000,?,?,000003FF,?,?,?,00402164,?,000003FF,000003FF), ref: 00401F23
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$QueryValue
          • String ID: 4$SQLPath
          • API String ID: 4175430599-707170241
          • Opcode ID: 6bdae49af9b41f76278810b277e957c1db4dae0b68e0f7af77f900c663d3bb2e
          • Instruction ID: 795865a80cf41a6a5ced10dc1a6cadd4e61db1a38a8d89a72c20709a76336584
          • Opcode Fuzzy Hash: 6bdae49af9b41f76278810b277e957c1db4dae0b68e0f7af77f900c663d3bb2e
          • Instruction Fuzzy Hash: 7351307290021DAFEF11DF95CC41BDE7BB8EB14314F1044AAF904B2191D7759A98CF99
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040C2B2(void* __ecx, intOrPtr _a4, void* _a8) {
          				void* _v8;
          				void _v263;
          				char _v264;
          				long _t15;
          				void* _t20;
          				long _t25;
          				void* _t27;
          				void* _t29;
          				void* _t34;
          				void* _t35;
          
          				_t27 = __ecx;
          				_v8 = 0;
          				_t15 = RegOpenKeyExA(_a8, "Microsoft\\VisualStudio", 0, 0x20019,  &_v8); // executed
          				if(_t15 == 0) {
          					_t29 = 0;
          					_v264 = 0;
          					memset( &_v263, 0, 0xff);
          					_t20 = E00401EC5(0xff, _v8, 0,  &_v264); // executed
          					_t35 = _t34 + 0x18;
          					while(_t20 == 0) {
          						E0040BDBF(_t27, _a4, _v8,  &_v264); // executed
          						_t29 = _t29 + 1;
          						_t20 = E00401EC5(0xff, _v8, _t29,  &_v264); // executed
          						_t35 = _t35 + 0xc;
          					}
          					_t25 = RegCloseKey(_v8); // executed
          					return _t25;
          				}
          				return _t15;
          			}













          0x0040c2b2
          0x0040c2d0
          0x0040c2d3
          0x0040c2db
          0x0040c2ed
          0x0040c2ef
          0x0040c2f5
          0x0040c307
          0x0040c30c
          0x0040c339
          0x0040c31e
          0x0040c32a
          0x0040c331
          0x0040c336
          0x0040c336
          0x0040c340
          0x00000000
          0x0040c347
          0x0040c34a

          APIs
          • RegOpenKeyExA.KERNELBASE(?,Microsoft\VisualStudio,00000000,00020019,?), ref: 0040C2D3
          • memset.MSVCRT ref: 0040C2F5
            • Part of subcall function 00401EC5: RegEnumKeyExA.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?), ref: 00401EE4
          • RegCloseKey.KERNELBASE(?), ref: 0040C340
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: CloseEnumOpenmemset
          • String ID: Microsoft\VisualStudio
          • API String ID: 42195315-2818195782
          • Opcode ID: 06443bf2749e695d2a55dbfd166c2e373fc6cfda460260038d3561efd8b90f66
          • Instruction ID: d1245358e997f8cd8fcbce29fd4ffd21369f85dbe1b80007c8d43278ce16d132
          • Opcode Fuzzy Hash: 06443bf2749e695d2a55dbfd166c2e373fc6cfda460260038d3561efd8b90f66
          • Instruction Fuzzy Hash: 4601C4B6A00118FBDB20DF95DD81EDEB7BCEF54344F0040B2BA04F2191E6748F599AA5
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040C6A7(void* __ebx, intOrPtr _a4, void* _a8) {
          				void _v259;
          				char _v260;
          				void* __esi;
          				long _t14;
          				void* _t19;
          				long _t24;
          				void* _t25;
          				int _t27;
          				void* _t32;
          				void* _t33;
          
          				_t25 = __ebx;
          				_t14 = RegOpenKeyExA(_a8, "Microsoft\\Office", 0, 0x20019,  &_a8); // executed
          				if(_t14 == 0) {
          					_t27 = 0;
          					_v260 = 0;
          					memset( &_v259, 0, 0xff);
          					_t19 = E00401EC5(0xff, _a8, 0,  &_v260); // executed
          					_t33 = _t32 + 0x18;
          					while(_t19 == 0) {
          						E0040C53D(_t25, 0xff, _a4, _a8,  &_v260); // executed
          						_t27 = _t27 + 1;
          						_t19 = E00401EC5(0xff, _a8, _t27,  &_v260); // executed
          						_t33 = _t33 + 0xc;
          					}
          					_t24 = RegCloseKey(_a8); // executed
          					return _t24;
          				}
          				return _t14;
          			}













          0x0040c6a7
          0x0040c6c3
          0x0040c6cb
          0x0040c6d5
          0x0040c6df
          0x0040c6e6
          0x0040c6f8
          0x0040c6fd
          0x0040c72a
          0x0040c70f
          0x0040c71b
          0x0040c722
          0x0040c727
          0x0040c727
          0x0040c731
          0x00000000
          0x0040c738
          0x0040c73a

          APIs
          • RegOpenKeyExA.KERNELBASE(?,Microsoft\Office,00000000,00020019,?), ref: 0040C6C3
          • memset.MSVCRT ref: 0040C6E6
            • Part of subcall function 00401EC5: RegEnumKeyExA.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?), ref: 00401EE4
          • RegCloseKey.KERNELBASE(?), ref: 0040C731
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: CloseEnumOpenmemset
          • String ID: Microsoft\Office
          • API String ID: 42195315-3910434081
          • Opcode ID: 3b82f7eb1ac85d066e520f540034e5f67d453d2e877e0dc33c862ac240e5e00f
          • Instruction ID: c68fad35f9fd40fba05eddd2a15fb6c8c2a2e2b72dc6aea4dbe2eebcac5165f8
          • Opcode Fuzzy Hash: 3b82f7eb1ac85d066e520f540034e5f67d453d2e877e0dc33c862ac240e5e00f
          • Instruction Fuzzy Hash: 6801D236600019BADB31AF12DC45FEE7B7CEF98710F008076BD08E5092E7749A45DBA5
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 48%
          			E0040C61B(void* __ecx, intOrPtr _a4, void* _a8) {
          				void _v259;
          				char _v260;
          				long _t13;
          				void* _t18;
          				void* _t23;
          				int _t24;
          				void* _t26;
          				void* _t27;
          
          				_t23 = __ecx;
          				_t13 = RegOpenKeyExA(_a8, "Microsoft\\Microsoft SQL Server", 0, 0x20019,  &_a8); // executed
          				if(_t13 == 0) {
          					_t24 = 0;
          					_v260 = 0;
          					memset( &_v259, 0, 0xff);
          					_t27 = _t26 + 0xc;
          					_push( &_v260);
          					_push(0);
          					while(1) {
          						_push(_a8);
          						_t18 = E00401EC5(0xff);
          						_t27 = _t27 + 0xc;
          						if(_t18 != 0) {
          							break;
          						}
          						E0040C34D(_t23, _a4, _a8,  &_v260);
          						_t24 = _t24 + 1;
          						_push( &_v260);
          						_push(_t24);
          					}
          					return RegCloseKey(_a8);
          				}
          				return _t13;
          			}











          0x0040c61b
          0x0040c639
          0x0040c641
          0x0040c649
          0x0040c653
          0x0040c65a
          0x0040c65f
          0x0040c668
          0x0040c669
          0x0040c687
          0x0040c687
          0x0040c68c
          0x0040c691
          0x0040c696
          0x00000000
          0x00000000
          0x0040c679
          0x0040c684
          0x0040c685
          0x0040c686
          0x0040c686
          0x00000000
          0x0040c69b
          0x0040c6a4

          APIs
          • RegOpenKeyExA.KERNELBASE(?,Microsoft\Microsoft SQL Server,00000000,00020019,?), ref: 0040C639
          • memset.MSVCRT ref: 0040C65A
            • Part of subcall function 00401EC5: RegEnumKeyExA.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?), ref: 00401EE4
          • RegCloseKey.ADVAPI32(?), ref: 0040C69B
          Strings
          • Microsoft\Microsoft SQL Server, xrefs: 0040C631
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: CloseEnumOpenmemset
          • String ID: Microsoft\Microsoft SQL Server
          • API String ID: 42195315-2662195110
          • Opcode ID: 6fa4e6ceb6d037ab56ca6903b97cdba4b88b3b7d7454f9f281a44a680ec66391
          • Instruction ID: bccda2c155679a8b1b9773621c0d9873c31b607589cf98ade5e2eae6ac71f9f2
          • Opcode Fuzzy Hash: 6fa4e6ceb6d037ab56ca6903b97cdba4b88b3b7d7454f9f281a44a680ec66391
          • Instruction Fuzzy Hash: 6001D475500018BADB319F11EC41FEB3BBCEF94700F004176BC48E1091E7759A58DBA4
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 87%
          			E004043A7(intOrPtr* __eax, void* __edi) {
          				void* __esi;
          				intOrPtr _t12;
          				intOrPtr _t13;
          				struct HICON__* _t15;
          				void* _t22;
          				intOrPtr* _t25;
          
          				_t22 = __edi;
          				_t25 = __eax;
          				_push(0x59c);
          				 *((intOrPtr*)(__eax + 0x140)) = 0;
          				 *__eax = 0x410250;
          				 *((intOrPtr*)(__eax + 0x298)) = 0;
          				L004010A4();
          				_t26 = __eax;
          				if(__eax == 0) {
          					_t12 = 0;
          					__eflags = 0;
          				} else {
          					_t12 = E0040A85F(__eax, _t26);
          				}
          				_push(0x880);
          				 *((intOrPtr*)(_t25 + 0x28c)) = _t12;
          				L004010A4(); // executed
          				_t27 = _t12;
          				if(_t12 == 0) {
          					_t13 = 0;
          					__eflags = 0;
          				} else {
          					_push(_t22);
          					_t13 = E0040BBF2(_t12, _t27);
          				}
          				 *((intOrPtr*)(_t25 + 0x290)) = _t13;
          				 *((intOrPtr*)(_t25 + 0x294)) = 0;
          				 *((intOrPtr*)(_t25 + 0x178)) = 0;
          				 *((intOrPtr*)(_t25 + 0x174)) = 0;
          				 *((intOrPtr*)(_t25 + 0x170)) = 0;
          				 *((intOrPtr*)(_t25 + 0x17c)) = 0;
          				 *((intOrPtr*)(_t25 + 0x288)) = 0;
          				_t15 = LoadIconA(GetModuleHandleA(0), 0x65); // executed
          				E0040D856(_t25, _t15);
          				return _t25;
          			}









          0x004043a7
          0x004043a9
          0x004043ad
          0x004043b2
          0x004043b8
          0x004043be
          0x004043c4
          0x004043c9
          0x004043cc
          0x004043d7
          0x004043d7
          0x004043ce
          0x004043d0
          0x004043d0
          0x004043d9
          0x004043de
          0x004043e4
          0x004043e9
          0x004043ec
          0x004043f9
          0x004043f9
          0x004043ee
          0x004043ee
          0x004043f1
          0x004043f6
          0x004043fc
          0x00404402
          0x00404408
          0x0040440e
          0x00404414
          0x0040441a
          0x00404420
          0x0040442f
          0x00404436
          0x0040443f

          APIs
          • ??2@YAPAXI@Z.MSVCRT ref: 004043C4
          • ??2@YAPAXI@Z.MSVCRT ref: 004043E4
          • GetModuleHandleA.KERNEL32(00000000,?,00000000,00404E86,?,00000000), ref: 00404426
          • LoadIconA.USER32(00000000,00000065), ref: 0040442F
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ??2@$HandleIconLoadModule
          • String ID:
          • API String ID: 4294683033-0
          • Opcode ID: e9a61a22fe9a943eb8acf6a146dbc507791da4c8ef5dada01a30413f3a1f9bd5
          • Instruction ID: 825f705ed21fec8e26d263cb1f521bea60573315257563d4bc7fc3ad909d8734
          • Opcode Fuzzy Hash: e9a61a22fe9a943eb8acf6a146dbc507791da4c8ef5dada01a30413f3a1f9bd5
          • Instruction Fuzzy Hash: 09015EB1A057008BD7606F7A98896D7F6E4BF48305F90493FE29ED6281DB7898414B48
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00409425(signed int* __eax, void* __edx, void** __edi, signed int _a4, intOrPtr _a8) {
          				void* _t8;
          				void* _t13;
          				signed int _t16;
          				void** _t21;
          				signed int _t22;
          
          				_t21 = __edi;
          				_t22 =  *__eax;
          				if(__edx < _t22) {
          					return 0;
          				} else {
          					_t13 =  *__edi;
          					do {
          						 *__eax =  *__eax + _a8;
          						_t16 =  *__eax;
          					} while (__edx >= _t16);
          					_t8 = malloc(_t16 * _a4); // executed
          					 *__edi = _t8;
          					if(_t22 > 0) {
          						if(_t8 != 0) {
          							memcpy(_t8, _t13, _t22 * _a4);
          						}
          						free(_t13);
          					}
          					return 0 |  *_t21 != 0x00000000;
          				}
          			}








          0x00409425
          0x00409426
          0x0040942a
          0x00409475
          0x0040942c
          0x0040942d
          0x0040942f
          0x00409433
          0x00409435
          0x00409437
          0x00409441
          0x00409449
          0x0040944b
          0x0040944f
          0x00409459
          0x0040945e
          0x00409462
          0x00409467
          0x00409471
          0x00409471

          APIs
          • malloc.MSVCRT ref: 00409441
          • memcpy.MSVCRT ref: 00409459
          • free.MSVCRT(00000000,00000000,00000000,0040857D,00000001,?,?,00000000,0040894C,00408AA2,?,74714DE0,?,00000000), ref: 00409462
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: freemallocmemcpy
          • String ID: Mqt
          • API String ID: 3056473165-844227191
          • Opcode ID: 5754e7e4bfc5c79033083ccfbfd169179e7367b3c7869c257f586f2e0fb1c4c2
          • Instruction ID: 289d377e5f73869b7caff960fb681cd9ce381e10f4fd76e1c8cda2eb9c808e0f
          • Opcode Fuzzy Hash: 5754e7e4bfc5c79033083ccfbfd169179e7367b3c7869c257f586f2e0fb1c4c2
          • Instruction Fuzzy Hash: D6F0E97260D2229FC708DB75A88184BB3ADAF44314711483FF445E32D2D738DC40CBA4
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040CAFC(void* __ecx, char _a4, void* _a8, intOrPtr* _a12) {
          				void* _v8;
          				long _t12;
          
          				E0040C73D(_a4, _a8, _a12); // executed
          				_t12 = RegOpenKeyExA(_a8, "Wow6432Node", 0, 0x20019,  &_v8); // executed
          				if(_t12 == 0) {
          					E0040C73D(_a4, _v8, _a12); // executed
          					return RegCloseKey(_v8);
          				}
          				return _t12;
          			}





          0x0040cb09
          0x0040cb21
          0x0040cb29
          0x0040cb34
          0x00000000
          0x0040cb3c
          0x0040cb43

          APIs
            • Part of subcall function 0040C73D: RegOpenKeyExA.KERNELBASE(?,Microsoft\Windows NT\CurrentVersion,00000000,00020019,?), ref: 0040C767
            • Part of subcall function 0040C73D: memset.MSVCRT ref: 0040C789
            • Part of subcall function 0040C73D: memset.MSVCRT ref: 0040C7A0
            • Part of subcall function 0040C73D: memset.MSVCRT ref: 0040C7BB
            • Part of subcall function 0040C73D: memset.MSVCRT ref: 0040C85A
            • Part of subcall function 0040C73D: memset.MSVCRT ref: 0040C871
          • RegOpenKeyExA.KERNELBASE(?,Wow6432Node,00000000,00020019,?), ref: 0040CB21
            • Part of subcall function 0040C73D: GetPrivateProfileStringA.KERNEL32(Product Specification,Product,0040F469,?,00000080,?), ref: 0040C8C9
            • Part of subcall function 0040C73D: RegCloseKey.KERNELBASE(?), ref: 0040C920
            • Part of subcall function 0040C73D: RegOpenKeyExA.ADVAPI32(?,Microsoft\Windows NT\CurrentVersion\DefaultProductKey,00000000,00020019,?), ref: 0040C955
            • Part of subcall function 0040C73D: RegCloseKey.ADVAPI32(?), ref: 0040C99A
            • Part of subcall function 0040C73D: RegOpenKeyExA.ADVAPI32(?,Microsoft\Windows\CurrentVersion,00000000,00020019,?), ref: 0040C9BF
            • Part of subcall function 0040C73D: memset.MSVCRT ref: 0040C9D8
          • RegCloseKey.ADVAPI32(?), ref: 0040CB3C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$Open$Close$PrivateProfileString
          • String ID: Wow6432Node
          • API String ID: 4162235261-3433321875
          • Opcode ID: 4331d51e3f19d49408c60aaa5a96547b5c8e0da2c0d4f074541140cc666a4dd1
          • Instruction ID: b2a21aeda2b3f5abf1583417472ef8e3245cec51ed79abbd54f67cff4fa402bc
          • Opcode Fuzzy Hash: 4331d51e3f19d49408c60aaa5a96547b5c8e0da2c0d4f074541140cc666a4dd1
          • Instruction Fuzzy Hash: D4E0C935100209FBDF219F91ED46E9D7B79BB14744F108136BA04750B1D7769A24BB54
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004046C8(void* __esi) {
          				struct HINSTANCE__* _t4;
          				struct HWND__* _t7;
          
          				E0040DA4A(__esi);
          				_t4 = GetModuleHandleA(0);
          				_t7 = CreateWindowExA(0, "ProduKey", "ProduKey", 0xcf0000, 0x80000000, 0x80000000, 0x280, 0x1e0, 0, 0, _t4, __esi); // executed
          				 *(__esi + 0x108) = _t7;
          				return _t7;
          			}





          0x004046ca
          0x004046d1
          0x004046fc
          0x00404702
          0x00404708

          APIs
            • Part of subcall function 0040DA4A: GetModuleHandleA.KERNEL32(00000000,74714DE0,?), ref: 0040DA67
            • Part of subcall function 0040DA4A: RegisterClassA.USER32 ref: 0040DA90
          • GetModuleHandleA.KERNEL32(00000000,00404F3B,/deleteregkey,/savelangfile,?,?,?,00000000), ref: 004046D1
          • CreateWindowExA.USER32 ref: 004046FC
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: HandleModule$ClassCreateRegisterWindow
          • String ID: ProduKey
          • API String ID: 2678498856-3483297114
          • Opcode ID: 93393d1ac61038d1ad10487e55b5d54c7996abf937b1b43556b961cf02ccf31c
          • Instruction ID: 6e5801d3909d3767904a12ef67d4d3394731ecc852b40ab1dfdb807e6540619b
          • Opcode Fuzzy Hash: 93393d1ac61038d1ad10487e55b5d54c7996abf937b1b43556b961cf02ccf31c
          • Instruction Fuzzy Hash: E8E06CB4389210BAF2A056A48D0AFBB295CDB54B06F204035BE49FD5D4CAF46C484AAE
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040B715(void* __ecx, intOrPtr _a4, void* _a8) {
          				void* _v8;
          				long _t9;
          
          				_v8 = _v8 & 0x00000000;
          				_t9 = RegOpenKeyExA(_a8, "Autodesk", 0, 0x20019,  &_v8); // executed
          				_t14 = _t9;
          				if(_t9 == 0) {
          					E0040AEF5(_a4, _t14, _v8, _t9);
          					return RegCloseKey(_v8);
          				}
          				return _t9;
          			}





          0x0040b719
          0x0040b730
          0x0040b736
          0x0040b738
          0x0040b741
          0x00000000
          0x0040b749
          0x0040b750

          APIs
          • RegOpenKeyExA.KERNELBASE(?,Autodesk,00000000,00020019,00000000), ref: 0040B730
            • Part of subcall function 0040AEF5: RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020019,00000000), ref: 0040AF4E
            • Part of subcall function 0040AEF5: RegCloseKey.ADVAPI32(00000000), ref: 0040B042
          • RegCloseKey.ADVAPI32(00000000), ref: 0040B749
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: CloseOpen
          • String ID: Autodesk
          • API String ID: 47109696-2445194919
          • Opcode ID: 6ad3c0b4acd562bcb3f630935ad7e175566819283e3014371350e88f4b62c351
          • Instruction ID: 31259e3e5a5e60c004f176c86ebac66b8ee43041345a5abcc467b94dc22bf34a
          • Opcode Fuzzy Hash: 6ad3c0b4acd562bcb3f630935ad7e175566819283e3014371350e88f4b62c351
          • Instruction Fuzzy Hash: AEE01A35640208BBDB20EF50ED06F9E776DEB50709F208035B504B50A1D7749A18ABA8
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00409D54() {
          				void* __esi;
          				signed char _t4;
          
          				if( *0x412da8 == 0) {
          					E00409C03(0x412da8);
          					_t4 = GetFileAttributesA(0x412da8); // executed
          					if((_t4 & 0x00000001) != 0) {
          						GetTempPathA(0x104, 0x412da8);
          					}
          				}
          				return 0x412da8;
          			}





          0x00409d61
          0x00409d63
          0x00409d69
          0x00409d71
          0x00409d79
          0x00409d79
          0x00409d71
          0x00409d82

          APIs
          • GetFileAttributesA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,?,00404A4A,00000000,/nosavereg,00000000,00000001), ref: 00409D69
          • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00404A4A,00000000,/nosavereg,00000000,00000001), ref: 00409D79
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: AttributesFilePathTemp
          • String ID: C:\Users\user\AppData\Local\Temp\
          • API String ID: 3199926297-3081826266
          • Opcode ID: 03ee38a574b8811611f3ed7be439ae2fdd3607a53681e8ebcb69c443d2e2b5b6
          • Instruction ID: ee73eeecbc2c19658a65ae5a3afedc161ce82e3f8e73b22d406f002233615bd9
          • Opcode Fuzzy Hash: 03ee38a574b8811611f3ed7be439ae2fdd3607a53681e8ebcb69c443d2e2b5b6
          • Instruction Fuzzy Hash: 7BD02230A824607BE2702328FF0DFC72A444F92310F040073F889F2292C2B80C4182EC
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 80%
          			E0040781B() {
          				void* _t13;
          				signed int _t15;
          				signed int _t16;
          				signed int _t17;
          				signed int _t18;
          				signed int _t27;
          				signed int _t29;
          				intOrPtr _t33;
          
          				_t33 =  *0x412b68;
          				if(_t33 == 0) {
          					_push(0x8000);
          					 *0x412b68 = 0x8000;
          					 *0x412b6c = 0x100;
          					 *0x412b70 = 0x1000; // executed
          					L004010A4(); // executed
          					 *0x412b50 = 0x8000;
          					_t15 =  *0x412b6c; // 0x100
          					_t27 = 4;
          					_t16 = _t15 * _t27;
          					_push( ~(0 | _t33 > 0x00000000) | _t16);
          					L004010A4();
          					 *0x412b58 = _t16;
          					_t17 =  *0x412b6c; // 0x100
          					_t29 = 4;
          					_t18 = _t17 * _t29;
          					_push( ~(0 | _t33 > 0x00000000) | _t18);
          					L004010A4();
          					_push( *0x412b70);
          					 *0x412b5c = _t18;
          					L004010A4();
          					 *0x412b54 = _t18;
          					return _t18;
          				}
          				return _t13;
          			}











          0x0040781b
          0x00407822
          0x00407829
          0x0040782a
          0x0040782f
          0x00407839
          0x00407843
          0x00407848
          0x0040784d
          0x00407856
          0x00407857
          0x00407860
          0x00407861
          0x00407866
          0x0040786b
          0x00407874
          0x00407875
          0x0040787e
          0x0040787f
          0x00407884
          0x0040788a
          0x0040788f
          0x00407897
          0x00000000
          0x00407897
          0x0040789c

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ??2@
          • String ID:
          • API String ID: 1033339047-0
          • Opcode ID: ee9f617b7fe656d3f584eb10a124b69bf03d05b41e7542abfcc17f71b64ee2a3
          • Instruction ID: 58f842bd4eed1399df72b29ec1e688766f804122cee06fd2624d10eb490c3055
          • Opcode Fuzzy Hash: ee9f617b7fe656d3f584eb10a124b69bf03d05b41e7542abfcc17f71b64ee2a3
          • Instruction Fuzzy Hash: 11F0ECB5D092809EE7549F34EE1679537E0A748304F44C53FA245DA2F0EBF964A5CB0C
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00405108(void* __ecx, intOrPtr _a4, signed int _a8, intOrPtr _a12) {
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				signed int _t21;
          				intOrPtr _t24;
          				signed int _t28;
          				intOrPtr _t38;
          				signed int* _t53;
          				intOrPtr _t54;
          				void* _t55;
          				void* _t56;
          
          				_t48 = __ecx;
          				_t54 = _a4;
          				_t56 = _t54 - 0x415;
          				_t55 = __ecx;
          				if(_t56 > 0) {
          					_t21 = _t54 - 0x416;
          					__eflags = _t21;
          					if(_t21 == 0) {
          						E004045E1(__ecx);
          						L23:
          						E004040C5(0, _t48, _t55);
          						L24:
          						_t24 =  *((intOrPtr*)(_t55 + 0x294));
          						if(_t54 == _t24 && _t24 != 0) {
          							E00406F34(_a12,  *((intOrPtr*)(_t55 + 0x290)));
          						}
          						return E0040D8DC(_t55, _t54, _a8, _a12);
          					}
          					_t28 = _t21 - 3;
          					__eflags = _t28;
          					if(_t28 == 0) {
          						__eflags = E00403A66(__ecx, __ecx);
          						if(__eflags != 0) {
          							L14:
          							E0040460A(_t55, __eflags);
          							goto L23;
          						}
          						__eflags =  *((intOrPtr*)( *((intOrPtr*)(__ecx + 0x28c)) + 0x578)) - 1;
          						if(__eflags == 0) {
          							goto L14;
          						}
          						E00405092(__ecx, __eflags);
          						goto L24;
          					}
          					__eflags = _t28 == 3;
          					if(_t28 == 3) {
          						SetFocus( *(__ecx + 0x288));
          					}
          					goto L24;
          				}
          				if(_t56 == 0) {
          					goto L14;
          				}
          				if(_t54 == 0x1c) {
          					__eflags = _a8;
          					if(_a8 == 0) {
          						 *((intOrPtr*)(_t55 + 0x288)) = GetFocus();
          					} else {
          						PostMessageA( *(__ecx + 0x108), 0x41c, 0, 0); // executed
          					}
          					goto L24;
          				}
          				if(_t54 == 0x7b) {
          					_t38 =  *((intOrPtr*)(__ecx + 0x290));
          					_t51 = _a8;
          					__eflags = _a8 -  *((intOrPtr*)(_t38 + 0x190));
          					if(_a8 ==  *((intOrPtr*)(_t38 + 0x190))) {
          						E00404440(__ecx, _t51);
          					}
          					goto L24;
          				}
          				if(_t54 == 0x113) {
          					_t41 = __ecx + 0x290;
          					_t53 =  *(__ecx + 0x290) + 0x87c;
          					__eflags =  *_t53;
          					if( *_t53 != 0) {
          						 *_t53 =  *_t53 & 0x00000000;
          						E004066BE( *_t41, _t53);
          					}
          					goto L24;
          				}
          				if(_t54 != 0x402) {
          					goto L24;
          				} else {
          					 *(__ecx + 0x174) =  *(__ecx + 0x174) & 0x00000000;
          					E00404020(_t54, __ecx);
          					goto L23;
          				}
          			}














          0x00405108
          0x0040510e
          0x00405116
          0x00405118
          0x0040511a
          0x004051d2
          0x004051d2
          0x004051d7
          0x00405213
          0x00405218
          0x0040521a
          0x0040521f
          0x0040521f
          0x00405227
          0x00405236
          0x00405236
          0x0040524d
          0x0040524d
          0x004051d9
          0x004051d9
          0x004051dc
          0x004051f7
          0x004051f9
          0x004051c7
          0x004051c9
          0x00000000
          0x004051c9
          0x00405201
          0x00405208
          0x00000000
          0x00000000
          0x0040520c
          0x00000000
          0x0040520c
          0x004051de
          0x004051e1
          0x004051e9
          0x004051e9
          0x00000000
          0x004051e1
          0x00405120
          0x00000000
          0x00000000
          0x00405129
          0x0040519f
          0x004051a2
          0x004051bf
          0x004051a4
          0x004051b1
          0x004051b1
          0x00000000
          0x004051a2
          0x0040512e
          0x0040517c
          0x00405182
          0x00405185
          0x0040518b
          0x00405193
          0x00405193
          0x00000000
          0x0040518b
          0x00405136
          0x00405156
          0x0040515e
          0x00405164
          0x00405167
          0x0040516d
          0x00405172
          0x00405172
          0x00000000
          0x00405167
          0x0040513e
          0x00000000
          0x00405144
          0x00405144
          0x0040514c
          0x00000000
          0x0040514c

          APIs
          • PostMessageA.USER32 ref: 004051B1
            • Part of subcall function 00404020: sprintf.MSVCRT ref: 0040404A
            • Part of subcall function 00404020: sprintf.MSVCRT ref: 00404074
          • SetFocus.USER32(?), ref: 004051E9
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: sprintf$FocusMessagePost
          • String ID:
          • API String ID: 1237675211-0
          • Opcode ID: 5da913d7ac876365127fe555b7165ea9638fa46120996a214cbb2d1a5a90a135
          • Instruction ID: 39ef1a041ae1b5f2144299f5d89d8638fb1484d53cc0abbde19ca4bcf46c7c55
          • Opcode Fuzzy Hash: 5da913d7ac876365127fe555b7165ea9638fa46120996a214cbb2d1a5a90a135
          • Instruction Fuzzy Hash: 5931C635210A049BC7247A78C948BAB37A1EFA4314F10047FE6167B6D1CB3C9C419E6E
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040B452(void* __eax) {
          				void* __esi;
          				void* _t6;
          				int _t7;
          				void* _t9;
          
          				_t9 = __eax;
          				E004062A6(__eax);
          				_t6 = LoadIconA(GetModuleHandleA(0), 0x66); // executed
          				_t7 = ImageList_ReplaceIcon( *(_t9 + 0x198), 0, _t6); // executed
          				if( *((intOrPtr*)(_t9 + 0x1c4)) != 0) {
          					return E004063D1(_t9);
          				}
          				return _t7;
          			}







          0x0040b453
          0x0040b455
          0x0040b465
          0x0040b474
          0x0040b481
          0x00000000
          0x0040b483
          0x0040b489

          APIs
            • Part of subcall function 004062A6: ImageList_Create.COMCTL32(00000010,00000010,00000019,00000001,00000001,00000000,?), ref: 004062C9
            • Part of subcall function 004062A6: ImageList_SetImageCount.COMCTL32(00000000,00000001), ref: 004062D7
            • Part of subcall function 004062A6: SendMessageA.USER32(?,00001003,00000001,?), ref: 004062E9
            • Part of subcall function 004062A6: ImageList_Create.COMCTL32(00000020,00000020,00000019,00000001,00000001,00000000,?), ref: 00406302
            • Part of subcall function 004062A6: ImageList_SetImageCount.COMCTL32(00000000,00000001), ref: 00406310
            • Part of subcall function 004062A6: SendMessageA.USER32(?,00001003,00000000,?), ref: 00406322
            • Part of subcall function 004062A6: GetModuleHandleA.KERNEL32(00000010,00000010,00000019,00000001,00000001,00000000,?), ref: 00406333
            • Part of subcall function 004062A6: GetModuleHandleA.KERNEL32(00000000), ref: 00406343
            • Part of subcall function 004062A6: LoadImageA.USER32 ref: 0040635A
            • Part of subcall function 004062A6: GetModuleHandleA.KERNEL32(00000000), ref: 00406362
            • Part of subcall function 004062A6: LoadImageA.USER32 ref: 00406375
            • Part of subcall function 004062A6: ImageList_SetImageCount.COMCTL32(?,00000000), ref: 00406381
            • Part of subcall function 004062A6: GetSysColor.USER32(0000000F), ref: 00406385
            • Part of subcall function 004062A6: ImageList_AddMasked.COMCTL32(?,00000001,00000000), ref: 0040639E
            • Part of subcall function 004062A6: ImageList_AddMasked.COMCTL32(?,00000000,00000000), ref: 004063A8
            • Part of subcall function 004062A6: DeleteObject.GDI32(?), ref: 004063B4
            • Part of subcall function 004062A6: DeleteObject.GDI32(00000000), ref: 004063B7
          • GetModuleHandleA.KERNEL32(00000000,?,004049A5,00000000,00000001), ref: 0040B45C
          • LoadIconA.USER32(00000000,00000066), ref: 0040B465
          • ImageList_ReplaceIcon.COMCTL32(?,00000000,00000000), ref: 0040B474
            • Part of subcall function 004063D1: ImageList_Create.COMCTL32(00000010,00000010,00000019,00000001,00000001,00000004,00000001,00000000,0040B488), ref: 004063F0
            • Part of subcall function 004063D1: ImageList_SetImageCount.COMCTL32(00000000,00000000), ref: 004063FF
            • Part of subcall function 004063D1: ImageList_AddMasked.COMCTL32(?,00000000,?), ref: 00406420
            • Part of subcall function 004063D1: ImageList_AddMasked.COMCTL32(?,00000000,?), ref: 00406434
            • Part of subcall function 004063D1: SendMessageA.USER32(?,00001003,00000002,?), ref: 00406449
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Image$List_$CountHandleMaskedModule$CreateLoadMessageSend$DeleteIconObject$ColorReplace
          • String ID:
          • API String ID: 1621792927-0
          • Opcode ID: da9844ca0ba146859d01c0b230f5acecf7462ef5641570e4e8e5a36020338564
          • Instruction ID: cb29005802ab213a12419ec21d94c9512647165d00ca8a51e2cbb4a74ff12b24
          • Opcode Fuzzy Hash: da9844ca0ba146859d01c0b230f5acecf7462ef5641570e4e8e5a36020338564
          • Instruction Fuzzy Hash: 0BD05E31444210ABE6703BB4FD0EFCA3659AB04311F01047AF606B54E1CBB958948668
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00401F0A(int __eax, void* __ecx, char* __esi, void* _a4, char _a8) {
          				int _v8;
          				int _v12;
          				long _t12;
          
          				_v8 = __eax;
          				_t4 =  &_a8; // 0x402164
          				_t12 = RegQueryValueExA(_a4,  *_t4, 0,  &_v12, __esi,  &_v8); // executed
          				if(_t12 == 0) {
          					 *(_v8 + __esi - 1) = _t12;
          					return _t12;
          				}
          				return _t12;
          			}






          0x00401f0f
          0x00401f1d
          0x00401f23
          0x00401f2b
          0x00401f30
          0x00000000
          0x00401f30
          0x00401f35

          APIs
          • RegQueryValueExA.KERNELBASE(?,d!@,00000000,?,?,000003FF,?,?,?,00402164,?,000003FF,000003FF), ref: 00401F23
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: QueryValue
          • String ID: d!@
          • API String ID: 3660427363-1255992989
          • Opcode ID: 7dbbef57c1e06dd486a3d0535f27dfad0d7df95b8f11c36d8141193ac136d34d
          • Instruction ID: ab836887f28d53c15001e4a0fd2480bc6afb191a597140aa7bfd751029efc1b5
          • Opcode Fuzzy Hash: 7dbbef57c1e06dd486a3d0535f27dfad0d7df95b8f11c36d8141193ac136d34d
          • Instruction Fuzzy Hash: 84E0B675505208BADF11CB90DD01EEE7BBCEB04644F1041A9B901A6151E672AB059B64
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00409396(char _a4) {
          				long _t4;
          
          				_t1 =  &_a4; // 0x407de3, executed
          				_t4 = GetFileAttributesA( *_t1); // executed
          				return 0 | _t4 != 0xffffffff;
          			}




          0x00409396
          0x0040939a
          0x004093aa

          APIs
          • GetFileAttributesA.KERNELBASE(}@,0040791C,00000000,?,00407DE3), ref: 0040939A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: AttributesFile
          • String ID: }@
          • API String ID: 3188754299-142398135
          • Opcode ID: 4a9406b6a1f673c38b210abde541ecdde58844cac8b02e254dd3267c38294842
          • Instruction ID: 3efb14ddee2388d2957894822ef5ae626d6f552a82693211c1f6ed8afbd6af18
          • Opcode Fuzzy Hash: 4a9406b6a1f673c38b210abde541ecdde58844cac8b02e254dd3267c38294842
          • Instruction Fuzzy Hash: DEB012752210008BCB1807349D5904D35507F44631720073DB033D14F0E730CC60FA00
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00409E38(signed int __eax, struct HWND__* _a4, intOrPtr _a8) {
          				signed int _t5;
          				long _t6;
          				long _t7;
          				signed int _t8;
          
          				_t8 = __eax;
          				_t5 = SendMessageA(_a4, 0x1037, 0, 0);
          				if(_a8 == 0) {
          					_t6 = _t5 &  !_t8;
          				} else {
          					_t6 = _t5 | _t8;
          				}
          				_t7 = SendMessageA(_a4, 0x1036, 0, _t6); // executed
          				return _t7;
          			}







          0x00409e4d
          0x00409e4f
          0x00409e56
          0x00409e5e
          0x00409e58
          0x00409e58
          0x00409e58
          0x00409e6c
          0x00409e70

          APIs
          • SendMessageA.USER32(?,00001037,00000000,00000000), ref: 00409E4F
          • SendMessageA.USER32(?,00001036,00000000,00000000), ref: 00409E6C
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: MessageSend
          • String ID:
          • API String ID: 3850602802-0
          • Opcode ID: 641253b7e1eeb101a1e09a135542526accfabee5e346ded97b1cc29f82893c4d
          • Instruction ID: b331cb060716864cd7a742bf2e802c7139fd2011c295487df5d51733bbda92d3
          • Opcode Fuzzy Hash: 641253b7e1eeb101a1e09a135542526accfabee5e346ded97b1cc29f82893c4d
          • Instruction Fuzzy Hash: BDE02B36BC435076E5318A15EC05F9B7E99E7D4BE0F240436B280B61E1C2F49C86C7D8
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 0040200B
          • ___crtGetTimeFormatEx.LIBCMT ref: 00402020
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: FormatPrivateProfileStringTimeWrite___crt
          • String ID:
          • API String ID: 1420052194-0
          • Opcode ID: ef90ee35996496e51417851c6fe9cfc7fa3389d6f4f48c09103f0480ebf01405
          • Instruction ID: 08f568e0aab9429a05310f9470ca6de1b51ed1551e68cd2036e7856e37d01f6b
          • Opcode Fuzzy Hash: ef90ee35996496e51417851c6fe9cfc7fa3389d6f4f48c09103f0480ebf01405
          • Instruction Fuzzy Hash: 05E0ED3A00020DBBCF119F90DD04E963B69AB48304F54C465BA08590A2D777C666EBA5
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 22%
          			E0040D722(void* __eax) {
          				int _t5;
          				struct HWND__** _t6;
          
          				_t6 = __eax + 0x108;
          				if( *((intOrPtr*)(__eax + 0x14c)) != 3) {
          					_push(5);
          				} else {
          					_push(3);
          				}
          				ShowWindow( *_t6, ??); // executed
          				_t5 = UpdateWindow( *_t6); // executed
          				return _t5;
          			}





          0x0040d72a
          0x0040d730
          0x0040d736
          0x0040d732
          0x0040d732
          0x0040d732
          0x0040d73a
          0x0040d742
          0x0040d749

          APIs
          • ShowWindow.USER32(?,00000005,?,00404F42,/deleteregkey,/savelangfile,?,?,?,00000000), ref: 0040D73A
          • KiUserCallbackDispatcher.NTDLL(?), ref: 0040D742
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: CallbackDispatcherShowUserWindow
          • String ID:
          • API String ID: 82835404-0
          • Opcode ID: c171b60c3a786ecbc27896c6c711e64ce8f1472cd6f63de75d0c763b6d2cb475
          • Instruction ID: 44fe3e4b903ec0d2a0a21ed3ca86e14094ac3ef84b81a3df52c0b5a67a95a5cb
          • Opcode Fuzzy Hash: c171b60c3a786ecbc27896c6c711e64ce8f1472cd6f63de75d0c763b6d2cb475
          • Instruction Fuzzy Hash: 87D09235845110EADA719F40ED1CAD576A4EB20342F1200B6F1857A0B8967219499E86
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00409923() {
          				void* _t2;
          
          				_t2 = LoadImageA(GetModuleHandleA(0), 0x68, 0, 0, 0, 0x9060); // executed
          				return _t2;
          			}




          0x00409939
          0x0040993f

          APIs
          • GetModuleHandleA.KERNEL32(00000000,0040492D,?,00000008,00000010,00000010,00000070,00000010,00000014), ref: 00409925
          • LoadImageA.USER32 ref: 00409939
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: HandleImageLoadModule
          • String ID:
          • API String ID: 2603579926-0
          • Opcode ID: aa446924e9ae46ff8ed199e72f09be8f861c39595815cd31f4e19c36ee667997
          • Instruction ID: 12486bb556b26b266545ceb203e5ee89eb66b0891fb66153bfd4dacf567af68d
          • Opcode Fuzzy Hash: aa446924e9ae46ff8ed199e72f09be8f861c39595815cd31f4e19c36ee667997
          • Instruction Fuzzy Hash: EBC092787C4300BAFDB067A1AE0FF0425285714F02F200470B705BC4D18AF12018C61C
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040D5FD(intOrPtr _a4) {
          				struct HACCEL__* _t4;
          
          				_t4 = LoadAcceleratorsA(GetModuleHandleA(0), 0x67); // executed
          				 *(_a4 + 0x120) = _t4;
          				return _t4;
          			}




          0x0040d608
          0x0040d612
          0x0040d618

          APIs
          • GetModuleHandleA.KERNEL32(00000000,00404F4A,?,/deleteregkey,/savelangfile,?,?,?,00000000), ref: 0040D5FF
          • LoadAcceleratorsA.USER32 ref: 0040D608
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: AcceleratorsHandleLoadModule
          • String ID:
          • API String ID: 3304241783-0
          • Opcode ID: a62cdd0d74553a51bdc35f2366d323287b22b6b79ec08d58a6963bedb7714514
          • Instruction ID: 7f64b0a10c24d88ab377ff8321fa22cdfb245feee9d2b03632c5547b5979dabc
          • Opcode Fuzzy Hash: a62cdd0d74553a51bdc35f2366d323287b22b6b79ec08d58a6963bedb7714514
          • Instruction Fuzzy Hash: 3AC08C79108200DBC2109B60DA0CB4536A4AB58702F008038BA499A281CB720810CA18
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040A171(intOrPtr* __eax, void* __ecx, struct HWND__* _a4, int _a8, intOrPtr _a12, intOrPtr _a16) {
          				signed int _v8;
          				signed int _v12;
          				signed int _v16;
          				intOrPtr _v20;
          				intOrPtr* _v24;
          				intOrPtr _v28;
          				intOrPtr _v32;
          				void* _v36;
          				intOrPtr* _t18;
          				long _t20;
          				intOrPtr _t25;
          				void* _t26;
          
          				_t18 = __eax;
          				_v36 = __ecx;
          				_v28 = _a16;
          				_v32 = _a12;
          				_v24 = __eax;
          				if(__eax != 0) {
          					_t26 = __eax + 1;
          					do {
          						_t25 =  *_t18;
          						_t18 = _t18 + 1;
          					} while (_t25 != 0);
          					_v20 = _t18 - _t26;
          				}
          				_v16 = _v16 & 0x00000000;
          				_v12 = _v12 & 0x00000000;
          				_v8 = _v8 & 0x00000000;
          				_t20 = SendMessageA(_a4, 0x101b, _a8,  &_v36); // executed
          				return _t20;
          			}















          0x0040a171
          0x0040a179
          0x0040a17f
          0x0040a185
          0x0040a188
          0x0040a18b
          0x0040a18d
          0x0040a190
          0x0040a190
          0x0040a192
          0x0040a193
          0x0040a199
          0x0040a199
          0x0040a19c
          0x0040a1a0
          0x0040a1a4
          0x0040a1b7
          0x0040a1be

          APIs
          • SendMessageA.USER32(00000000,0000101B,00000000,?), ref: 0040A1B7
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: MessageSend
          • String ID:
          • API String ID: 3850602802-0
          • Opcode ID: 4a646dd824a1434e92fbf119822c7a6e55d9768b2b3cb61e16bb407f86eeeb03
          • Instruction ID: d8c8eb49a35bd4b0650a41503097de75dc46ccd38f86cbb98d38e45381fc3db8
          • Opcode Fuzzy Hash: 4a646dd824a1434e92fbf119822c7a6e55d9768b2b3cb61e16bb407f86eeeb03
          • Instruction Fuzzy Hash: 91F017B4C0020AAFDF05CF95D954BEEBBF5BF08305F008069E854A6290E7788615CF95
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 84%
          			E00402134(void* __esi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, int _a16) {
          				void* _v8;
          				void* __ecx;
          				void* _t12;
          				void* _t14;
          				void* _t18;
          
          				_push(_t14);
          				_t18 = 0;
          				if(E00401F5D(_a4, _a8,  &_v8, 0x20019) == 0) {
          					_t12 = E00401F0A(_a16, _t14, __esi, _v8, _a12); // executed
          					if(_t12 == 0) {
          						_t18 = 1;
          					}
          					RegCloseKey(_v8); // executed
          				}
          				return _t18;
          			}








          0x00402137
          0x00402145
          0x00402154
          0x0040215f
          0x00402168
          0x0040216a
          0x0040216a
          0x0040216e
          0x0040216e
          0x00402178

          APIs
            • Part of subcall function 00401F5D: RegOpenKeyExA.KERNELBASE(00000000,00000000,00000000,00000000,?,0040214F,?,?,?,00020019,?,?,?,004019BF,80000000,http\shell\open\command), ref: 00401F6F
            • Part of subcall function 00401F0A: RegQueryValueExA.KERNELBASE(?,d!@,00000000,?,?,000003FF,?,?,?,00402164,?,000003FF,000003FF), ref: 00401F23
          • RegCloseKey.KERNELBASE(?,000003FF), ref: 0040216E
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: CloseOpenQueryValue
          • String ID:
          • API String ID: 3677997916-0
          • Opcode ID: 39ef9214a4bbc39a589c3ac41ff62d875ea33cbdb3ba3aad493ef93dd6797a57
          • Instruction ID: 42db503181f7d11c8ccf5e1327975531709675a0c196322be2aabd5e4b029017
          • Opcode Fuzzy Hash: 39ef9214a4bbc39a589c3ac41ff62d875ea33cbdb3ba3aad493ef93dd6797a57
          • Instruction Fuzzy Hash: 12E06D71600209BBEF119F56DE0AC9F7BB9EB84318B100075FE04A51A1E771DE10A614
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • GetPrivateProfileIntA.KERNEL32 ref: 004021A0
            • Part of subcall function 00401F93: memset.MSVCRT ref: 00401FB1
            • Part of subcall function 00401F93: _itoa.MSVCRT ref: 00401FC8
            • Part of subcall function 00401F93: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 00401FD7
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: PrivateProfile$StringWrite_itoamemset
          • String ID:
          • API String ID: 4165544737-0
          • Opcode ID: 8a68bbf644abb5d44d60de43b5c7e1df7c55df95ee88ecdfc72f4919ea230b2d
          • Instruction ID: e9f89080816bc2bcc59e67a33ed3b00210a23e40ffd8dddc1828376fca90fdc3
          • Opcode Fuzzy Hash: 8a68bbf644abb5d44d60de43b5c7e1df7c55df95ee88ecdfc72f4919ea230b2d
          • Instruction Fuzzy Hash: 41E0B632000209AFCF125F90ED05AA97FA6FF04314F148469F95C14571D33295B0AB45
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00401EC5(int __eax, void* _a4, int _a8, char* _a12) {
          				int _v8;
          				struct _FILETIME _v16;
          				long _t11;
          
          				_v8 = __eax;
          				_t11 = RegEnumKeyExA(_a4, _a8, _a12,  &_v8, 0, 0, 0,  &_v16); // executed
          				return _t11;
          			}






          0x00401ecb
          0x00401ee4
          0x00401eeb

          APIs
          • RegEnumKeyExA.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?), ref: 00401EE4
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Enum
          • String ID:
          • API String ID: 2928410991-0
          • Opcode ID: 1d2982a5234ff3ad1f2956bb5490e8e3c25f80115bc81954109239b0ffdf8a7c
          • Instruction ID: 2c83204679d6201717fb1a7b7ce65a81b4c6ac802224762fc8e3916444a79168
          • Opcode Fuzzy Hash: 1d2982a5234ff3ad1f2956bb5490e8e3c25f80115bc81954109239b0ffdf8a7c
          • Instruction Fuzzy Hash: 72D067B680010DFFDF01DFA0DD05CEF7BBDEB44204B008171B911D6110E631DA15ABA4
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00409EC9(intOrPtr __eax, struct HWND__* _a4, int _a8, intOrPtr _a12, intOrPtr _a16) {
          				intOrPtr _v20;
          				intOrPtr _v24;
          				intOrPtr _v36;
          				void* _v44;
          				long _t13;
          
          				_v36 = __eax;
          				_v20 = _a16;
          				_v24 = _a12;
          				_t13 = SendMessageA(_a4, 0x102d, _a8,  &_v44); // executed
          				return _t13;
          			}








          0x00409ecf
          0x00409ed5
          0x00409edb
          0x00409eed
          0x00409ef4

          APIs
          • SendMessageA.USER32(?,0000102D,?,?), ref: 00409EED
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: MessageSend
          • String ID:
          • API String ID: 3850602802-0
          • Opcode ID: 946e5f03cb46406b8b2400ba3adca3cfef12c1d897526695cbeeadf8492f5707
          • Instruction ID: e433e23515aff7448425a065c2ae2b77eb2c0011313e47abc414fcfb5c7cbedb
          • Opcode Fuzzy Hash: 946e5f03cb46406b8b2400ba3adca3cfef12c1d897526695cbeeadf8492f5707
          • Instruction Fuzzy Hash: CCE02DB994120EAFCF01DFA8E9458DE7BB8BB08204F004525E915F6250E7719A558BA5
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 37%
          			E00409DF6(struct HINSTANCE__** __eax, intOrPtr _a4) {
          				void* __esi;
          				intOrPtr* _t5;
          				void* _t7;
          				struct HINSTANCE__** _t9;
          
          				_t9 = __eax;
          				E00409DB8(__eax);
          				_t5 =  *((intOrPtr*)(_t9 + 8));
          				if(_t5 == 0) {
          					return 0;
          				}
          				_t7 =  *_t5(0x41435049, 0x4d44534d, _a4, 0x400); // executed
          				return _t7;
          			}







          0x00409df7
          0x00409df9
          0x00409dfe
          0x00409e04
          0x00000000
          0x00409e1d
          0x00409e19
          0x00000000

          APIs
            • Part of subcall function 00409DB8: GetModuleHandleA.KERNEL32(kernel32.dll,?,00409DFE,00020019,0040D088,?), ref: 00409DC3
            • Part of subcall function 00409DB8: GetProcAddress.KERNEL32(00000000,EnumSystemFirmwareTables), ref: 00409DD7
            • Part of subcall function 00409DB8: GetProcAddress.KERNEL32(?,GetSystemFirmwareTable), ref: 00409DE3
          • GetSystemFirmwareTable.KERNELBASE(41435049,4D44534D,0040D088,00000400,0040D088,?), ref: 00409E19
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: AddressProc$FirmwareHandleModuleSystemTable
          • String ID:
          • API String ID: 227725366-0
          • Opcode ID: 1714beba3eaf873f253e8b80d92f3b7143881c772c5b757661562748ad53d5c8
          • Instruction ID: 95a429a6300d35b589037232fcc7258777f47fce88d18a24066592b89bc846dc
          • Opcode Fuzzy Hash: 1714beba3eaf873f253e8b80d92f3b7143881c772c5b757661562748ad53d5c8
          • Instruction Fuzzy Hash: 17D02271205210B6D60091B1CC02E8B92D84FC4300F048C3A7210F21C3D378DC602BDC
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040A208(intOrPtr __eax, struct HWND__* _a4, int _a8, intOrPtr _a12) {
          				intOrPtr _v32;
          				intOrPtr _v36;
          				void* _v48;
          				long _t10;
          
          				_v32 = __eax;
          				_v36 = _a12;
          				_t10 = SendMessageA(_a4, 0x102b, _a8,  &_v48); // executed
          				return _t10;
          			}







          0x0040a20e
          0x0040a214
          0x0040a226
          0x0040a22d

          APIs
          • SendMessageA.USER32(00000000,0000102B,000000FF,?), ref: 0040A226
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: MessageSend
          • String ID:
          • API String ID: 3850602802-0
          • Opcode ID: 6a97b007e9e75faf7fa9d058f0f925b2cab3dae633f5c586ea8645b932cc2d2c
          • Instruction ID: 16507cf1ae40ea50913097fe49752bf7251f07d0266011d533b2402de74a8a23
          • Opcode Fuzzy Hash: 6a97b007e9e75faf7fa9d058f0f925b2cab3dae633f5c586ea8645b932cc2d2c
          • Instruction Fuzzy Hash: 7CD0927994020DAFCF01AFA9EC458DE7BB8FB08304F008135F915E6250E771D5568FA8
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00401EEC(void* __ecx, void* _a4, char* _a8, char* _a12, int* _a16) {
          				int _v8;
          				long _t7;
          
          				_t7 = RegQueryValueExA(_a4, _a8, 0,  &_v8, _a12, _a16); // executed
          				return _t7;
          			}





          0x00401f02
          0x00401f09

          APIs
          • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,?), ref: 00401F02
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: QueryValue
          • String ID:
          • API String ID: 3660427363-0
          • Opcode ID: f1e049ac91f55d9db44804a0c7744853d86a365aca791268e7cd08e790d99e9b
          • Instruction ID: 149b854331e5da3576aec0a549c73aa4df8f9bf2fc405360c7fc02885dfe43db
          • Opcode Fuzzy Hash: f1e049ac91f55d9db44804a0c7744853d86a365aca791268e7cd08e790d99e9b
          • Instruction Fuzzy Hash: E3D0C93110020EBFDF028F80DD05E9A3B69FB04244F004020BA0465060D272EA21AB64
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00403870(void* __eax) {
          				int _t4;
          
          				 *((intOrPtr*)(__eax + 0x178)) = 1;
          				_t4 = SetTimer( *(__eax + 0x108), 1, 0x3e8, 0); // executed
          				return _t4;
          			}




          0x00403881
          0x00403887
          0x0040388d

          APIs
          • SetTimer.USER32(?,00000001,000003E8,00000000), ref: 00403887
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Timer
          • String ID:
          • API String ID: 2870079774-0
          • Opcode ID: e83bd4fbf6b4463496155961242e57436beb69a18681abf906d81b9ad5a44fe9
          • Instruction ID: a0726496f4722c18b9340672b1a90b5104f2d2f548739068a324c895f556545c
          • Opcode Fuzzy Hash: e83bd4fbf6b4463496155961242e57436beb69a18681abf906d81b9ad5a44fe9
          • Instruction Fuzzy Hash: 69C04C706943409FEE994B20CA4FFB53574D710702F4501BEA18E591E19DB154408900
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00401F5D(void* _a4, char* _a8, void** _a12, int _a16) {
          				long _t5;
          
          				_t5 = RegOpenKeyExA(_a4, _a8, 0, _a16, _a12); // executed
          				return _t5;
          			}




          0x00401f6f
          0x00401f75

          APIs
          • RegOpenKeyExA.KERNELBASE(00000000,00000000,00000000,00000000,?,0040214F,?,?,?,00020019,?,?,?,004019BF,80000000,http\shell\open\command), ref: 00401F6F
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Open
          • String ID:
          • API String ID: 71445658-0
          • Opcode ID: 7989f145f92a336114807b4751515da6ed361536bfb9fd55c28d22adbfda428a
          • Instruction ID: 47fe800b6052ed67d00124f192e898e6da7d96f50201a3ad7b56d723bd74c210
          • Opcode Fuzzy Hash: 7989f145f92a336114807b4751515da6ed361536bfb9fd55c28d22adbfda428a
          • Instruction Fuzzy Hash: 2BC00C75548201AFDE129F51EF05B0ABBA2BBC5B11F104868B2956447186729828EB27
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00408C45(struct HWND__* _a4, int _a8) {
          				long _t3;
          
          				_t3 = SendMessageA(_a4, 0xb, _a8, 0); // executed
          				return _t3;
          			}




          0x00408c51
          0x00408c57

          APIs
          • SendMessageA.USER32(?,0000000B,?,00000000), ref: 00408C51
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: MessageSend
          • String ID:
          • API String ID: 3850602802-0
          • Opcode ID: 37910b6323c2cb4ea90511e40d6aea8b3f1677ff3672a4f0db04ec05884eefdf
          • Instruction ID: aedddd97314f06e05f0d123828412265e791970771d7f135517dc88052aa2e9f
          • Opcode Fuzzy Hash: 37910b6323c2cb4ea90511e40d6aea8b3f1677ff3672a4f0db04ec05884eefdf
          • Instruction Fuzzy Hash: 61B012381C4300BFDE324F40DD05F0A7B62BBC0700F008C78B250640F083724014DB09
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040D83B(void* __ecx, int _a4, int _a8, long _a12) {
          				long _t5;
          
          				_t5 = DefWindowProcA( *(__ecx + 0x108), _a4, _a8, _a12); // executed
          				return _t5;
          			}




          0x0040d84d
          0x0040d853

          APIs
          • DefWindowProcA.USER32(?,?,?,?,0040D996,?,?,?), ref: 0040D84D
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ProcWindow
          • String ID:
          • API String ID: 181713994-0
          • Opcode ID: 6eebf7aca66c2fa0f51cf01e8272ef7946687bd8ae81690e2175f24bc8418977
          • Instruction ID: 8b9909e8b875f4162d5b4d933cec06c2fc5f9b70b481239f90607cd75c446504
          • Opcode Fuzzy Hash: 6eebf7aca66c2fa0f51cf01e8272ef7946687bd8ae81690e2175f24bc8418977
          • Instruction Fuzzy Hash: FEC0483A008200FFCA024B80CD08D4ABBA2ABA8320F00C87CB2A84403187338062EB02
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040D62E(void* __eax, int _a4) {
          				int _t4;
          
          				_t4 = PostMessageA( *(__eax + 0x108), _a4, 0, 0); // executed
          				return _t4;
          			}




          0x0040d63c
          0x0040d642

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: 37c24b1380eb569a964a4ca75b7a0b85f4689a6e26b70cd4d130cb417451a819
          • Instruction ID: 0efac51e16cf544aa8701aa43e584df60bacf9e56adc6abc275013eae93ccd4c
          • Opcode Fuzzy Hash: 37c24b1380eb569a964a4ca75b7a0b85f4689a6e26b70cd4d130cb417451a819
          • Instruction Fuzzy Hash: 40B01231144200FFDA214B00CD09F457F61AB60700F21C070B3846C0F087B11464FF0C
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00409370(CHAR* _a4) {
          				long _t2;
          
          				_t2 = GetModuleFileNameA(0, _a4, 0x104); // executed
          				return _t2;
          			}




          0x0040937b
          0x00409381

          APIs
          • GetModuleFileNameA.KERNELBASE(00000000,?,00000104,00407D89,00000000,74714DE0,?,00407DD8), ref: 0040937B
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: FileModuleName
          • String ID:
          • API String ID: 514040917-0
          • Opcode ID: 366bbf10f02cd4765a263b556c1eb370cde5645851f33f2e8979308c14decca0
          • Instruction ID: c2208a7898666418c09ee92196ca5ebccbfeb6c30a7520eab7f044036f1f00c6
          • Opcode Fuzzy Hash: 366bbf10f02cd4765a263b556c1eb370cde5645851f33f2e8979308c14decca0
          • Instruction Fuzzy Hash: 6EA0247014C30077DD004750CD05F443F505740701F004030F34C544F0C1F000C4C701
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040D65F(void* __eax) {
          				int _t4;
          
          				_t4 = SetMenu( *(__eax + 0x108),  *(__eax + 0x11c)); // executed
          				return _t4;
          			}




          0x0040d66b
          0x0040d671

          APIs
          • KiUserCallbackDispatcher.NTDLL(?,?,004048E5), ref: 0040D66B
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: CallbackDispatcherUser
          • String ID:
          • API String ID: 2492992576-0
          • Opcode ID: 6c31237deb0ed68a55961fe4111bcecc944de7b324785ca608ed5bc27cbfb90c
          • Instruction ID: cd96e9ca0aab6b55f5e24d9c1a3e61bf1fc22d95bd1e4faa5fd2e34ab30e5fe4
          • Opcode Fuzzy Hash: 6c31237deb0ed68a55961fe4111bcecc944de7b324785ca608ed5bc27cbfb90c
          • Instruction Fuzzy Hash: 0CB001364440049FDE569B50DE0DEE43AA2BB55301F1A40F4A6995A4328B7204A6EB44
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00401ACF() {
          				struct HINSTANCE__* _t1;
          				_Unknown_base(*)()* _t13;
          				intOrPtr _t20;
          				intOrPtr _t21;
          				intOrPtr _t22;
          				intOrPtr _t23;
          				intOrPtr _t24;
          				intOrPtr _t25;
          				intOrPtr _t26;
          				intOrPtr _t27;
          
          				_t1 = LoadLibraryA("advapi32.dll");
          				 *0x412b20 = _t1;
          				if(_t1 == 0) {
          					L11:
          					return 1;
          				} else {
          					 *0x412b24 = GetProcAddress(_t1, "OpenSCManagerA");
          					 *0x412b28 = GetProcAddress( *0x412b20, "OpenServiceA");
          					 *0x412b2c = GetProcAddress( *0x412b20, "ChangeServiceConfigA");
          					 *0x412b30 = GetProcAddress( *0x412b20, "CloseServiceHandle");
          					 *0x412b34 = GetProcAddress( *0x412b20, "QueryServiceConfigA");
          					 *0x412b38 = GetProcAddress( *0x412b20, "QueryServiceConfig2A");
          					 *0x412b3c = GetProcAddress( *0x412b20, "ControlService");
          					 *0x412b40 = GetProcAddress( *0x412b20, "EnumServicesStatusA");
          					 *0x412b44 = GetProcAddress( *0x412b20, "StartServiceA");
          					_t13 = GetProcAddress( *0x412b20, "QueryServiceStatus");
          					_t20 =  *0x412b24; // 0x0
          					 *0x412b48 = _t13;
          					if(_t20 == 0) {
          						L10:
          						return 0;
          					} else {
          						_t21 =  *0x412b28; // 0x0
          						if(_t21 == 0) {
          							goto L10;
          						} else {
          							_t22 =  *0x412b2c; // 0x0
          							if(_t22 == 0) {
          								goto L10;
          							} else {
          								_t23 =  *0x412b30; // 0x0
          								if(_t23 == 0) {
          									goto L10;
          								} else {
          									_t24 =  *0x412b34; // 0x0
          									if(_t24 == 0) {
          										goto L10;
          									} else {
          										_t25 =  *0x412b3c; // 0x0
          										if(_t25 == 0) {
          											goto L10;
          										} else {
          											_t26 =  *0x412b40; // 0x0
          											if(_t26 == 0) {
          												goto L10;
          											} else {
          												_t27 =  *0x412b44; // 0x0
          												if(_t27 == 0 || _t13 == 0) {
          													goto L10;
          												} else {
          													goto L11;
          												}
          											}
          										}
          									}
          								}
          							}
          						}
          					}
          				}
          			}













          0x00401ad5
          0x00401adf
          0x00401ae4
          0x00401be9
          0x00401bed
          0x00401aea
          0x00401b04
          0x00401b16
          0x00401b28
          0x00401b3a
          0x00401b4c
          0x00401b5e
          0x00401b70
          0x00401b82
          0x00401b94
          0x00401b99
          0x00401b9b
          0x00401ba1
          0x00401ba7
          0x00401be5
          0x00401be8
          0x00401ba9
          0x00401ba9
          0x00401baf
          0x00000000
          0x00401bb1
          0x00401bb1
          0x00401bb7
          0x00000000
          0x00401bb9
          0x00401bb9
          0x00401bbf
          0x00000000
          0x00401bc1
          0x00401bc1
          0x00401bc7
          0x00000000
          0x00401bc9
          0x00401bc9
          0x00401bcf
          0x00000000
          0x00401bd1
          0x00401bd1
          0x00401bd7
          0x00000000
          0x00401bd9
          0x00401bd9
          0x00401bdf
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00401bdf
          0x00401bd7
          0x00401bcf
          0x00401bc7
          0x00401bbf
          0x00401bb7
          0x00401baf
          0x00401ba7

          APIs
          • LoadLibraryA.KERNEL32(advapi32.dll,?,00401CCD,00401D1F,?), ref: 00401AD5
          • GetProcAddress.KERNEL32(00000000,OpenSCManagerA), ref: 00401AF7
          • GetProcAddress.KERNEL32(OpenServiceA), ref: 00401B09
          • GetProcAddress.KERNEL32(ChangeServiceConfigA), ref: 00401B1B
          • GetProcAddress.KERNEL32(CloseServiceHandle), ref: 00401B2D
          • GetProcAddress.KERNEL32(QueryServiceConfigA), ref: 00401B3F
          • GetProcAddress.KERNEL32(QueryServiceConfig2A), ref: 00401B51
          • GetProcAddress.KERNEL32(ControlService), ref: 00401B63
          • GetProcAddress.KERNEL32(EnumServicesStatusA), ref: 00401B75
          • GetProcAddress.KERNEL32(StartServiceA), ref: 00401B87
          • GetProcAddress.KERNEL32(QueryServiceStatus), ref: 00401B99
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: AddressProc$LibraryLoad
          • String ID: ChangeServiceConfigA$CloseServiceHandle$ControlService$EnumServicesStatusA$OpenSCManagerA$OpenServiceA$QueryServiceConfig2A$QueryServiceConfigA$QueryServiceStatus$StartServiceA$advapi32.dll
          • API String ID: 2238633743-3119926377
          • Opcode ID: bf1bd3dfa6be9226d94423ac26b0ce1afbc649b2159dff0d93ee81f0f973e503
          • Instruction ID: 29ecb8122060b0810a3eae0c2f2a49010dee65feeaf817c6736d024ff6693c0c
          • Opcode Fuzzy Hash: bf1bd3dfa6be9226d94423ac26b0ce1afbc649b2159dff0d93ee81f0f973e503
          • Instruction Fuzzy Hash: 7321F878948714EACB229FA5AF945967FF2F6587143208937E404E62B0E3F974A0CF0C
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 68%
          			E0040180A(intOrPtr _a4) {
          				_Unknown_base(*)()* _t3;
          				void* _t7;
          				struct HINSTANCE__* _t8;
          
          				_t7 = 0;
          				_t8 = LoadLibraryA("shlwapi.dll");
          				_t3 = GetProcAddress(_t8, "SHAutoComplete");
          				if(_t3 != 0) {
          					_t7 =  *_t3(_a4, 0x10000001);
          				}
          				FreeLibrary(_t8);
          				return _t7;
          			}






          0x00401811
          0x00401819
          0x00401821
          0x00401829
          0x00401836
          0x00401836
          0x00401839
          0x00401843

          APIs
          • LoadLibraryA.KERNEL32(shlwapi.dll,?,775D48C0,0040E61B,00000000), ref: 00401813
          • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 00401821
          • FreeLibrary.KERNEL32(00000000,?,775D48C0,0040E61B,00000000), ref: 00401839
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Library$AddressFreeLoadProc
          • String ID: SHAutoComplete$shlwapi.dll
          • API String ID: 145871493-1506664499
          • Opcode ID: 36a6584b44a98245668995b2017f28a1bd2ed28a44707be7fcb7e8d86be41feb
          • Instruction ID: 4ae96949a77f2b0da97fbddaa6dd0191d11c515f6cd7e720bf20bc8f9797e570
          • Opcode Fuzzy Hash: 36a6584b44a98245668995b2017f28a1bd2ed28a44707be7fcb7e8d86be41feb
          • Instruction Fuzzy Hash: 8AD02B313012206BD3305722ED08EEF2995DFD13627050031F804E2250CBB44C8AC16C
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040867D(void** __eax, void* __ecx) {
          				signed int _v8;
          				void** _v12;
          				void* __esi;
          				void* _t20;
          				int _t21;
          				void** _t22;
          				void* _t29;
          				void** _t31;
          				void* _t35;
          				void* _t36;
          				void** _t42;
          				void* _t43;
          				void** _t45;
          				void** _t48;
          				void** _t49;
          				void** _t50;
          
          				_t48 = __eax;
          				_t20 =  *__eax;
          				if(_t20 != 0xffffffff) {
          					_t21 = FindNextFileA(_t20,  &(__eax[0x52]));
          					_v8 = _t21;
          					if(_t21 != 0) {
          						goto L5;
          					} else {
          						E004083DB(_t48);
          						goto L4;
          					}
          				} else {
          					_t29 = FindFirstFileA( &(__eax[1]),  &(__eax[0x52]));
          					 *_t48 = _t29;
          					_v8 = 0 | _t29 != 0xffffffff;
          					L4:
          					if(_v8 != 0) {
          						L5:
          						_t42 =  &(_t48[0xf3]);
          						_t31 =  &(_t48[0xa2]);
          						_t22 =  &(_t48[0x5d]);
          						_v12 = _t42;
          						_t49 =  &(_t42[0]);
          						do {
          							_t35 =  *_t42;
          							_t42 =  &(_t42[0]);
          						} while (_t35 != 0);
          						_t43 = _t42 - _t49;
          						_t50 = _t22;
          						_t45 =  &(_t50[0]);
          						do {
          							_t36 =  *_t50;
          							_t50 =  &(_t50[0]);
          						} while (_t36 != 0);
          						if(_t50 - _t45 + _t43 + 1 >= 0x143) {
          							 *_t31 = 0;
          						} else {
          							E00409ADF(_t31, _v12, _t22);
          						}
          					}
          				}
          				return _v8;
          			}



















          0x00408683
          0x00408685
          0x0040868a
          0x004086b4
          0x004086bc
          0x004086bf
          0x00000000
          0x004086c1
          0x004086c1
          0x00000000
          0x004086c1
          0x0040868c
          0x00408697
          0x004086a5
          0x004086a7
          0x004086c6
          0x004086ca
          0x004086cc
          0x004086cc
          0x004086d3
          0x004086d9
          0x004086df
          0x004086e2
          0x004086e5
          0x004086e5
          0x004086e7
          0x004086e8
          0x004086ec
          0x004086ee
          0x004086f1
          0x004086f4
          0x004086f4
          0x004086f6
          0x004086f7
          0x00408708
          0x00408718
          0x0040870a
          0x00408710
          0x00408715
          0x0040871b
          0x004086ca
          0x00408721

          APIs
          • FindFirstFileA.KERNEL32(?,?), ref: 00408697
          • FindNextFileA.KERNEL32(?,?), ref: 004086B4
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: FileFind$FirstNext
          • String ID:
          • API String ID: 1690352074-0
          • Opcode ID: 5bcc1ea45a3f37c8921b7c6839e43af2c05acf34090211bcde2f3b7c6e544677
          • Instruction ID: 086f8102b2cc6972c0ce453810dbea7a9d332b2ba5458a327b9a26daa53302aa
          • Opcode Fuzzy Hash: 5bcc1ea45a3f37c8921b7c6839e43af2c05acf34090211bcde2f3b7c6e544677
          • Instruction Fuzzy Hash: 5D11B472400205DFCB25CF78D984AEBB7E8AB44310F204A7ED4DBE3280EB756A448B94
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 75%
          			E0040455B(void* __ecx, void* __edi, void* __esi, void* __eflags) {
          				char _v8;
          				void* _t18;
          
          				_t18 = __esi;
          				_push(__ecx);
          				if(E00406B4D( *((intOrPtr*)(__esi + 0x290)), __ecx, __edi, __eflags,  &_v8) != 0 && OpenClipboard( *(__esi + 0x108)) != 0) {
          					E004094FE(_v8 + 0x10e);
          				}
          				return E004054FF( *((intOrPtr*)(_t18 + 0x290)));
          			}





          0x0040455b
          0x0040455e
          0x00404570
          0x0040458b
          0x00404590
          0x0040459d

          APIs
          • OpenClipboard.USER32(?), ref: 00404578
            • Part of subcall function 004094FE: EmptyClipboard.USER32(?,?,00404590,?), ref: 00409506
            • Part of subcall function 004094FE: GlobalAlloc.KERNEL32(00002000,?,?,?,?,?,00404590,?), ref: 00409529
            • Part of subcall function 004094FE: GlobalLock.KERNEL32 ref: 00409536
            • Part of subcall function 004094FE: memcpy.MSVCRT ref: 0040953F
            • Part of subcall function 004094FE: GlobalUnlock.KERNEL32(00000000), ref: 00409548
            • Part of subcall function 004094FE: SetClipboardData.USER32 ref: 00409551
            • Part of subcall function 004094FE: CloseClipboard.USER32 ref: 00409561
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Clipboard$Global$AllocCloseDataEmptyLockOpenUnlockmemcpy
          • String ID:
          • API String ID: 1107540621-0
          • Opcode ID: 2031c62112e80f5e5796f680882c8a5b14734faa713b46f8e7e82ef379f4b379
          • Instruction ID: 02c95b43c9ba60480caf94e3eecde025093c679f28c6020ee4969b0c68e7b7b0
          • Opcode Fuzzy Hash: 2031c62112e80f5e5796f680882c8a5b14734faa713b46f8e7e82ef379f4b379
          • Instruction Fuzzy Hash: 02E0E671204609BBDB10EB6ADD85B8BB3EDAF44348F00047AB69AF2591DA78FD449718
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004092C5() {
          
          				if( *0x412704 == 0) {
          					0x412700->dwOSVersionInfoSize = 0x94;
          					GetVersionExA(0x412700);
          				}
          				return 0x412700;
          			}



          0x004092d2
          0x004092d5
          0x004092df
          0x004092df
          0x004092e8

          APIs
          • GetVersionExA.KERNEL32(00412700,00410500,00409B3A,0040B3B5,?,?,00403E9E,?,00000001,00000000), ref: 004092DF
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Version
          • String ID:
          • API String ID: 1889659487-0
          • Opcode ID: 07a6dfe9e970191e177825cff1b67b36fdf4804b08e6be314bac40c2b755cb8b
          • Instruction ID: 34381bf79c3577fb6e3eeede89c30b4a4b8a04c2a810ec268e6400cc11749217
          • Opcode Fuzzy Hash: 07a6dfe9e970191e177825cff1b67b36fdf4804b08e6be314bac40c2b755cb8b
          • Instruction Fuzzy Hash: 31C002355111219BD6615BD8BE08BD67698E70A335F118076E614E2291C3F80C698A9C
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 98%
          			E004023E5(void* __ecx, intOrPtr* __esi, void* __eflags, signed int _a4, intOrPtr _a8, signed int _a12, long _a16, char* _a20, signed int _a24, signed int _a28, intOrPtr _a32, struct HDC__* _a36, int _a40, struct tagRECT _a44, intOrPtr _a48, intOrPtr _a52, char _a56, struct tagRECT _a60, intOrPtr _a64, intOrPtr _a68, char _a72, struct tagRECT _a76, intOrPtr _a80, struct tagRECT _a88, intOrPtr _a92, intOrPtr _a96, intOrPtr _a100, intOrPtr _a104, intOrPtr _a108, long _a112, struct tagSIZE _a116, struct tagRECT _a120, intOrPtr _a124, intOrPtr _a132, char _a328) {
          				signed int _v0;
          				struct HWND__* _v4;
          				intOrPtr _v8;
          				signed int _v12;
          				intOrPtr _v16;
          				intOrPtr _v20;
          				intOrPtr _v24;
          				signed int _v36;
          				intOrPtr _v40;
          				struct HWND__* _v48;
          				intOrPtr _v60;
          				intOrPtr* _v64;
          				struct HWND__* _v68;
          				intOrPtr _v72;
          				intOrPtr _v76;
          				intOrPtr _v80;
          				struct HDC__* _t170;
          				struct HWND__* _t172;
          				signed int _t223;
          				void* _t224;
          				CHAR* _t229;
          				signed int _t234;
          				struct HWND__* _t236;
          				void* _t238;
          				CHAR* _t263;
          				char _t267;
          				intOrPtr* _t275;
          				signed int _t276;
          				signed int _t277;
          
          				_t275 = __esi;
          				_t277 = _t276 & 0xfffffff8;
          				E0040EAD0(0x2198, __ecx);
          				_a8 =  *((intOrPtr*)( *((intOrPtr*)(__esi + 0x10)) + 0x1c0));
          				_t236 = GetDlgItem( *(__esi + 4), 0x3e9);
          				_v4 = GetDlgItem( *(__esi + 4), 0x3e8);
          				_a24 = GetWindowLongA(_t236, 0xfffffff0);
          				_a12 = GetWindowLongA(_v4, 0xfffffff0);
          				_a112 = GetWindowLongA(_t236, 0xffffffec);
          				_a16 = GetWindowLongA(_v4, 0xffffffec);
          				GetWindowRect(_t236,  &_a76);
          				GetWindowRect(_v4,  &_a60);
          				E004023D4(__esi,  &_a76);
          				E004023D4(__esi,  &_a56);
          				_t238 = _a76.left - _a68;
          				_v12 = _v12 & 0x00000000;
          				_a24 = _a60.left - _a52;
          				_a100 = _a80 - _a72;
          				_a32 = _a64 - _a56;
          				_t170 = GetDC( *(__esi + 4));
          				_a28 = _t170;
          				if(_t170 == 0) {
          					L11:
          					_v0 = _v0 & 0x00000000;
          					if( *((intOrPtr*)( *((intOrPtr*)(_t275 + 0x10)) + 0x1bc)) <= 0) {
          						L14:
          						_t172 = GetDlgItem( *(_t275 + 4), 1);
          						_a16 = _t172;
          						GetWindowRect(_t172,  &_a44);
          						E004023D4(_t275,  &_a44);
          						GetClientRect( *(_t275 + 4),  &_a120);
          						GetWindowRect( *(_t275 + 4),  &_a88);
          						SetWindowPos( *(_t275 + 4), 0, 0, 0, _a96 - _a88.left + 1, _a124 - _a132 - _a44.left - _a92 + _a52 + _a100 + _v8 + 0x15, 0x206);
          						GetClientRect( *(_t275 + 4),  &_a88);
          						return SetWindowPos(_a12, 0, _a40, _a44.left - _a52 - _a92 + _a100 - 5, _a48 - _a40 + 1, _a52 - _a44.left + 1, 0x204);
          					}
          					_a24 = _a24 | 0x10000000;
          					_a12 = _a12 | 0x10000000;
          					_a4 = _a8 + 0x10;
          					do {
          						 *((intOrPtr*)( *_t275 + 0x1c))(_v0);
          						_v16 = E0040DAE9(_t275, _a108, "STATIC", _a20, _a72, _v8 + _a76.left, _t238, _a104);
          						_v60 = E0040DAE9(_t275, _v20, "EDIT", _v24, _a24, _v40 + _a28, _v4,  *(_t275 + 0x14) * _a4);
          						sprintf( &_a72, "%s:",  *_v64);
          						_t277 = _t277 + 0xc;
          						SetWindowTextA(_v48,  &_a72);
          						SetWindowTextA(_v68,  *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t275 + 0xc))))))(_v68,  &_a328));
          						_v72 = _v72 + 0x14;
          						_v80 = _v80 +  *(_t275 + 0x14) * _v36 +  *((intOrPtr*)(_t275 + 0x18));
          						_v76 = _v76 + 1;
          					} while (_v76 <  *((intOrPtr*)( *((intOrPtr*)(_t275 + 0x10)) + 0x1bc)));
          					goto L14;
          				}
          				_t223 = 0;
          				_a28 = _a28 & 0;
          				_a4 = 0;
          				if( *((intOrPtr*)( *((intOrPtr*)(__esi + 0x10)) + 0x1bc)) <= 0) {
          					L10:
          					_t224 = _t223 - _t238;
          					_a32 = _a32 - _t224;
          					_a60.left = _a60.left + _t224;
          					_t238 = _t238 + _t224;
          					ReleaseDC( *(_t275 + 4), _a36);
          					goto L11;
          				}
          				_v0 = _a8 + 0x10;
          				do {
          					_t263 =  *_v0;
          					_t229 = _t263;
          					_a20 =  &(_t229[1]);
          					do {
          						_t267 =  *_t229;
          						_t229 =  &(_t229[1]);
          					} while (_t267 != 0);
          					if(GetTextExtentPoint32A(_a36, _t263, _t229 - _a20,  &_a116) != 0) {
          						_t234 = _a100 + 0xa;
          						if(_t234 > _v12) {
          							_v12 = _t234;
          						}
          					}
          					_a12 =  &(_a12->i);
          					_v16 = _v16 + 0x14;
          				} while (_a12 <  *((intOrPtr*)( *((intOrPtr*)(_t275 + 0x10)) + 0x1bc)));
          				_t223 = _v12;
          				goto L10;
          			}
































          0x004023e5
          0x004023e8
          0x004023f0
          0x0040240e
          0x0040241c
          0x00402429
          0x00402435
          0x0040243e
          0x0040244a
          0x00402459
          0x00402463
          0x0040246e
          0x00402477
          0x00402483
          0x00402497
          0x0040249b
          0x004024a0
          0x004024ac
          0x004024b8
          0x004024bc
          0x004024c4
          0x004024c8
          0x00402569
          0x0040256c
          0x00402578
          0x00402684
          0x00402689
          0x00402695
          0x00402699
          0x004026a2
          0x004026b8
          0x004026c2
          0x00402708
          0x00402712
          0x00402754
          0x00402754
          0x00402589
          0x0040259a
          0x0040259e
          0x004025a2
          0x004025aa
          0x004025db
          0x0040260a
          0x00402621
          0x00402626
          0x00402635
          0x00402653
          0x00402664
          0x00402669
          0x0040266d
          0x00402678
          0x00000000
          0x004025a2
          0x004024d1
          0x004024d3
          0x004024dd
          0x004024e1
          0x00402550
          0x00402554
          0x00402559
          0x0040255d
          0x00402561
          0x00402563
          0x00000000
          0x00402563
          0x004024ea
          0x004024ee
          0x004024f2
          0x004024f4
          0x004024f9
          0x004024fd
          0x004024fd
          0x004024ff
          0x00402500
          0x0040251e
          0x00402527
          0x0040252e
          0x00402530
          0x00402530
          0x0040252e
          0x00402534
          0x0040253f
          0x00402544
          0x0040254c
          0x00000000

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Window$Rect$Long$ItemText$Client$ExtentPoint32Releasesprintf
          • String ID: %s:$EDIT$STATIC
          • API String ID: 2417084822-3046471546
          • Opcode ID: e4ee7dc6c116e34781058ab9e6c655eb5266348201ca296e9373e0718df351e7
          • Instruction ID: b26deb6e0db11c0c99bdd80cc40bad539230ac6ca156b2682db7e00d63175fce
          • Opcode Fuzzy Hash: e4ee7dc6c116e34781058ab9e6c655eb5266348201ca296e9373e0718df351e7
          • Instruction Fuzzy Hash: C0B1DE71108341AFD720DF68C985A6BBBE9FB88314F004A2EF599D32A1DB75E944CF16
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040C34D(void* __ecx, intOrPtr _a4, void* _a8, intOrPtr _a12) {
          				void* _v8;
          				void _v315;
          				char _v316;
          				void* __ebx;
          				void* _t66;
          				void* _t83;
          
          				_t83 = __ecx;
          				_v316 = 0;
          				memset( &_v315, 0, 0x12b);
          				sprintf( &_v316, "%s\\Registration", _a12);
          				if(RegOpenKeyExA(_a8,  &_v316, 0, 0x20019,  &_v8) == 0) {
          					E0040BF30(_a4, E00407C3F(0x898), _v8);
          					RegCloseKey(_v8);
          				}
          				sprintf( &_v316, "%s\\ProductID", _a12);
          				if(RegOpenKeyExA(_a8,  &_v316, 0, 0x20019,  &_v8) == 0) {
          					E0040BF30(_a4, E00407C3F(0x898), _v8);
          					RegCloseKey(_v8);
          				}
          				sprintf( &_v316, "%s\\Tools\\Setup", _a12);
          				if(RegOpenKeyExA(_a8,  &_v316, 0, 0x20019,  &_v8) == 0) {
          					E0040B8BD(_t83, _a4, E00407C3F(0x898), _v8, "ProductID", _v8, "DigitalProductID", 4, 0x40f469, 0x40f469, 0x40f469, 1);
          					RegCloseKey(_v8);
          				}
          				sprintf( &_v316, "%s\\Setup", _a12);
          				if(RegOpenKeyExA(_a8,  &_v316, 0, 0x20019,  &_v8) == 0) {
          					E0040B8BD(_t83, _a4, E00407C3F(0x898), _v8, "ProductID", _v8, "DigitalProductID", 4, 0x40f469, 0x40f469, 0x40f469, 1);
          					RegCloseKey(_v8);
          				}
          				_t66 = E00401F5D(_a8, _a12,  &_v8, 0x20019);
          				if(_t66 == 0) {
          					E0040BF30(_a4, E00407C3F(0x898), _v8);
          					return RegCloseKey(_v8);
          				}
          				return _t66;
          			}









          0x0040c34d
          0x0040c367
          0x0040c36e
          0x0040c385
          0x0040c3b7
          0x0040c3c5
          0x0040c3cd
          0x0040c3cd
          0x0040c3de
          0x0040c3ff
          0x0040c40d
          0x0040c415
          0x0040c415
          0x0040c426
          0x0040c44c
          0x0040c46e
          0x0040c476
          0x0040c476
          0x0040c487
          0x0040c4ac
          0x0040c4ce
          0x0040c4d6
          0x0040c4d6
          0x0040c4e7
          0x0040c4f1
          0x0040c4ff
          0x00000000
          0x0040c507
          0x0040c50d

          APIs
          • memset.MSVCRT ref: 0040C36E
          • sprintf.MSVCRT ref: 0040C385
          • RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00020019,?), ref: 0040C3A8
          • RegCloseKey.ADVAPI32(?), ref: 0040C3CD
          • sprintf.MSVCRT ref: 0040C3DE
          • RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00020019,?), ref: 0040C3FB
          • RegCloseKey.ADVAPI32(?), ref: 0040C415
          • sprintf.MSVCRT ref: 0040C426
          • RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00020019,?), ref: 0040C443
          • RegCloseKey.ADVAPI32(?), ref: 0040C476
          • sprintf.MSVCRT ref: 0040C487
          • RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00020019,?), ref: 0040C4A4
          • RegCloseKey.ADVAPI32(?), ref: 0040C4D6
            • Part of subcall function 00407C3F: GetModuleHandleA.KERNEL32(00000000,?,?,?,004074B9,?,00000000), ref: 00407C68
            • Part of subcall function 00407C3F: LoadStringA.USER32 ref: 00407CF2
            • Part of subcall function 00407C3F: memcpy.MSVCRT ref: 00407D31
            • Part of subcall function 0040BF30: memset.MSVCRT ref: 0040BF53
            • Part of subcall function 0040BF30: RegEnumValueA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,?), ref: 0040BF8A
            • Part of subcall function 0040BF30: _strnicmp.MSVCRT ref: 0040BFAB
            • Part of subcall function 0040BF30: memset.MSVCRT ref: 0040BFC4
          • RegCloseKey.ADVAPI32(?), ref: 0040C507
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Close$Opensprintf$memset$EnumHandleLoadModuleStringValue_strnicmpmemcpy
          • String ID: %s\ProductID$%s\Registration$%s\Setup$%s\Tools\Setup$DigitalProductID$ProductID
          • API String ID: 772435431-3621475174
          • Opcode ID: cf937d245fdbcbe4b484a9e2c7198a5cd5d7e2b57483a7b00467a84e9ee46a27
          • Instruction ID: 39a95b94f143818cea47ff5659df46396f0b6565f199a10ec340ff912934c094
          • Opcode Fuzzy Hash: cf937d245fdbcbe4b484a9e2c7198a5cd5d7e2b57483a7b00467a84e9ee46a27
          • Instruction Fuzzy Hash: 09415E7194021CBADF21ABA1DD42FEE7B2DEF14744F100076BA08B10E1D7759B54EBA9
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 90%
          			E00403535(void* __ecx, void* __eflags, struct HWND__* _a4, intOrPtr _a8, void _a10, signed short _a12, void _a264, void _a265, void _a520, void _a521, char _a776, void _a780, char _a784, char _a1056, void _a1057, char _a2080, void _a2081, char _a3104, void _a3105) {
          				char _v0;
          				void* _v4;
          				void* __ebx;
          				void* _t42;
          				void* _t56;
          				int _t57;
          				int _t59;
          				int _t75;
          				intOrPtr* _t76;
          				int _t97;
          				int _t99;
          				signed short _t111;
          				signed int _t112;
          				signed int _t113;
          				void* _t119;
          
          				_t113 = _t112 & 0xfffffff8;
          				E0040EAD0(0x1424, __ecx);
          				_t42 = _a8 - 0x110;
          				if(_t42 == 0) {
          					E00409A28(_a4);
          					 *_t113 = 0x7ff;
          					_a3104 = 0;
          					memset( &_a3105, 0, ??);
          					asm("movsd");
          					asm("movsd");
          					asm("movsw");
          					memset( &_a10, 0, 0xfb);
          					_a520 = 0;
          					memset( &_a521, 0, 0xff);
          					_a264 = 0;
          					memset( &_a265, 0, 0xff);
          					_a1056 = 0;
          					memset( &_a1057, 0, 0x3ff);
          					_a2080 = 0;
          					memset( &_a2081, 0, 0x3ff);
          					_t119 = _t113 + 0x48;
          					_t56 = GetCurrentProcess();
          					_t95 =  &_a520;
          					_v4 = _t56;
          					_t57 = ReadProcessMemory(_t56,  *0x41224c,  &_a520, 0x80, 0);
          					__eflags = _t57;
          					if(_t57 != 0) {
          						E00408E4E( &_a1056,  &_a520, 4);
          						_t119 = _t119 + 0xc;
          					}
          					_t59 = ReadProcessMemory(_v4,  *0x412240,  &_a264, 0x80, 0);
          					__eflags = _t59;
          					if(_t59 != 0) {
          						E00408E4E( &_a2080,  &_a264, 0);
          						_t119 = _t119 + 0xc;
          					}
          					__eflags = E00402D3F();
          					if(__eflags == 0) {
          						L16:
          						sprintf( &_a3104, "Exception %8.8X at address %8.8X in module %s\r\nRegisters: \r\nEAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8X\r\nESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8X\r\nEIP=%8.8X\r\nStack Data: %s\r\nCode Data: %s\r\n",  *0x412458,  *0x412464,  &_v0,  *0x412238,  *0x41222c,  *0x412234,  *0x412230,  *0x412228,  *0x412224,  *0x41223c,  *0x41224c,  *0x412240,  &_a1056,  &_a2080);
          						SetDlgItemTextA(_a4, 0x3ea,  &_a3104);
          						SetFocus(GetDlgItem(_a4, 0x3ea));
          						L17:
          						return 0;
          					} else {
          						_a776 = 0;
          						memset( &_a780, 0, 0x114);
          						_t75 = E00402D6A(_t95, __eflags, GetCurrentProcessId(),  *0x412464,  &_a776);
          						_t119 = _t119 + 0x18;
          						__eflags = _t75;
          						if(_t75 == 0) {
          							goto L16;
          						}
          						_t76 = E00409317( &_a784);
          						_t99 =  &_v0 - _t76;
          						__eflags = _t99;
          						do {
          							_t97 =  *_t76;
          							 *((char*)(_t99 + _t76)) = _t97;
          							_t76 = _t76 + 1;
          							__eflags = _t97;
          						} while (_t97 != 0);
          						goto L16;
          					}
          				}
          				if(_t42 == 1) {
          					_t111 = _a12;
          					if(_t111 >> 0x10 == 0) {
          						if(_t111 == 1 || _t111 == 2) {
          							EndDialog(_a4, _t111 & 0x0000ffff);
          						}
          						if(_t111 == 3) {
          							E00403507(GetDlgItem(_a4, 0x3ea));
          						}
          					}
          				}
          				goto L17;
          			}


















          0x00403538
          0x00403540
          0x00403548
          0x00403550
          0x004035aa
          0x004035b1
          0x004035c1
          0x004035c8
          0x004035d6
          0x004035da
          0x004035e6
          0x004035e8
          0x004035ff
          0x00403606
          0x00403618
          0x0040361f
          0x00403636
          0x0040363d
          0x0040364f
          0x00403656
          0x0040365b
          0x0040365e
          0x00403671
          0x0040367f
          0x00403684
          0x00403686
          0x00403688
          0x0040369c
          0x004036a1
          0x004036a1
          0x004036b8
          0x004036ba
          0x004036bc
          0x004036cf
          0x004036d4
          0x004036d4
          0x004036dc
          0x004036de
          0x0040373a
          0x0040379e
          0x004037b7
          0x004037c8
          0x004037ce
          0x004037d6
          0x004036e0
          0x004036ee
          0x004036f5
          0x00403712
          0x00403717
          0x0040371a
          0x0040371c
          0x00000000
          0x00000000
          0x00403725
          0x0040372e
          0x0040372e
          0x00403730
          0x00403730
          0x00403732
          0x00403735
          0x00403736
          0x00403736
          0x00000000
          0x00403730
          0x004036de
          0x00403553
          0x00403559
          0x00403564
          0x0040356e
          0x0040357d
          0x0040357d
          0x00403587
          0x0040359d
          0x0040359d
          0x00403587
          0x00403564
          0x00000000

          APIs
          Strings
          • {Unknown}, xrefs: 004035CD
          • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8XEIP=%8.8XStack Data: %sCode Data: %s, xrefs: 00403798
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$Process$Item$CurrentMemoryRead$DialogFocusTextsprintf
          • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8XEIP=%8.8XStack Data: %sCode Data: %s${Unknown}
          • API String ID: 955384824-3474136107
          • Opcode ID: c05994200bfd6b670d6d8ec55e2416f0f8e2694d95102f659c2f8c18640872df
          • Instruction ID: f46141ed16033347230814c317ca42c0e9ef5a0c76a65517c55da975750c5127
          • Opcode Fuzzy Hash: c05994200bfd6b670d6d8ec55e2416f0f8e2694d95102f659c2f8c18640872df
          • Instruction Fuzzy Hash: 9161DBB2504248AFD7219F55DD45EDB7BDCFB48300F04483AF988E3161E6799A18CB6A
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 84%
          			E0040DE42(void* __ecx, intOrPtr _a4, struct HDC__* _a8, unsigned int _a12) {
          				struct tagPOINT _v12;
          				void* __edi;
          				void* _t42;
          				struct HBRUSH__* _t54;
          				void* _t59;
          				unsigned int _t60;
          				void* _t67;
          				struct HWND__* _t68;
          				struct HWND__* _t69;
          				void* _t72;
          				unsigned int _t73;
          				struct HWND__* _t75;
          				struct HWND__* _t76;
          				struct HWND__* _t77;
          				struct HWND__* _t78;
          				unsigned int _t84;
          				struct HWND__* _t86;
          				struct HWND__* _t88;
          				struct HWND__* _t89;
          				struct tagPOINT _t95;
          				struct tagPOINT _t97;
          
          				_push(__ecx);
          				_push(__ecx);
          				_t42 = _a4 - 0x110;
          				_t104 = __ecx;
          				if(_t42 == 0) {
          					__eflags =  *0x412930;
          					if(__eflags != 0) {
          						SetDlgItemTextA( *(__ecx + 4), 0x3ee, 0x412930);
          					} else {
          						ShowWindow(GetDlgItem( *(__ecx + 4), 0x3ed), 0);
          						ShowWindow(GetDlgItem( *(_t104 + 4), 0x3ee), 0);
          					}
          					E0040DBFF(_t104);
          					E0040DB6B(_t104, 0x3ea, _t104 + 0xc);
          					E0040DB6B(_t104, 0x3ec, _t104 + 0x10b);
          					E0040DDF6(_t104, __eflags);
          					E00409A28( *(_t104 + 4));
          					goto L29;
          				} else {
          					_t59 = _t42 - 1;
          					if(_t59 == 0) {
          						_t60 = _a8;
          						__eflags = _t60 - 1;
          						if(_t60 != 1) {
          							goto L29;
          						} else {
          							__eflags = _t60 >> 0x10;
          							if(_t60 >> 0x10 != 0) {
          								goto L29;
          							} else {
          								E0040DB26(__ecx, 1);
          								E0040DD94(__ecx);
          								goto L8;
          							}
          						}
          					} else {
          						_t67 = _t59 - 0x27;
          						if(_t67 == 0) {
          							_t68 = GetDlgItem( *(__ecx + 4), 0x3ec);
          							__eflags = _a12 - _t68;
          							if(_a12 != _t68) {
          								__eflags =  *0x412970;
          								if( *0x412970 == 0) {
          									goto L29;
          								} else {
          									_t69 = GetDlgItem( *(_t104 + 4), 0x3ee);
          									__eflags = _a12 - _t69;
          									if(_a12 != _t69) {
          										goto L29;
          									} else {
          										goto L18;
          									}
          								}
          							} else {
          								L18:
          								SetBkMode(_a8, 1);
          								SetTextColor(_a8, 0xc00000);
          								_t54 = GetSysColorBrush(0xf);
          							}
          						} else {
          							_t72 = _t67 - 0xc8;
          							if(_t72 == 0) {
          								_t73 = _a12;
          								_t95 = _t73 & 0x0000ffff;
          								_v12.x = _t95;
          								_v12.y = _t73 >> 0x10;
          								_t75 = GetDlgItem( *(__ecx + 4), 0x3ec);
          								_push(_v12.y);
          								_a8 = _t75;
          								_t76 = ChildWindowFromPoint( *(_t104 + 4), _t95);
          								__eflags = _t76 - _a8;
          								if(_t76 != _a8) {
          									__eflags =  *0x412970;
          									if( *0x412970 == 0) {
          										goto L29;
          									} else {
          										_t77 = GetDlgItem( *(_t104 + 4), 0x3ee);
          										_push(_v12.y);
          										_t78 = ChildWindowFromPoint( *(_t104 + 4), _v12.x);
          										__eflags = _t78 - _t77;
          										if(_t78 != _t77) {
          											goto L29;
          										} else {
          											goto L13;
          										}
          									}
          								} else {
          									L13:
          									SetCursor(LoadCursorA(GetModuleHandleA(0), 0x67));
          									goto L8;
          								}
          							} else {
          								if(_t72 != 0) {
          									L29:
          									_t54 = 0;
          									__eflags = 0;
          								} else {
          									_t84 = _a12;
          									_t97 = _t84 & 0x0000ffff;
          									_v12.x = _t97;
          									_v12.y = _t84 >> 0x10;
          									_t86 = GetDlgItem( *(__ecx + 4), 0x3ec);
          									_push(_v12.y);
          									_a8 = _t86;
          									if(ChildWindowFromPoint( *(_t104 + 4), _t97) != _a8) {
          										__eflags =  *0x412970;
          										if( *0x412970 == 0) {
          											goto L29;
          										} else {
          											_t88 = GetDlgItem( *(_t104 + 4), 0x3ee);
          											_push(_v12.y);
          											_t89 = ChildWindowFromPoint( *(_t104 + 4), _v12);
          											__eflags = _t89 - _t88;
          											if(_t89 != _t88) {
          												goto L29;
          											} else {
          												_push(0x412970);
          												goto L7;
          											}
          										}
          									} else {
          										_push(_t104 + 0x10b);
          										L7:
          										_push( *(_t104 + 4));
          										E00408F52();
          										L8:
          										_t54 = 1;
          									}
          								}
          							}
          						}
          					}
          				}
          				return _t54;
          			}
























          0x0040de45
          0x0040de46
          0x0040de4a
          0x0040de52
          0x0040de54
          0x0040e00b
          0x0040e012
          0x0040e04d
          0x0040e014
          0x0040e02d
          0x0040e03c
          0x0040e03c
          0x0040e055
          0x0040e065
          0x0040e078
          0x0040e07d
          0x0040e085
          0x00000000
          0x0040de5a
          0x0040de5a
          0x0040de5b
          0x0040dfdd
          0x0040dfe0
          0x0040dfe4
          0x00000000
          0x0040dfea
          0x0040dfed
          0x0040dff0
          0x00000000
          0x0040dff6
          0x0040dffa
          0x0040e001
          0x00000000
          0x0040e001
          0x0040dff0
          0x0040de61
          0x0040de61
          0x0040de64
          0x0040df8e
          0x0040df90
          0x0040df93
          0x0040dfbb
          0x0040dfc2
          0x00000000
          0x0040dfc8
          0x0040dfd0
          0x0040dfd2
          0x0040dfd5
          0x00000000
          0x0040dfdb
          0x00000000
          0x0040dfdb
          0x0040dfd5
          0x0040df95
          0x0040df95
          0x0040df9a
          0x0040dfa8
          0x0040dfb0
          0x0040dfb0
          0x0040de6a
          0x0040de6a
          0x0040de6f
          0x0040deff
          0x0040df08
          0x0040df16
          0x0040df19
          0x0040df1c
          0x0040df1e
          0x0040df21
          0x0040df2e
          0x0040df30
          0x0040df33
          0x0040df52
          0x0040df59
          0x00000000
          0x0040df5f
          0x0040df67
          0x0040df69
          0x0040df74
          0x0040df76
          0x0040df78
          0x00000000
          0x0040df7e
          0x00000000
          0x0040df7e
          0x0040df78
          0x0040df35
          0x0040df35
          0x0040df47
          0x00000000
          0x0040df47
          0x0040de75
          0x0040de77
          0x0040e08b
          0x0040e08b
          0x0040e08b
          0x0040de7d
          0x0040de7d
          0x0040de86
          0x0040de94
          0x0040de97
          0x0040de9a
          0x0040de9c
          0x0040de9f
          0x0040deb1
          0x0040decc
          0x0040ded3
          0x00000000
          0x0040ded9
          0x0040dee1
          0x0040dee3
          0x0040deee
          0x0040def0
          0x0040def2
          0x00000000
          0x0040def8
          0x0040def8
          0x00000000
          0x0040def8
          0x0040def2
          0x0040deb3
          0x0040deb9
          0x0040deba
          0x0040deba
          0x0040debd
          0x0040dec4
          0x0040dec6
          0x0040dec6
          0x0040deb1
          0x0040de77
          0x0040de6f
          0x0040de64
          0x0040de5b
          0x0040e091

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Item$Window$ChildFromPoint$ColorCursorShowText$BrushHandleLoadModeModule
          • String ID:
          • API String ID: 3867407936-0
          • Opcode ID: 10249b85a8e355ae9aa926841566aafcd15d2eaee965fec5e88dba55a0847797
          • Instruction ID: 5262a15f62f93bfe80ba1738d2e77b45fd3be770c7bf6a93cb16edab12745759
          • Opcode Fuzzy Hash: 10249b85a8e355ae9aa926841566aafcd15d2eaee965fec5e88dba55a0847797
          • Instruction Fuzzy Hash: 2C51D575900115FBDB129F64CE85B6E7B65FB04310F008636F904BA6E0C7B99D65DF88
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 70%
          			E0040389D(signed int __eax, void* __esi) {
          				void* _t5;
          				void* _t6;
          				void* _t7;
          				void* _t8;
          				void* _t9;
          				void* _t10;
          
          				_push("/shtml");
          				L0040107A();
          				if(__eax != 0) {
          					_push("/sverhtml");
          					L0040107A();
          					if(__eax != 0) {
          						_push("/sxml");
          						L0040107A();
          						if(__eax != 0) {
          							_push("/stab");
          							L0040107A();
          							if(__eax != 0) {
          								_push("/scomma");
          								L0040107A();
          								if(__eax != 0) {
          									_push("/stabular");
          									L0040107A();
          									if(__eax != 0) {
          										_push("/sjson");
          										L00401086();
          										asm("sbb eax, eax");
          										return ( ~__eax & 0xfffffff8) + 8;
          									} else {
          										_t5 = 3;
          										return _t5;
          									}
          								} else {
          									_t6 = 7;
          									return _t6;
          								}
          							} else {
          								_t7 = 2;
          								return _t7;
          							}
          						} else {
          							_t8 = 6;
          							return _t8;
          						}
          					} else {
          						_t9 = 5;
          						return _t9;
          					}
          				} else {
          					_t10 = 4;
          					return _t10;
          				}
          			}









          0x0040389e
          0x004038a3
          0x004038ac
          0x004038b3
          0x004038b8
          0x004038c1
          0x004038c8
          0x004038cd
          0x004038d6
          0x004038dd
          0x004038e2
          0x004038eb
          0x004038f2
          0x004038f7
          0x00403900
          0x00403907
          0x0040390c
          0x00403915
          0x0040391c
          0x00403921
          0x00403928
          0x00403932
          0x00403917
          0x00403919
          0x0040391a
          0x0040391a
          0x00403902
          0x00403904
          0x00403905
          0x00403905
          0x004038ed
          0x004038ef
          0x004038f0
          0x004038f0
          0x004038d8
          0x004038da
          0x004038db
          0x004038db
          0x004038c3
          0x004038c5
          0x004038c6
          0x004038c6
          0x004038ae
          0x004038b0
          0x004038b1
          0x004038b1

          APIs
          • _stricmp.MSVCRT(/shtml,00000000,00404BF2,00000000,00000000,74714DE0,?,00000000,?,?,00000000), ref: 004038A3
          • _stricmp.MSVCRT(/sverhtml,00000000,00404BF2,00000000,00000000,74714DE0,?,00000000,?,?,00000000), ref: 004038B8
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: _stricmp
          • String ID: /scomma$/shtml$/sjson$/stab$/stabular$/sverhtml$/sxml
          • API String ID: 2884411883-1636461792
          • Opcode ID: 3133bf17417b5b64f9396f564197433a4c5c9e145a8e610fd7fc9e9dc7274182
          • Instruction ID: 66b82687e40d6ef911e3a7ae516b89404358880832d8eb6ae21766801d9d2f71
          • Opcode Fuzzy Hash: 3133bf17417b5b64f9396f564197433a4c5c9e145a8e610fd7fc9e9dc7274182
          • Instruction Fuzzy Hash: A7011A7378931138F92821666C17F870B898B51B7BF34547BF880E80D5EFAE91C050AC
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040286A() {
          				void* _t1;
          				int _t2;
          				struct HINSTANCE__* _t4;
          
          				if( *0x412b14 != 0) {
          					return _t1;
          				}
          				_t2 = LoadLibraryA("psapi.dll");
          				_t4 = _t2;
          				if(_t4 == 0) {
          					L10:
          					return _t2;
          				} else {
          					_t2 = GetProcAddress(_t4, "GetModuleBaseNameA");
          					 *0x4125d4 = _t2;
          					if(_t2 != 0) {
          						_t2 = GetProcAddress(_t4, "EnumProcessModules");
          						 *0x4125cc = _t2;
          						if(_t2 != 0) {
          							_t2 = GetProcAddress(_t4, "GetModuleFileNameExA");
          							 *0x4125c4 = _t2;
          							if(_t2 != 0) {
          								_t2 = GetProcAddress(_t4, "EnumProcesses");
          								 *0x4126f4 = _t2;
          								if(_t2 != 0) {
          									_t2 = GetProcAddress(_t4, "GetModuleInformation");
          									 *0x4125d0 = _t2;
          									if(_t2 != 0) {
          										 *0x412b14 = 1;
          									}
          								}
          							}
          						}
          					}
          					if( *0x412b14 == 0) {
          						_t2 = FreeLibrary(_t4);
          					}
          					goto L10;
          				}
          			}






          0x00402871
          0x00402901
          0x00402901
          0x0040287d
          0x00402883
          0x00402887
          0x00402900
          0x00000000
          0x00402889
          0x00402896
          0x0040289a
          0x0040289f
          0x004028a7
          0x004028ab
          0x004028b0
          0x004028b8
          0x004028bc
          0x004028c1
          0x004028c9
          0x004028cd
          0x004028d2
          0x004028da
          0x004028de
          0x004028e3
          0x004028e5
          0x004028e5
          0x004028e3
          0x004028d2
          0x004028c1
          0x004028b0
          0x004028f7
          0x004028fa
          0x004028fa
          0x00000000
          0x004028f7

          APIs
          • LoadLibraryA.KERNEL32(psapi.dll,00000080,00402D4D,004036DC), ref: 0040287D
          • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00402896
          • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004028A7
          • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 004028B8
          • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 004028C9
          • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004028DA
          • FreeLibrary.KERNEL32(00000000), ref: 004028FA
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: AddressProc$Library$FreeLoad
          • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
          • API String ID: 2449869053-232097475
          • Opcode ID: 344c79fe987b578d57bb1da44b86a42f2c48e6210b7299a95826269c643423a4
          • Instruction ID: 217c089c90b919cac0153b6a7f84a945ec2b1e4bff1499a1315237dae27fb9dd
          • Opcode Fuzzy Hash: 344c79fe987b578d57bb1da44b86a42f2c48e6210b7299a95826269c643423a4
          • Instruction Fuzzy Hash: 3A01B531641205AEDB506B24EF88FA73AE4A754B41B10803BE504F12D8EBFC84919B7D
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 92%
          			E00401443(void* __ecx, intOrPtr _a4, intOrPtr _a8, char _a12, char _a16, intOrPtr _a20) {
          				intOrPtr _v256;
          				void _v259;
          				int _v260;
          				void _v515;
          				char _v516;
          				void _v771;
          				char _v772;
          				void _v1027;
          				char _v1028;
          				char _v1284;
          				char _v2308;
          				char _t48;
          				intOrPtr* _t51;
          				void* _t58;
          				char _t65;
          				intOrPtr _t66;
          				void* _t72;
          				intOrPtr* _t75;
          				void* _t78;
          				void* _t79;
          				void* _t80;
          				void* _t81;
          
          				_t72 = __ecx;
          				_v772 = 0;
          				memset( &_v771, 0, 0xfe);
          				_v1028 = 0;
          				memset( &_v1027, 0, 0xfe);
          				_v260 = 0;
          				memset( &_v259, 0, 0xfe);
          				_t79 = _t78 + 0x24;
          				if(_a16 != 0xffffffff) {
          					sprintf( &_v772, " bgcolor=\"%s\"", E004013F6(_a16,  &_v1284));
          					_t79 = _t79 + 0x14;
          				}
          				if(_a20 != 0xffffffff) {
          					sprintf( &_v1028, "<font color=\"%s\">", E004013F6(_a20,  &_v1284));
          					_t65 = "</font>"; // 0x6f662f3c
          					_v260 = _t65;
          					_t66 =  *0x410760; // 0x3e746e
          					_t79 = _t79 + 0x14;
          					_v256 = _t66;
          				}
          				sprintf( &_v2308, "<table border=\"1\" cellpadding=\"5\"><tr%s>\r\n",  &_v772);
          				E004096D5(_t72, _a4,  &_v2308);
          				_t48 = _a12;
          				_t80 = _t79 + 0x14;
          				if(_t48 > 0) {
          					_t75 = _a8 + 4;
          					_a16 = _t48;
          					do {
          						_v516 = 0;
          						memset( &_v515, 0, 0xfe);
          						_t51 =  *_t75;
          						_t81 = _t80 + 0xc;
          						if( *_t51 == 0) {
          							_v516 = 0;
          						} else {
          							sprintf( &_v516, " width=\"%s\"", _t51);
          							_t81 = _t81 + 0xc;
          						}
          						sprintf( &_v2308, "<th%s>%s%s%s\r\n",  &_v516,  &_v1028,  *((intOrPtr*)(_t75 - 4)),  &_v260);
          						_t58 = E004096D5(_t72, _a4,  &_v2308);
          						_t80 = _t81 + 0x20;
          						_t75 = _t75 + 8;
          						_t35 =  &_a16;
          						 *_t35 = _a16 - 1;
          					} while ( *_t35 != 0);
          					return _t58;
          				}
          				return _t48;
          			}

























          0x00401443
          0x0040145e
          0x00401464
          0x00401472
          0x00401478
          0x00401486
          0x0040148c
          0x00401491
          0x00401498
          0x004014b6
          0x004014bb
          0x004014bb
          0x004014c2
          0x004014e0
          0x004014e5
          0x004014ea
          0x004014f0
          0x004014f5
          0x004014f8
          0x004014f8
          0x00401511
          0x00401520
          0x00401525
          0x00401528
          0x0040152d
          0x00401537
          0x0040153a
          0x0040153d
          0x00401546
          0x0040154c
          0x00401551
          0x00401553
          0x00401558
          0x00401571
          0x0040155a
          0x00401567
          0x0040156c
          0x0040156c
          0x0040159b
          0x004015aa
          0x004015af
          0x004015b2
          0x004015b5
          0x004015b5
          0x004015b5
          0x00000000
          0x004015ba
          0x004015be

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: sprintf$memset
          • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
          • API String ID: 1679753483-3842416460
          • Opcode ID: 9d7a8ef25289f72f2e749bf8d61b3dad6572740c4a62b3f6065fb75a35507f06
          • Instruction ID: feb25d6c748d1ce852a697f0815ad6c6f9fd7b6504d8b29b38ccdfa577624f79
          • Opcode Fuzzy Hash: 9d7a8ef25289f72f2e749bf8d61b3dad6572740c4a62b3f6065fb75a35507f06
          • Instruction Fuzzy Hash: 3A4180B290115DAEDB21DB55CC81FEA777CAF04348F0401BBB519B21A2E6389F948F65
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 75%
          			E004057D8(intOrPtr* _a4, intOrPtr _a8, intOrPtr* _a12) {
          				signed int _v12;
          				char* _v16;
          				intOrPtr _v20;
          				signed int _v24;
          				signed int _v28;
          				signed int _v32;
          				intOrPtr _v80;
          				void _v83;
          				int _v84;
          				void _v135;
          				char _v136;
          				void _v187;
          				char _v188;
          				char _v240;
          				void _v495;
          				char _v496;
          				void* __ebx;
          				void* _t88;
          				signed int _t92;
          				void* _t103;
          				char* _t105;
          				intOrPtr* _t106;
          				void* _t107;
          				signed int _t121;
          				signed int _t123;
          				intOrPtr _t128;
          				char _t139;
          				intOrPtr _t140;
          				char _t145;
          				intOrPtr _t146;
          				signed int _t153;
          				signed int _t154;
          				intOrPtr* _t155;
          				intOrPtr* _t158;
          				void* _t160;
          				void* _t162;
          
          				_t121 = 0;
          				_v496 = 0;
          				memset( &_v495, 0, 0xfe);
          				_t123 = 0xc;
          				memcpy( &_v240, "<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s\r\n", _t123 << 2);
          				asm("movsb");
          				_v136 = 0;
          				memset( &_v135, 0, 0x31);
          				_v188 = 0;
          				memset( &_v187, 0, 0x31);
          				_v84 = 0;
          				memset( &_v83, 0, 0x31);
          				_t158 = _a4;
          				_t162 = _t160 + 0x3c;
          				_t88 =  *((intOrPtr*)( *_t158 + 0x10))();
          				_t126 =  *((intOrPtr*)(_t158 + 0x1c0));
          				_v16 =  *((intOrPtr*)(_t158 + 0x1c0));
          				if(_t88 != 0xffffffff) {
          					_t126 =  &_v496;
          					sprintf( &_v136, " bgcolor=\"%s\"", E004013F6(_t88,  &_v496));
          					_t162 = _t162 + 0x14;
          				}
          				E004096D5(_t126, _a8, "<table border=\"1\" cellpadding=\"5\">\r\n");
          				_pop(_t128);
          				_v12 = _t121;
          				if( *((intOrPtr*)(_t158 + 0x24)) > _t121) {
          					while(1) {
          						_t92 = _v12;
          						_t153 =  *( *((intOrPtr*)(_t158 + 0x28)) + _t92 * 4);
          						if( *((intOrPtr*)((_t153 << 4) +  *((intOrPtr*)(_t158 + 0x38)) + 4)) != _t121) {
          							_t145 = " nowrap"; // 0x776f6e20
          							_v84 = _t145;
          							_t146 =  *0x40fec8; // 0x706172
          							_v80 = _t146;
          						}
          						_v32 = _v32 | 0xffffffff;
          						_v28 = _v28 | 0xffffffff;
          						_v24 = _v24 | 0xffffffff;
          						_v20 = _t121;
          						 *((intOrPtr*)( *_t158 + 0x30))(5, _t92, _a12,  &_v32);
          						E004013F6(_v32,  &_v188);
          						E00401387( *((intOrPtr*)(_t158 + 0x58)),  *((intOrPtr*)( *_a12))(_t153,  *(_t158 + 0x54)));
          						 *((intOrPtr*)( *_t158 + 0x48))( *((intOrPtr*)(_t158 + 0x58)), _a12, _t153);
          						_t103 =  *((intOrPtr*)( *_t158 + 0x14))();
          						_t154 = _t153 * 0x14;
          						if(_t103 == 0xffffffff) {
          							goto L9;
          						}
          						_push( *((intOrPtr*)(_t154 + _v16 + 0x10)));
          						_push(E004013F6(_t103,  &_v496));
          						sprintf( *(_t158 + 0x5c), "<font color=\"%s\">%s</font>");
          						_t162 = _t162 + 0x10;
          						L11:
          						_t106 =  *((intOrPtr*)(_t158 + 0x58));
          						_t140 =  *_t106;
          						if(_t140 == _t121 || _t140 == 0x20) {
          							_t107 = _t106 - 1;
          							do {
          								_t128 =  *((intOrPtr*)(_t107 + 1));
          								_t107 = _t107 + 1;
          							} while (_t128 != _t121);
          							asm("movsd");
          							asm("movsw");
          							asm("movsb");
          							_t158 = _a4;
          						}
          						E004015BF( &_v32,  *((intOrPtr*)(_t158 + 0x60)),  *((intOrPtr*)(_t158 + 0x58)));
          						sprintf( *(_t158 + 0x54),  &_v240,  &_v136,  *(_t158 + 0x5c),  &_v188,  &_v84,  *((intOrPtr*)(_t158 + 0x60)));
          						E004096D5(_t128, _a8,  *(_t158 + 0x54));
          						_t162 = _t162 + 0x2c;
          						_v12 = _v12 + 1;
          						if(_v12 <  *((intOrPtr*)(_t158 + 0x24))) {
          							_t121 = 0;
          							continue;
          						}
          						goto L17;
          						L9:
          						_t155 =  *((intOrPtr*)(_t154 + _v16 + 0x10));
          						_t105 =  *(_t158 + 0x5c);
          						do {
          							_t139 =  *_t155;
          							_t155 = _t155 + 1;
          							 *_t105 = _t139;
          							_t105 =  &(_t105[1]);
          						} while (_t139 != _t121);
          						goto L11;
          					}
          				}
          				L17:
          				E004096D5(_t128, _a8, "</table><p>");
          				return E004096D5(_t128, _a8, "\r\n");
          			}







































          0x004057e4
          0x004057f3
          0x004057f9
          0x00405800
          0x0040580c
          0x00405818
          0x00405819
          0x0040581f
          0x0040582e
          0x00405834
          0x00405840
          0x00405843
          0x00405848
          0x0040584d
          0x00405852
          0x00405858
          0x0040585e
          0x00405861
          0x00405863
          0x0040587d
          0x00405882
          0x00405882
          0x0040588d
          0x00405896
          0x00405897
          0x0040589a
          0x004058a4
          0x004058a7
          0x004058aa
          0x004058b9
          0x004058bb
          0x004058c1
          0x004058c4
          0x004058ca
          0x004058ca
          0x004058cf
          0x004058d3
          0x004058d7
          0x004058e7
          0x004058ea
          0x004058f7
          0x0040590e
          0x0040591e
          0x00405925
          0x00405928
          0x0040592e
          0x00000000
          0x00000000
          0x00405933
          0x00405946
          0x0040594f
          0x00405954
          0x0040596d
          0x0040596d
          0x00405970
          0x00405974
          0x0040597b
          0x0040597c
          0x0040597c
          0x0040597f
          0x00405980
          0x0040598b
          0x0040598c
          0x0040598e
          0x0040598f
          0x0040598f
          0x0040599b
          0x004059c2
          0x004059cd
          0x004059d2
          0x004059d5
          0x004059de
          0x004058a2
          0x00000000
          0x004058a2
          0x00000000
          0x00405959
          0x0040595c
          0x00405960
          0x00405963
          0x00405963
          0x00405965
          0x00405966
          0x00405968
          0x00405969
          0x00000000
          0x00405963
          0x004058a4
          0x004059e4
          0x004059ec
          0x00405a05

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memsetsprintf
          • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
          • API String ID: 4041149307-601624466
          • Opcode ID: 3cbb0ee0592f9727debd6ea0743596826fb770f4f8134f2240006f178ca05d86
          • Instruction ID: bd2f7b2927322c3c7e6169080418333b93865647938ed6a495bebaf89e0a7d3e
          • Opcode Fuzzy Hash: 3cbb0ee0592f9727debd6ea0743596826fb770f4f8134f2240006f178ca05d86
          • Instruction Fuzzy Hash: 0E61EE31900208AFDB20DF55C841AAFBBB9EF08324F10457AF856A76E1D738AA45CF54
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00402902() {
          				void* _t1;
          				_Unknown_base(*)()* _t2;
          				struct HINSTANCE__* _t4;
          
          				if( *0x412b10 != 0) {
          					return _t1;
          				}
          				_t2 = GetModuleHandleA("kernel32.dll");
          				_t4 = _t2;
          				if(_t4 == 0) {
          					L9:
          					return _t2;
          				}
          				_t2 = GetProcAddress(_t4, "CreateToolhelp32Snapshot");
          				 *0x4125c8 = _t2;
          				if(_t2 != 0) {
          					_t2 = GetProcAddress(_t4, "Module32First");
          					 *0x4125c0 = _t2;
          					if(_t2 != 0) {
          						_t2 = GetProcAddress(_t4, "Module32Next");
          						 *0x4125bc = _t2;
          						if(_t2 != 0) {
          							_t2 = GetProcAddress(_t4, "Process32First");
          							 *0x412454 = _t2;
          							if(_t2 != 0) {
          								_t2 = GetProcAddress(_t4, "Process32Next");
          								 *0x4125b4 = _t2;
          								if(_t2 != 0) {
          									 *0x412b10 = 1;
          								}
          							}
          						}
          					}
          				}
          				goto L9;
          			}






          0x00402909
          0x00402985
          0x00402985
          0x00402911
          0x00402917
          0x0040291b
          0x00402984
          0x00000000
          0x00402984
          0x0040292a
          0x0040292e
          0x00402933
          0x0040293b
          0x0040293f
          0x00402944
          0x0040294c
          0x00402950
          0x00402955
          0x0040295d
          0x00402961
          0x00402966
          0x0040296e
          0x00402972
          0x00402977
          0x00402979
          0x00402979
          0x00402977
          0x00402966
          0x00402955
          0x00402944
          0x00000000

          APIs
          • GetModuleHandleA.KERNEL32(kernel32.dll,00000080,00402D54,004036DC), ref: 00402911
          • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 0040292A
          • GetProcAddress.KERNEL32(00000000,Module32First), ref: 0040293B
          • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 0040294C
          • GetProcAddress.KERNEL32(00000000,Process32First), ref: 0040295D
          • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 0040296E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: AddressProc$HandleModule
          • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
          • API String ID: 667068680-3953557276
          • Opcode ID: b680712c30a427f4f3561d1e6768f78a7ff5aa4b0d9143a8c722c10e77033dcc
          • Instruction ID: 2afadc6d7b1a62aa00a0387305a68baa0d067eabbde59b9677db4cf2209c1d39
          • Opcode Fuzzy Hash: b680712c30a427f4f3561d1e6768f78a7ff5aa4b0d9143a8c722c10e77033dcc
          • Instruction Fuzzy Hash: 60F06270700217ABC3105B24AF84BAB6EA9A745F40B18413BEC00F12D4EBF894928E6C
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 93%
          			E0040D33F(intOrPtr _a4) {
          				signed int _v12;
          				long _v16;
          				char _v277;
          				char _v278;
          				void _v279;
          				char _v280;
          				void _v543;
          				char _v544;
          				void _v807;
          				char _v808;
          				char _v1132;
          				char _v1456;
          				char _v2100;
          				signed int _v2104;
          				void* __esi;
          				int _t56;
          				char* _t63;
          				char* _t65;
          				intOrPtr* _t68;
          				char* _t72;
          				void* _t81;
          				intOrPtr _t83;
          				void* _t88;
          				void* _t89;
          
          				_v16 = GetLogicalDrives();
          				_v12 = 2;
          				do {
          					if((_v16 & 1 << _v12) == 0) {
          						goto L16;
          					}
          					_v808 = 0;
          					memset( &_v807, 0, 0x104);
          					E00409225( &_v808);
          					_pop(_t81);
          					memset( &_v279, 0, 0x104);
          					_v280 = _v12 + 0x41;
          					_t89 = _t89 + 0x18;
          					_v279 = 0x3a;
          					_v278 = 0x5c;
          					_v277 = 0;
          					_t56 = GetDriveTypeA( &_v280);
          					if(_t56 == 2) {
          						L4:
          						_v2104 = _v2104 | 0xffffffff;
          						_v2100 = 0;
          						_v1132 = 0;
          						_v1456 = 0;
          						E00408722( &_v2104, _t81, _t94,  &_v280);
          						while(E0040867D( &_v2104, _t81) != 0) {
          							_t63 = E00408512( &_v2104);
          							__eflags = _t63;
          							if(_t63 == 0) {
          								continue;
          							}
          							_push( &_v808);
          							_t65 =  &_v1456;
          							L0040107A();
          							__eflags = _t65;
          							_t81 = _t65;
          							if(_t65 == 0) {
          								continue;
          							}
          							_v544 = 0;
          							memset( &_v543, 0, 0x104);
          							_t68 =  &_v1456;
          							_t89 = _t89 + 0xc;
          							_t88 = _t68 + 1;
          							do {
          								_t83 =  *_t68;
          								_t68 = _t68 + 1;
          								__eflags = _t83;
          							} while (_t83 != 0);
          							__eflags = _t68 - _t88 + 0x10 - 0x104;
          							if(_t68 - _t88 + 0x10 >= 0x104) {
          								_v544 = 0;
          							} else {
          								E00409ADF( &_v544,  &_v1456, "system32\\config");
          							}
          							_t72 = E00409396( &_v544);
          							__eflags = _t72;
          							_pop(_t81);
          							if(_t72 != 0) {
          								E0040D109(_a4,  &_v1456);
          							}
          						}
          						E004083DB( &_v2104);
          						goto L16;
          					}
          					_t94 = _t56 - 3;
          					if(_t56 != 3) {
          						goto L16;
          					}
          					goto L4;
          					L16:
          					_v12 = _v12 + 1;
          				} while (_v12 < 0x20);
          				return 0;
          			}



























          0x0040d351
          0x0040d354
          0x0040d362
          0x0040d36f
          0x00000000
          0x00000000
          0x0040d37e
          0x0040d384
          0x0040d393
          0x0040d398
          0x0040d3a2
          0x0040d3ac
          0x0040d3b2
          0x0040d3bc
          0x0040d3c3
          0x0040d3ca
          0x0040d3d0
          0x0040d3d9
          0x0040d3e4
          0x0040d3e4
          0x0040d3f8
          0x0040d3fe
          0x0040d404
          0x0040d40a
          0x0040d4af
          0x0040d41a
          0x0040d41f
          0x0040d421
          0x00000000
          0x00000000
          0x0040d42d
          0x0040d42e
          0x0040d435
          0x0040d43a
          0x0040d43d
          0x0040d43e
          0x00000000
          0x00000000
          0x0040d449
          0x0040d44f
          0x0040d454
          0x0040d45a
          0x0040d45d
          0x0040d460
          0x0040d460
          0x0040d462
          0x0040d463
          0x0040d463
          0x0040d46c
          0x0040d46e
          0x0040d489
          0x0040d470
          0x0040d481
          0x0040d486
          0x0040d496
          0x0040d49b
          0x0040d49d
          0x0040d49e
          0x0040d4aa
          0x0040d4aa
          0x0040d49e
          0x0040d4c8
          0x00000000
          0x0040d4c8
          0x0040d3db
          0x0040d3de
          0x00000000
          0x00000000
          0x00000000
          0x0040d4cd
          0x0040d4cd
          0x0040d4d0
          0x0040d4e0

          APIs
          • GetLogicalDrives.KERNEL32 ref: 0040D34B
          • memset.MSVCRT ref: 0040D384
            • Part of subcall function 00409225: GetWindowsDirectoryA.KERNEL32(00412B88,00000104,?,00402A6C,00000000,?,00000000,00000104), ref: 0040923A
          • memset.MSVCRT ref: 0040D3A2
          • GetDriveTypeA.KERNEL32(?), ref: 0040D3D0
          • _stricmp.MSVCRT(?,?), ref: 0040D435
          • memset.MSVCRT ref: 0040D44F
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$DirectoryDriveDrivesLogicalTypeWindows_stricmp
          • String ID: $:$\$system32\config
          • API String ID: 132563618-2809694175
          • Opcode ID: 1e24a9947093709c3fe60f78e73973d85afc855c8af9a5ef3779cdae3bf5a6fc
          • Instruction ID: 6382f7b931f21d70a1174caf659fd9be9e68f0d6f8dce2cefffbd5d06a0edbea
          • Opcode Fuzzy Hash: 1e24a9947093709c3fe60f78e73973d85afc855c8af9a5ef3779cdae3bf5a6fc
          • Instruction Fuzzy Hash: B6419E7190115C9ACB20D6658C45ADEBBB8AF55304F0440FAE589F2182EA389B8DCF69
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 89%
          			E0040CB46(intOrPtr _a4, void* _a8) {
          				signed int _v8;
          				int _v12;
          				void _v275;
          				char _v276;
          				void _v539;
          				char _v540;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				char* _t30;
          				long _t34;
          				long _t37;
          				char* _t45;
          				void* _t54;
          				char* _t56;
          				char* _t57;
          				char* _t58;
          
          				_v540 = 0;
          				memset( &_v539, 0, 0x104);
          				_v276 = 0;
          				memset( &_v275, 0, 0x104);
          				_v12 = 0;
          				_t56 =  &_v276;
          				E00409476(0x104, _t56, _a8);
          				_t30 = strrchr(_t56, 0x5c);
          				_pop(_t54);
          				if(_t30 != 0) {
          					 *_t30 = 0;
          					_t45 = strrchr(_t56, 0x5c);
          					_pop(_t54);
          					if(_t45 != 0) {
          						 *_t45 = 0;
          						_t58 =  &_v540;
          						E00409476(0x104, _t58, _t56);
          						_pop(_t54);
          						_v12 = _t58;
          					}
          				}
          				E0040A7B6(_t54, _a4);
          				if(E00409B5D() != 0) {
          					_t11 =  &_v8;
          					_v8 = _v8 & 0x00000000;
          					E00402FB0( *_t11,  &_v8);
          					E00402E64( &_v8);
          				}
          				_t57 = "$$PRODUCKEY_TEMP_HIVE$$";
          				RegUnLoadKeyA(0x80000002, _t57);
          				_t34 = RegLoadKeyA(0x80000002, _t57, _a8);
          				_v8 = _t34;
          				if(_t34 == 0) {
          					_t37 = RegOpenKeyExA(0x80000002, _t57, 0, 0x20019,  &_a8);
          					_v8 = _t37;
          					if(_t37 == 0) {
          						E0040CAFC(_t54, _a4, _a8, _v12);
          						RegCloseKey(_a8);
          					}
          					RegUnLoadKeyA(0x80000002, _t57);
          				}
          				return _v8;
          			}




















          0x0040cb62
          0x0040cb68
          0x0040cb79
          0x0040cb7f
          0x0040cb8a
          0x0040cb8f
          0x0040cb95
          0x0040cba0
          0x0040cba8
          0x0040cba9
          0x0040cbab
          0x0040cbb3
          0x0040cbbb
          0x0040cbbc
          0x0040cbbe
          0x0040cbc4
          0x0040cbca
          0x0040cbd1
          0x0040cbd2
          0x0040cbd2
          0x0040cbbc
          0x0040cbd8
          0x0040cbe4
          0x0040cbe6
          0x0040cbe6
          0x0040cbee
          0x0040cbf6
          0x0040cbf6
          0x0040cc01
          0x0040cc0d
          0x0040cc14
          0x0040cc1c
          0x0040cc1f
          0x0040cc2e
          0x0040cc36
          0x0040cc39
          0x0040cc44
          0x0040cc4c
          0x0040cc4c
          0x0040cc54
          0x0040cc54
          0x0040cc5d

          APIs
          • memset.MSVCRT ref: 0040CB68
          • memset.MSVCRT ref: 0040CB7F
            • Part of subcall function 00409476: memcpy.MSVCRT ref: 00409496
          • strrchr.MSVCRT ref: 0040CBA0
          • strrchr.MSVCRT ref: 0040CBB3
          • RegUnLoadKeyA.ADVAPI32(80000002,$$PRODUCKEY_TEMP_HIVE$$), ref: 0040CC0D
          • RegLoadKeyA.ADVAPI32(80000002,$$PRODUCKEY_TEMP_HIVE$$,?), ref: 0040CC14
          • RegOpenKeyExA.ADVAPI32(80000002,$$PRODUCKEY_TEMP_HIVE$$,00000000,00020019,?), ref: 0040CC2E
          • RegCloseKey.ADVAPI32(?), ref: 0040CC4C
          • RegUnLoadKeyA.ADVAPI32(80000002,$$PRODUCKEY_TEMP_HIVE$$), ref: 0040CC54
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Load$memsetstrrchr$CloseOpenmemcpy
          • String ID: $$PRODUCKEY_TEMP_HIVE$$
          • API String ID: 2415994382-4012694985
          • Opcode ID: 87eb7532a99d52fd244a8280536f629a4df418aea5cfceb0827b58f064d778e2
          • Instruction ID: 784516e6dca9c1608afa2149188d804e3feb09765de8019ca0a4e038e20016b4
          • Opcode Fuzzy Hash: 87eb7532a99d52fd244a8280536f629a4df418aea5cfceb0827b58f064d778e2
          • Instruction Fuzzy Hash: B7316371A00218BEDB21ABA69C45FCF7BBCEF55314F10407AF504F6192DA789E458BA8
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 87%
          			E0040E0A9(void* __eax) {
          				signed int _v8;
          				struct HWND__* _v12;
          				long _v16;
          				char _v277;
          				char _v278;
          				void _v279;
          				char _v280;
          				void _v543;
          				char _v544;
          				int _t40;
          				intOrPtr _t46;
          				void* _t62;
          				void* _t67;
          				void* _t68;
          
          				if( *((intOrPtr*)(__eax + 0xc)) != 0) {
          					return __eax;
          				} else {
          					 *((intOrPtr*)(__eax + 0xc)) = 1;
          					_v12 = GetDlgItem( *(__eax + 4), 0x3ef);
          					_v16 = GetLogicalDrives();
          					_v544 = 0;
          					memset( &_v543, 0, 0x104);
          					E00409225( &_v544);
          					_t68 = _t67 + 0x10;
          					_v8 = 2;
          					do {
          						_t40 = 1 << _v8;
          						if((_v16 & 1) == 0) {
          							goto L10;
          						}
          						memset( &_v279, 0, 0x104);
          						_v280 = _v8 + 0x41;
          						_t68 = _t68 + 0xc;
          						_v279 = 0x3a;
          						_v278 = 0x5c;
          						_v277 = 0;
          						_t40 = GetDriveTypeA( &_v280);
          						if(_t40 == 2 || _t40 == 3) {
          							_t62 =  &_v280 - 1;
          							do {
          								_t46 =  *((intOrPtr*)(_t62 + 1));
          								_t62 = _t62 + 1;
          							} while (_t46 != 0);
          							asm("movsd");
          							_push( &_v544);
          							_t40 =  &_v280;
          							_push(_t40);
          							asm("movsd");
          							L0040107A();
          							if(_t40 != 0) {
          								_t40 = E00409396( &_v280);
          								if(_t40 != 0) {
          									_t40 = E004093AB(_v12,  &_v280);
          								}
          							}
          						}
          						L10:
          						_v8 = _v8 + 1;
          					} while (_v8 < 0x20);
          					return _t40;
          				}
          			}

















          0x0040e0b6
          0x0040e1cf
          0x0040e0bc
          0x0040e0c7
          0x0040e0d4
          0x0040e0e3
          0x0040e0ef
          0x0040e0f6
          0x0040e102
          0x0040e107
          0x0040e10a
          0x0040e111
          0x0040e117
          0x0040e11e
          0x00000000
          0x00000000
          0x0040e12e
          0x0040e138
          0x0040e13e
          0x0040e148
          0x0040e14f
          0x0040e156
          0x0040e15d
          0x0040e166
          0x0040e173
          0x0040e174
          0x0040e174
          0x0040e177
          0x0040e178
          0x0040e187
          0x0040e188
          0x0040e189
          0x0040e18f
          0x0040e190
          0x0040e191
          0x0040e19a
          0x0040e1a3
          0x0040e1ab
          0x0040e1b7
          0x0040e1bd
          0x0040e1ab
          0x0040e19a
          0x0040e1be
          0x0040e1be
          0x0040e1c1
          0x00000000
          0x0040e1cd

          APIs
          • GetDlgItem.USER32 ref: 0040E0CE
          • GetLogicalDrives.KERNEL32 ref: 0040E0D7
          • memset.MSVCRT ref: 0040E0F6
            • Part of subcall function 00409225: GetWindowsDirectoryA.KERNEL32(00412B88,00000104,?,00402A6C,00000000,?,00000000,00000104), ref: 0040923A
          • memset.MSVCRT ref: 0040E12E
          • GetDriveTypeA.KERNEL32(?), ref: 0040E15D
          • _stricmp.MSVCRT(?,00000000), ref: 0040E191
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$DirectoryDriveDrivesItemLogicalTypeWindows_stricmp
          • String ID: $:$Windows$\
          • API String ID: 1179675397-2453529296
          • Opcode ID: bef06e0d57a42d07de4d7ea2a4da898f6a23be68d91c5a16efaa69d34a520f7e
          • Instruction ID: 076f0527ea9c5fee8924921937fb03d8c48f1c3d5d0045629b0c51db26f4c80d
          • Opcode Fuzzy Hash: bef06e0d57a42d07de4d7ea2a4da898f6a23be68d91c5a16efaa69d34a520f7e
          • Instruction Fuzzy Hash: 1B31CF7190024CABDB24DBA6CD4ABDEB7B8AB05304F1444F6D608FA1C2D7388B858F65
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00409CB1(void* __ebx, void* __edi, void* __esi, void* __eflags, intOrPtr _a4) {
          				long _v8;
          				void* _v12;
          				long _v16;
          				void* _t14;
          				void* _t29;
          				void* _t34;
          				long _t36;
          
          				_v8 = _v8 & 0x00000000;
          				EmptyClipboard();
          				_t14 = E00409716(_a4);
          				_v12 = _t14;
          				if(_t14 == 0xffffffff) {
          					_v8 = GetLastError();
          				} else {
          					_t36 = GetFileSize(_t14, 0);
          					_t5 = _t36 + 1; // 0x1
          					_t29 = GlobalAlloc(0x2000, _t5);
          					if(_t29 == 0) {
          						L4:
          						_v8 = GetLastError();
          					} else {
          						_t34 = GlobalLock(_t29);
          						if(ReadFile(_v12, _t34, _t36,  &_v16, 0) == 0) {
          							goto L4;
          						} else {
          							 *((char*)(_t34 + _t36)) = 0;
          							GlobalUnlock(_t29);
          							SetClipboardData(1, _t29);
          						}
          					}
          					CloseHandle(_v12);
          				}
          				CloseClipboard();
          				return _v8;
          			}










          0x00409cb7
          0x00409cbb
          0x00409cc4
          0x00409ccd
          0x00409cd0
          0x00409d46
          0x00409cd2
          0x00409cde
          0x00409ce0
          0x00409cef
          0x00409cf3
          0x00409d29
          0x00409d2f
          0x00409cf5
          0x00409cfe
          0x00409d11
          0x00000000
          0x00409d13
          0x00409d14
          0x00409d18
          0x00409d21
          0x00409d21
          0x00409d11
          0x00409d35
          0x00409d3d
          0x00409d49
          0x00409d53

          APIs
          • EmptyClipboard.USER32(00404DF4,?), ref: 00409CBB
            • Part of subcall function 00409716: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00409CC9,?), ref: 00409728
          • GetFileSize.KERNEL32(00000000,00000000,?), ref: 00409CD8
          • GlobalAlloc.KERNEL32(00002000,00000001), ref: 00409CE9
          • GlobalLock.KERNEL32 ref: 00409CF6
          • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00409D09
          • GlobalUnlock.KERNEL32(00000000), ref: 00409D18
          • SetClipboardData.USER32 ref: 00409D21
          • GetLastError.KERNEL32 ref: 00409D29
          • CloseHandle.KERNEL32(?), ref: 00409D35
          • GetLastError.KERNEL32 ref: 00409D40
          • CloseClipboard.USER32 ref: 00409D49
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
          • String ID:
          • API String ID: 3604893535-0
          • Opcode ID: 10de5859567b87446904565400fedfa97000c2bcf1d4b14b3dbc8805c7939b9a
          • Instruction ID: 5a50d71c9677ff208350085b36c79d2013372cce5b999ce37c3e4ca6669c51b4
          • Opcode Fuzzy Hash: 10de5859567b87446904565400fedfa97000c2bcf1d4b14b3dbc8805c7939b9a
          • Instruction Fuzzy Hash: 5E116D35500205EBD7206FA5EE48B9E7BB8EF48311F104076F605E6591DB709D098A68
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 96%
          			E0040CC60(long _a4, char _a8) {
          				void* _v8;
          				void* _v12;
          				void _v275;
          				char _v276;
          				void _v1299;
          				char _v1300;
          				void* __ebx;
          				void* __edi;
          				intOrPtr* _t40;
          				void* _t43;
          				unsigned int _t44;
          				long _t56;
          				long _t58;
          				long _t60;
          				intOrPtr* _t71;
          				void* _t74;
          				void* _t75;
          				char _t76;
          				char _t81;
          				void _t82;
          				void _t83;
          				signed int _t85;
          				int _t88;
          				void* _t91;
          				char _t92;
          				void* _t94;
          				void* _t95;
          				void* _t97;
          				void* _t101;
          				void* _t105;
          				void* _t111;
          				long _t112;
          
          				_t40 = _a8;
          				if( *_t40 != 0x5c ||  *((char*)(_t40 + 1)) != 0x5c) {
          					_t74 = _a4 + 0x768;
          					_t94 = _t74 - _t40;
          					do {
          						_t81 =  *_t40;
          						 *((char*)(_t94 + _t40)) = _t81;
          						_t40 = _t40 + 1;
          					} while (_t81 != 0);
          					goto L7;
          				} else {
          					_t74 = _a4 + 0x768;
          					_t71 = _t40 + 2;
          					_t97 = _t74 - _t71;
          					do {
          						_t92 =  *_t71;
          						 *((char*)(_t97 + _t71)) = _t92;
          						_t71 = _t71 + 1;
          					} while (_t92 != 0);
          					L7:
          					memset( &_v275, 0, 0x106);
          					asm("movsw");
          					_t43 = _t74;
          					asm("movsb");
          					_t95 = _t43;
          					do {
          						_t82 =  *_t43;
          						_t43 = _t43 + 1;
          					} while (_t82 != 0);
          					_t44 = _t43 - _t95;
          					_t101 =  &_v276 - 1;
          					do {
          						_t83 =  *(_t101 + 1);
          						_t101 = _t101 + 1;
          					} while (_t83 != 0);
          					_t85 = _t44 >> 2;
          					_t111 = _t95;
          					_t88 = memcpy(_t101, _t111, _t85 << 2) & 0x00000003;
          					memcpy(_t111 + _t85 + _t85, _t111, _t88);
          					_t105 = _t111 + _t88 + _t88;
          					_v1300 = 0;
          					memset( &_v1299, 0, 0x3ff);
          					_t75 = 9;
          					sprintf( &_v1300, E00407C3F(_t75));
          					_t112 = _a4;
          					E00409E22( *((intOrPtr*)(_t112 + 0x878)),  &_v1300);
          					_t76 = 0;
          					_t91 = _t74;
          					if( *((intOrPtr*)(_t112 + 0x754)) == 0) {
          						L13:
          						_a8 = _t76;
          						_t56 = RegConnectRegistryA( &_v276, 0x80000002,  &_v8);
          						_a4 = _t56;
          						if(_t56 == 0) {
          							L18:
          							_t58 = RegOpenKeyExA(_v8, "Software", 0, 0x20019,  &_v12);
          							_a4 = _t58;
          							if(_t58 == 0) {
          								E0040CAFC(_t91, _t112, _v12, 0);
          								RegCloseKey(_v12);
          							}
          							RegCloseKey(_v8);
          							L21:
          							if(_t76 != 0) {
          								E00401D0A( &_a8,  &_v276, 0);
          							}
          							_t60 = _a4;
          							L24:
          							return _t60;
          						}
          						if( *((intOrPtr*)(_t112 + 0x760)) != 0) {
          							_t76 = E00401D0A( &_a8,  &_v276, 1);
          							if(_t76 != 0) {
          								_a4 = RegConnectRegistryA( &_v276, 0x80000002,  &_v8);
          							}
          						}
          						if(_a4 != 0) {
          							goto L21;
          						} else {
          							goto L18;
          						}
          					}
          					_t60 = E0040ABDB(_a8, _t105, _t112);
          					if(_t60 == 0) {
          						goto L24;
          					}
          					goto L13;
          				}
          			}



































          0x0040cc63
          0x0040cc72
          0x0040cc99
          0x0040cca1
          0x0040cca3
          0x0040cca3
          0x0040cca5
          0x0040cca8
          0x0040cca9
          0x00000000
          0x0040cc7a
          0x0040cc7d
          0x0040cc83
          0x0040cc88
          0x0040cc8a
          0x0040cc8a
          0x0040cc8c
          0x0040cc8f
          0x0040cc90
          0x0040ccad
          0x0040ccbb
          0x0040cccb
          0x0040cccd
          0x0040ccd2
          0x0040ccd3
          0x0040ccd5
          0x0040ccd5
          0x0040ccd7
          0x0040ccd8
          0x0040cce2
          0x0040cce4
          0x0040cce5
          0x0040cce5
          0x0040cce8
          0x0040cce9
          0x0040ccef
          0x0040ccf2
          0x0040cd03
          0x0040cd09
          0x0040cd09
          0x0040cd0b
          0x0040cd12
          0x0040cd1d
          0x0040cd2b
          0x0040cd30
          0x0040cd43
          0x0040cd48
          0x0040cd51
          0x0040cd52
          0x0040cd65
          0x0040cd7b
          0x0040cd7e
          0x0040cd82
          0x0040cd85
          0x0040cdc2
          0x0040cdd5
          0x0040cde3
          0x0040cde6
          0x0040cdee
          0x0040cdf6
          0x0040cdf6
          0x0040cdfb
          0x0040cdfd
          0x0040cdff
          0x0040ce0d
          0x0040ce0d
          0x0040ce12
          0x0040ce15
          0x0040ce19
          0x0040ce19
          0x0040cd8e
          0x0040cda1
          0x0040cda5
          0x0040cdb9
          0x0040cdb9
          0x0040cda5
          0x0040cdc0
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x0040cdc0
          0x0040cd58
          0x0040cd5f
          0x00000000
          0x00000000
          0x00000000
          0x0040cd5f

          APIs
          • memset.MSVCRT ref: 0040CCBB
          • memset.MSVCRT ref: 0040CD12
          • sprintf.MSVCRT ref: 0040CD2B
          • RegConnectRegistryA.ADVAPI32(?,80000002,?), ref: 0040CD7E
          • RegConnectRegistryA.ADVAPI32(?,80000002,?), ref: 0040CDB7
          • RegOpenKeyExA.ADVAPI32(?,Software,00000000,00020019,?), ref: 0040CDD5
          • RegCloseKey.ADVAPI32(?), ref: 0040CDF6
          • RegCloseKey.ADVAPI32(?), ref: 0040CDFB
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: CloseConnectRegistrymemset$Opensprintf
          • String ID: Software
          • API String ID: 3924636354-2393246361
          • Opcode ID: f09d0ba0c24eb170852eadd1196640db1142fb1754b71308216b7b879914348c
          • Instruction ID: a5624547f57fb1dbc346fbc3180d5039ffa5e1ae1cf231a9bc551707f2c1f170
          • Opcode Fuzzy Hash: f09d0ba0c24eb170852eadd1196640db1142fb1754b71308216b7b879914348c
          • Instruction Fuzzy Hash: 0051A671A0060CEFEB21DF64DC81BDB7BA8AF44344F14417AEA49B71C1D7789A49CB94
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 84%
          			E004015BF(void* __ebx, char* _a4, void* _a8) {
          				int _v8;
          				void _v263;
          				char _v264;
          				void _v519;
          				char _v520;
          				void* _t45;
          				unsigned int _t46;
          				intOrPtr _t50;
          				intOrPtr _t51;
          				intOrPtr _t52;
          				intOrPtr _t53;
          				intOrPtr _t55;
          				void* _t59;
          				unsigned int _t60;
          				void* _t65;
          				unsigned int _t66;
          				void* _t69;
          				void _t70;
          				void _t71;
          				signed int _t73;
          				void _t79;
          				void _t80;
          				signed int _t82;
          				void _t87;
          				void _t88;
          				signed int _t90;
          				void* _t95;
          				void* _t96;
          				void* _t97;
          				int _t98;
          				void* _t100;
          				void* _t106;
          				void* _t108;
          				void* _t110;
          				void* _t113;
          				void* _t115;
          				void* _t121;
          				void* _t127;
          				void* _t133;
          				void* _t134;
          				void* _t135;
          				void* _t136;
          				void* _t139;
          				void* _t141;
          
          				_t69 = __ebx;
          				_t98 = 0;
          				_v264 = 0;
          				memset( &_v263, 0, 0xfe);
          				_v520 = 0;
          				memset( &_v519, 0, 0xfe);
          				_t136 = _t135 + 0x18;
          				_v8 = 1;
          				if( *((intOrPtr*)(__ebx + 4)) == 0xffffffff &&  *((intOrPtr*)(__ebx + 8)) <= 0) {
          					_v8 = 0;
          				}
          				 *_a4 = 0;
          				if(_v8 != _t98) {
          					asm("movsd");
          					asm("movsw");
          					_t53 =  *((intOrPtr*)(_t69 + 8));
          					if(_t53 > 0) {
          						sprintf( &_v264, " size=\"%d\"", _t53);
          						_t65 =  &_v264;
          						_t141 = _t136 + 0xc;
          						_t97 = _t65;
          						do {
          							_t87 =  *_t65;
          							_t65 = _t65 + 1;
          						} while (_t87 != 0);
          						_t66 = _t65 - _t97;
          						_t121 = _a4 - 1;
          						do {
          							_t88 =  *(_t121 + 1);
          							_t121 = _t121 + 1;
          						} while (_t88 != 0);
          						_t90 = _t66 >> 2;
          						_t134 = _t97;
          						memcpy(_t134 + _t90 + _t90, _t134, memcpy(_t121, _t134, _t90 << 2) & 0x00000003);
          						_t136 = _t141 + 0x18;
          					}
          					_t54 =  *((intOrPtr*)(_t69 + 4));
          					if( *((intOrPtr*)(_t69 + 4)) != 0xffffffff) {
          						sprintf( &_v264, " color=\"#%s\"", E004013F6(_t54,  &_v520));
          						_t59 =  &_v264;
          						_t139 = _t136 + 0x14;
          						_t96 = _t59;
          						do {
          							_t79 =  *_t59;
          							_t59 = _t59 + 1;
          						} while (_t79 != 0);
          						_t60 = _t59 - _t96;
          						_t115 = _a4 - 1;
          						do {
          							_t80 =  *(_t115 + 1);
          							_t115 = _t115 + 1;
          						} while (_t80 != 0);
          						_t82 = _t60 >> 2;
          						_t133 = _t96;
          						memcpy(_t133 + _t82 + _t82, _t133, memcpy(_t115, _t133, _t82 << 2) & 0x00000003);
          						_t136 = _t139 + 0x18;
          					}
          					_t113 = _a4 - 1;
          					do {
          						_t55 =  *((intOrPtr*)(_t113 + 1));
          						_t113 = _t113 + 1;
          					} while (_t55 != 0);
          					asm("movsw");
          					_t98 = 0;
          				}
          				if( *((intOrPtr*)(_t69 + 0xc)) != _t98) {
          					_t110 = _a4 - 1;
          					do {
          						_t52 =  *((intOrPtr*)(_t110 + 1));
          						_t110 = _t110 + 1;
          					} while (_t52 != 0);
          					asm("movsd");
          				}
          				_t45 = _a8;
          				_t95 = _t45;
          				do {
          					_t70 =  *_t45;
          					_t45 = _t45 + 1;
          				} while (_t70 != 0);
          				_t46 = _t45 - _t95;
          				_t100 = _a4 - 1;
          				do {
          					_t71 =  *(_t100 + 1);
          					_t100 = _t100 + 1;
          				} while (_t71 != 0);
          				_t73 = _t46 >> 2;
          				_t127 = _t95;
          				memcpy(_t127 + _t73 + _t73, _t127, memcpy(_t100, _t127, _t73 << 2) & 0x00000003);
          				if( *((intOrPtr*)(_t69 + 0xc)) != 0) {
          					_t108 = _a4 - 1;
          					do {
          						_t51 =  *((intOrPtr*)(_t108 + 1));
          						_t108 = _t108 + 1;
          					} while (_t51 != 0);
          					asm("movsd");
          					asm("movsb");
          				}
          				if(_v8 != 0) {
          					_t106 = _a4 - 1;
          					do {
          						_t50 =  *((intOrPtr*)(_t106 + 1));
          						_t106 = _t106 + 1;
          					} while (_t50 != 0);
          					asm("movsd");
          					asm("movsd");
          				}
          				return _a4;
          			}















































          0x004015bf
          0x004015d0
          0x004015da
          0x004015e1
          0x004015ef
          0x004015f6
          0x004015fb
          0x00401602
          0x00401609
          0x00401610
          0x00401610
          0x00401619
          0x0040161c
          0x00401629
          0x0040162a
          0x0040162c
          0x00401631
          0x00401640
          0x00401645
          0x0040164b
          0x0040164e
          0x00401650
          0x00401650
          0x00401652
          0x00401653
          0x0040165a
          0x0040165c
          0x0040165d
          0x0040165d
          0x00401660
          0x00401661
          0x00401667
          0x0040166a
          0x00401673
          0x00401673
          0x00401673
          0x00401675
          0x0040167b
          0x00401697
          0x0040169c
          0x004016a2
          0x004016a5
          0x004016a7
          0x004016a7
          0x004016a9
          0x004016aa
          0x004016b1
          0x004016b3
          0x004016b4
          0x004016b4
          0x004016b7
          0x004016b8
          0x004016be
          0x004016c1
          0x004016ca
          0x004016ca
          0x004016ca
          0x004016cf
          0x004016d0
          0x004016d0
          0x004016d3
          0x004016d4
          0x004016dd
          0x004016df
          0x004016df
          0x004016e4
          0x004016e9
          0x004016ea
          0x004016ea
          0x004016ed
          0x004016ee
          0x004016f7
          0x004016f7
          0x004016f8
          0x004016fb
          0x004016fd
          0x004016fd
          0x004016ff
          0x00401700
          0x00401707
          0x00401709
          0x0040170a
          0x0040170a
          0x0040170d
          0x0040170e
          0x00401714
          0x00401717
          0x00401720
          0x00401726
          0x0040172b
          0x0040172c
          0x0040172c
          0x0040172f
          0x00401730
          0x00401739
          0x0040173a
          0x0040173a
          0x0040173f
          0x00401744
          0x00401745
          0x00401745
          0x00401748
          0x00401749
          0x00401752
          0x00401753
          0x00401753
          0x0040175a

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memsetsprintf
          • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
          • API String ID: 4041149307-1996832678
          • Opcode ID: 1e2aab957bc7b26221ffa0c709ab96f7c84d7ed275eae9eb88dfbc97be7e2620
          • Instruction ID: 39ae1bf813dd95f269064c10691c7677a7bb4ec6dda8d1802202662c61fc824e
          • Opcode Fuzzy Hash: 1e2aab957bc7b26221ffa0c709ab96f7c84d7ed275eae9eb88dfbc97be7e2620
          • Instruction Fuzzy Hash: 53517B318004495BCF11CE288850BEBB7E6AF91350F1882B6E899AF391D776DDC1CB94
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 57%
          			E00407AB3(char __ecx, void* __eflags, int _a4, struct tagMENUITEMINFOA _a8, intOrPtr _a12, int _a24, intOrPtr _a28, char* _a44, int _a48, char _a56, void _a57, char _a4160, void _a4161) {
          				int _v0;
          				int _v4;
          				int _t42;
          				void* _t53;
          				void* _t55;
          				void* _t58;
          				unsigned int _t59;
          				intOrPtr _t62;
          				int _t63;
          				void _t70;
          				void _t71;
          				signed int _t73;
          				void* _t77;
          				void* _t80;
          				void* _t82;
          				int _t88;
          				void* _t90;
          				signed int _t91;
          				signed int _t92;
          
          				_t68 = __ecx;
          				_t92 = _t91 & 0xfffffff8;
          				E0040EAD0(0x204c, __ecx);
          				_t42 = GetMenuItemCount(_a8.cbSize);
          				_t88 = 0;
          				_a4 = _t42;
          				_v4 = 0;
          				if(_t42 <= 0) {
          					L20:
          					return _t42;
          				}
          				do {
          					memset( &_a57, _t88, 0x1000);
          					_t92 = _t92 + 0xc;
          					_a44 =  &_a56;
          					_a8.cbSize = 0x30;
          					_a12 = 0x36;
          					_a48 = 0x1000;
          					_a56 = 0;
          					if(GetMenuItemInfoA(_a8.cbSize, _v4, 1,  &_a8) == 0) {
          						goto L19;
          					}
          					if(_a56 == 0) {
          						L17:
          						_t106 = _a28 - _t88;
          						if(_a28 != _t88) {
          							_push(_t88);
          							_push(_a28);
          							_push(_a4);
          							E00407AB3(_t68, _t106);
          							_t92 = _t92 + 0xc;
          						}
          						goto L19;
          					}
          					_v0 = _a24;
          					_a4160 = 0;
          					memset( &_a4161, _t88, 0x1000);
          					_t53 = strchr( &_a56, 9);
          					_t92 = _t92 + 0x14;
          					_t80 = _t53;
          					if(_a28 != _t88) {
          						if(_a12 == _t88) {
          							 *0x41279c =  *0x41279c + 1;
          							_t62 =  *0x41279c; // 0x0
          							_t63 = _t62 + 0x11558;
          							__eflags = _t63;
          						} else {
          							_t63 = _v4 + 0x11171;
          						}
          						_v0 = _t63;
          					}
          					_t55 = E004076DC(_v0,  &_a4160);
          					_pop(_t68);
          					if(_t55 == 0) {
          						goto L17;
          					} else {
          						if(_t80 == _t88) {
          							L16:
          							ModifyMenuA(_a8, _v4, 0x400, _v0,  &_a4160);
          							goto L17;
          						}
          						_t58 = _t80;
          						_t77 = _t80;
          						do {
          							_t70 =  *_t58;
          							_t58 = _t58 + 1;
          						} while (_t70 != 0);
          						_t59 = _t58 - _t77;
          						_t82 =  &_a4160 - 1;
          						do {
          							_t71 =  *(_t82 + 1);
          							_t82 = _t82 + 1;
          						} while (_t71 != 0);
          						_t73 = _t59 >> 2;
          						_t90 = _t77;
          						memcpy(_t90 + _t73 + _t73, _t90, memcpy(_t82, _t90, _t73 << 2) & 0x00000003);
          						_t92 = _t92 + 0x18;
          						_t68 = 0;
          						_t88 = 0;
          						goto L16;
          					}
          					L19:
          					_v4 = _v4 + 1;
          					_t42 = _v4;
          				} while (_t42 < _a4);
          				goto L20;
          			}






















          0x00407ab3
          0x00407ab6
          0x00407abe
          0x00407ac9
          0x00407acf
          0x00407ad3
          0x00407ad7
          0x00407adb
          0x00407c27
          0x00407c2d
          0x00407c2d
          0x00407ae6
          0x00407aed
          0x00407af2
          0x00407af9
          0x00407b08
          0x00407b13
          0x00407b1b
          0x00407b1f
          0x00407b2c
          0x00000000
          0x00000000
          0x00407b37
          0x00407bff
          0x00407bff
          0x00407c03
          0x00407c05
          0x00407c06
          0x00407c0a
          0x00407c0d
          0x00407c12
          0x00407c12
          0x00000000
          0x00407c03
          0x00407b42
          0x00407b4f
          0x00407b57
          0x00407b63
          0x00407b68
          0x00407b6f
          0x00407b71
          0x00407b76
          0x00407b83
          0x00407b89
          0x00407b8e
          0x00407b8e
          0x00407b78
          0x00407b7c
          0x00407b7c
          0x00407b93
          0x00407b93
          0x00407ba3
          0x00407bab
          0x00407bac
          0x00000000
          0x00407bae
          0x00407bb0
          0x00407be1
          0x00407bf9
          0x00000000
          0x00407bf9
          0x00407bb2
          0x00407bb4
          0x00407bb6
          0x00407bb6
          0x00407bb8
          0x00407bb9
          0x00407bc4
          0x00407bc6
          0x00407bc7
          0x00407bc7
          0x00407bca
          0x00407bcb
          0x00407bd1
          0x00407bd4
          0x00407bdd
          0x00407bdd
          0x00407bdd
          0x00407bdf
          0x00000000
          0x00407bdf
          0x00407c15
          0x00407c15
          0x00407c19
          0x00407c1d
          0x00000000

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Menu$Itemmemset$CountInfoModifystrchr
          • String ID: 0$6
          • API String ID: 2695500961-3849865405
          • Opcode ID: 3f125d8f9c99a8dc343bc0f6ed8da4378aa4ab476d370e35e0c0dbe081e5d04a
          • Instruction ID: bc50868f119f1ac69747449354b0e5ede2fc8155e10fb2fb2ca5d72e8faccf57
          • Opcode Fuzzy Hash: 3f125d8f9c99a8dc343bc0f6ed8da4378aa4ab476d370e35e0c0dbe081e5d04a
          • Instruction Fuzzy Hash: 4741CF7190C344AFC7218F59D800A9FBBE9EB84754F04493EF988A2291D775E944CFA7
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 46%
          			E00408080(void* __ecx, void* __eflags, struct HINSTANCE__* _a4, intOrPtr _a8, CHAR* _a12) {
          				void _v4103;
          				char _v4104;
          				void* _t18;
          				char _t21;
          				void* _t22;
          				struct HMENU__* _t34;
          				void* _t45;
          				struct HWND__* _t47;
          				struct HMENU__* _t50;
          
          				E0040EAD0(0x1004, __ecx);
          				_t18 = 4;
          				_t55 = _a8 - _t18;
          				if(_a8 != _t18) {
          					__eflags = _a8 - 5;
          					if(_a8 == 5) {
          						_t21 = E00407595(_a12);
          						__eflags = _t21;
          						if(_t21 == 0) {
          							_push(_a12);
          							_t22 = 5;
          							E00407714(_t22);
          							_t47 = CreateDialogParamA(_a4, _a12, 0, E004075B7, 0);
          							_v4104 = 0;
          							memset( &_v4103, 0, 0x1000);
          							GetWindowTextA(_t47,  &_v4104, 0x1000);
          							__eflags = _v4104;
          							if(__eflags != 0) {
          								E004075BC(__eflags, "caption",  &_v4104);
          							}
          							EnumChildWindows(_t47, E00407E46, 0);
          							DestroyWindow(_t47);
          						}
          					}
          				} else {
          					E00407714(_t18, _a12);
          					_pop(_t45);
          					_t34 = LoadMenuA(_a4, _a12);
          					 *0x41279c =  *0x41279c & 0x00000000;
          					_t50 = _t34;
          					_push(1);
          					_push(_t50);
          					_push(_a12);
          					E00407EF9(_t45, _t55);
          					DestroyMenu(_t50);
          				}
          				return 1;
          			}












          0x00408088
          0x00408090
          0x00408091
          0x00408094
          0x004080ce
          0x004080d2
          0x004080db
          0x004080e0
          0x004080e3
          0x004080eb
          0x004080f0
          0x004080f1
          0x00408112
          0x0040811c
          0x00408122
          0x00408133
          0x00408139
          0x0040813f
          0x0040814d
          0x00408153
          0x0040815b
          0x00408162
          0x00408169
          0x004080e3
          0x00408096
          0x00408099
          0x0040809e
          0x004080a5
          0x004080ab
          0x004080b2
          0x004080b4
          0x004080b6
          0x004080b7
          0x004080ba
          0x004080c3
          0x004080c3
          0x0040816f

          APIs
          • LoadMenuA.USER32 ref: 004080A5
            • Part of subcall function 00407EF9: GetMenuItemCount.USER32 ref: 00407F0E
            • Part of subcall function 00407EF9: memset.MSVCRT ref: 00407F2F
            • Part of subcall function 00407EF9: GetMenuItemInfoA.USER32 ref: 00407F6A
            • Part of subcall function 00407EF9: strchr.MSVCRT ref: 00407F81
          • DestroyMenu.USER32(00000000), ref: 004080C3
          • CreateDialogParamA.USER32(?,?,00000000,004075B7,00000000), ref: 00408106
          • memset.MSVCRT ref: 00408122
          • GetWindowTextA.USER32 ref: 00408133
          • EnumChildWindows.USER32 ref: 0040815B
          • DestroyWindow.USER32(00000000), ref: 00408162
            • Part of subcall function 00407714: sprintf.MSVCRT ref: 00407737
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Menu$DestroyItemWindowmemset$ChildCountCreateDialogEnumInfoLoadParamTextWindowssprintfstrchr
          • String ID: caption
          • API String ID: 2399569875-4135340389
          • Opcode ID: c6f0a7400c459f5448579dd9d8661458a8750f959f47b059c50533fb2ca9ee94
          • Instruction ID: eee04953f9942be59f9ff2124a300e171563816723e8f5865314466324634240
          • Opcode Fuzzy Hash: c6f0a7400c459f5448579dd9d8661458a8750f959f47b059c50533fb2ca9ee94
          • Instruction Fuzzy Hash: 3D210632404248BFDB216F21DD45EEB3B28EF04355F00447AF645F54E0D6B95D948B69
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 77%
          			E0040A877(void* __ebx, intOrPtr _a4) {
          				int _v8;
          				intOrPtr _v12;
          				intOrPtr _v16;
          				int _v20;
          				signed int* _v24;
          				signed char _v26;
          				void* _v40;
          				void _v68;
          				void _v131;
          				char _v132;
          				void* _v368;
          				void* _v373;
          				void* _v378;
          				void* _v383;
          				void _v387;
          				void _v388;
          				signed char _t95;
          				signed int _t97;
          				signed int _t98;
          				signed int _t99;
          				signed int _t101;
          				void* _t110;
          				unsigned int _t111;
          				void* _t113;
          				void* _t118;
          				signed int _t119;
          				signed int _t121;
          				signed int* _t123;
          				signed int _t126;
          				signed int _t127;
          				void _t128;
          				void _t129;
          				signed int _t131;
          				void* _t145;
          				signed int _t155;
          				void* _t157;
          				signed int _t171;
          				signed char* _t173;
          				signed int _t174;
          				int _t175;
          				void* _t176;
          				signed int _t182;
          				void* _t183;
          
          				_t118 = __ebx;
          				_t119 = 6;
          				memcpy( &_v68, "BCDFGHJKMPQRTVWXY2346789", _t119 << 2);
          				_v20 = 0;
          				_v8 = 0;
          				_v132 = 0;
          				asm("movsb");
          				memset( &_v131, 0, 0x3f);
          				_t121 = 8;
          				memset(__ebx, 0, _t121 << 2);
          				asm("movsd");
          				asm("movsd");
          				asm("movsd");
          				asm("movsw");
          				asm("movsb");
          				_t95 = _v26;
          				if((_t95 & 0x00000008) != 0) {
          					_v20 = 1;
          					_v26 = _t95 >> 0x00000001 & 0x00000078 | _t95 & 0x000000f7;
          				}
          				_t123 = _t118 + 0x1c;
          				_v16 = 1;
          				_v16 = _v16 - _t118;
          				_a4 = 0x18;
          				_v12 = 0x1c;
          				_v24 = _t123;
          				do {
          					_t97 = _v16 + _t123;
          					asm("cdq");
          					_t171 = 6;
          					_t98 = _t97 / _t171;
          					if(_t97 % _t171 != 0) {
          						_v8 = 0xe;
          						_t99 = 0;
          						do {
          							_t173 = _t183 + _v8 - 0x24;
          							_t126 = _t99 << 0x00000008 |  *_t173 & 0x000000ff;
          							_t101 = _t126;
          							_t155 = 0x18;
          							_t35 =  &_v8;
          							 *_t35 = _v8 - 1;
          							 *_t173 = _t101 / _t155;
          							_t99 = _t101 % _t155;
          						} while ( *_t35 >= 0);
          						if(_v20 != 0) {
          							if(_a4 >= 0) {
          								_t182 = _t155;
          								 *((char*)(_t183 + _a4 - 0x80)) =  *((intOrPtr*)(_t183 + _t126 % _t182 - 0x40));
          							}
          							_a4 = _a4 - 1;
          						}
          						_t127 = 0x18;
          						_t123 = _v24;
          						_t174 = _t126 % _t127;
          						_t98 =  *((intOrPtr*)(_t183 + _t174 - 0x40));
          						 *_t123 = _t98;
          						_v8 = _t174;
          					} else {
          						 *_t123 = 0x2d;
          					}
          					_v12 = _v12 - 1;
          					_t123 = _t123 - 1;
          					_v24 = _t123;
          				} while (_v12 >= 0);
          				if(_v20 != 0) {
          					_t175 = _v8;
          					if(_t175 < 0x1e) {
          						_v388 = 0;
          						memset( &_v387, 0, 0xfe);
          						memcpy( &_v388,  &_v131, _t175);
          						_t110 = _t183 + _t175 - 0x7f;
          						 *((char*)(_t183 + _t175 - 0x180)) = 0x4e;
          						_t145 = _t110;
          						do {
          							_t128 =  *_t110;
          							_t110 = _t110 + 1;
          						} while (_t128 != 0);
          						_t111 = _t110 - _t145;
          						_t157 =  &_v388 - 1;
          						do {
          							_t129 =  *(_t157 + 1);
          							_t157 = _t157 + 1;
          						} while (_t129 != 0);
          						_t131 = _t111 >> 2;
          						_t176 = _t145;
          						_t113 = memcpy(_t176 + _t131 + _t131, _t176, memcpy(_t157, _t176, _t131 << 2) & 0x00000003);
          						asm("movsd");
          						asm("movsb");
          						asm("movsd");
          						asm("movsb");
          						asm("movsd");
          						asm("movsb");
          						asm("movsd");
          						asm("movsb");
          						asm("movsd");
          						 *((char*)(_t118 + 5)) = 0x2d;
          						 *((char*)(_t118 + 0xb)) = 0x2d;
          						 *((char*)(_t118 + 0x11)) = 0x2d;
          						 *((char*)(_t118 + 0x17)) = 0x2d;
          						asm("movsb");
          						 *((char*)(_t118 + 0x1d)) = 0;
          						return _t113;
          					}
          				}
          				return _t98;
          			}














































          0x0040a877
          0x0040a884
          0x0040a88d
          0x0040a894
          0x0040a897
          0x0040a89a
          0x0040a8a1
          0x0040a8a2
          0x0040a8b1
          0x0040a8b4
          0x0040a8b9
          0x0040a8ba
          0x0040a8bb
          0x0040a8bc
          0x0040a8be
          0x0040a8bf
          0x0040a8c7
          0x0040a8d4
          0x0040a8d7
          0x0040a8d7
          0x0040a8da
          0x0040a8dd
          0x0040a8e0
          0x0040a8e3
          0x0040a8ea
          0x0040a8f1
          0x0040a8f4
          0x0040a8f7
          0x0040a8fb
          0x0040a8fc
          0x0040a8fd
          0x0040a901
          0x0040a908
          0x0040a90f
          0x0040a911
          0x0040a916
          0x0040a920
          0x0040a926
          0x0040a928
          0x0040a92b
          0x0040a92b
          0x0040a92e
          0x0040a930
          0x0040a930
          0x0040a938
          0x0040a93e
          0x0040a945
          0x0040a94f
          0x0040a94f
          0x0040a953
          0x0040a953
          0x0040a95a
          0x0040a95f
          0x0040a962
          0x0040a964
          0x0040a968
          0x0040a96a
          0x0040a903
          0x0040a903
          0x0040a903
          0x0040a96d
          0x0040a970
          0x0040a975
          0x0040a975
          0x0040a982
          0x0040a988
          0x0040a98e
          0x0040a9a2
          0x0040a9a9
          0x0040a9ba
          0x0040a9bf
          0x0040a9c6
          0x0040a9ce
          0x0040a9d0
          0x0040a9d0
          0x0040a9d2
          0x0040a9d3
          0x0040a9dd
          0x0040a9df
          0x0040a9e0
          0x0040a9e0
          0x0040a9e3
          0x0040a9e4
          0x0040a9ea
          0x0040a9ed
          0x0040a9f6
          0x0040aa00
          0x0040aa01
          0x0040aa0b
          0x0040aa0c
          0x0040aa16
          0x0040aa17
          0x0040aa21
          0x0040aa22
          0x0040aa2c
          0x0040aa2d
          0x0040aa31
          0x0040aa35
          0x0040aa39
          0x0040aa3d
          0x0040aa3e
          0x00000000
          0x0040aa3e
          0x0040a98e
          0x0040aa45

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$memcpy
          • String ID: -$-$-$-$BCDFGHJKMPQRTVWXY2346789$N
          • API String ID: 368790112-290593145
          • Opcode ID: 6234dd5b282ead6a4b6fa16e9340903ba4a9d7abc0c46a715f62a906365b06bc
          • Instruction ID: be0272b2efbbd6c10dabd1d3c91be8c75acc4c0b7bfd47c7a7399edc3e37da8e
          • Opcode Fuzzy Hash: 6234dd5b282ead6a4b6fa16e9340903ba4a9d7abc0c46a715f62a906365b06bc
          • Instruction Fuzzy Hash: C251CE31A042599FDF15CE68C8047DFBBB1AF55304F1484AAE844BB282D7B5AB4ACB91
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 87%
          			E0040B48A(intOrPtr* __ecx, void* __edi, intOrPtr _a4, intOrPtr _a8) {
          				intOrPtr* _v8;
          				void _v1031;
          				void _v1032;
          				void _v2055;
          				char _v2056;
          				void _v3079;
          				char _v3080;
          				void* __ebx;
          				void* __esi;
          				void* _t39;
          				void* _t45;
          				signed int _t48;
          				void* _t50;
          				void* _t58;
          				void* _t59;
          				intOrPtr _t62;
          				intOrPtr _t63;
          
          				_t50 = __edi;
          				_v8 = __ecx;
          				E004017CD(__ecx, _a4);
          				_v1032 = 0;
          				memset( &_v1031, 0, 0x3ff);
          				_v2056 = 0;
          				memset( &_v2055, 0, 0x3ff);
          				_v3080 = 0;
          				memset( &_v3079, 0, 0x3ff);
          				_t59 = _t58 + 0x28;
          				_t62 =  *0x4128f0; // 0x0
          				if(_t62 != 0) {
          					sprintf( &_v2056, "<meta http-equiv=\'content-type\' content=\'text/html;charset=%s\'>", 0x4128f0);
          					_t59 = _t59 + 0xc;
          				}
          				_t63 =  *0x4128ec; // 0x0
          				if(_t63 != 0) {
          					_push(_t50);
          					_t48 = 7;
          					memcpy( &_v1032, "<table dir=\"rtl\"><tr><td>\r\n", _t48 << 2);
          					_t59 = _t59 + 0xc;
          				}
          				E00401782(_a4,  *((intOrPtr*)( *_v8 + 0x1c))(),  &_v2056,  &_v1032);
          				_push("ProduKey");
          				_t45 = 6;
          				_push(E00407C3F(_t45));
          				sprintf( &_v3080, "<br><h4>%s <a href=\"http://www.nirsoft.net/\" target=\"newwin\">%s</a></h4><p>");
          				_t39 = E004096D5(_v8, _a4,  &_v3080);
          				_t64 = _a8 - 4;
          				if(_a8 == 4) {
          					return E00405761(_v8, _t64, _a4);
          				}
          				return _t39;
          			}




















          0x0040b48a
          0x0040b498
          0x0040b49b
          0x0040b4b0
          0x0040b4b6
          0x0040b4c4
          0x0040b4ca
          0x0040b4d8
          0x0040b4de
          0x0040b4e3
          0x0040b4e6
          0x0040b4ec
          0x0040b4ff
          0x0040b504
          0x0040b504
          0x0040b507
          0x0040b50d
          0x0040b50f
          0x0040b512
          0x0040b51e
          0x0040b51e
          0x0040b520
          0x0040b53b
          0x0040b543
          0x0040b54a
          0x0040b550
          0x0040b55d
          0x0040b56c
          0x0040b574
          0x0040b578
          0x00000000
          0x0040b580
          0x0040b588

          APIs
          Strings
          • ProduKey, xrefs: 0040B543
          • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 0040B4F9
          • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 0040B557
          • <table dir="rtl"><tr><td>, xrefs: 0040B513
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$sprintf
          • String ID: <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>$ProduKey
          • API String ID: 1905644873-4049021796
          • Opcode ID: 778b35b1de36561c8a15e4ac573c118ea7b29f4b81876604b5700a31cfb043f7
          • Instruction ID: 12a8dd2a83f90a446e50023e9b62def618514604d974679ae29f97422011508a
          • Opcode Fuzzy Hash: 778b35b1de36561c8a15e4ac573c118ea7b29f4b81876604b5700a31cfb043f7
          • Instruction Fuzzy Hash: 8A21A6B2D01158BADB20EB65CD41EDB77ACEB14308F0440F6B608B3191D6399F58CFA9
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 76%
          			E0040BF30(intOrPtr _a4, intOrPtr _a8, void* _a12) {
          				int _v12;
          				int _v16;
          				int _v20;
          				int _v24;
          				char _v271;
          				void _v279;
          				char _v280;
          				void _v583;
          				char _v584;
          				char _v1608;
          				long _t42;
          				char* _t43;
          				void* _t51;
          				unsigned int _t52;
          				void _t59;
          				void _t60;
          				signed int _t62;
          				void* _t67;
          				int* _t68;
          				void* _t71;
          				void* _t78;
          				void* _t79;
          				void* _t80;
          				void* _t81;
          
          				_t68 = 0;
          				_v280 = 0;
          				memset( &_v279, 0, 0xff);
          				_t80 = _t79 + 0xc;
          				_v16 = 0xff;
          				_v20 = 0;
          				_v24 = 0x3ff;
          				_v12 = 0;
          				_t42 = RegEnumValueA(_a12, 0,  &_v280,  &_v16, 0,  &_v20,  &_v1608,  &_v24);
          				while(_t42 == 0) {
          					_push(9);
          					_t43 =  &_v280;
          					_push("productid");
          					_push(_t43);
          					L0040108C();
          					_t80 = _t80 + 0xc;
          					if(_t43 == 0) {
          						memset( &_v583, _t68, 0x12b);
          						asm("movsd");
          						asm("movsd");
          						asm("movsd");
          						asm("movsd");
          						_t51 =  &_v271;
          						_t81 = _t80 + 0xc;
          						asm("movsb");
          						_t67 = _t51;
          						do {
          							_t59 =  *_t51;
          							_t51 = _t51 + 1;
          						} while (_t59 != 0);
          						_t52 = _t51 - _t67;
          						_t71 =  &_v584 - 1;
          						do {
          							_t60 =  *(_t71 + 1);
          							_t71 = _t71 + 1;
          						} while (_t60 != 0);
          						_t62 = _t52 >> 2;
          						_t78 = _t67;
          						memcpy(_t78 + _t62 + _t62, _t78, memcpy(_t71, _t78, _t62 << 2) & 0x00000003);
          						_t80 = _t81 + 0x18;
          						E0040B8BD(0, _a4, _a8, _a12,  &_v280, _a12,  &_v584, 4, 0x40f469, 0x40f469, 0x40f469, 1);
          						_t68 = 0;
          					}
          					_v12 = _v12 + 1;
          					_t42 = RegEnumValueA(_a12, _v12,  &_v280,  &_v16, _t68,  &_v20,  &_v1608,  &_v24);
          				}
          				return _t42;
          			}



























          0x0040bf42
          0x0040bf4c
          0x0040bf53
          0x0040bf58
          0x0040bf7a
          0x0040bf7d
          0x0040bf80
          0x0040bf87
          0x0040bf8a
          0x0040bf92
          0x0040bf9d
          0x0040bf9f
          0x0040bfa5
          0x0040bfaa
          0x0040bfab
          0x0040bfb0
          0x0040bfb5
          0x0040bfc4
          0x0040bfd4
          0x0040bfd5
          0x0040bfd6
          0x0040bfd7
          0x0040bfd8
          0x0040bfde
          0x0040bfe1
          0x0040bfe2
          0x0040bfe4
          0x0040bfe4
          0x0040bfe6
          0x0040bfe7
          0x0040bff1
          0x0040bff3
          0x0040bff4
          0x0040bff4
          0x0040bff7
          0x0040bff8
          0x0040c003
          0x0040c008
          0x0040c028
          0x0040c028
          0x0040c02d
          0x0040c032
          0x0040c032
          0x0040c034
          0x0040c058
          0x0040c05e
          0x0040c06a

          APIs
          • memset.MSVCRT ref: 0040BF53
          • RegEnumValueA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,?), ref: 0040BF8A
          • _strnicmp.MSVCRT ref: 0040BFAB
          • memset.MSVCRT ref: 0040BFC4
          • RegEnumValueA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,000003FF), ref: 0040C058
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: EnumValuememset$_strnicmp
          • String ID: DigitalProductID$productid
          • API String ID: 122006098-3158503407
          • Opcode ID: e4dbb91b9a3dc3db13993cf8e91e5e521a3c96c3a7a9c64e8599efa7cd0b86d2
          • Instruction ID: ded00ab1c49dcf52826af456cbea8e792decb2087d77f508eba27fd8bb73ba88
          • Opcode Fuzzy Hash: e4dbb91b9a3dc3db13993cf8e91e5e521a3c96c3a7a9c64e8599efa7cd0b86d2
          • Instruction Fuzzy Hash: A4317C7290011EABDB21DE95CC41FEFB7BDEF54704F0040B6BA18F6150E7719A588BA4
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 78%
          			E00407E46(void* __ecx, void* __eflags, struct HWND__* _a4) {
          				void _v259;
          				char _v260;
          				void _v4359;
          				char _v4360;
          				int _t17;
          				CHAR* _t26;
          
          				E0040EAD0(0x1104, __ecx);
          				_v4360 = 0;
          				memset( &_v4359, 0, 0x1000);
          				_t17 = GetDlgCtrlID(_a4);
          				_t35 = _t17;
          				GetWindowTextA(_a4,  &_v4360, 0x1000);
          				if(_t17 > 0 && _v4360 != 0) {
          					_v260 = 0;
          					memset( &_v259, 0, 0xff);
          					GetClassNameA(_a4,  &_v260, 0xff);
          					_t26 =  &_v260;
          					_push("sysdatetimepick32");
          					_push(_t26);
          					L0040107A();
          					if(_t26 != 0) {
          						E00407993(_t35,  &_v4360);
          					}
          				}
          				return 1;
          			}









          0x00407e4e
          0x00407e66
          0x00407e6c
          0x00407e77
          0x00407e7d
          0x00407e8a
          0x00407e92
          0x00407eaa
          0x00407eb0
          0x00407ec3
          0x00407ec9
          0x00407ecf
          0x00407ed4
          0x00407ed5
          0x00407ede
          0x00407ee8
          0x00407eee
          0x00407ede
          0x00407ef6

          APIs
          • memset.MSVCRT ref: 00407E6C
          • GetDlgCtrlID.USER32(?), ref: 00407E77
          • GetWindowTextA.USER32 ref: 00407E8A
          • memset.MSVCRT ref: 00407EB0
          • GetClassNameA.USER32(?,?,000000FF), ref: 00407EC3
          • _stricmp.MSVCRT(?,sysdatetimepick32), ref: 00407ED5
            • Part of subcall function 00407993: _itoa.MSVCRT ref: 004079B4
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$ClassCtrlNameTextWindow_itoa_stricmp
          • String ID: sysdatetimepick32
          • API String ID: 896699463-4169760276
          • Opcode ID: 2f645697545001dd0d580fc77fc6236cdcc8ee29f3f06962c495c1c78859140a
          • Instruction ID: 002409b2ff2b35f88df28a0fb8a32fe212527c33e95a4f591c4e010e06ff33fa
          • Opcode Fuzzy Hash: 2f645697545001dd0d580fc77fc6236cdcc8ee29f3f06962c495c1c78859140a
          • Instruction Fuzzy Hash: B7110A72D051196EE721EB55DC81EEE37ACEF18304F0400FBFA08F2551E6799E848B64
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 93%
          			E0040AEF5(intOrPtr __ecx, void* __eflags, void* _a4, intOrPtr _a8) {
          				void* _v8;
          				signed int _v12;
          				intOrPtr _v16;
          				intOrPtr _v20;
          				char _v36;
          				char _v428;
          				char _v557;
          				char _v686;
          				char _v815;
          				char _v944;
          				char _v956;
          				char _v1980;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				void* _t44;
          				long _t47;
          				void* _t50;
          				void* _t79;
          				intOrPtr _t85;
          				void* _t92;
          				void* _t93;
          				void* _t94;
          
          				_v12 = _v12 & 0x00000000;
          				_v16 = __ecx;
          				_v1980 = 0;
          				_t44 = E00401EC5(0x3ff, _a4, 0,  &_v1980);
          				_t93 = _t92 + 0xc;
          				if(_t44 != 0) {
          					return _t44;
          				}
          				do {
          					_v8 = _v8 & 0x00000000;
          					_t47 = RegOpenKeyExA(_a4,  &_v1980, 0, 0x20019,  &_v8);
          					_t97 = _t47;
          					if(_t47 == 0) {
          						_t85 = _a8;
          						_t77 = _v16;
          						E0040AEF5(_v16, _t97, _v8, _t85 + 1);
          						if(_t85 >= 0) {
          							E0040A80B( &_v956);
          							E00401F0A(0x80, _t77,  &_v686, _v8, "SerialNumber");
          							_pop(_t79);
          							if(_v686 != 0) {
          								E00401F0A(0x80, _t79,  &_v815, _v8, "ProductCode");
          								E00401F0A(0x80, _t79,  &_v944, _v8, "ProductName");
          								E00401F0A(0x104, _t79,  &_v428, _v8, "Location");
          								_t94 = _t93 + 0x18;
          								if(_v944 == 0) {
          									E00409476(0x80,  &_v944,  &_v1980);
          									_pop(_t79);
          								}
          								_v20 = 8;
          								E00401DEC(_v8,  &_v36);
          								E00409476(0x80,  &_v557, _v16 + 0x768);
          								_t93 = _t94 + 0xc;
          								E00405DE7(_v16, _t79,  &_v956);
          							}
          						}
          						RegCloseKey(_v8);
          					}
          					_v12 = _v12 + 1;
          					_t50 = E00401EC5(0x3ff, _a4, _v12,  &_v1980);
          					_t93 = _t93 + 0xc;
          				} while (_t50 == 0);
          				return _t50;
          			}


























          0x0040aefe
          0x0040af13
          0x0040af16
          0x0040af1d
          0x0040af22
          0x0040af27
          0x0040b071
          0x0040b071
          0x0040af35
          0x0040af35
          0x0040af4e
          0x0040af54
          0x0040af56
          0x0040af5c
          0x0040af5f
          0x0040af69
          0x0040af70
          0x0040af7c
          0x0040af91
          0x0040af9e
          0x0040af9f
          0x0040afb5
          0x0040afca
          0x0040afe2
          0x0040afe7
          0x0040aff1
          0x0040b000
          0x0040b005
          0x0040b005
          0x0040b00d
          0x0040b014
          0x0040b028
          0x0040b02d
          0x0040b03a
          0x0040b03a
          0x0040af9f
          0x0040b042
          0x0040b042
          0x0040b048
          0x0040b05d
          0x0040b062
          0x0040b065
          0x00000000

          APIs
            • Part of subcall function 00401EC5: RegEnumKeyExA.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?), ref: 00401EE4
          • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020019,00000000), ref: 0040AF4E
            • Part of subcall function 0040AEF5: RegCloseKey.ADVAPI32(00000000), ref: 0040B042
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: CloseEnumOpen
          • String ID: Location$ProductCode$ProductName$SerialNumber
          • API String ID: 1332880857-3150285382
          • Opcode ID: 3b0a12e50cef74caee93ee181dda03b1001e0fef77cd8e9b5b7477cef9444fcd
          • Instruction ID: 9fa157b7ef48736957d423d201b5757fea497bdd6292b4b657393e42b22838a1
          • Opcode Fuzzy Hash: 3b0a12e50cef74caee93ee181dda03b1001e0fef77cd8e9b5b7477cef9444fcd
          • Instruction Fuzzy Hash: 15414D72D00219AFDF61AB55DC41BDDB7B8EF04304F1040B6A904B2192DB386F89DF9A
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 57%
          			E0040BA61(void* __ecx) {
          				void* __ebx;
          				intOrPtr _t22;
          				char* _t23;
          				void* _t24;
          				void* _t25;
          				void* _t26;
          				void* _t27;
          				void* _t28;
          				intOrPtr _t36;
          				char* _t44;
          				void* _t46;
          				intOrPtr _t54;
          				char* _t58;
          				void* _t61;
          				void* _t63;
          
          				_t61 = _t63 - 0x70;
          				_t44 =  *(_t61 + 0x7c);
          				_t56 = __ecx;
          				_t22 =  *((intOrPtr*)(_t61 + 0x78));
          				 *_t44 = 0;
          				if(_t22 == 0) {
          					_t23 = __ecx + 0xc;
          					L22:
          					return _t23;
          				}
          				_t24 = _t22 - 1;
          				if(_t24 == 0) {
          					_t23 = __ecx + 0x8d;
          					goto L22;
          				}
          				_t25 = _t24 - 1;
          				if(_t25 == 0) {
          					_t58 = __ecx + 0x10e;
          					_push("BBBBB-BBBBB-BBBBB-BBBBB-BBBBB");
          					_push(_t58);
          					L00401080();
          					if(_t25 != 0) {
          						_t23 = _t58;
          					} else {
          						_t46 = 0x10;
          						_t23 = E00407C3F(_t46);
          					}
          					goto L22;
          				}
          				_t26 = _t25 - 1;
          				if(_t26 == 0) {
          					_t23 = __ecx + 0x210;
          					goto L22;
          				}
          				_t27 = _t26 - 1;
          				if(_t27 == 0) {
          					_t23 = __ecx + 0x315;
          					goto L22;
          				}
          				_t28 = _t27 - 1;
          				if(_t28 == 0) {
          					_t54 =  *((intOrPtr*)(__ecx + 0x3a0));
          					if(_t54 == 0) {
          						_t23 = __ecx + 0x18f;
          						goto L22;
          					}
          					 *((char*)(_t61 - 0x18)) = 0;
          					memset(_t61 - 0x17, 0, 0x7f);
          					_push(_t54);
          					_push(_t61 - 0x18);
          					E0040AAE7();
          					sprintf(_t44, "%s (%s)", _t56 + 0x18f, _t61 - 0x18);
          					goto L13;
          				} else {
          					if(_t28 == 1) {
          						_t36 =  *0x4126f8; // 0xbc25b0
          						if( *((intOrPtr*)(_t36 + 0x58c)) != 0) {
          							 *(_t61 + 0x68) =  *(__ecx + 0x398);
          							 *((intOrPtr*)(_t61 + 0x6c)) =  *((intOrPtr*)(__ecx + 0x39c));
          						} else {
          							FileTimeToLocalFileTime(__ecx + 0x398, _t61 + 0x68);
          						}
          						_push(_t44);
          						E00408F8A(_t61 + 0x68);
          					}
          					L13:
          					_t23 = _t44;
          					goto L22;
          				}
          			}


















          0x0040ba62
          0x0040ba70
          0x0040ba74
          0x0040ba78
          0x0040ba7b
          0x0040ba7d
          0x0040bb68
          0x0040bb6b
          0x0040bb72
          0x0040bb72
          0x0040ba83
          0x0040ba84
          0x0040bb60
          0x00000000
          0x0040bb60
          0x0040ba8a
          0x0040ba8b
          0x0040bb3b
          0x0040bb41
          0x0040bb46
          0x0040bb47
          0x0040bb50
          0x0040bb5c
          0x0040bb52
          0x0040bb54
          0x0040bb55
          0x0040bb55
          0x00000000
          0x0040bb50
          0x0040ba91
          0x0040ba92
          0x0040bb33
          0x00000000
          0x0040bb33
          0x0040ba98
          0x0040ba99
          0x0040bb2b
          0x00000000
          0x0040bb2b
          0x0040ba9f
          0x0040baa0
          0x0040bae3
          0x0040baeb
          0x0040bb23
          0x00000000
          0x0040bb23
          0x0040baf4
          0x0040baf7
          0x0040baff
          0x0040bb00
          0x0040bb01
          0x0040bb17
          0x00000000
          0x0040baa2
          0x0040baa3
          0x0040baa5
          0x0040bab0
          0x0040bacb
          0x0040bad4
          0x0040bab2
          0x0040babd
          0x0040babd
          0x0040bad7
          0x0040badb
          0x0040bae0
          0x0040bb1f
          0x0040bb1f
          0x00000000
          0x0040bb1f

          APIs
          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0040BABD
          • memset.MSVCRT ref: 0040BAF7
          • sprintf.MSVCRT ref: 0040BB17
          • _stricmp.MSVCRT(?,BBBBB-BBBBB-BBBBB-BBBBB-BBBBB), ref: 0040BB47
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: FileTime$Local_stricmpmemsetsprintf
          • String ID: %s (%s)$BBBBB-BBBBB-BBBBB-BBBBB-BBBBB
          • API String ID: 4101006872-1976196928
          • Opcode ID: e35bc464ce63c23f2551731cee8dc18f3ee7e47a91196a29afc57797713ace9e
          • Instruction ID: 3677dd148965493d53ce516f5a8301e290d6a33004366d8288dd37aa27c60dae
          • Opcode Fuzzy Hash: e35bc464ce63c23f2551731cee8dc18f3ee7e47a91196a29afc57797713ace9e
          • Instruction Fuzzy Hash: 28316C31A046099BC734DB248881AEB77B8EB14304F54043BF55AF36D5EB7CB9458BAD
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040197B(void* __eax, void* __eflags) {
          				char _v1027;
          				char _v1028;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				char* _t17;
          				char* _t18;
          				char* _t21;
          				char* _t25;
          				void* _t39;
          
          				_t39 = __eax;
          				_v1028 = 0;
          				memset( &_v1027, 0, 0x3ff);
          				if(E00402134( &_v1028, 0x80000000, "http\\shell\\open\\command", 0x40f469, 0x3ff) == 0 || _v1028 == 0) {
          					L12:
          					return 0;
          				} else {
          					if(_v1028 != 0x22) {
          						_t17 = strrchr( &_v1027, 0x5c);
          						if(_t17 == 0) {
          							goto L12;
          						}
          						_t18 = strchr(_t17, 0x20);
          						if(_t18 != 0) {
          							 *_t18 = 0;
          						}
          						if(E00409396( &_v1028) == 0) {
          							goto L12;
          						} else {
          							_t21 =  &_v1028;
          							L6:
          							E00409476(0x104, _t39, _t21);
          							return 1;
          						}
          					}
          					_t25 = strchr( &_v1027, 0x22);
          					if(_t25 == 0) {
          						goto L12;
          					}
          					 *_t25 = 0;
          					if(E00409396( &_v1027) == 0) {
          						goto L12;
          					}
          					_t21 =  &_v1027;
          					goto L6;
          				}
          			}













          0x0040198f
          0x00401999
          0x0040199f
          0x004019c4
          0x00401a50
          0x00000000
          0x004019d2
          0x004019df
          0x00401a1c
          0x00401a25
          0x00000000
          0x00000000
          0x00401a2a
          0x00401a33
          0x00401a35
          0x00401a35
          0x00401a46
          0x00000000
          0x00401a48
          0x00401a48
          0x00401a08
          0x00401a0e
          0x00000000
          0x00401a16
          0x00401a46
          0x004019e4
          0x004019ed
          0x00000000
          0x00000000
          0x004019ef
          0x00401a00
          0x00000000
          0x00000000
          0x00401a02
          0x00000000
          0x00401a02

          APIs
          • memset.MSVCRT ref: 0040199F
            • Part of subcall function 00402134: RegCloseKey.KERNELBASE(?,000003FF), ref: 0040216E
          • strchr.MSVCRT ref: 004019E4
            • Part of subcall function 00409396: GetFileAttributesA.KERNELBASE(}@,0040791C,00000000,?,00407DE3), ref: 0040939A
          • strrchr.MSVCRT ref: 00401A1C
          • strchr.MSVCRT ref: 00401A2A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: strchr$AttributesCloseFilememsetstrrchr
          • String ID: "$http\shell\open\command
          • API String ID: 1162287896-1950826730
          • Opcode ID: d1c773c073627adbf29546af093c200f2fe3b1194ac23ce3381b8b3f125a5929
          • Instruction ID: 6e59d34447f748108a54929566104150787b734e98c39b168f745e8c94178a70
          • Opcode Fuzzy Hash: d1c773c073627adbf29546af093c200f2fe3b1194ac23ce3381b8b3f125a5929
          • Instruction Fuzzy Hash: B7212472F0A2556DEB20A2B14C41BAB679CDF00358F1404BBFB05F21D2EA3C9E494E2D
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 42%
          			E00407EF9(void* __ecx, void* __eflags, struct tagMENUITEMINFOA _a4, struct HMENU__* _a8, intOrPtr _a12, int _a20, intOrPtr _a24, char* _a40, int _a44, char _a52, void _a53) {
          				int _v0;
          				int _t26;
          				char* _t32;
          				intOrPtr _t34;
          				int _t44;
          				signed int _t46;
          				signed int _t47;
          
          				_t38 = __ecx;
          				_t47 = _t46 & 0xfffffff8;
          				E0040EAD0(0x1040, __ecx);
          				_t26 = GetMenuItemCount(_a8);
          				_t44 = 0;
          				_v0 = _t26;
          				if(_t26 <= 0) {
          					L13:
          					return _t26;
          				} else {
          					goto L1;
          				}
          				do {
          					L1:
          					memset( &_a53, 0, 0x1000);
          					_t47 = _t47 + 0xc;
          					_a40 =  &_a52;
          					_a4.cbSize = 0x30;
          					_a8 = 0x36;
          					_a44 = 0x1000;
          					_a20 = 0;
          					_a52 = 0;
          					_t26 = GetMenuItemInfoA(_a8, _t44, 1,  &_a4);
          					if(_t26 == 0) {
          						goto L12;
          					}
          					if(_a52 == 0) {
          						L10:
          						_t55 = _a24;
          						if(_a24 != 0) {
          							_push(0);
          							_push(_a24);
          							_push(_a4.cbSize);
          							_t26 = E00407EF9(_t38, _t55);
          							_t47 = _t47 + 0xc;
          						}
          						goto L12;
          					}
          					_t32 = strchr( &_a52, 9);
          					if(_t32 != 0) {
          						 *_t32 = 0;
          					}
          					_t33 = _a20;
          					if(_a24 != 0) {
          						if(_a12 == 0) {
          							 *0x41279c =  *0x41279c + 1;
          							_t34 =  *0x41279c; // 0x0
          							_t33 = _t34 + 0x11558;
          							__eflags = _t34 + 0x11558;
          						} else {
          							_t18 = _t44 + 0x11171; // 0x11171
          							_t33 = _t18;
          						}
          					}
          					_t26 = E00407993(_t33,  &_a52);
          					_pop(_t38);
          					goto L10;
          					L12:
          					_t44 = _t44 + 1;
          				} while (_t44 < _v0);
          				goto L13;
          			}










          0x00407ef9
          0x00407efc
          0x00407f04
          0x00407f0e
          0x00407f16
          0x00407f1a
          0x00407f1e
          0x00407fe3
          0x00407fe8
          0x00000000
          0x00000000
          0x00000000
          0x00407f24
          0x00407f24
          0x00407f2f
          0x00407f34
          0x00407f3b
          0x00407f4a
          0x00407f52
          0x00407f5a
          0x00407f62
          0x00407f66
          0x00407f6a
          0x00407f72
          0x00000000
          0x00000000
          0x00407f78
          0x00407fc2
          0x00407fc2
          0x00407fc6
          0x00407fc8
          0x00407fc9
          0x00407fcd
          0x00407fd0
          0x00407fd5
          0x00407fd5
          0x00000000
          0x00407fc6
          0x00407f81
          0x00407f8a
          0x00407f8c
          0x00407f8c
          0x00407f92
          0x00407f96
          0x00407f9b
          0x00407fa5
          0x00407fab
          0x00407fb0
          0x00407fb0
          0x00407f9d
          0x00407f9d
          0x00407f9d
          0x00407f9d
          0x00407f9b
          0x00407fbb
          0x00407fc1
          0x00000000
          0x00407fd8
          0x00407fd8
          0x00407fd9
          0x00000000

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ItemMenu$CountInfomemsetstrchr
          • String ID: 0$6
          • API String ID: 2300387033-3849865405
          • Opcode ID: bc7a620c73af99c1b323adf13958f74d25821cc529af0c635c1f720489260e74
          • Instruction ID: 128be8fb5cc611165b0733850d53bdbb1440fa96cd5a04a54b621966ed798803
          • Opcode Fuzzy Hash: bc7a620c73af99c1b323adf13958f74d25821cc529af0c635c1f720489260e74
          • Instruction Fuzzy Hash: D7219F7190C385AFDB108F15C881A9BB7E8FB88344F44493EF584A62D0E779E954CB5B
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 90%
          			E00403F29(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
          				char _v8;
          				char* _v12;
          				intOrPtr _v16;
          				intOrPtr _v20;
          				intOrPtr _v24;
          				intOrPtr _v28;
          				intOrPtr _v32;
          				char* _v36;
          				intOrPtr _v40;
          				char* _v44;
          				intOrPtr _v48;
          				intOrPtr _v52;
          				intOrPtr _v56;
          				intOrPtr _v60;
          				intOrPtr _v64;
          				intOrPtr _v68;
          				char _v72;
          				void _v1095;
          				char _v1096;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				char _t29;
          				intOrPtr _t32;
          				void* _t38;
          				void* _t40;
          				void* _t52;
          				char _t58;
          				char* _t59;
          
          				_v1096 = 0;
          				memset( &_v1095, 0, 0x3ff);
          				_v8 = 0x747874;
          				_t29 = E00407C3F(0x1f5);
          				_t58 = "*.txt";
          				_v72 = _t29;
          				_v68 = _t58;
          				_v64 = E00407C3F(0x1f6);
          				_v60 = _t58;
          				_v56 = E00407C3F(0x1f7);
          				_v52 = _t58;
          				_t32 = E00407C3F(0x1f8);
          				_t59 = "*.htm;*.html";
          				_v48 = _t32;
          				_v44 = _t59;
          				_v40 = E00407C3F(0x1f9);
          				_v36 = _t59;
          				_v32 = E00407C3F(0x1fa);
          				_v28 = "*.xml";
          				_v24 = E00407C3F(0x1fb);
          				_v20 = "*.csv";
          				_v16 = E00407C3F(0x1fc);
          				_push( &_v72);
          				_t38 = 8;
          				_t56 =  &_v1096;
          				_v12 = "*.json";
          				E00408B73(_t38,  &_v1096);
          				_t52 = 7;
          				_t40 = E00407C3F(_t52);
          				_t23 =  &_v8; // 0x747874
          				_t26 = _a4 + 0x108; // 0x7379654b
          				return E00408D55( *_t26, _a12, _a8, _t56, _t40, _t23);
          			}
































          0x00403f43
          0x00403f4a
          0x00403f57
          0x00403f5e
          0x00403f63
          0x00403f69
          0x00403f6c
          0x00403f79
          0x00403f7c
          0x00403f85
          0x00403f88
          0x00403f8b
          0x00403f90
          0x00403f9a
          0x00403f9d
          0x00403fa6
          0x00403fa9
          0x00403fb6
          0x00403fb9
          0x00403fc6
          0x00403fc9
          0x00403fd5
          0x00403fdb
          0x00403fde
          0x00403fdf
          0x00403fe5
          0x00403fec
          0x00403ff4
          0x00403ff5
          0x00403ffd
          0x0040400b
          0x0040401d

          APIs
          • memset.MSVCRT ref: 00403F4A
            • Part of subcall function 00407C3F: GetModuleHandleA.KERNEL32(00000000,?,?,?,004074B9,?,00000000), ref: 00407C68
            • Part of subcall function 00407C3F: LoadStringA.USER32 ref: 00407CF2
            • Part of subcall function 00407C3F: memcpy.MSVCRT ref: 00407D31
            • Part of subcall function 00407C3F: GetModuleHandleA.KERNEL32(00000000,?,?,004074B9,?,00000000), ref: 00407CC7
            • Part of subcall function 00408B73: memset.MSVCRT ref: 00408B96
            • Part of subcall function 00408B73: sprintf.MSVCRT ref: 00408BCB
            • Part of subcall function 00408B73: memcpy.MSVCRT ref: 00408BF6
            • Part of subcall function 00408B73: memcpy.MSVCRT ref: 00408C20
            • Part of subcall function 00408D55: GetSaveFileNameA.COMDLG32(?), ref: 00408DA4
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memcpy$HandleModulememset$FileLoadNameSaveStringsprintf
          • String ID: *.htm;*.html$*.txt$d$l$t$txt
          • API String ID: 2393846163-3349648381
          • Opcode ID: a7c13929c30cb576514a60836ce69b860cfd6933a9065d97f5b84c31690b4c7e
          • Instruction ID: 5abb5fe217e8adcb178f005a3a95b3df54ba3d664fd4bde60622f1d0f22f22e3
          • Opcode Fuzzy Hash: a7c13929c30cb576514a60836ce69b860cfd6933a9065d97f5b84c31690b4c7e
          • Instruction Fuzzy Hash: 7B2130B1D0421C9FDB10EFAAD841BDDBBB4BB08304F10447FE558B7281DB782A458B9A
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 64%
          			E0040972F(long __eax, void* __ecx, intOrPtr _a4) {
          				char _v8;
          				void* _t9;
          				void* _t10;
          				void* _t11;
          				void* _t13;
          				long _t15;
          				void _t20;
          				char _t21;
          				void* _t22;
          				void* _t24;
          				long _t26;
          				void* _t29;
          
          				_t26 = __eax;
          				_t1 = _t26 - 0x834; // -2100
          				_t9 = 0;
          				_t15 = 0x1100;
          				if(_t1 <= 0x383) {
          					_t9 = LoadLibraryExA("netmsg.dll", 0, 2);
          					if(0 != 0) {
          						_t15 = 0x1900;
          					}
          				}
          				_t10 = FormatMessageA(_t15, _t9, _t26, 0x400,  &_v8, 0, 0);
          				if(_t10 <= 0) {
          					asm("movsd");
          					asm("movsd");
          					asm("movsd");
          					asm("movsw");
          					goto L11;
          				} else {
          					_t29 = _v8;
          					_t11 = _t29;
          					_t4 = _t11 + 1; // 0x2
          					_t22 = _t4;
          					do {
          						_t20 =  *_t11;
          						_t11 = _t11 + 1;
          					} while (_t20 != 0);
          					if(_t11 - _t22 >= 0x400) {
          						L9:
          						_t10 = LocalFree(_t29);
          						L11:
          						return _t10;
          					}
          					_t13 = _t29;
          					_t24 = _a4 - _t29;
          					do {
          						_t21 =  *_t13;
          						 *((char*)(_t24 + _t13)) = _t21;
          						_t13 = _t13 + 1;
          					} while (_t21 != 0);
          					goto L9;
          				}
          			}















          0x00409736
          0x00409738
          0x00409740
          0x00409748
          0x0040974d
          0x00409757
          0x0040975f
          0x00409761
          0x00409761
          0x0040975f
          0x00409775
          0x0040977d
          0x004097b6
          0x004097b7
          0x004097b8
          0x004097b9
          0x00000000
          0x0040977f
          0x0040977f
          0x00409782
          0x00409784
          0x00409784
          0x00409787
          0x00409787
          0x00409789
          0x0040978a
          0x00409792
          0x004097a5
          0x004097a6
          0x004097bb
          0x004097bf
          0x004097bf
          0x00409797
          0x00409799
          0x0040979b
          0x0040979b
          0x0040979d
          0x004097a0
          0x004097a1
          0x00000000
          0x0040979b

          APIs
          • LoadLibraryExA.KERNEL32(netmsg.dll,00000000,00000002,00000000,00000000,00000000,?,Mqt,00409826,?,00000001), ref: 00409757
          • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,00000001,00000000,00000000,00000000,00000000,00000000,?,Mqt,00409826,?,00000001), ref: 00409775
          • LocalFree.KERNEL32(00000001,?,Mqt,00409826,?,00000001), ref: 004097A6
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: FormatFreeLibraryLoadLocalMessage
          • String ID: Unknown Error$netmsg.dll$Mqt
          • API String ID: 1325279722-46246100
          • Opcode ID: 412eca96e1c04b5d70236736187b1dd26c3e3df9f4897c000102b2503df2dc30
          • Instruction ID: 1ca6936c2ea6891eade7529bb53e59055be907e5d85f378e791af833a288d16b
          • Opcode Fuzzy Hash: 412eca96e1c04b5d70236736187b1dd26c3e3df9f4897c000102b2503df2dc30
          • Instruction Fuzzy Hash: CE116B36614110ABD3224E25CD58EAB7B5DDF87790B244071FD42FB382D5749D05C3E8
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 93%
          			E004094FE(void* _a4) {
          				void* _t7;
          				signed int _t13;
          				int _t15;
          				void* _t17;
          				void _t18;
          				void* _t20;
          				signed int _t22;
          				void* _t25;
          
          				_t25 = _a4;
          				_t22 = 0;
          				EmptyClipboard();
          				if(_t25 != 0) {
          					_t7 = _t25;
          					_t17 = _t7 + 1;
          					do {
          						_t18 =  *_t7;
          						_t7 = _t7 + 1;
          					} while (_t18 != 0);
          					_t15 = _t7 - _t17 + 1;
          					_t20 = GlobalAlloc(0x2000, _t15);
          					if(_t20 != 0) {
          						memcpy(GlobalLock(_t20), _t25, _t15);
          						GlobalUnlock(_t20);
          						_t13 = SetClipboardData(1, _t20);
          						asm("sbb esi, esi");
          						_t22 =  ~( ~_t13);
          					}
          				}
          				CloseClipboard();
          				return _t22;
          			}











          0x004094ff
          0x00409504
          0x00409506
          0x0040950e
          0x00409510
          0x00409512
          0x00409515
          0x00409515
          0x00409517
          0x00409518
          0x00409520
          0x0040952f
          0x00409533
          0x0040953f
          0x00409548
          0x00409551
          0x0040955b
          0x0040955d
          0x0040955d
          0x00409560
          0x00409561
          0x0040956b

          APIs
          • EmptyClipboard.USER32(?,?,00404590,?), ref: 00409506
          • GlobalAlloc.KERNEL32(00002000,?,?,?,?,?,00404590,?), ref: 00409529
          • GlobalLock.KERNEL32 ref: 00409536
          • memcpy.MSVCRT ref: 0040953F
          • GlobalUnlock.KERNEL32(00000000), ref: 00409548
          • SetClipboardData.USER32 ref: 00409551
          • CloseClipboard.USER32 ref: 00409561
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpy
          • String ID:
          • API String ID: 4281975876-0
          • Opcode ID: 382b1388d6f3ccb0e475e7a8e732124f69640ed4a929f3609a4016d7d68969c5
          • Instruction ID: 6c7b5e656f87a6772e3dda65743f52150f9ff59ae3070b8da2c06ae0992377d1
          • Opcode Fuzzy Hash: 382b1388d6f3ccb0e475e7a8e732124f69640ed4a929f3609a4016d7d68969c5
          • Instruction Fuzzy Hash: F0F0C83B100215ABC3216FA5ED8CD6B7B2CDB85B457050179FE46E7252EA36AC0D87A8
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00408181(intOrPtr* __eax, struct HINSTANCE__* _a4) {
          				struct HINSTANCE__* _v0;
          				intOrPtr _v4;
          				intOrPtr* _t5;
          				char _t6;
          				intOrPtr _t7;
          				char _t12;
          				intOrPtr _t13;
          				void* _t14;
          				char _t15;
          
          				_t5 = __eax;
          				do {
          					_t15 =  *_t5;
          					 *((char*)(0x4127a0 + _t5)) = _t15;
          					_t5 = _t5 + 1;
          					_t29 = _t15;
          				} while (_t15 != 0);
          				_t6 = "general"; // 0x656e6567
          				 *0x4128a8 = _t6;
          				_t7 =  *0x40fd7c; // 0x6c6172
          				 *0x4128ac = _t7;
          				E004075BC(_t29, "TranslatorName", 0x40f469);
          				E004075BC(_t29, "TranslatorURL", 0x40f469);
          				EnumResourceNamesA(_a4, 4, E00408080, 0);
          				EnumResourceNamesA(_v0, 5, E00408080, 0);
          				_t12 = "strings"; // 0x69727473
          				 *0x4128a8 = _t12;
          				_t13 =  *0x40fd74; // 0x73676e
          				 *0x4128ac = _t13;
          				_t14 = E00407DE5(_t15, _t29, _v4);
          				 *0x4127a0 = 0;
          				return _t14;
          			}












          0x00408181
          0x00408188
          0x00408188
          0x0040818a
          0x0040818d
          0x0040818e
          0x0040818e
          0x00408192
          0x0040819e
          0x004081a3
          0x004081ae
          0x004081b3
          0x004081be
          0x004081da
          0x004081e5
          0x004081e7
          0x004081f0
          0x004081f5
          0x004081fa
          0x004081ff
          0x00408206
          0x0040820e

          APIs
          • EnumResourceNamesA.KERNEL32 ref: 004081DA
          • EnumResourceNamesA.KERNEL32 ref: 004081E5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: EnumNamesResource
          • String ID: TranslatorName$TranslatorURL$general$strings
          • API String ID: 3334572018-3647959541
          • Opcode ID: 4156d8c37e1a61cdefbfebdcb61d4fd1b8c8f5c658b526a0baf4a3c0576992b5
          • Instruction ID: 209f779ddb25f5af74832284491d342bc251737630bee5914a750b4ba385d638
          • Opcode Fuzzy Hash: 4156d8c37e1a61cdefbfebdcb61d4fd1b8c8f5c658b526a0baf4a3c0576992b5
          • Instruction Fuzzy Hash: FE019E31904600BFD321AB29AE09F833FE0EF85710F14803AF448AB6E1D6B558598BAD
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004097F0(long __esi, struct HWND__* _a4, intOrPtr _a8) {
          				char _v1028;
          				char _v2052;
          				long _t7;
          				void* _t16;
          				long _t17;
          				long _t18;
          
          				_t18 = __esi;
          				if(__esi != 0) {
          					_t17 = __esi;
          				} else {
          					_t7 = GetLastError();
          					_t17 = _t7;
          				}
          				if(_a8 == 0) {
          					E0040972F(_t17, _t16,  &_v1028);
          					sprintf( &_v2052, "Error %d: %s", _t17,  &_v1028);
          					return MessageBoxA(_a4,  &_v2052, "Error", 0x30);
          				} else {
          					 *0x4126fc = _t18;
          					return _t7;
          				}
          			}









          0x004097f0
          0x004097fc
          0x00409808
          0x004097fe
          0x004097fe
          0x00409804
          0x00409804
          0x0040980e
          0x00409821
          0x0040983a
          0x00000000
          0x00409810
          0x00409810
          0x00000000
          0x00409810

          APIs
          • GetLastError.KERNEL32(00000001), ref: 004097FE
            • Part of subcall function 0040972F: LoadLibraryExA.KERNEL32(netmsg.dll,00000000,00000002,00000000,00000000,00000000,?,Mqt,00409826,?,00000001), ref: 00409757
            • Part of subcall function 0040972F: FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,00000001,00000000,00000000,00000000,00000000,00000000,?,Mqt,00409826,?,00000001), ref: 00409775
            • Part of subcall function 0040972F: LocalFree.KERNEL32(00000001,?,Mqt,00409826,?,00000001), ref: 004097A6
          • sprintf.MSVCRT ref: 0040983A
          • MessageBoxA.USER32 ref: 00409853
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Message$ErrorFormatFreeLastLibraryLoadLocalsprintf
          • String ID: Error$Error %d: %s$Mqt
          • API String ID: 1804333364-384850037
          • Opcode ID: 084d39a359356ad7847816d2aef003e23d65f73f4ea9ee93ff9083b3cc005403
          • Instruction ID: fbc003b7c461b04974fb8c9c857bc755e714a62d47ff6d5a9af6f98d96675b72
          • Opcode Fuzzy Hash: 084d39a359356ad7847816d2aef003e23d65f73f4ea9ee93ff9083b3cc005403
          • Instruction Fuzzy Hash: 54F0F6B6810118ABC720BB44DC05BEA76BCB745744F0480B6F905B22C2E6789D4DCFAD
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 50%
          			E0040A22E(intOrPtr _a4) {
          				_Unknown_base(*)()* _t5;
          				void* _t9;
          				void* _t10;
          				struct HINSTANCE__* _t11;
          
          				_t9 = 0;
          				_t10 = 0;
          				_t11 = LoadLibraryA("comctl32.dll");
          				if(_t11 == 0) {
          					L5:
          					__imp__#17();
          					return 1;
          				}
          				_t5 = GetProcAddress(_t11, "InitCommonControlsEx");
          				if(_t5 != 0) {
          					_t10 = 1;
          					_t9 =  *_t5(_a4);
          				}
          				FreeLibrary(_t11);
          				if(_t10 == 0) {
          					goto L5;
          				} else {
          					return _t9;
          				}
          			}







          0x0040a236
          0x0040a238
          0x0040a240
          0x0040a244
          0x0040a26e
          0x0040a26e
          0x00000000
          0x0040a276
          0x0040a24c
          0x0040a254
          0x0040a25a
          0x0040a25d
          0x0040a25d
          0x0040a260
          0x0040a268
          0x00000000
          0x0040a26a
          0x00000000
          0x0040a26a

          APIs
          • LoadLibraryA.KERNEL32(comctl32.dll,74714DE0,?,00000000,0040A4E8,?,?,?,?,00404E3B,74714DE0), ref: 0040A23A
          • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 0040A24C
          • FreeLibrary.KERNEL32(00000000,?,00000000,0040A4E8,?,?,?,?,00404E3B,74714DE0), ref: 0040A260
          • #17.COMCTL32(?,00000000,0040A4E8,?,?,?,?,00404E3B,74714DE0), ref: 0040A26E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Library$AddressFreeLoadProc
          • String ID: InitCommonControlsEx$comctl32.dll
          • API String ID: 145871493-802336580
          • Opcode ID: 39c4708e21592f6b5b83b4b2a6d089808a0747253cc70916cb65b440dda5b722
          • Instruction ID: 087d2bfa413aa19143781dd4ca8eb23a0016281e5864367d40afe674b3bd0d1a
          • Opcode Fuzzy Hash: 39c4708e21592f6b5b83b4b2a6d089808a0747253cc70916cb65b440dda5b722
          • Instruction Fuzzy Hash: 2EE02B313013109BC3315B709D88E2F36A4EFC0B01306003AF911F1780EB398C19955E
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00408257(struct HINSTANCE__** __esi) {
          				struct HINSTANCE__* _t4;
          				_Unknown_base(*)()* _t7;
          
          				_t4 =  *__esi;
          				if(_t4 != 0) {
          					__esi[1] = GetProcAddress(_t4, "IcmpCreateFile");
          					__esi[2] = GetProcAddress( *__esi, "IcmpCloseHandle");
          					_t7 = GetProcAddress( *__esi, "IcmpSendEcho");
          					__esi[3] = _t7;
          					return _t7;
          				}
          				return _t4;
          			}





          0x00408257
          0x0040825b
          0x00408273
          0x0040827f
          0x00408282
          0x00408284
          0x00000000
          0x00408287
          0x00408288

          APIs
          • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 0040826A
          • GetProcAddress.KERNEL32(?,IcmpCloseHandle), ref: 00408276
          • GetProcAddress.KERNEL32(?,IcmpSendEcho), ref: 00408282
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: AddressProc
          • String ID: IcmpCloseHandle$IcmpCreateFile$IcmpSendEcho
          • API String ID: 190572456-1259528597
          • Opcode ID: 23cc92f69b86c125c888f9d92ae312f5f0d95321de70f0ab1c4eac699587f4cc
          • Instruction ID: e3040b6c4cbc9dce3db47db9ad32ef43000e21e6f45b276228b28e75c94a7058
          • Opcode Fuzzy Hash: 23cc92f69b86c125c888f9d92ae312f5f0d95321de70f0ab1c4eac699587f4cc
          • Instruction Fuzzy Hash: 7EE0EC70540704AACB709F6ADC04D06BBE4EFA9700325883EE591A3A90D679E4448E44
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00409DB8(struct HINSTANCE__** __esi) {
          				void* _t3;
          				struct HINSTANCE__* _t4;
          				_Unknown_base(*)()* _t6;
          
          				if( *__esi == 0) {
          					_t4 = GetModuleHandleA("kernel32.dll");
          					 *__esi = _t4;
          					__esi[1] = GetProcAddress(_t4, "EnumSystemFirmwareTables");
          					_t6 = GetProcAddress( *__esi, "GetSystemFirmwareTable");
          					__esi[2] = _t6;
          					return _t6;
          				}
          				return _t3;
          			}






          0x00409dbb
          0x00409dc3
          0x00409dd5
          0x00409de0
          0x00409de3
          0x00409de5
          0x00000000
          0x00409de8
          0x00409de9

          APIs
          • GetModuleHandleA.KERNEL32(kernel32.dll,?,00409DFE,00020019,0040D088,?), ref: 00409DC3
          • GetProcAddress.KERNEL32(00000000,EnumSystemFirmwareTables), ref: 00409DD7
          • GetProcAddress.KERNEL32(?,GetSystemFirmwareTable), ref: 00409DE3
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: AddressProc$HandleModule
          • String ID: EnumSystemFirmwareTables$GetSystemFirmwareTable$kernel32.dll
          • API String ID: 667068680-556989768
          • Opcode ID: 331c28743f1cb4a627a5e0a57ce2784328d82bf2e9980eb1adcf1daa3fb6cb83
          • Instruction ID: ed11e46ac89e2c8d86e13da19356c947bf7504ae6910298a258e52afc57c2eb1
          • Opcode Fuzzy Hash: 331c28743f1cb4a627a5e0a57ce2784328d82bf2e9980eb1adcf1daa3fb6cb83
          • Instruction Fuzzy Hash: 05D0EC74544305DAD7306F65D90AA06BAE4BBA4710B20483EE480A2A90D2B854848A04
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00408B73(char __eax, char* __edi, intOrPtr _a4) {
          				void** _v8;
          				char _v12;
          				void _v1035;
          				void _v1036;
          				char* _t31;
          				void** _t34;
          				intOrPtr* _t37;
          				void* _t44;
          				char _t49;
          				void _t51;
          				void* _t52;
          				void* _t53;
          				void* _t54;
          				intOrPtr _t55;
          				void* _t56;
          				char* _t57;
          				int _t58;
          				void* _t59;
          				void* _t60;
          				void* _t61;
          				void* _t62;
          				void* _t63;
          
          				_t57 = __edi;
          				_t49 = __eax;
          				_t58 = 0;
          				_v1036 = 0;
          				memset( &_v1035, 0, 0x3ff);
          				_t61 = _t60 + 0xc;
          				 *__edi = 0;
          				if(_t49 > 0) {
          					_t34 = _a4 + 4;
          					_v8 = _t34;
          					_v12 = _t49;
          					while(1) {
          						_t7 = _t34 - 4; // 0xe8004100
          						sprintf( &_v1036, "%s (%s)",  *_t7,  *_t34);
          						_t37 =  &_v1036;
          						_t62 = _t61 + 0x10;
          						_t10 = _t37 + 1; // 0x1
          						_t53 = _t10;
          						do {
          							_t55 =  *_t37;
          							_t37 = _t37 + 1;
          						} while (_t55 != 0);
          						_t11 = _t37 - _t53 + 1; // 0x2
          						memcpy(_t58 + _t57,  &_v1036, _t11);
          						_t54 =  *_v8;
          						_t44 = _t54;
          						_t63 = _t62 + 0xc;
          						_t59 = _t58 + _t37 - _t53 + 1;
          						_t56 = _t44 + 1;
          						do {
          							_t51 =  *_t44;
          							_t44 = _t44 + 1;
          						} while (_t51 != 0);
          						_t52 = _t44 - _t56;
          						memcpy(_t59 + _t57, _t54, _t52 + 1);
          						_v8 =  &(_v8[2]);
          						_t61 = _t63 + 0xc;
          						_t22 =  &_v12;
          						 *_t22 = _v12 - 1;
          						_t58 = _t59 + _t52 + 1;
          						if( *_t22 != 0) {
          							_t34 = _v8;
          							continue;
          						}
          						goto L8;
          					}
          				}
          				L8:
          				_t31 = _t58 + _t57;
          				 *_t31 = 0;
          				 *((char*)(_t31 + 1)) = 0;
          				return _t57;
          			}

























          0x00408b73
          0x00408b83
          0x00408b85
          0x00408b8f
          0x00408b96
          0x00408b9b
          0x00408ba0
          0x00408ba3
          0x00408bac
          0x00408baf
          0x00408bb2
          0x00408bba
          0x00408bbc
          0x00408bcb
          0x00408bd0
          0x00408bd6
          0x00408bd9
          0x00408bd9
          0x00408bdc
          0x00408bdc
          0x00408bde
          0x00408bdf
          0x00408be7
          0x00408bf6
          0x00408bfe
          0x00408c00
          0x00408c02
          0x00408c05
          0x00408c09
          0x00408c0c
          0x00408c0c
          0x00408c0e
          0x00408c0f
          0x00408c15
          0x00408c20
          0x00408c25
          0x00408c29
          0x00408c2c
          0x00408c2c
          0x00408c2f
          0x00408c33
          0x00408bb7
          0x00000000
          0x00408bb7
          0x00000000
          0x00408c33
          0x00408bba
          0x00408c35
          0x00408c35
          0x00408c39
          0x00408c3c
          0x00408c44

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memcpy$memsetsprintf
          • String ID: %s (%s)$*.htm;*.html
          • API String ID: 1941091690-1402919948
          • Opcode ID: d18015177108984baa15ee6ee8af0f05e90cfa79162649ca993e2c14bbf23510
          • Instruction ID: 3f8d38bbff6308db14577c9186b7d138bb798970aeef803183a93644235fb190
          • Opcode Fuzzy Hash: d18015177108984baa15ee6ee8af0f05e90cfa79162649ca993e2c14bbf23510
          • Instruction Fuzzy Hash: 4B21B7B1904249DFCB11DF54C984BDABBF9DF44304F0440BAE685E7241EA75EB49CB64
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004090CA(intOrPtr* __esi, int* _a4) {
          				int _t3;
          				struct HDC__* _t12;
          				intOrPtr* _t13;
          				int* _t14;
          
          				_t13 = __esi;
          				_t14 = _a4;
          				 *__esi = GetSystemMetrics(0x11);
          				_t3 = GetSystemMetrics(0x10);
          				 *_t14 = _t3;
          				if( *__esi == 0 || _t3 == 0) {
          					_t12 = GetDC(0);
          					 *_t14 = GetDeviceCaps(_t12, 8);
          					 *_t13 = GetDeviceCaps(_t12, 0xa);
          					return ReleaseDC(0, _t12);
          				}
          				return _t3;
          			}







          0x004090ca
          0x004090cb
          0x004090dc
          0x004090de
          0x004090e3
          0x004090e6
          0x004090fb
          0x00409105
          0x0040910d
          0x00000000
          0x00409115
          0x00409118

          APIs
          • GetSystemMetrics.USER32 ref: 004090D8
          • GetSystemMetrics.USER32 ref: 004090DE
          • GetDC.USER32(00000000), ref: 004090EF
          • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409100
          • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409108
          • ReleaseDC.USER32 ref: 0040910F
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: CapsDeviceMetricsSystem$Release
          • String ID:
          • API String ID: 447804332-0
          • Opcode ID: 84a31667dc520d80a7ae1faed3a9ecc5a532576b4a5f478b7d801bf386425950
          • Instruction ID: 526282f1a5c0b809247f27c058f5214bee5de060b0667dcea82074e018295ea0
          • Opcode Fuzzy Hash: 84a31667dc520d80a7ae1faed3a9ecc5a532576b4a5f478b7d801bf386425950
          • Instruction Fuzzy Hash: EEF08231680309AFF7202F719C45B6AB7A8FBD0B45F104439F684AB2D1D7B59C448B24
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 53%
          			E00407C3F(signed short __ebx) {
          				CHAR* _t14;
          				void* _t15;
          				intOrPtr _t16;
          				struct HINSTANCE__* _t18;
          				intOrPtr _t20;
          				signed int _t23;
          				signed int _t24;
          				intOrPtr _t25;
          				char _t27;
          				intOrPtr _t28;
          				void _t30;
          				signed short _t32;
          				signed int _t34;
          				intOrPtr _t35;
          				intOrPtr _t36;
          				intOrPtr _t37;
          				intOrPtr _t40;
          				void* _t42;
          				intOrPtr _t43;
          				intOrPtr _t46;
          				void* _t48;
          				int _t52;
          				void* _t53;
          				void* _t60;
          				void* _t61;
          
          				_t32 = __ebx;
          				if( *0x412b68 == 0) {
          					E0040781B();
          				}
          				_t14 = E004077E3(_t32);
          				_t48 = _t14;
          				if(_t48 != 0) {
          					L18:
          					_t15 = _t48;
          				} else {
          					if((_t32 & 0x00010000) == 0) {
          						if( *0x4127a0 == 0) {
          							_t16 =  *0x412b70; // 0x1000
          							_push(_t16 - 1);
          							_push( *0x412b54);
          							_push(_t32);
          							_t18 = E00407C2E();
          							goto L12;
          						} else {
          							_t27 = "strings"; // 0x69727473
          							 *0x4128a8 = _t27;
          							_t28 =  *0x40fd74; // 0x73676e
          							 *0x4128ac = _t28;
          							if(E004076DC(_t32,  *0x412b54) == 0) {
          								L10:
          								_t18 = GetModuleHandleA(0);
          								_t40 =  *0x412b70; // 0x1000
          								_push(_t40 - 1);
          								_push( *0x412b54);
          								_push(_t32);
          								goto L12;
          							} else {
          								_t53 =  *0x412b54; // 0xbcbf08
          								_t3 = _t53 + 1; // 0xbcbf09
          								_t42 = _t3;
          								do {
          									_t30 =  *_t53;
          									_t53 = _t53 + 1;
          								} while (_t30 != 0);
          								_t52 = _t53 - _t42;
          								if(_t52 == 0) {
          									goto L10;
          								}
          							}
          						}
          					} else {
          						_t18 = GetModuleHandleA(_t14);
          						_t43 =  *0x412b70; // 0x1000
          						_push(_t43 - 1);
          						_push( *0x412b54);
          						_push(_t32 & 0x0000ffff);
          						L12:
          						_t52 = LoadStringA(_t18, ??, ??, ??);
          					}
          					if(_t52 <= 0) {
          						L17:
          						_t15 = 0x40f469;
          					} else {
          						_t20 =  *0x412b64; // 0xfb
          						_t5 = _t52 + 2; // 0xfd
          						_t60 = _t20 + _t5 -  *0x412b68; // 0x8000
          						if(_t60 >= 0) {
          							goto L17;
          						} else {
          							_t34 =  *0x412b60; // 0x12
          							_t61 = _t34 -  *0x412b6c; // 0x100
          							if(_t61 >= 0) {
          								goto L17;
          							} else {
          								_t35 =  *0x412b50; // 0xbc36f0
          								_t48 = _t35 + _t20;
          								_t7 = _t52 + 1; // 0x1
          								memcpy(_t48,  *0x412b54, _t7);
          								_t23 =  *0x412b60; // 0x12
          								_t36 =  *0x412b64; // 0xfb
          								_t46 =  *0x412b5c; // 0xbcbb00
          								 *((intOrPtr*)(_t46 + _t23 * 4)) = _t36;
          								_t24 =  *0x412b60; // 0x12
          								_t37 =  *0x412b58; // 0xbcb6f8
          								 *(_t37 + _t24 * 4) = _t32;
          								_t25 =  *0x412b64; // 0xfb
          								 *0x412b60 =  *0x412b60 + 1;
          								 *0x412b64 = _t25 + _t52 + 1;
          								if(_t48 != 0) {
          									goto L18;
          								} else {
          									goto L17;
          								}
          							}
          						}
          					}
          				}
          				return _t15;
          			}




























          0x00407c3f
          0x00407c46
          0x00407c48
          0x00407c48
          0x00407c50
          0x00407c55
          0x00407c59
          0x00407d7a
          0x00407d7a
          0x00407c5f
          0x00407c65
          0x00407c89
          0x00407cde
          0x00407ce4
          0x00407ce5
          0x00407ceb
          0x00407cec
          0x00000000
          0x00407c8b
          0x00407c8b
          0x00407c96
          0x00407c9b
          0x00407ca1
          0x00407caf
          0x00407cc5
          0x00407cc7
          0x00407ccd
          0x00407cd4
          0x00407cd5
          0x00407cdb
          0x00000000
          0x00407cb1
          0x00407cb1
          0x00407cb7
          0x00407cb7
          0x00407cba
          0x00407cba
          0x00407cbc
          0x00407cbd
          0x00407cc1
          0x00407cc3
          0x00000000
          0x00000000
          0x00407cc3
          0x00407caf
          0x00407c67
          0x00407c68
          0x00407c6e
          0x00407c75
          0x00407c76
          0x00407c7f
          0x00407cf1
          0x00407cf8
          0x00407cf8
          0x00407cfc
          0x00407d73
          0x00407d73
          0x00407cfe
          0x00407cfe
          0x00407d03
          0x00407d07
          0x00407d0d
          0x00000000
          0x00407d0f
          0x00407d0f
          0x00407d15
          0x00407d1b
          0x00000000
          0x00407d1d
          0x00407d1d
          0x00407d23
          0x00407d26
          0x00407d31
          0x00407d36
          0x00407d3b
          0x00407d41
          0x00407d47
          0x00407d4a
          0x00407d4f
          0x00407d55
          0x00407d58
          0x00407d60
          0x00407d6c
          0x00407d71
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00407d71
          0x00407d1b
          0x00407d0d
          0x00407cfc
          0x00407d7e

          APIs
          • GetModuleHandleA.KERNEL32(00000000,?,?,?,004074B9,?,00000000), ref: 00407C68
          • GetModuleHandleA.KERNEL32(00000000,?,?,004074B9,?,00000000), ref: 00407CC7
          • LoadStringA.USER32 ref: 00407CF2
          • memcpy.MSVCRT ref: 00407D31
            • Part of subcall function 0040781B: ??2@YAPAXI@Z.MSVCRT ref: 00407843
            • Part of subcall function 0040781B: ??2@YAPAXI@Z.MSVCRT ref: 00407861
            • Part of subcall function 0040781B: ??2@YAPAXI@Z.MSVCRT ref: 0040787F
            • Part of subcall function 0040781B: ??2@YAPAXI@Z.MSVCRT ref: 0040788F
            • Part of subcall function 004076DC: _itoa.MSVCRT ref: 004076FD
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ??2@$HandleModule$LoadString_itoamemcpy
          • String ID: strings
          • API String ID: 1623145738-3030018805
          • Opcode ID: 7bd8298991550abc5c2c98f91390d0293e29c8c3185365eace5f488851281c97
          • Instruction ID: 97e43cacb30860ce3e801c0595160a29f8d5ee6be1373f002ccc26d35cd4094e
          • Opcode Fuzzy Hash: 7bd8298991550abc5c2c98f91390d0293e29c8c3185365eace5f488851281c97
          • Instruction Fuzzy Hash: 4831637990C6019FD729DF15EE549B23776FB44304700843AE806E72A1D7B9B926CB1D
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 98%
          			E0040E886(signed int __ecx, intOrPtr _a4, unsigned int _a8, intOrPtr* _a12) {
          				signed int _v8;
          				intOrPtr _v16;
          				void* __edi;
          				void* __esi;
          				void* _t69;
          				signed int _t70;
          				signed int _t71;
          				intOrPtr _t76;
          				signed int _t85;
          				signed int _t86;
          				void* _t94;
          				void* _t97;
          				short* _t115;
          				short _t123;
          				signed int _t126;
          				void* _t139;
          				intOrPtr* _t141;
          				unsigned int _t145;
          				intOrPtr _t147;
          				signed int _t150;
          
          				_t124 = __ecx;
          				_push(__ecx);
          				_t69 = _a4 - 0x4e;
          				_t150 = __ecx;
          				if(_t69 == 0) {
          					_t141 = _a12;
          					__eflags =  *((intOrPtr*)(_t141 + 8)) - 0xfffffffd;
          					if( *((intOrPtr*)(_t141 + 8)) == 0xfffffffd) {
          						__eflags =  *((intOrPtr*)(_t141 + 4)) - 0x3e9;
          						if(__eflags == 0) {
          							E0040A2D5(__eflags,  *_t141,  *(_t141 + 0xc));
          						}
          					}
          					__eflags =  *((intOrPtr*)(_t141 + 8)) - 0xffffff9b;
          					if( *((intOrPtr*)(_t141 + 8)) != 0xffffff9b) {
          						L26:
          						_t70 = 0;
          						__eflags = 0;
          						goto L27;
          					} else {
          						__eflags =  *((intOrPtr*)(_t141 + 4)) - 0x3e9;
          						if( *((intOrPtr*)(_t141 + 4)) != 0x3e9) {
          							goto L26;
          						}
          						_t71 =  *(_t141 + 0x14);
          						__eflags = _t71 & 0x00000002;
          						if((_t71 & 0x00000002) == 0) {
          							L35:
          							_t126 =  *(_t141 + 0x18) ^ _t71;
          							__eflags = 0x0000f000 & _t126;
          							if((0x0000f000 & _t126) == 0) {
          								L38:
          								__eflags =  *(_t141 + 0x14) & 0x00000002;
          								if(( *(_t141 + 0x14) & 0x00000002) == 0) {
          									goto L26;
          								}
          								__eflags =  *(_t141 + 0x18) & 0x00000002;
          								if(( *(_t141 + 0x18) & 0x00000002) != 0) {
          									goto L26;
          								}
          								__eflags =  *(_t141 + 0xc);
          								E0040DB55(_t150, 0x3eb, 0 |  *(_t141 + 0xc) != 0x00000000);
          								_t76 =  *((intOrPtr*)(_t150 + 0xc));
          								 *(_t141 + 0xc) -  *((intOrPtr*)(_t76 + 4)) - 1 =  *(_t141 + 0xc) !=  *((intOrPtr*)(_t76 + 4)) - 1;
          								E0040DB55(_t150, 0x3ec, 0 |  *(_t141 + 0xc) !=  *((intOrPtr*)(_t76 + 4)) - 0x00000001);
          								E0040E821(_t150,  *((short*)( *((intOrPtr*)( *((intOrPtr*)(_t150 + 0xc)))) +  *(_t141 + 0x28) * 4)));
          								L41:
          								_t70 = 1;
          								L27:
          								return _t70;
          							}
          							L36:
          							_t85 = E0040A1F0( *_t141,  *(_t141 + 0xc), 0xf002);
          							__eflags = _t85 & 0x00000002;
          							if((_t85 & 0x00000002) != 0) {
          								_t86 = _t85 & 0x0000f000;
          								__eflags = _t86 - 0x1000;
          								_v8 = _t86;
          								E0040DB55(_t150, 0x3ee, 0 | _t86 == 0x00001000);
          								_v16 - 0x2000 = _v16 == 0x2000;
          								E0040DB55(_t150, 0x3ef, 0 | _v16 == 0x00002000);
          							}
          							goto L38;
          						}
          						__eflags =  *(_t141 + 0x18) & 0x00000002;
          						if(( *(_t141 + 0x18) & 0x00000002) == 0) {
          							goto L36;
          						}
          						goto L35;
          					}
          				}
          				_t94 = _t69 - 0xc2;
          				if(_t94 == 0) {
          					SendDlgItemMessageA( *(__ecx + 4), 0x3ed, 0xc5, 3, 0);
          					E0040E669(_t150, __eflags);
          					goto L26;
          				}
          				_t97 = _t94 - 1;
          				if(_t97 != 0) {
          					goto L26;
          				}
          				_t145 = _a8 >> 0x10;
          				if( *((intOrPtr*)(__ecx + 0x14)) != _t97 || _t145 != 0x300) {
          					L7:
          					if(_t145 != 0) {
          						goto L26;
          					}
          					if(_a8 != 0x3f0) {
          						L13:
          						if(_a8 == 0x3eb) {
          							E0040A6DF(GetDlgItem( *(_t150 + 4), 0x3e9), _t124);
          						}
          						if(_a8 == 0x3ec) {
          							E0040A6A3(GetDlgItem( *(_t150 + 4), 0x3e9));
          						}
          						if(_a8 == 0x3ee) {
          							E0040A46E(GetDlgItem( *(_t150 + 4), 0x3e9), 1);
          						}
          						if(_a8 == 0x3ef) {
          							E0040A46E(GetDlgItem( *(_t150 + 4), 0x3e9), 0);
          						}
          						if(_a8 == 2) {
          							E0040DB26(_t150, 2);
          						}
          						if(_a8 == 1) {
          							E0040E7BA(_t150);
          							E0040DB26(_t150, 1);
          						}
          						goto L41;
          					}
          					_t147 =  *((intOrPtr*)( *((intOrPtr*)(_t150 + 0xc)) + 4));
          					_t124 = 0;
          					if(_t147 <= 0) {
          						L12:
          						E0040E669(_t150, _t165);
          						goto L13;
          					} else {
          						_t139 = 0;
          						do {
          							_t115 =  *((intOrPtr*)( *((intOrPtr*)(_t150 + 0xc)))) + _t124 * 4;
          							 *(_t115 + 2) = _t124;
          							_t123 =  *((intOrPtr*)( *((intOrPtr*)(_t150 + 0x10)) + _t139 + 0xc));
          							_t124 = _t124 + 1;
          							_t139 = _t139 + 0x14;
          							_t165 = _t124 - _t147;
          							 *_t115 = _t123;
          						} while (_t124 < _t147);
          						goto L12;
          					}
          				} else {
          					if(_a8 != 0x3ed) {
          						goto L26;
          					} else {
          						E0040E83A(__ecx, __ecx);
          						goto L7;
          					}
          				}
          			}























          0x0040e886
          0x0040e88c
          0x0040e890
          0x0040e896
          0x0040e898
          0x0040e9d0
          0x0040e9d3
          0x0040e9dc
          0x0040e9de
          0x0040e9e1
          0x0040e9e8
          0x0040e9ee
          0x0040e9e1
          0x0040e9ef
          0x0040e9f3
          0x0040e9c5
          0x0040e9c5
          0x0040e9c5
          0x00000000
          0x0040e9f5
          0x0040e9f5
          0x0040e9f8
          0x00000000
          0x00000000
          0x0040e9fa
          0x0040e9fd
          0x0040ea04
          0x0040ea0c
          0x0040ea0f
          0x0040ea11
          0x0040ea13
          0x0040ea62
          0x0040ea62
          0x0040ea66
          0x00000000
          0x00000000
          0x0040ea6c
          0x0040ea70
          0x00000000
          0x00000000
          0x0040ea78
          0x0040ea86
          0x0040ea8b
          0x0040ea99
          0x0040eaa2
          0x0040eab4
          0x0040eab9
          0x0040eabb
          0x0040e9c7
          0x0040e9cd
          0x0040e9cd
          0x0040ea15
          0x0040ea1f
          0x0040ea27
          0x0040ea29
          0x0040ea2b
          0x0040ea2f
          0x0040ea37
          0x0040ea43
          0x0040ea52
          0x0040ea5d
          0x0040ea5d
          0x00000000
          0x0040ea29
          0x0040ea06
          0x0040ea0a
          0x00000000
          0x00000000
          0x00000000
          0x0040ea0a
          0x0040e9f3
          0x0040e89e
          0x0040e8a3
          0x0040e9b8
          0x0040e9c0
          0x00000000
          0x0040e9c0
          0x0040e8a9
          0x0040e8aa
          0x00000000
          0x00000000
          0x0040e8b3
          0x0040e8b9
          0x0040e8d3
          0x0040e8d6
          0x00000000
          0x00000000
          0x0040e8e2
          0x0040e918
          0x0040e929
          0x0040e931
          0x0040e931
          0x0040e93c
          0x0040e944
          0x0040e944
          0x0040e94f
          0x0040e95a
          0x0040e960
          0x0040e967
          0x0040e972
          0x0040e978
          0x0040e97e
          0x0040e984
          0x0040e984
          0x0040e98e
          0x0040e994
          0x0040e99d
          0x0040e99d
          0x00000000
          0x0040e98e
          0x0040e8e7
          0x0040e8ea
          0x0040e8ee
          0x0040e911
          0x0040e913
          0x00000000
          0x0040e8f0
          0x0040e8f0
          0x0040e8f2
          0x0040e8f7
          0x0040e8fa
          0x0040e901
          0x0040e906
          0x0040e907
          0x0040e90a
          0x0040e90c
          0x0040e90c
          0x00000000
          0x0040e8f2
          0x0040e8c2
          0x0040e8c8
          0x00000000
          0x0040e8ce
          0x0040e8ce
          0x00000000
          0x0040e8ce
          0x0040e8c8

          APIs
          • GetDlgItem.USER32 ref: 0040E92F
          • GetDlgItem.USER32 ref: 0040E942
          • GetDlgItem.USER32 ref: 0040E957
          • GetDlgItem.USER32 ref: 0040E96F
            • Part of subcall function 0040E83A: GetDlgItem.USER32 ref: 0040E848
          • SendDlgItemMessageA.USER32(?,000003ED,000000C5,00000003,00000000), ref: 0040E9B8
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Item$MessageSend
          • String ID:
          • API String ID: 1192005507-0
          • Opcode ID: 7c90aea8232da8ad537cf2a5ce2d4c7232e844a3d3ada824651be2fe7239a305
          • Instruction ID: 4d099fed6390a821e44670faac05e94f15387c4cbfcb2ca509142600d3213a37
          • Opcode Fuzzy Hash: 7c90aea8232da8ad537cf2a5ce2d4c7232e844a3d3ada824651be2fe7239a305
          • Instruction Fuzzy Hash: 8951D471600601ABDB20AF27C846B2A73A5EF54724F05C93FF814A76D1DB78E960CB89
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 35%
          			E00402B3D(void* __ecx, void* __eflags, long _a4, intOrPtr _a8) {
          				void* _v8;
          				unsigned int _v12;
          				int _v16;
          				intOrPtr _v24;
          				char _v28;
          				intOrPtr _v32;
          				intOrPtr _v36;
          				char _v300;
          				intOrPtr _v304;
          				void _v308;
          				void _v571;
          				int _v572;
          				intOrPtr _v1096;
          				intOrPtr _v1100;
          				intOrPtr _v1104;
          				char _v1124;
          				char _v17508;
          				void* __ebx;
          				void* _t60;
          				void* _t61;
          				void* _t65;
          				void* _t69;
          				void* _t72;
          				intOrPtr _t78;
          				int _t88;
          				char _t92;
          				void _t97;
          				signed int _t98;
          				void* _t101;
          				void* _t102;
          				void* _t105;
          
          				E0040EAD0(0x4464, __ecx);
          				_t88 = 0;
          				_v16 = 0;
          				if(E00409B5D() == 0) {
          					L12:
          					__eflags =  *0x412b10 - _t88; // 0x0
          					if(__eflags != 0) {
          						_t97 = _a4;
          						_t60 =  *0x4125c8(8, _t97);
          						__eflags = _t60 - 0xffffffff;
          						_v8 = _t60;
          						if(_t60 != 0xffffffff) {
          							_v16 = 1;
          							_v1124 = 0x224;
          							_t61 =  *0x4125c0(_t60,  &_v1124);
          							while(1) {
          								__eflags = _t61;
          								if(_t61 == 0) {
          									goto L20;
          								}
          								memset( &_v308, _t88, 0x118);
          								_t102 = _t102 + 0xc;
          								_v304 = _v1096;
          								_v308 = _t97;
          								_t65 = 0;
          								__eflags = 0;
          								do {
          									_t92 =  *((intOrPtr*)(_t101 + _t65 - 0x340));
          									 *((char*)(_t101 + _t65 - 0x128)) = _t92;
          									_t65 = _t65 + 1;
          									__eflags = _t92 - _t88;
          								} while (_t92 != _t88);
          								_v36 = _v1100;
          								_v32 = _v1104;
          								_v1124 = 0x224;
          								_t69 = E004027FC(_a8,  &_v308);
          								__eflags = _t69;
          								if(_t69 != 0) {
          									_t61 =  *0x4125bc(_v8,  &_v1124);
          									continue;
          								}
          								goto L20;
          							}
          							goto L20;
          						}
          					}
          				} else {
          					_t105 =  *0x412b14 - _t88; // 0x0
          					if(_t105 == 0) {
          						goto L12;
          					} else {
          						_t72 = OpenProcess(0x410, 0, _a4);
          						_v8 = _t72;
          						if(_t72 != 0) {
          							_push( &_v12);
          							_push(0x4000);
          							_push( &_v17508);
          							_push(_t72);
          							if( *0x4125cc() != 0) {
          								_t6 =  &_v12;
          								 *_t6 = _v12 >> 2;
          								_v16 = 1;
          								_t98 = 0;
          								if( *_t6 != 0) {
          									while(1) {
          										_v572 = _t88;
          										memset( &_v571, _t88, 0x104);
          										memset( &_v308, _t88, 0x118);
          										_t78 =  *((intOrPtr*)(_t101 + _t98 * 4 - 0x4460));
          										_t102 = _t102 + 0x18;
          										_v308 = _a4;
          										_v304 = _t78;
          										 *0x4125c4(_v8, _t78,  &_v572, 0x104);
          										E00402986( &_v572,  &_v300);
          										_push(0xc);
          										_push( &_v28);
          										_push(_v304);
          										_push(_v8);
          										if( *0x4125d0() != 0) {
          											_v36 = _v24;
          											_v32 = _v28;
          										}
          										if(E004027FC(_a8,  &_v308) == 0) {
          											goto L20;
          										}
          										_t98 = _t98 + 1;
          										if(_t98 < _v12) {
          											_t88 = 0;
          											__eflags = 0;
          											continue;
          										} else {
          										}
          										goto L20;
          									}
          								}
          							}
          							L20:
          							CloseHandle(_v8);
          						}
          					}
          				}
          				return _v16;
          			}


































          0x00402b45
          0x00402b4c
          0x00402b4f
          0x00402b59
          0x00402c6d
          0x00402c6d
          0x00402c73
          0x00402c79
          0x00402c7f
          0x00402c85
          0x00402c88
          0x00402c8b
          0x00402c9e
          0x00402ca5
          0x00402cab
          0x00402d2a
          0x00402d2a
          0x00402d2c
          0x00000000
          0x00000000
          0x00402cc0
          0x00402ccb
          0x00402cce
          0x00402cd4
          0x00402cda
          0x00402cda
          0x00402cdc
          0x00402cdc
          0x00402ce3
          0x00402cea
          0x00402ceb
          0x00402ceb
          0x00402cf5
          0x00402cfe
          0x00402d0b
          0x00402d11
          0x00402d16
          0x00402d18
          0x00402d24
          0x00000000
          0x00402d24
          0x00000000
          0x00402d18
          0x00000000
          0x00402d2a
          0x00402c8b
          0x00402b5f
          0x00402b5f
          0x00402b65
          0x00000000
          0x00402b6b
          0x00402b74
          0x00402b7c
          0x00402b7f
          0x00402b88
          0x00402b89
          0x00402b94
          0x00402b95
          0x00402b9e
          0x00402ba4
          0x00402ba4
          0x00402ba8
          0x00402baf
          0x00402bb1
          0x00402bc0
          0x00402bc9
          0x00402bcf
          0x00402be1
          0x00402be9
          0x00402bf0
          0x00402bf4
          0x00402c05
          0x00402c0b
          0x00402c1d
          0x00402c22
          0x00402c27
          0x00402c28
          0x00402c2e
          0x00402c39
          0x00402c3e
          0x00402c44
          0x00402c44
          0x00402c58
          0x00000000
          0x00000000
          0x00402c5e
          0x00402c62
          0x00402bbe
          0x00402bbe
          0x00000000
          0x00000000
          0x00402c68
          0x00000000
          0x00402c62
          0x00402bc0
          0x00402bb1
          0x00402d2e
          0x00402d31
          0x00402d31
          0x00402b7f
          0x00402b65
          0x00402d3e

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$CloseHandleOpenProcess
          • String ID:
          • API String ID: 2659917700-0
          • Opcode ID: 1ebf7961364a92b06d82b9fe625fa98a7b0d8ac1040caa31b57378f6bf9ea446
          • Instruction ID: 31624b9f32d3fd1142d46a14fe65249d5835e2d161884a26e909a5a6c6e23d97
          • Opcode Fuzzy Hash: 1ebf7961364a92b06d82b9fe625fa98a7b0d8ac1040caa31b57378f6bf9ea446
          • Instruction Fuzzy Hash: 59510DB190021CABDB11DFA5DD89AEEB7B8BB08304F0444BAE505F6290D7749E54CF69
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 54%
          			E00405A08(void* __eflags, intOrPtr* _a4, intOrPtr _a8, intOrPtr* _a12) {
          				signed int _v12;
          				char* _v16;
          				signed int _v20;
          				signed int _v24;
          				signed int _v28;
          				signed int _v32;
          				char _v52;
          				char _v72;
          				void _v100;
          				void* __ebx;
          				signed int _t56;
          				intOrPtr* _t66;
          				void* _t67;
          				signed int _t73;
          				signed int _t75;
          				intOrPtr _t78;
          				char* _t84;
          				intOrPtr _t91;
          				intOrPtr* _t99;
          				intOrPtr* _t103;
          				void* _t105;
          				void* _t106;
          
          				_t75 = 6;
          				memcpy( &_v100, "<td bgcolor=#%s nowrap>%s", _t75 << 2);
          				_t106 = _t105 + 0xc;
          				asm("movsw");
          				asm("movsd");
          				asm("movsd");
          				asm("movsd");
          				asm("movsd");
          				asm("movsw");
          				asm("movsb");
          				E004096D5(0, _a8, "<tr>");
          				_t103 = _a4;
          				_v12 = _v12 & 0x00000000;
          				_pop(_t78);
          				if( *((intOrPtr*)(_t103 + 0x24)) > 0) {
          					do {
          						_t56 = _v12;
          						_t73 =  *( *((intOrPtr*)(_t103 + 0x28)) + _t56 * 4);
          						_t84 =  &_v100;
          						if( *((intOrPtr*)((_t73 << 4) +  *((intOrPtr*)(_t103 + 0x38)) + 4)) == 0) {
          							_t84 =  &_v52;
          						}
          						_t99 = _a12;
          						_v32 = _v32 | 0xffffffff;
          						_v28 = _v28 | 0xffffffff;
          						_v24 = _v24 | 0xffffffff;
          						_v20 = _v20 & 0x00000000;
          						_v16 = _t84;
          						 *((intOrPtr*)( *_t103 + 0x30))(4, _t56, _t99,  &_v32);
          						E004013F6(_v32,  &_v72);
          						E00401387( *((intOrPtr*)(_t103 + 0x58)),  *((intOrPtr*)( *_t99))(_t73,  *(_t103 + 0x54)));
          						 *((intOrPtr*)( *_t103 + 0x48))( *((intOrPtr*)(_t103 + 0x58)), _t99, _t73);
          						_t66 =  *((intOrPtr*)(_t103 + 0x58));
          						_t91 =  *_t66;
          						if(_t91 == 0 || _t91 == 0x20) {
          							_t67 = _t66 - 1;
          							do {
          								_t78 =  *((intOrPtr*)(_t67 + 1));
          								_t67 = _t67 + 1;
          							} while (_t78 != 0);
          							asm("movsd");
          							asm("movsw");
          							asm("movsb");
          							_t103 = _a4;
          						}
          						E004015BF( &_v32,  *((intOrPtr*)(_t103 + 0x5c)),  *((intOrPtr*)(_t103 + 0x58)));
          						sprintf( *(_t103 + 0x54), _v16,  &_v72,  *((intOrPtr*)(_t103 + 0x5c)));
          						E004096D5(_t78, _a8,  *(_t103 + 0x54));
          						_t106 = _t106 + 0x20;
          						_v12 = _v12 + 1;
          					} while (_v12 <  *((intOrPtr*)(_t103 + 0x24)));
          				}
          				return E004096D5(_t78, _a8, "\r\n");
          			}

























          0x00405a13
          0x00405a1c
          0x00405a1c
          0x00405a1e
          0x00405a28
          0x00405a29
          0x00405a2a
          0x00405a2b
          0x00405a2c
          0x00405a36
          0x00405a37
          0x00405a3c
          0x00405a3f
          0x00405a48
          0x00405a49
          0x00405a4f
          0x00405a52
          0x00405a55
          0x00405a65
          0x00405a68
          0x00405a6a
          0x00405a6a
          0x00405a6d
          0x00405a72
          0x00405a76
          0x00405a7a
          0x00405a7e
          0x00405a82
          0x00405a8f
          0x00405a99
          0x00405aaf
          0x00405abd
          0x00405ac0
          0x00405ac3
          0x00405ac7
          0x00405ace
          0x00405acf
          0x00405acf
          0x00405ad2
          0x00405ad3
          0x00405ade
          0x00405adf
          0x00405ae1
          0x00405ae2
          0x00405ae2
          0x00405aee
          0x00405b00
          0x00405b0b
          0x00405b10
          0x00405b13
          0x00405b19
          0x00405a4f
          0x00405b35

          APIs
            • Part of subcall function 004096D5: WriteFile.KERNEL32(00000001,00000007,00000008,?,00000000,?,Mqt,00405D6B,00000001,00000001,004066BB,00000007,],00407088,00000001,?), ref: 004096F5
          • sprintf.MSVCRT ref: 00405B00
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: FileWritesprintf
          • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
          • API String ID: 1487071335-4153097237
          • Opcode ID: 702a3c32cabf1f88c58567333f5c504749f0d3cc3fa98b31e56703f1878b1f50
          • Instruction ID: b39776ee9a5446e31fe3793a89f3811eb2b3ec2e01c3e99e1ec3be62203b76ce
          • Opcode Fuzzy Hash: 702a3c32cabf1f88c58567333f5c504749f0d3cc3fa98b31e56703f1878b1f50
          • Instruction Fuzzy Hash: A641C131900709AFDB25DF41C845AAFBBB6FF44324F20452AF8526B6E1C775A915CF44
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 76%
          			E004065EA(void* __ecx, void* __edi, void* __esi, void* __eflags, intOrPtr _a4, intOrPtr* _a8) {
          				void _v259;
          				char _v260;
          				signed int _t36;
          				char* _t47;
          				void* _t49;
          
          				E004096D5(__ecx, _a4, "<item>\r\n");
          				_t36 = 0;
          				_pop(_t39);
          				if( *((intOrPtr*)(__edi + 0x24)) > 0) {
          					do {
          						_v260 = 0;
          						memset( &_v259, 0, 0xfe);
          						_t39 = _a8;
          						E00401387( *((intOrPtr*)(__edi + 0x58)),  *((intOrPtr*)( *_a8))( *( *((intOrPtr*)(__edi + 0x28)) + _t36 * 4),  *((intOrPtr*)(__edi + 0x54))));
          						_t47 =  &_v260;
          						E00405DB4( *((intOrPtr*)(( *( *((intOrPtr*)(__edi + 0x28)) + _t36 * 4) << 4) +  *((intOrPtr*)(__edi + 0x38)) + 0xc)), _t47);
          						sprintf( *(__edi + 0x5c), "<%s>%s</%s>\r\n", _t47,  *((intOrPtr*)(__edi + 0x58)), _t47);
          						E004096D5(_a8, _a4,  *(__edi + 0x5c));
          						_t49 = _t49 + 0x28;
          						_t36 = _t36 + 1;
          					} while (_t36 <  *((intOrPtr*)(__edi + 0x24)));
          				}
          				return E004096D5(_t39, _a4, "</item>\r\n");
          			}








          0x004065fc
          0x00406601
          0x00406607
          0x00406608
          0x0040660b
          0x00406619
          0x00406620
          0x0040662b
          0x0040663e
          0x0040664d
          0x00406653
          0x00406667
          0x00406672
          0x00406677
          0x0040667a
          0x0040667b
          0x00406680
          0x00406692

          APIs
            • Part of subcall function 004096D5: WriteFile.KERNEL32(00000001,00000007,00000008,?,00000000,?,Mqt,00405D6B,00000001,00000001,004066BB,00000007,],00407088,00000001,?), ref: 004096F5
          • memset.MSVCRT ref: 00406620
            • Part of subcall function 00405DB4: _strlwr.MSVCRT ref: 00405DDE
          • sprintf.MSVCRT ref: 00406667
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: FileWrite_strlwrmemsetsprintf
          • String ID: <%s>%s</%s>$</item>$<item>
          • API String ID: 3790356888-2769808009
          • Opcode ID: 0f63e4aab8ab1bf85a5962dcf09dded0389523d36828774249a28022f24372c7
          • Instruction ID: fde61e8dda856c35f80db56188135188a95777a6ba072418582c54b9e59401eb
          • Opcode Fuzzy Hash: 0f63e4aab8ab1bf85a5962dcf09dded0389523d36828774249a28022f24372c7
          • Instruction Fuzzy Hash: DA11C431904616BFDB11EB55CC42F8A7BA4FF04318F10403AF809669E2DB7ABC65CB98
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 67%
          			E00402ABB(char* __esi, intOrPtr _a4) {
          				void _v267;
          				char _v268;
          				char* _t8;
          
          				_t8 = strchr(__esi, 0x5c);
          				if(_t8 == 0) {
          					if(strchr(__esi, 0x2e) == 0) {
          						_v268 = 0;
          						memset( &_v267, 0, 0x104);
          						E00409B6E(_a4,  &_v268);
          						_t8 =  &_v268;
          						_push(__esi);
          						_push(_t8);
          						L0040107A();
          						L3:
          						if(_t8 != 0) {
          							return 0;
          						} else {
          							return  &(_t8[1]);
          						}
          					}
          					_t8 = E00409317(_a4);
          					_push(__esi);
          					_push(_t8);
          					L2:
          					L0040107A();
          					goto L3;
          				}
          				_push(__esi);
          				_push(_a4);
          				goto L2;
          			}






          0x00402ac7
          0x00402ad0
          0x00402af0
          0x00402b0c
          0x00402b13
          0x00402b22
          0x00402b27
          0x00402b2d
          0x00402b2e
          0x00402b2f
          0x00402add
          0x00402adf
          0x00402b3c
          0x00402ae1
          0x00402ae3
          0x00402ae3
          0x00402adf
          0x00402af5
          0x00402afa
          0x00402afb
          0x00402ad6
          0x00402ad6
          0x00000000
          0x00402adc
          0x00402ad2
          0x00402ad3
          0x00000000

          APIs
          • strchr.MSVCRT ref: 00402AC7
          • _stricmp.MSVCRT(00000000), ref: 00402AD6
          • strchr.MSVCRT ref: 00402AE7
          • memset.MSVCRT ref: 00402B13
            • Part of subcall function 00409B6E: strrchr.MSVCRT ref: 00409B87
          • _stricmp.MSVCRT(00000000,?,00000000,?,00000000,00000104), ref: 00402B2F
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: _stricmpstrchr$memsetstrrchr
          • String ID:
          • API String ID: 1556096600-0
          • Opcode ID: 96ca6cb642b6ab74d963f4bce240b6dfa48fa6025da02c3aed7fee4a850514b8
          • Instruction ID: 3d94280b60d1943fbf4895c28001f677b7c53e9330229df40d0712a5b19e3b1f
          • Opcode Fuzzy Hash: 96ca6cb642b6ab74d963f4bce240b6dfa48fa6025da02c3aed7fee4a850514b8
          • Instruction Fuzzy Hash: 1501DB3570824465EB34A672DD06FCB379C9F00358F10007BB585B54D1EEF8E9C14AA9
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040655E(intOrPtr* __ecx, intOrPtr _a4) {
          				void _v259;
          				char _v260;
          				void _v515;
          				char _v516;
          				void* __esi;
          				void* _t17;
          				intOrPtr* _t26;
          				char* _t28;
          
          				_t24 = __ecx;
          				_t26 = __ecx;
          				_v260 = 0;
          				memset( &_v259, 0, 0xfe);
          				_v516 = 0;
          				memset( &_v515, 0, 0xfe);
          				E004096D5(_t24, _a4, "<?xml version=\"1.0\"  encoding=\"ISO-8859-1\" ?>\r\n");
          				_t17 =  *((intOrPtr*)( *_t26 + 0x20))();
          				_t28 =  &_v260;
          				E00405DB4(_t17, _t28);
          				sprintf( &_v516, "<%s>\r\n", _t28);
          				return E004096D5(_t26, _a4,  &_v516);
          			}











          0x0040655e
          0x00406578
          0x0040657a
          0x00406581
          0x00406590
          0x00406597
          0x004065a4
          0x004065b0
          0x004065b3
          0x004065b9
          0x004065cd
          0x004065e7

          APIs
          • memset.MSVCRT ref: 00406581
          • memset.MSVCRT ref: 00406597
            • Part of subcall function 004096D5: WriteFile.KERNEL32(00000001,00000007,00000008,?,00000000,?,Mqt,00405D6B,00000001,00000001,004066BB,00000007,],00407088,00000001,?), ref: 004096F5
            • Part of subcall function 00405DB4: _strlwr.MSVCRT ref: 00405DDE
          • sprintf.MSVCRT ref: 004065CD
          Strings
          • <%s>, xrefs: 004065C7
          • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 0040659C
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$FileWrite_strlwrsprintf
          • String ID: <%s>$<?xml version="1.0" encoding="ISO-8859-1" ?>
          • API String ID: 2668691490-1998499579
          • Opcode ID: 70dd308df9ff3523b82206564b9d0d24c505a0913d072cffb5b4b132d72fb44d
          • Instruction ID: 627c366ac279c3a02e6257e4d4abee7f173dcc254d430477c9bf57c17902ba05
          • Opcode Fuzzy Hash: 70dd308df9ff3523b82206564b9d0d24c505a0913d072cffb5b4b132d72fb44d
          • Instruction Fuzzy Hash: 8401A272A001296BDB20E75ACC46FDA7A6CAF44308F0400B7B50DF71D3DB789E948BA5
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 84%
          			E004063D1(void* __esi) {
          				void* _t9;
          				long _t12;
          				void* _t20;
          
          				if( *((intOrPtr*)(__esi + 0x1c4)) != 0) {
          					E00405688(__esi, 4, 1);
          					_t12 = ImageList_Create(0x10, 0x10, 0x19, 1, 1);
          					 *(__esi + 0x1a0) = _t12;
          					__imp__ImageList_SetImageCount(_t12, 0, _t20);
          					ImageList_AddMasked( *(__esi + 0x1a0), E00409902(0x87),  *(__esi + 0x50));
          					ImageList_AddMasked( *(__esi + 0x1a0), E00409902(0x6c),  *(__esi + 0x50));
          					return SendMessageA( *(__esi + 0x190), 0x1003, 2,  *(__esi + 0x1a0));
          				}
          				return _t9;
          			}






          0x004063d8
          0x004063e1
          0x004063f0
          0x004063f9
          0x004063ff
          0x00406420
          0x00406434
          0x00000000
          0x0040644f
          0x00406450

          APIs
          • ImageList_Create.COMCTL32(00000010,00000010,00000019,00000001,00000001,00000004,00000001,00000000,0040B488), ref: 004063F0
          • ImageList_SetImageCount.COMCTL32(00000000,00000000), ref: 004063FF
            • Part of subcall function 00409902: GetModuleHandleA.KERNEL32(00000000,00406412,00000087,?), ref: 00409904
            • Part of subcall function 00409902: LoadImageA.USER32 ref: 0040991C
          • ImageList_AddMasked.COMCTL32(?,00000000,?), ref: 00406420
          • ImageList_AddMasked.COMCTL32(?,00000000,?), ref: 00406434
          • SendMessageA.USER32(?,00001003,00000002,?), ref: 00406449
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Image$List_$Masked$CountCreateHandleLoadMessageModuleSend
          • String ID:
          • API String ID: 4182045780-0
          • Opcode ID: 26f374aef07ca369e4edf62f3c6e46d7972b97e7ebd2828148313294c29697fd
          • Instruction ID: 21a4dcc33a34f3f9d67521fe10afb2230a2aac32d3ac6fe916b77ba968a417e2
          • Opcode Fuzzy Hash: 26f374aef07ca369e4edf62f3c6e46d7972b97e7ebd2828148313294c29697fd
          • Instruction Fuzzy Hash: 3901E171281704BEFA3227609C0AFDA7665FB48B04F40483DF395795E2C6F66450DB19
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00407714(void* __eax, intOrPtr _a4) {
          				char _t4;
          				intOrPtr _t5;
          				char _t6;
          
          				if(__eax != 4) {
          					if(__eax != 5) {
          						if(__eax == 6) {
          							_t6 = "strings"; // 0x69727473
          							 *0x4128a8 = _t6;
          							_t5 =  *0x40fd74; // 0x73676e
          							L9:
          							 *0x4128ac = _t5;
          							return _t5;
          						}
          						if(__eax == 0) {
          							_t4 = "general"; // 0x656e6567
          							 *0x4128a8 = _t4;
          							_t5 =  *0x40fd7c; // 0x6c6172
          							goto L9;
          						}
          						return __eax;
          					} else {
          						return sprintf(0x4128a8, ??, "dialog_%d", _a4);
          						goto L4;
          					}
          				} else {
          					return sprintf(0x4128a8, ??, "menu_%d", _a4);
          					L4:
          				}
          			}






          0x00407717
          0x00407727
          0x00407743
          0x00407745
          0x0040774a
          0x0040774f
          0x00407769
          0x00407769
          0x00000000
          0x00407769
          0x00407758
          0x0040775a
          0x0040775f
          0x00407764
          0x00000000
          0x00407764
          0x0040776e
          0x00407729
          0x0040773f
          0x00000000
          0x0040773f
          0x00407719
          0x0040773f
          0x00407732
          0x0040773f

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: sprintf
          • String ID: dialog_%d$general$menu_%d$strings
          • API String ID: 590974362-502967061
          • Opcode ID: a17a5228ab9808788ccc858fc477c9d0032b53db8640bbc1f45ff4f354d33841
          • Instruction ID: dc2664122fd744ac89bb07bcd6245be0c15406158903a1f35011880d38323053
          • Opcode Fuzzy Hash: a17a5228ab9808788ccc858fc477c9d0032b53db8640bbc1f45ff4f354d33841
          • Instruction Fuzzy Hash: FBF01274914700EEC620DB24DE8091532E0EB48744B204537E406F77A0E678B8549B0E
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 56%
          			E0040324B(signed int _a4) {
          				signed int _t8;
          				intOrPtr* _t11;
          				signed int _t14;
          				void** _t17;
          				void** _t20;
          
          				_t8 =  *0x412b08; // 0x0
          				if(_t8 != 0) {
          					_push(2);
          					_t20 = _a4 * 0xc + _t8;
          					_push(4);
          					_t17 =  &(_t20[2]);
          					_push(_t17);
          					L00401350();
          					_a4 = _a4 & 0x00000000;
          					_t14 = _t8;
          					if( *0x412b08 != 0) {
          						if(_t14 == 0) {
          							L0040133E();
          							_a4 = _t8;
          						}
          						_t11 = E00408342(0x412148, _t20[1]);
          						if(_t11 != 0) {
          							 *((intOrPtr*)( *_t11))( *_t17, _t14, _a4);
          						}
          						CloseHandle( *_t20);
          						 *_t20 =  *_t20 & 0x00000000;
          					}
          				}
          				return 0;
          			}








          0x0040324e
          0x00403258
          0x00403260
          0x00403262
          0x00403264
          0x00403266
          0x00403269
          0x0040326a
          0x0040326f
          0x0040327a
          0x0040327c
          0x00403280
          0x00403282
          0x00403287
          0x00403287
          0x00403292
          0x00403299
          0x004032a5
          0x004032a5
          0x004032a9
          0x004032af
          0x004032af
          0x0040327c
          0x004032b8

          APIs
          • gethostbyaddr.WS2_32(?,00000004,00000002), ref: 0040326A
          • WSAGetLastError.WS2_32 ref: 00403282
          • CloseHandle.KERNEL32(?,?), ref: 004032A9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: CloseErrorHandleLastgethostbyaddr
          • String ID: H!A
          • API String ID: 829321779-210526607
          • Opcode ID: 63e709186d85802a625cb6053a47f72908d93a1828cbdd8e0367ca52442d84ca
          • Instruction ID: 2a1d009462b8a7b488afa1501fdc0e19cc9a1357039da1a28aff8c3b3d262e5a
          • Opcode Fuzzy Hash: 63e709186d85802a625cb6053a47f72908d93a1828cbdd8e0367ca52442d84ca
          • Instruction Fuzzy Hash: B101DB31200304AFE7109F51DD81B677BA8EB44755F10443EFD44EB290D7759D54CB98
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 75%
          			E004079CB(void* __ecx, void* __eflags, struct HWND__* _a4) {
          				void _v4103;
          				char _v4104;
          				void* _t8;
          				void* _t11;
          
          				_t18 = __ecx;
          				_t8 = E0040EAD0(0x1004, __ecx);
          				_t22 =  *0x4127a0;
          				if( *0x4127a0 != 0) {
          					_v4104 = 0;
          					memset( &_v4103, 0, 0x1000);
          					_push( *0x4128e8);
          					_t11 = 5;
          					E00407714(_t11);
          					if(E0040762A(_t18, _t22, "caption",  &_v4104) != 0) {
          						SetWindowTextA(_a4,  &_v4104);
          					}
          					return EnumChildWindows(_a4, E0040776F, 0);
          				}
          				return _t8;
          			}







          0x004079cb
          0x004079d3
          0x004079d8
          0x004079df
          0x004079ef
          0x004079f6
          0x004079fb
          0x00407a03
          0x00407a04
          0x00407a1f
          0x00407a2b
          0x00407a2b
          0x00000000
          0x00407a3b
          0x00407a42

          APIs
          • memset.MSVCRT ref: 004079F6
            • Part of subcall function 00407714: sprintf.MSVCRT ref: 00407737
            • Part of subcall function 0040762A: memset.MSVCRT ref: 0040764E
            • Part of subcall function 0040762A: GetPrivateProfileStringA.KERNEL32(004128A8,0000000A,0040F469,?,00001000,004127A0), ref: 00407670
          • SetWindowTextA.USER32(?,?), ref: 00407A2B
          • EnumChildWindows.USER32 ref: 00407A3B
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindowssprintf
          • String ID: caption
          • API String ID: 670118382-4135340389
          • Opcode ID: 3a16401db87154e29734f327cd967811c32ad6f593e80b9db89ea3d4c520e0b4
          • Instruction ID: eb6801712ff5f3793bcf583c275848c14d25528d0646c5adc5be71172eec7444
          • Opcode Fuzzy Hash: 3a16401db87154e29734f327cd967811c32ad6f593e80b9db89ea3d4c520e0b4
          • Instruction Fuzzy Hash: 15F02B30A442487EDB22A755DD06BC937689B08745F0044B2F704F51E0D7F4BAC48F5E
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 58%
          			E0040925E(struct HWND__* _a4) {
          				void _v259;
          				char _v260;
          				signed int _t10;
          
          				_v260 = 0;
          				memset( &_v259, 0, 0xff);
          				GetClassNameA(_a4,  &_v260, 0xff);
          				_t10 =  &_v260;
          				_push("edit");
          				_push(_t10);
          				L0040107A();
          				asm("sbb eax, eax");
          				return  ~_t10 + 1;
          			}






          0x00409277
          0x0040927e
          0x00409291
          0x00409297
          0x0040929d
          0x004092a2
          0x004092a3
          0x004092ac
          0x004092b1

          APIs
          • memset.MSVCRT ref: 0040927E
          • GetClassNameA.USER32(?,00000000,000000FF), ref: 00409291
          • _stricmp.MSVCRT(00000000,edit), ref: 004092A3
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ClassName_stricmpmemset
          • String ID: edit
          • API String ID: 3665161774-2167791130
          • Opcode ID: 1cfecf832dc5d596aa0e39dbd4597336c6fe878ab0f6f15d6d08781b49a6f9ef
          • Instruction ID: 3c0eebbde036c6db2872d526128da02f57f0528f3baf21114fc6d7e576a942c9
          • Opcode Fuzzy Hash: 1cfecf832dc5d596aa0e39dbd4597336c6fe878ab0f6f15d6d08781b49a6f9ef
          • Instruction Fuzzy Hash: 02E09B72D4412E6ADB31F665DC01FE537ACEF18304F0400B6B849F14D1E5B4A6884BA4
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040829A(struct HINSTANCE__** __eax) {
          				void* __esi;
          				void* _t4;
          				struct HINSTANCE__** _t10;
          
          				_t10 = __eax;
          				if( *((intOrPtr*)(__eax)) == 0) {
          					 *_t10 = LoadLibraryA("Iphlpapi.dll");
          					_t4 = E00408257(_t10);
          					if( *((intOrPtr*)(_t10 + 4)) == 0) {
          						E00408289(_t10);
          						 *_t10 = LoadLibraryA("icmp.dll");
          						_t4 = E00408257(_t10);
          					}
          					return _t4;
          				}
          				return __eax;
          			}






          0x0040829b
          0x004082a0
          0x004082b0
          0x004082b2
          0x004082bb
          0x004082bd
          0x004082c9
          0x004082cb
          0x004082cb
          0x00000000
          0x004082d0
          0x004082d2

          APIs
          • LoadLibraryA.KERNEL32(Iphlpapi.dll,?,?,004082F0), ref: 004082AE
            • Part of subcall function 00408257: GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 0040826A
            • Part of subcall function 00408257: GetProcAddress.KERNEL32(?,IcmpCloseHandle), ref: 00408276
            • Part of subcall function 00408257: GetProcAddress.KERNEL32(?,IcmpSendEcho), ref: 00408282
            • Part of subcall function 00408289: FreeLibrary.KERNEL32(00000000,0040BBE2,?,?,004044A2,00000001,00404C51,00000000,00000000,?,00000000,00000000,00000000,74714DE0,?,00000000), ref: 00408290
          • LoadLibraryA.KERNEL32(icmp.dll,?,?,004082F0), ref: 004082C7
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: AddressLibraryProc$Load$Free
          • String ID: Iphlpapi.dll$icmp.dll
          • API String ID: 3890210519-413374463
          • Opcode ID: 4fec41d2b5989501e07b3d4c9651d397d1b9b3b4a86371711c18ca54078e8af7
          • Instruction ID: 0b6e63d0cae7dd16096740f2b8d8435cf9b177e91a2a56ff30e9c7847e705a7a
          • Opcode Fuzzy Hash: 4fec41d2b5989501e07b3d4c9651d397d1b9b3b4a86371711c18ca54078e8af7
          • Instruction Fuzzy Hash: 31E0EC31540B149ECB307B7AAA05706F6D45FE1714F2108BFE4C1B35D0DABC48848A59
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 58%
          			E00408B42(void* __ecx, intOrPtr _a4) {
          				signed int _v8;
          				_Unknown_base(*)()* _t7;
          
          				_v8 = _v8 & 0x00000000;
          				_t7 = GetProcAddress(GetModuleHandleA("kernel32"), "IsWow64Process");
          				if(_t7 != 0) {
          					 *_t7(_a4,  &_v8);
          				}
          				return _v8;
          			}





          0x00408b46
          0x00408b5b
          0x00408b63
          0x00408b6c
          0x00408b6c
          0x00408b72

          APIs
          • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process), ref: 00408B54
          • GetProcAddress.KERNEL32(00000000), ref: 00408B5B
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: AddressHandleModuleProc
          • String ID: IsWow64Process$kernel32
          • API String ID: 1646373207-3789238822
          • Opcode ID: aecdae43805f87fb8adcc04bb4af8d751b0385bff0289bf7daa79f207a46c273
          • Instruction ID: 14f95c188769b76f73108f8b96d627f79ad2ac93a913c914285f3619fafbbc17
          • Opcode Fuzzy Hash: aecdae43805f87fb8adcc04bb4af8d751b0385bff0289bf7daa79f207a46c273
          • Instruction Fuzzy Hash: 32D01274604209FFDB14DBA1DE0AB9D7778FB04749F200079B901F2490DBB8EE049718
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 58%
          			E004017DE(intOrPtr* __esi, intOrPtr _a4) {
          				_Unknown_base(*)()* _t3;
          
          				 *__esi = 0x34;
          				_t3 = GetProcAddress(GetModuleHandleA("user32.dll"), "GetComboBoxInfo");
          				if(_t3 == 0) {
          					return 0;
          				} else {
          					return  *_t3(_a4, __esi);
          				}
          			}




          0x004017e8
          0x004017f5
          0x004017fd
          0x00401809
          0x004017ff
          0x00401806
          0x00401806

          APIs
          • GetModuleHandleA.KERNEL32(user32.dll,GetComboBoxInfo,0040E654,00000000), ref: 004017EE
          • GetProcAddress.KERNEL32(00000000), ref: 004017F5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: AddressHandleModuleProc
          • String ID: GetComboBoxInfo$user32.dll
          • API String ID: 1646373207-3174150333
          • Opcode ID: 2226fdea089c3a05446b4ada4f483745aefc94f6ebeb98019eec55739f6bcacf
          • Instruction ID: b83c21a91fa3469feaed3addd1857c1a91e642ba4a40d27d5acdabeb95e023ca
          • Opcode Fuzzy Hash: 2226fdea089c3a05446b4ada4f483745aefc94f6ebeb98019eec55739f6bcacf
          • Instruction Fuzzy Hash: 0ED01270242215AFCB211F70CC0CB4B3E98AF90782F1444757594E54B0DBF8C9C4D62C
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004018BC() {
          				struct HINSTANCE__* _t1;
          				_Unknown_base(*)()* _t2;
          
          				if( *0x412b1c == 0) {
          					_t1 = LoadLibraryA("shell32.dll");
          					 *0x412b1c = _t1;
          					if(_t1 != 0) {
          						_t2 = GetProcAddress(_t1, "SHGetSpecialFolderPathA");
          						 *0x412b18 = _t2;
          						return _t2;
          					}
          				}
          				return _t1;
          			}





          0x004018c3
          0x004018ca
          0x004018d2
          0x004018d7
          0x004018df
          0x004018e5
          0x00000000
          0x004018e5
          0x004018d7
          0x004018ea

          APIs
          • LoadLibraryA.KERNEL32(shell32.dll,00404E57,?,00000000), ref: 004018CA
          • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 004018DF
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc
          • String ID: SHGetSpecialFolderPathA$shell32.dll
          • API String ID: 2574300362-543337301
          • Opcode ID: cf0bff61eae21087795894de178c3bfa42ec3d102e0d4c01dcc572666ab534c8
          • Instruction ID: f3029a26553a15ab45b7535dd6fa42627ec5de75f695190acadfce5a8b35013a
          • Opcode Fuzzy Hash: cf0bff61eae21087795894de178c3bfa42ec3d102e0d4c01dcc572666ab534c8
          • Instruction Fuzzy Hash: 7DD092B06483009BD720AF61EE48B823BA4B764B02F108036A401F22A8D7F856A49F5D
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 89%
          			E004060FF(intOrPtr* __esi) {
          				void* _t22;
          				void* _t24;
          				intOrPtr* _t30;
          
          				_t30 = __esi;
          				_t1 = _t30 + 4; // 0x4
          				_t24 = _t1;
          				 *__esi = 0x40ff70;
          				_t22 = memset(_t24, 0, 0x1d0);
          				_push(0x14);
          				 *_t24 = 0;
          				L004010A4();
          				if(_t22 == 0) {
          					_t22 = 0;
          				} else {
          					 *((intOrPtr*)(_t22 + 0xc)) = 0;
          					 *_t22 = 0;
          					 *((intOrPtr*)(_t22 + 4)) = 0;
          					 *((intOrPtr*)(_t22 + 0x10)) = 0x100;
          					 *((intOrPtr*)(_t22 + 8)) = 0;
          				}
          				_push(0x14);
          				 *(_t30 + 8) = _t22;
          				L004010A4();
          				if(_t22 == 0) {
          					_t22 = 0;
          				} else {
          					 *((intOrPtr*)(_t22 + 0xc)) = 0;
          					 *_t22 = 0;
          					 *((intOrPtr*)(_t22 + 4)) = 0;
          					 *((intOrPtr*)(_t22 + 0x10)) = 0x100;
          					 *((intOrPtr*)(_t22 + 8)) = 0;
          				}
          				_push(0x14);
          				 *(_t30 + 0xc) = _t22;
          				L004010A4();
          				if(_t22 == 0) {
          					_t22 = 0;
          				} else {
          					 *((intOrPtr*)(_t22 + 0xc)) = 0;
          					 *_t22 = 0;
          					 *((intOrPtr*)(_t22 + 4)) = 0;
          					 *((intOrPtr*)(_t22 + 0x10)) = 0x100;
          					 *((intOrPtr*)(_t22 + 8)) = 0;
          				}
          				_push(0x14);
          				 *(_t30 + 0x10) = _t22;
          				L004010A4();
          				if(_t22 == 0) {
          					_t22 = 0;
          				} else {
          					 *((intOrPtr*)(_t22 + 0xc)) = 0;
          					 *_t22 = 0;
          					 *((intOrPtr*)(_t22 + 4)) = 0;
          					 *((intOrPtr*)(_t22 + 0x10)) = 0x100;
          					 *((intOrPtr*)(_t22 + 8)) = 0;
          				}
          				 *(_t30 + 0x14) = _t22;
          				return _t30;
          			}






          0x004060ff
          0x00406108
          0x00406108
          0x0040610d
          0x00406113
          0x00406118
          0x0040611a
          0x0040611c
          0x0040612b
          0x0040613d
          0x0040612d
          0x0040612d
          0x00406130
          0x00406132
          0x00406135
          0x00406138
          0x00406138
          0x0040613f
          0x00406141
          0x00406144
          0x0040614c
          0x0040615e
          0x0040614e
          0x0040614e
          0x00406151
          0x00406153
          0x00406156
          0x00406159
          0x00406159
          0x00406160
          0x00406162
          0x00406165
          0x0040616d
          0x0040617f
          0x0040616f
          0x0040616f
          0x00406172
          0x00406174
          0x00406177
          0x0040617a
          0x0040617a
          0x00406181
          0x00406183
          0x00406186
          0x0040618e
          0x004061a0
          0x00406190
          0x00406190
          0x00406193
          0x00406195
          0x00406198
          0x0040619b
          0x0040619b
          0x004061a3
          0x004061a9

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ??2@$memset
          • String ID:
          • API String ID: 1860491036-0
          • Opcode ID: 22f9adb3412914d52b21ad88d3f8d37356db5ee118e6f1e6b33e1133ec302bd2
          • Instruction ID: 043405e180bbfa69a68fd3ddffe9275c3d489b42cb6acf531a6d8dba20b1be92
          • Opcode Fuzzy Hash: 22f9adb3412914d52b21ad88d3f8d37356db5ee118e6f1e6b33e1133ec302bd2
          • Instruction Fuzzy Hash: ED21C4B4A003008ED7219F2B8885956FAE4FF94310B6AC8AFD159DF6B2D7B8C851CB15
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 98%
          			E00402986(void* __eax, short* __ebx) {
          				void _v267;
          				char _v268;
          				intOrPtr* _t21;
          				char* _t23;
          				void* _t26;
          				void* _t33;
          				unsigned int _t34;
          				intOrPtr* _t41;
          				void* _t42;
          				intOrPtr* _t43;
          				short* _t44;
          				void* _t46;
          				char _t48;
          				void* _t49;
          				void _t50;
          				signed int _t52;
          				char _t58;
          				void* _t59;
          				intOrPtr _t60;
          				char _t61;
          				char _t62;
          				void* _t64;
          				void _t65;
          				void* _t67;
          				void _t68;
          				void* _t70;
          				void* _t72;
          				void* _t74;
          				void* _t77;
          				void* _t83;
          
          				_t44 = __ebx;
          				_t21 = __eax;
          				_t84 = __eax;
          				if( *((char*)(__eax + 1)) != 0x3a) {
          					_t23 = strchr(__eax + 2, 0x3a);
          					_pop(_t46);
          					if(_t23 == 0) {
          						_t74 = E004095D5(_t84, _t46, "\\systemroot");
          						if(_t74 < 0) {
          							if( *_t84 != 0x5c) {
          								_t26 = _t84;
          								_t64 = __ebx - _t84;
          								do {
          									_t48 =  *_t26;
          									 *((char*)(_t64 + _t26)) = _t48;
          									_t26 = _t26 + 1;
          								} while (_t48 != 0);
          							} else {
          								_v268 = 0;
          								memset( &_v267, 0, 0x104);
          								E00409225( &_v268);
          								 *__ebx = _v268;
          								_t33 = _t84;
          								 *((char*)(__ebx + 2)) = 0;
          								_t49 = _t33;
          								do {
          									_t65 =  *_t33;
          									_t33 = _t33 + 1;
          								} while (_t65 != 0);
          								_t34 = _t33 - _t49;
          								_t77 = __ebx - 1;
          								do {
          									_t50 =  *(_t77 + 1);
          									_t77 = _t77 + 1;
          								} while (_t50 != 0);
          								goto L21;
          							}
          						} else {
          							_v268 = 0;
          							memset( &_v267, 0, 0x104);
          							E00409225( &_v268);
          							_t41 =  &_v268;
          							_t67 = __ebx - _t41;
          							do {
          								_t58 =  *_t41;
          								 *((char*)(_t67 + _t41)) = _t58;
          								_t41 = _t41 + 1;
          							} while (_t58 != 0);
          							_t11 = _t84 + 0xb; // 0xb
          							_t42 = _t74 + _t11;
          							_t59 = _t42;
          							do {
          								_t68 =  *_t42;
          								_t42 = _t42 + 1;
          							} while (_t68 != 0);
          							_t34 = _t42 - _t59;
          							_t84 = _t59;
          							_t83 = __ebx - 1;
          							do {
          								_t60 =  *((intOrPtr*)(_t83 + 1));
          								_t83 = _t83 + 1;
          							} while (_t60 != 0);
          							L21:
          							_t52 = _t34 >> 2;
          							memcpy(_t84 + _t52 + _t52, _t84, memcpy(_t77, _t84, _t52 << 2) & 0x00000003);
          						}
          					} else {
          						_t43 = _t23 - 1;
          						_t70 = __ebx - _t43;
          						do {
          							_t61 =  *_t43;
          							 *((char*)(_t70 + _t43)) = _t61;
          							_t43 = _t43 + 1;
          						} while (_t61 != 0);
          					}
          				} else {
          					_t72 = __ebx - __eax;
          					do {
          						_t62 =  *_t21;
          						 *((char*)(_t72 + _t21)) = _t62;
          						_t21 = _t21 + 1;
          					} while (_t62 != 0);
          				}
          				return _t44;
          			}

































          0x00402986
          0x00402986
          0x00402990
          0x00402996
          0x004029b1
          0x004029b9
          0x004029ba
          0x004029dd
          0x004029e2
          0x00402a44
          0x00402aa7
          0x00402aa9
          0x00402aab
          0x00402aab
          0x00402aad
          0x00402ab0
          0x00402ab1
          0x00402a46
          0x00402a54
          0x00402a5b
          0x00402a67
          0x00402a73
          0x00402a76
          0x00402a7b
          0x00402a7f
          0x00402a81
          0x00402a81
          0x00402a83
          0x00402a84
          0x00402a8a
          0x00402a8c
          0x00402a8d
          0x00402a8d
          0x00402a90
          0x00402a91
          0x00000000
          0x00402a8d
          0x004029e4
          0x004029f2
          0x004029f9
          0x00402a05
          0x00402a0a
          0x00402a17
          0x00402a19
          0x00402a19
          0x00402a1b
          0x00402a1e
          0x00402a1f
          0x00402a23
          0x00402a23
          0x00402a27
          0x00402a29
          0x00402a29
          0x00402a2b
          0x00402a2c
          0x00402a32
          0x00402a34
          0x00402a36
          0x00402a37
          0x00402a37
          0x00402a3a
          0x00402a3b
          0x00402a95
          0x00402a97
          0x00402aa1
          0x00402aa1
          0x004029bc
          0x004029bc
          0x004029bf
          0x004029c1
          0x004029c1
          0x004029c3
          0x004029c6
          0x004029c7
          0x004029cb
          0x00402998
          0x0040299a
          0x0040299c
          0x0040299c
          0x0040299e
          0x004029a1
          0x004029a2
          0x004029a6
          0x00402aba

          APIs
          • strchr.MSVCRT ref: 004029B1
            • Part of subcall function 004095D5: _memicmp.MSVCRT ref: 00409615
          • memset.MSVCRT ref: 004029F9
            • Part of subcall function 00409225: GetWindowsDirectoryA.KERNEL32(00412B88,00000104,?,00402A6C,00000000,?,00000000,00000104), ref: 0040923A
          • memset.MSVCRT ref: 00402A5B
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$DirectoryWindows_memicmpstrchr
          • String ID: \systemroot
          • API String ID: 192065784-1821301763
          • Opcode ID: 620001a1641ca959dba40a467a675807d08a1b1fc6ccdaecc019a2041688ab2c
          • Instruction ID: 6097d3b08450cda3f4311a94afa6a68f0fe9f01403df4b2954c8190962c3f291
          • Opcode Fuzzy Hash: 620001a1641ca959dba40a467a675807d08a1b1fc6ccdaecc019a2041688ab2c
          • Instruction Fuzzy Hash: 9C316920B086465BDB22853C49687A37BD45FAA304F1440FBD4C9E73C2EDB88C898795
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 38%
          			E0040E669(void* __edi, void* __eflags) {
          				signed int _v8;
          				int _v12;
          				struct HWND__* _v16;
          				intOrPtr _v20;
          				intOrPtr _v24;
          				intOrPtr _v28;
          				char _v60;
          				void _v315;
          				char _v316;
          				intOrPtr* _t49;
          				void* _t51;
          				intOrPtr _t56;
          				void* _t62;
          				void* _t64;
          				signed int _t68;
          				short _t70;
          				void* _t73;
          				intOrPtr _t74;
          				void* _t76;
          				void* _t77;
          				void* _t82;
          				struct HWND__* _t83;
          				signed int _t85;
          				short* _t86;
          				void* _t87;
          				void* _t88;
          
          				_t82 = __edi;
          				_t83 = GetDlgItem( *(__edi + 4), 0x3e9);
          				_v16 = _t83;
          				E00409EF5(_t83);
          				_t68 = 0;
          				SendMessageA(_t83, 0x1036, 0, 0x26);
          				E0040A053(_t83);
          				_push(0xc8);
          				_push(0);
          				_push(0);
          				_push(_t83);
          				_t73 = 6;
          				E0040A171(0x40f469, _t73);
          				_t49 =  *((intOrPtr*)(__edi + 0xc));
          				_t74 =  *((intOrPtr*)(_t49 + 4));
          				_t88 = _t87 + 0x10;
          				_v28 = _t74;
          				_v24 =  *_t49;
          				_v12 = 0;
          				if(_t74 <= 0) {
          					L9:
          					_t51 = 2;
          					E0040A208(_t51, _t83, _t68, _t51);
          					return SetFocus(_t83);
          				} else {
          					goto L1;
          				}
          				do {
          					L1:
          					_v8 = _t68;
          					_v20 = _t68;
          					do {
          						_t85 = _v8 << 2;
          						if( *((short*)(_v24 + _t85 + 2)) == _v12) {
          							_v316 = 0;
          							memset( &_v315, 0, 0xff);
          							_push(0xff);
          							_push( &_v316);
          							_push(_v8);
          							_push( *((intOrPtr*)( *((intOrPtr*)(_t82 + 0xc)) + 8)));
          							_t76 = 4;
          							_t62 = E0040A111( &_v60, _t76);
          							_t88 = _t88 + 0x1c;
          							if(_t62 != 0) {
          								_push(_v8);
          								_push(0);
          								_push(_v16);
          								_t77 = 5;
          								_t64 = E0040A0BA( &_v316, _t77);
          								_t86 = _t85 + _v24;
          								_t70 =  *_t86;
          								E00409F67(_v16, _t64, 0 | _t70 > 0x00000000);
          								_t88 = _t88 + 0x18;
          								if(_t70 == 0) {
          									 *_t86 =  *((intOrPtr*)( *((intOrPtr*)(_t82 + 0x10)) + _v20 + 0xc));
          								}
          							}
          						}
          						_v8 = _v8 + 1;
          						_t56 = _v28;
          						_v20 = _v20 + 0x14;
          					} while (_v8 < _t56);
          					_v12 = _v12 + 1;
          					_t68 = 0;
          				} while (_v12 < _t56);
          				_t83 = _v16;
          				goto L9;
          			}





























          0x0040e669
          0x0040e682
          0x0040e685
          0x0040e688
          0x0040e690
          0x0040e699
          0x0040e6a0
          0x0040e6a6
          0x0040e6ab
          0x0040e6ac
          0x0040e6ad
          0x0040e6b5
          0x0040e6b6
          0x0040e6bb
          0x0040e6be
          0x0040e6c3
          0x0040e6c8
          0x0040e6cb
          0x0040e6ce
          0x0040e6d1
          0x0040e7a1
          0x0040e7a3
          0x0040e7a7
          0x0040e7b9
          0x00000000
          0x00000000
          0x00000000
          0x0040e6d7
          0x0040e6d7
          0x0040e6d7
          0x0040e6da
          0x0040e6dd
          0x0040e6e3
          0x0040e6ee
          0x0040e703
          0x0040e70a
          0x0040e718
          0x0040e71f
          0x0040e720
          0x0040e723
          0x0040e729
          0x0040e72a
          0x0040e72f
          0x0040e734
          0x0040e736
          0x0040e73f
          0x0040e741
          0x0040e746
          0x0040e747
          0x0040e74f
          0x0040e751
          0x0040e763
          0x0040e768
          0x0040e76d
          0x0040e77a
          0x0040e77a
          0x0040e76d
          0x0040e734
          0x0040e77d
          0x0040e780
          0x0040e783
          0x0040e787
          0x0040e790
          0x0040e793
          0x0040e795
          0x0040e79e
          0x00000000

          APIs
          • GetDlgItem.USER32 ref: 0040E67C
            • Part of subcall function 00409EF5: SendMessageA.USER32(?,00001009,00000000,00000000), ref: 00409F02
          • SendMessageA.USER32(00000000,00001036,00000000,00000026), ref: 0040E699
            • Part of subcall function 0040A053: SendMessageA.USER32(0040E6A5,0000101C,00000000,00000000), ref: 0040A060
            • Part of subcall function 0040A171: SendMessageA.USER32(00000000,0000101B,00000000,?), ref: 0040A1B7
          • memset.MSVCRT ref: 0040E70A
            • Part of subcall function 0040A111: SendMessageA.USER32(?,00001019,00000000,?), ref: 0040A12F
            • Part of subcall function 0040A0BA: SendMessageA.USER32(?,00001007,00000000,?), ref: 0040A108
            • Part of subcall function 00409F67: SendMessageA.USER32(?,0000102B,?,?), ref: 00409F92
          • SetFocus.USER32(00000000), ref: 0040E7B0
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: MessageSend$FocusItemmemset
          • String ID:
          • API String ID: 4281309102-0
          • Opcode ID: 48640707d1499f987a14a9b78215ebb401cdfae753aa73d56d0b55e11b51c743
          • Instruction ID: b6be17ff35d8ce9602de8e075ec2aa06abd2b18790c4ef29e68e1ee6de857504
          • Opcode Fuzzy Hash: 48640707d1499f987a14a9b78215ebb401cdfae753aa73d56d0b55e11b51c743
          • Instruction Fuzzy Hash: 14418F75A00219AFDB20AF95DC82EAEB778FF04304F10447AF904BB291E7759E50CB95
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040B58B(intOrPtr _a4) {
          				void* _v12;
          				signed int _v16;
          				void* _v20;
          				intOrPtr _v24;
          				char _v28;
          				void* _v32;
          				void* __edi;
          				void* __esi;
          				intOrPtr _t41;
          				intOrPtr _t42;
          				void* _t44;
          				signed int _t48;
          				signed int _t51;
          				signed int _t53;
          				intOrPtr _t61;
          				signed int _t63;
          				signed int _t65;
          				void* _t66;
          				void* _t69;
          				signed int _t71;
          
          				_t41 = _a4;
          				_t53 = 0;
          				_v24 = 0x20;
          				_v32 = 0;
          				_v20 = 0;
          				_v28 = 0;
          				_v12 = 0;
          				if( *((intOrPtr*)(_t41 + 0x2c)) <= 0) {
          					L17:
          					_t65 = 0;
          					if(_t53 <= 0) {
          						L24:
          						if(_v32 == 0) {
          							return _t41;
          						}
          						free(_v32);
          						return _t41;
          					}
          					_t69 = _a4 + 0x1d4;
          					do {
          						if(_t65 < 0 || _t65 >= _t53) {
          							_t42 = 0;
          						} else {
          							_t42 =  *((intOrPtr*)(_v32 + _t65 * 4));
          						}
          						_t41 = E00403458(_t54, _t69, _t42);
          						Sleep(0xa);
          						_t65 = _t65 + 1;
          					} while (_t65 < _t53);
          					goto L24;
          				} else {
          					goto L1;
          				}
          				do {
          					L1:
          					_t44 = E00405532(_a4, _v12);
          					_v16 = _v16 & 0x00000000;
          					_t66 = _t44;
          					_t13 = _t66 + 0x18f; // 0x18f
          					if(E0040AA46(_t13,  &_v16) == 0) {
          						goto L16;
          					}
          					_t63 = _v16;
          					_t48 = 0;
          					 *((intOrPtr*)(_t66 + 0x3a0)) = _t63;
          					if(_t53 <= 0) {
          						L9:
          						_t71 = _t53;
          						if(_t53 >= 0) {
          							if(_t53 != 0xffffffff) {
          								E00409425( &_v28, _t53,  &_v32, 4, _v24);
          								_t53 = _v20;
          							} else {
          								free(_v32);
          							}
          							_t24 = _t71 + 1; // 0x1
          							_t51 = _t24;
          							if(_t53 < _t51) {
          								_t53 = _t51;
          								_v20 = _t53;
          							}
          							 *(_v32 + _t71 * 4) = _v16;
          						}
          						goto L16;
          					}
          					L3:
          					L3:
          					if(_t48 < 0 || _t48 >= _t53) {
          						_t61 = 0;
          					} else {
          						_t61 =  *((intOrPtr*)(_v32 + _t48 * 4));
          					}
          					if(_t61 == _t63) {
          						goto L16;
          					}
          					_t48 = _t48 + 1;
          					if(_t48 < _t53) {
          						goto L3;
          					}
          					goto L9;
          					L16:
          					_v12 = _v12 + 1;
          					_t41 = _a4;
          					_t54 = _v12;
          				} while (_v12 <  *((intOrPtr*)(_t41 + 0x2c)));
          				goto L17;
          			}























          0x0040b591
          0x0040b595
          0x0040b59c
          0x0040b5a3
          0x0040b5a6
          0x0040b5a9
          0x0040b5ac
          0x0040b5af
          0x0040b659
          0x0040b659
          0x0040b65d
          0x0040b68e
          0x0040b692
          0x0040b6a1
          0x0040b6a1
          0x0040b697
          0x00000000
          0x0040b69c
          0x0040b662
          0x0040b668
          0x0040b66a
          0x0040b678
          0x0040b670
          0x0040b673
          0x0040b673
          0x0040b67c
          0x0040b683
          0x0040b689
          0x0040b68a
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x0040b5b5
          0x0040b5b5
          0x0040b5bb
          0x0040b5c0
          0x0040b5c4
          0x0040b5ca
          0x0040b5da
          0x00000000
          0x00000000
          0x0040b5dc
          0x0040b5df
          0x0040b5e3
          0x0040b5e9
          0x0040b606
          0x0040b608
          0x0040b60a
          0x0040b60f
          0x0040b628
          0x0040b62d
          0x0040b611
          0x0040b614
          0x0040b614
          0x0040b631
          0x0040b631
          0x0040b637
          0x0040b639
          0x0040b63b
          0x0040b63b
          0x0040b644
          0x0040b644
          0x00000000
          0x0040b60a
          0x00000000
          0x0040b5eb
          0x0040b5ed
          0x0040b5fb
          0x0040b5f3
          0x0040b5f6
          0x0040b5f6
          0x0040b5ff
          0x00000000
          0x00000000
          0x0040b601
          0x0040b604
          0x00000000
          0x00000000
          0x00000000
          0x0040b647
          0x0040b647
          0x0040b64a
          0x0040b64d
          0x0040b650
          0x00000000

          APIs
          • free.MSVCRT(?,?), ref: 0040B614
          • Sleep.KERNEL32(0000000A), ref: 0040B683
          • free.MSVCRT(00000000), ref: 0040B697
            • Part of subcall function 0040AA46: memset.MSVCRT ref: 0040AA5F
            • Part of subcall function 0040AA46: atoi.MSVCRT ref: 0040AA9C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: free$Sleepatoimemset
          • String ID:
          • API String ID: 974239163-3916222277
          • Opcode ID: bf18c20752a2c3d53ceb7974e038712389ea27865c16d83284f006a5178114dd
          • Instruction ID: fe420ae7a9214f9af618cfec97980af17a631c8c40830a620ec39472056085f8
          • Opcode Fuzzy Hash: bf18c20752a2c3d53ceb7974e038712389ea27865c16d83284f006a5178114dd
          • Instruction Fuzzy Hash: F1316071E00206ABCB049F96C8C0AAEB7B5FF44318F10443FD915B72C1D73A99428B9E
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 95%
          			E0040D200(void* __ecx, struct _NETRESOURCE* _a4, void _a7) {
          				int _v8;
          				int _v12;
          				void* _v16;
          				intOrPtr _v20;
          				void* _v24;
          				void* _v28;
          				void* _v32;
          				void* _v36;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				void* _t50;
          				signed short _t59;
          				void* _t60;
          				intOrPtr* _t61;
          				void* _t70;
          				void* _t73;
          				void* _t75;
          
          				_t59 = 0xa;
          				_t70 = __ecx;
          				E00409E22( *((intOrPtr*)(_t70 + 0x878)), E00407C3F(_t59));
          				if(WNetOpenEnumA(2, 0, 0, _a4,  &_v16) != 0) {
          					L17:
          					return 0;
          				}
          				_v12 = _v12 | 0xffffffff;
          				_v8 = 1;
          				E00409E22( *((intOrPtr*)(_t70 + 0x878)), E00407C3F(_t59));
          				WNetEnumResourceA(_v16,  &_v12,  &_a7,  &_v8);
          				if(_v8 <= 1) {
          					L16:
          					WNetCloseEnum(_v16);
          					goto L17;
          				}
          				_v8 = _v8 + 0x1000;
          				_t69 = _v8;
          				_v24 = 0;
          				_v36 = 0;
          				_v32 = 0;
          				_v28 = 0;
          				_v20 = 0x100;
          				E00408559( &_v36, _v8);
          				_t73 = _v36;
          				_v12 = _v12 | 0xffffffff;
          				_t60 = 0x40f469;
          				_t50 = 0x40f469;
          				if(_t73 != 0) {
          					_t50 = _t73;
          				}
          				if(WNetEnumResourceA(_v16,  &_v12, _t50,  &_v8) != 0) {
          					L15:
          					E00408540( &_v36);
          					goto L16;
          				}
          				if(_t73 != 0) {
          					_t60 = _t73;
          				}
          				_t75 = 0;
          				if(_v12 > 0) {
          					_t61 = _t60 + 0x14;
          					do {
          						_t29 = _t61 - 0x14; // 0x40f441
          						if(_t29 != 0) {
          							if( *((intOrPtr*)(_t61 - 0xc)) != 1) {
          								_t31 = _t61 - 0x14; // 0x40f441
          								E0040D200(_t70, _t31);
          							} else {
          								_t57 =  *_t61;
          								if( *_t61 != 0) {
          									E0040CE1C(_t69, _t70, _t57);
          								}
          							}
          						}
          						_t75 = _t75 + 1;
          						_t61 = _t61 + 0x20;
          					} while (_t75 < _v12);
          				}
          			}





















          0x0040d20b
          0x0040d20c
          0x0040d21a
          0x0040d235
          0x0040d316
          0x0040d31a
          0x0040d31a
          0x0040d23b
          0x0040d242
          0x0040d251
          0x0040d267
          0x0040d26f
          0x0040d30c
          0x0040d30f
          0x00000000
          0x0040d30f
          0x0040d275
          0x0040d27c
          0x0040d281
          0x0040d284
          0x0040d287
          0x0040d28a
          0x0040d290
          0x0040d297
          0x0040d29c
          0x0040d29f
          0x0040d2a5
          0x0040d2aa
          0x0040d2ac
          0x0040d2ae
          0x0040d2ae
          0x0040d2c3
          0x0040d304
          0x0040d307
          0x00000000
          0x0040d307
          0x0040d2c7
          0x0040d2c9
          0x0040d2c9
          0x0040d2cb
          0x0040d2d0
          0x0040d2d2
          0x0040d2d5
          0x0040d2d5
          0x0040d2da
          0x0040d2e0
          0x0040d2f0
          0x0040d2f6
          0x0040d2e2
          0x0040d2e2
          0x0040d2e6
          0x0040d2e9
          0x0040d2e9
          0x0040d2e6
          0x0040d2e0
          0x0040d2fb
          0x0040d2fc
          0x0040d2ff
          0x0040d2d5

          APIs
            • Part of subcall function 00407C3F: GetModuleHandleA.KERNEL32(00000000,?,?,?,004074B9,?,00000000), ref: 00407C68
            • Part of subcall function 00407C3F: LoadStringA.USER32 ref: 00407CF2
            • Part of subcall function 00407C3F: memcpy.MSVCRT ref: 00407D31
            • Part of subcall function 00409E22: SendMessageA.USER32(00000000,00000401,00000000,?), ref: 00409E31
          • WNetOpenEnumA.MPR(00000002,00000000,00000000,?,?), ref: 0040D22E
            • Part of subcall function 00407C3F: GetModuleHandleA.KERNEL32(00000000,?,?,004074B9,?,00000000), ref: 00407CC7
          • WNetEnumResourceA.MPR(?,000000FF,?,?), ref: 0040D267
          • WNetCloseEnum.MPR(?), ref: 0040D30F
            • Part of subcall function 00408559: free.MSVCRT(00000000,?,00000000,0040894C,00408AA2,?,74714DE0,?,00000000), ref: 00408568
          • WNetEnumResourceA.MPR(?,000000FF,0040F469,00001000), ref: 0040D2BC
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Enum$HandleModuleResource$CloseLoadMessageOpenSendStringfreememcpy
          • String ID:
          • API String ID: 3502242302-0
          • Opcode ID: 66f54070ff903f299dedfd7262f8d53144f652eee6b3331320c20c9254886cb3
          • Instruction ID: 566c83fc4a2d7eb0d181db45672644d8c7d96acff2c67565bc637989ceceadf9
          • Opcode Fuzzy Hash: 66f54070ff903f299dedfd7262f8d53144f652eee6b3331320c20c9254886cb3
          • Instruction Fuzzy Hash: 67318F72D00218AADB15EBE5CD81AEFB7B8AB04314F10417BE950F62C1DB389A448B99
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 60%
          			E0040B753(void* __ecx, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
          				void* _v240;
          				void* _v245;
          				void* _v250;
          				void* _v255;
          				void _v259;
          				char _v260;
          				intOrPtr _v264;
          				char _v280;
          				char _v672;
          				char _v801;
          				void* _v906;
          				void* _v912;
          				void* _v918;
          				void* _v924;
          				void _v930;
          				char _v1059;
          				char _v1188;
          				char _v1200;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				intOrPtr* _t36;
          				void* _t37;
          				void* _t62;
          				void* _t63;
          				signed int _t64;
          				intOrPtr _t66;
          				intOrPtr* _t81;
          				void* _t91;
          				void* _t92;
          
          				_t62 = __ecx;
          				_v260 = 0;
          				memset( &_v259, 0, 0xff);
          				_t81 =  &_v260;
          				E00401F0A(0xff, _t62, _t81, _a8, "PIDKEY");
          				_t36 = _t81;
          				_t92 = _t91 + 0x14;
          				_t5 = _t36 + 1; // 0x1
          				_t63 = _t5;
          				do {
          					_t66 =  *_t36;
          					_t36 = _t36 + 1;
          				} while (_t66 != 0);
          				_t37 = _t36 - _t63;
          				if(_t37 == 0x19) {
          					E0040A80B( &_v1200);
          					E00401F0A(0x80, _t63,  &_v1059, _a8, "ProductID");
          					_t64 = 7;
          					memcpy( &_v930, "XXXXX-XXXXX-XXXXX-XXXXX-XXXXX", _t64 << 2);
          					asm("movsw");
          					asm("movsd");
          					asm("movsb");
          					asm("movsd");
          					asm("movsb");
          					asm("movsd");
          					asm("movsb");
          					asm("movsd");
          					asm("movsb");
          					asm("movsd");
          					asm("movsb");
          					E00401DEC(_a8,  &_v280);
          					_v264 = 6;
          					E00409476(0x80,  &_v801, _a4 + 0x768);
          					E00409476(0x104,  &_v672, _a16);
          					E00409476(0x80,  &_v1188, E00407C3F(0x89a));
          					 *((intOrPtr*)(_t92 + 0x24)) = " (";
          					E00408CD6(E00408CD6(E00408CD6( &_v1188), _a12), ")");
          					return E00405DE7(_a4, 0,  &_v1200);
          				}
          				return _t37;
          			}

































          0x0040b753
          0x0040b76c
          0x0040b773
          0x0040b782
          0x0040b788
          0x0040b78d
          0x0040b78f
          0x0040b792
          0x0040b792
          0x0040b795
          0x0040b795
          0x0040b797
          0x0040b798
          0x0040b79c
          0x0040b7a1
          0x0040b7af
          0x0040b7c9
          0x0040b7d0
          0x0040b7dc
          0x0040b7de
          0x0040b7ec
          0x0040b7ed
          0x0040b7fa
          0x0040b7fb
          0x0040b808
          0x0040b809
          0x0040b816
          0x0040b817
          0x0040b82a
          0x0040b82f
          0x0040b830
          0x0040b845
          0x0040b84f
          0x0040b862
          0x0040b880
          0x0040b887
          0x0040b8a0
          0x00000000
          0x0040b8b7
          0x0040b8ba

          APIs
          • memset.MSVCRT ref: 0040B773
            • Part of subcall function 00401F0A: RegQueryValueExA.KERNELBASE(?,d!@,00000000,?,?,000003FF,?,?,?,00402164,?,000003FF,000003FF), ref: 00401F23
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: QueryValuememset
          • String ID: PIDKEY$ProductID$XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
          • API String ID: 3363972335-861314722
          • Opcode ID: 1cdf2bce93428134c8925047dfe57b536436aba27d2566a6bf0b9342ec471be5
          • Instruction ID: f61c62734a97450c8f9e01e2d9151ed58a04bf6130a734142c12666bbd96faa8
          • Opcode Fuzzy Hash: 1cdf2bce93428134c8925047dfe57b536436aba27d2566a6bf0b9342ec471be5
          • Instruction Fuzzy Hash: AA31917290022A9BCF21EE15CC41BCAB379AF55308F0144F6AD4877191D7B56F8A8F99
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 79%
          			E00409A28(struct HWND__* _a4) {
          				int _v12;
          				char _v16;
          				char _v20;
          				struct tagRECT _v36;
          				struct tagRECT _v52;
          				void* __esi;
          				intOrPtr _t34;
          				int _t42;
          				long _t49;
          				intOrPtr _t50;
          				struct HWND__* _t54;
          				intOrPtr _t55;
          				void* _t59;
          				intOrPtr _t60;
          				intOrPtr _t61;
          				int _t69;
          
          				_t49 = 0;
          				_v12 = 0;
          				E004090CA( &_v16,  &_v20);
          				GetWindowRect(_a4,  &_v52);
          				_t54 = GetParent(_a4);
          				if(_t54 == 0) {
          					_t55 = _v16;
          					_t34 = _v20;
          				} else {
          					_v36.left = 0;
          					asm("stosd");
          					asm("stosd");
          					asm("stosd");
          					GetWindowRect(_t54,  &_v36);
          					_t49 = _v36.left;
          					_t60 = _v36.top;
          					_t34 = _v36.right - _t49 + 1;
          					_t55 = _v36.bottom - _t60 + 1;
          					_v12 = _t60;
          				}
          				_t61 = _v52.right;
          				_t59 = _v52.left - _t61;
          				asm("cdq");
          				_t69 = (_t59 + _t34 - 1 - _t59 >> 1) + _t49;
          				_t50 = _v52.bottom;
          				asm("cdq");
          				_t42 = (_v52.top - _t50 + _t55 - 1 - _t59 >> 1) + _v12;
          				if(_t42 < 0) {
          					_t42 = 0;
          				}
          				if(_t69 < 0) {
          					_t69 = 0;
          				}
          				return MoveWindow(_a4, _t69, _t42, _t61 - _v52.left + 1, _t50 - _v52.top + 1, 1);
          			}



















          0x00409a34
          0x00409a3a
          0x00409a3d
          0x00409a50
          0x00409a5b
          0x00409a5f
          0x00409a8a
          0x00409a8d
          0x00409a61
          0x00409a63
          0x00409a69
          0x00409a6a
          0x00409a6b
          0x00409a71
          0x00409a76
          0x00409a79
          0x00409a83
          0x00409a84
          0x00409a85
          0x00409a85
          0x00409a93
          0x00409a96
          0x00409a9c
          0x00409aa6
          0x00409aa8
          0x00409ab1
          0x00409ab6
          0x00409ab9
          0x00409abb
          0x00409abb
          0x00409abf
          0x00409ac1
          0x00409ac1
          0x00409ade

          APIs
            • Part of subcall function 004090CA: GetSystemMetrics.USER32 ref: 004090D8
            • Part of subcall function 004090CA: GetSystemMetrics.USER32 ref: 004090DE
            • Part of subcall function 004090CA: GetDC.USER32(00000000), ref: 004090EF
            • Part of subcall function 004090CA: GetDeviceCaps.GDI32(00000000,00000008), ref: 00409100
            • Part of subcall function 004090CA: GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409108
            • Part of subcall function 004090CA: ReleaseDC.USER32 ref: 0040910F
          • GetWindowRect.USER32 ref: 00409A50
          • GetParent.USER32(?), ref: 00409A55
          • GetWindowRect.USER32 ref: 00409A71
          • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00409AD4
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
          • String ID:
          • API String ID: 2163313125-0
          • Opcode ID: 942298c3d101d755c7465a8cf7374d64da193c57ac0334f9b6b79978f9ffbea1
          • Instruction ID: d7f44464c94bdf310ba7c3194a17dc4d655543f70f785db6c776c23c77ad5e39
          • Opcode Fuzzy Hash: 942298c3d101d755c7465a8cf7374d64da193c57ac0334f9b6b79978f9ffbea1
          • Instruction Fuzzy Hash: 1D212F76E10119AFCB11DFF8DD84CEEBBB9FB88310B04457AE915F3254D631AD058AA0
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040AA46(intOrPtr* _a4, signed int* _a8) {
          				signed int _v8;
          				int _v12;
          				int _v16;
          				void _v115;
          				char _v116;
          				signed int _t32;
          				char _t34;
          				signed int _t37;
          				int _t38;
          				void* _t39;
          				void* _t44;
          
          				_t38 = 0;
          				_v12 = 0;
          				_v116 = 0;
          				memset( &_v115, 0, 0x63);
          				_t37 = 0;
          				_v16 = 0;
          				_v8 = 0;
          				while(1) {
          					_t34 =  *_a4;
          					if(_t34 - 0x30 > 9) {
          						goto L3;
          					}
          					 *((char*)(_t39 + _t38 - 0x70)) = _t34;
          					_t38 = _t38 + 1;
          					_t44 = _t38 - 4;
          					L11:
          					if(_t44 >= 0) {
          						L15:
          						return _v16;
          					}
          					_a4 = _a4 + 1;
          					continue;
          					L3:
          					if(_t38 == 0 || _t34 != 0x2e && _t34 != 0) {
          						goto L15;
          					} else {
          						 *((char*)(_t39 + _t38 - 0x70)) = 0;
          						_t32 = atoi( &_v116);
          						if(_t32 > 0xff) {
          							goto L15;
          						}
          						_t38 = 0;
          						if(_v12 > 0) {
          							_t32 = _t32 << _v8;
          						}
          						_v8 = _v8 + 8;
          						_t37 = _t37 | _t32;
          						_v12 = _v12 + 1;
          						if(_t34 == 0) {
          							if(_v12 == 4) {
          								_v16 = 1;
          								 *_a8 = _t37;
          							}
          							goto L15;
          						} else {
          							goto L11;
          						}
          					}
          				}
          			}














          0x0040aa4f
          0x0040aa58
          0x0040aa5b
          0x0040aa5f
          0x0040aa67
          0x0040aa69
          0x0040aa6c
          0x0040aa6f
          0x0040aa72
          0x0040aa7a
          0x00000000
          0x00000000
          0x0040aa7c
          0x0040aa80
          0x0040aa81
          0x0040aac6
          0x0040aac6
          0x0040aadf
          0x0040aae6
          0x0040aae6
          0x0040aac8
          0x00000000
          0x0040aa86
          0x0040aa88
          0x00000000
          0x0040aa93
          0x0040aa97
          0x0040aa9c
          0x0040aaa7
          0x00000000
          0x00000000
          0x0040aaa9
          0x0040aaae
          0x0040aab3
          0x0040aab3
          0x0040aab5
          0x0040aab9
          0x0040aabb
          0x0040aac0
          0x0040aad1
          0x0040aad6
          0x0040aadd
          0x0040aadd
          0x00000000
          0x0040aac2
          0x00000000
          0x0040aac2
          0x0040aac0
          0x0040aa88

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: atoimemset
          • String ID: $.
          • API String ID: 1386486121-3929174939
          • Opcode ID: c38543f7ac29c7ee5ed56dc8b58fa952c277becc102d902cd1c0fe574a744c7a
          • Instruction ID: 8d35f9858fefca9159f603dbe3b5168525f1678bd58d80eea2b0dfff62136ede
          • Opcode Fuzzy Hash: c38543f7ac29c7ee5ed56dc8b58fa952c277becc102d902cd1c0fe574a744c7a
          • Instruction Fuzzy Hash: 2D11F031E00358AEEB209EA9C6402DEBBB4EB45700F14407BD882B72C1D3B84E46DF96
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 93%
          			E0040847C(void** __esi, intOrPtr _a4, intOrPtr _a8) {
          				signed int _t21;
          				signed int _t23;
          				void* _t24;
          				signed int _t31;
          				void* _t33;
          				void* _t44;
          				signed int _t46;
          				void* _t48;
          				signed int _t51;
          				int _t52;
          				void** _t53;
          				void* _t58;
          
          				_t53 = __esi;
          				_t1 =  &(_t53[1]); // 0x8
          				_t51 =  *_t1;
          				_t21 = 0;
          				if(_t51 <= 0) {
          					L4:
          					_t2 =  &(_t53[2]); // 0x8
          					_t33 =  *_t53;
          					_t23 =  *_t2 + _t51;
          					_t46 = 8;
          					_t53[1] = _t23;
          					_t24 = _t23 * _t46;
          					_push( ~(0 | _t58 > 0x00000000) | _t24);
          					L004010A4();
          					_t10 =  &(_t53[1]); // 0x8
          					 *_t53 = _t24;
          					memset(_t24, 0,  *_t10 << 3);
          					_t52 = _t51 << 3;
          					memcpy( *_t53, _t33, _t52);
          					if(_t33 != 0) {
          						_push(_t33);
          						L0040109E();
          					}
          					 *((intOrPtr*)( *_t53 + _t52)) = _a4;
          					 *((intOrPtr*)(_t52 +  *_t53 + 4)) = _a8;
          				} else {
          					_t44 =  *__esi;
          					_t48 = _t44;
          					while( *_t48 != 0) {
          						_t21 = _t21 + 1;
          						_t48 = _t48 + 8;
          						_t58 = _t21 - _t51;
          						if(_t58 < 0) {
          							continue;
          						} else {
          							goto L4;
          						}
          						goto L7;
          					}
          					_t31 = _t21 << 3;
          					 *((intOrPtr*)(_t44 + _t31)) = _a4;
          					 *((intOrPtr*)(_t31 +  *_t53 + 4)) = _a8;
          				}
          				L7:
          				return 1;
          			}















          0x0040847c
          0x0040847d
          0x0040847d
          0x00408480
          0x00408484
          0x00408497
          0x00408497
          0x0040849b
          0x0040849d
          0x004084a3
          0x004084a4
          0x004084a7
          0x004084b0
          0x004084b1
          0x004084b6
          0x004084c0
          0x004084c2
          0x004084c7
          0x004084ce
          0x004084d8
          0x004084da
          0x004084db
          0x004084e0
          0x004084e7
          0x004084f0
          0x00408486
          0x00408486
          0x00408488
          0x0040848a
          0x0040848f
          0x00408490
          0x00408493
          0x00408495
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00408495
          0x00408500
          0x00408503
          0x0040850c
          0x0040850c
          0x004084f5
          0x004084f9

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ??2@??3@memcpymemset
          • String ID:
          • API String ID: 1865533344-0
          • Opcode ID: fdc23d6c7c355a7f8824d6f8271387e1460a6349cdae78e936a41195db118b7e
          • Instruction ID: b7b31846c70ad2dad921fa4f0699ce3eb2af9f70827145e0b14fe4d5444e402c
          • Opcode Fuzzy Hash: fdc23d6c7c355a7f8824d6f8271387e1460a6349cdae78e936a41195db118b7e
          • Instruction Fuzzy Hash: 6C1188712146029FD328CF2DC991A26F7E5FFC8300B24882EE5DAD7391EA75E841CB54
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 84%
          			E004022AF(void* __ecx, intOrPtr* __edi, void* __eflags, intOrPtr _a4, CHAR* _a8, CHAR* _a12, intOrPtr _a16, CHAR* _a20) {
          				void _v8199;
          				char _v8200;
          				signed int _t38;
          
          				E0040EAD0(0x2004, __ecx);
          				_v8200 = 0;
          				if(_a4 == 0) {
          					memset( &_v8199, 0, 0x2000);
          					GetPrivateProfileStringA(_a8, _a12, 0x40f469,  &_v8200, 0x2000, _a20);
          					asm("sbb esi, esi");
          					_t38 =  ~0x2000;
          					E00409940(0,  &_v8200, __edi, _a16);
          				} else {
          					memset( &_v8199, 0, 0x2000);
          					E00408C58(_a16,  *__edi,  &_v8200);
          					_t38 = WritePrivateProfileStringA(_a8, _a12,  &_v8200, _a20);
          				}
          				return _t38;
          			}






          0x004022b7
          0x004022c2
          0x004022c8
          0x00402318
          0x00402336
          0x00402349
          0x0040234d
          0x0040234f
          0x004022ca
          0x004022d7
          0x004022e8
          0x00402306
          0x00402306
          0x0040235b

          APIs
          • memset.MSVCRT ref: 004022D7
            • Part of subcall function 00408C58: sprintf.MSVCRT ref: 00408C94
          • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00402300
          • memset.MSVCRT ref: 00402318
          • GetPrivateProfileStringA.KERNEL32(?,?,0040F469,?,00002000,?), ref: 00402336
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: PrivateProfileStringmemset$Writesprintf
          • String ID:
          • API String ID: 3935685222-0
          • Opcode ID: 13c3db3c10bd9b4b813548ab36b3006e57b9ce8826d40c620dda9554cb8a933d
          • Instruction ID: 01dad1e97d0ea611c51632c9944fd68f59f6e64d5e25b22289b4f3fe4284738a
          • Opcode Fuzzy Hash: 13c3db3c10bd9b4b813548ab36b3006e57b9ce8826d40c620dda9554cb8a933d
          • Instruction Fuzzy Hash: 4E117771900219ABDF119F61DD89EDF7B7DEF14304F0404B6BA05B1152E6358A64CFA9
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00407A43(void* __esi, struct HWND__* _a4, signed int _a8) {
          				struct tagRECT _v20;
          				struct tagRECT _v36;
          				int _t27;
          				struct HWND__* _t33;
          
          				_t33 = _a4;
          				if((_a8 & 0x00000001) != 0) {
          					_t35 = GetParent(_t33);
          					GetWindowRect(_t33,  &_v20);
          					GetClientRect(_t18,  &_v36);
          					E004092B2(_t35,  &_v20);
          					_t27 = _v36.right - _v20.right - _v36.left;
          					_v20.left = _t27;
          					SetWindowPos(_t33, 0, _t27, _v20.top, 0, 0, 5);
          				}
          				if((_a8 & 0x00000002) != 0) {
          					E00408F16(_t33);
          				}
          				return 1;
          			}







          0x00407a4e
          0x00407a51
          0x00407a5b
          0x00407a62
          0x00407a6d
          0x00407a78
          0x00407a84
          0x00407a91
          0x00407a97
          0x00407a9d
          0x00407aa2
          0x00407aa5
          0x00407aaa
          0x00407ab0

          APIs
          • GetParent.USER32(?), ref: 00407A55
          • GetWindowRect.USER32 ref: 00407A62
          • GetClientRect.USER32 ref: 00407A6D
            • Part of subcall function 004092B2: MapWindowPoints.USER32 ref: 004092BE
          • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00407A97
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Window$Rect$ClientParentPoints
          • String ID:
          • API String ID: 4247780290-0
          • Opcode ID: 5345c5c527c3fc3f8e9d6d880b0170da0f52ac8d1f882eaa375eb39d27b71158
          • Instruction ID: 48dce25d97afcd2a1de3d63898f056f379a9ad6891b358c4f11349d87d03ae6b
          • Opcode Fuzzy Hash: 5345c5c527c3fc3f8e9d6d880b0170da0f52ac8d1f882eaa375eb39d27b71158
          • Instruction Fuzzy Hash: D8018C7280010ABEEB15DBA4DD4ADFF7BBCEB45314F00413EF801B2180DB78A9058B65
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 92%
          			E0040E5F0(void* __ecx) {
          				intOrPtr _v12;
          				void _v52;
          				signed int _v56;
          				void* __esi;
          				void* _t26;
          				intOrPtr* _t30;
          
          				_t26 = __ecx;
          				 *(__ecx + 0xc) =  *(__ecx + 0xc) & 0x00000000;
          				E0040E1D0(__ecx);
          				E0040180A(GetDlgItem( *(__ecx + 4), 0x3f0));
          				 *_t30 = 0x3ea;
          				E0040180A(GetDlgItem( *(_t26 + 4), ??));
          				_v56 = _v56 & 0x00000000;
          				memset( &_v52, 0, 0x30);
          				E004017DE( &_v56, GetDlgItem( *(_t26 + 4), 0x3ef));
          				E0040180A(_v12);
          				return E0040DC88(_t26, _v56);
          			}









          0x0040e5f8
          0x0040e5fa
          0x0040e600
          0x0040e616
          0x0040e61b
          0x0040e628
          0x0040e62d
          0x0040e639
          0x0040e64f
          0x0040e657
          0x0040e668

          APIs
          • GetDlgItem.USER32 ref: 0040E613
            • Part of subcall function 0040180A: LoadLibraryA.KERNEL32(shlwapi.dll,?,775D48C0,0040E61B,00000000), ref: 00401813
            • Part of subcall function 0040180A: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 00401821
            • Part of subcall function 0040180A: FreeLibrary.KERNEL32(00000000,?,775D48C0,0040E61B,00000000), ref: 00401839
          • GetDlgItem.USER32 ref: 0040E625
          • memset.MSVCRT ref: 0040E639
          • GetDlgItem.USER32 ref: 0040E649
            • Part of subcall function 004017DE: GetModuleHandleA.KERNEL32(user32.dll,GetComboBoxInfo,0040E654,00000000), ref: 004017EE
            • Part of subcall function 004017DE: GetProcAddress.KERNEL32(00000000), ref: 004017F5
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Item$AddressLibraryProc$FreeHandleLoadModulememset
          • String ID:
          • API String ID: 269129164-0
          • Opcode ID: a030b01cc2aad7aa9a6a9bef71fa04415ad64c387887b09759075f4b579476b6
          • Instruction ID: cfe16cbaffc5988c80775c023091c45c56397ba5fe459ac6d31887564ce5492b
          • Opcode Fuzzy Hash: a030b01cc2aad7aa9a6a9bef71fa04415ad64c387887b09759075f4b579476b6
          • Instruction Fuzzy Hash: 84F0817290021877DB067762DD07B5EBA6DEF40329F00413AF504770E1CBBCAA118A98
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004064DF(intOrPtr* __ecx, intOrPtr _a4) {
          				void _v259;
          				char _v260;
          				void _v515;
          				char _v516;
          				void* __esi;
          				void* _t15;
          				intOrPtr* _t24;
          				char* _t26;
          
          				_t24 = __ecx;
          				_v260 = 0;
          				memset( &_v259, 0, 0xfe);
          				_v516 = 0;
          				memset( &_v515, 0, 0xfe);
          				_t15 =  *((intOrPtr*)( *_t24 + 0x20))();
          				_t26 =  &_v260;
          				E00405DB4(_t15, _t26);
          				sprintf( &_v516, "</%s>\r\n", _t26);
          				return E004096D5(_t24, _a4,  &_v516);
          			}











          0x004064f9
          0x004064fb
          0x00406502
          0x00406511
          0x00406518
          0x00406524
          0x00406527
          0x0040652d
          0x00406541
          0x0040655b

          APIs
          • memset.MSVCRT ref: 00406502
          • memset.MSVCRT ref: 00406518
            • Part of subcall function 00405DB4: _strlwr.MSVCRT ref: 00405DDE
          • sprintf.MSVCRT ref: 00406541
            • Part of subcall function 004096D5: WriteFile.KERNEL32(00000001,00000007,00000008,?,00000000,?,Mqt,00405D6B,00000001,00000001,004066BB,00000007,],00407088,00000001,?), ref: 004096F5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$FileWrite_strlwrsprintf
          • String ID: </%s>
          • API String ID: 2668691490-259020660
          • Opcode ID: 934da644deba16ecb91b013f8b1b9e960f504b70decd6c9124e7ad6f8a4d6ea7
          • Instruction ID: 2ce1b2bdd008745dd7762bb9e09ff5252843985f01a8bceac2a75e76fd85860d
          • Opcode Fuzzy Hash: 934da644deba16ecb91b013f8b1b9e960f504b70decd6c9124e7ad6f8a4d6ea7
          • Instruction Fuzzy Hash: 20F0F472A001296BEB20E71ACC49FDA776CAF44308F0400FAB50CF3182E6749E848BB5
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 16%
          			E0040276A(void* __ecx, intOrPtr _a4, struct HDC__* _a8, struct HWND__* _a12) {
          				void* __esi;
          				void* _t11;
          				void* _t25;
          
          				_t11 = _a4 - 0x110;
          				_t25 = __ecx;
          				if(_t11 == 0) {
          					E004023E5(__ecx, __ecx, __eflags);
          					E00409A28( *((intOrPtr*)(__ecx + 4)));
          					L5:
          					return E0040DA9A(_t25, _a4, _a8, _a12);
          				}
          				if(_t11 != 0x28 || E0040925E(_a12) == 0) {
          					goto L5;
          				} else {
          					SetBkMode(_a8, 1);
          					SetBkColor(_a8, 0xffffff);
          					SetTextColor(_a8, 0xc00000);
          					return GetStockObject(0);
          				}
          			}






          0x00402770
          0x00402776
          0x00402778
          0x004027bd
          0x004027c5
          0x004027cb
          0x00000000
          0x004027d6
          0x0040277d
          0x00000000
          0x0040278c
          0x00402791
          0x0040279f
          0x004027ad
          0x00000000
          0x004027b5

          APIs
            • Part of subcall function 0040925E: memset.MSVCRT ref: 0040927E
            • Part of subcall function 0040925E: GetClassNameA.USER32(?,00000000,000000FF), ref: 00409291
            • Part of subcall function 0040925E: _stricmp.MSVCRT(00000000,edit), ref: 004092A3
          • SetBkMode.GDI32(?,00000001), ref: 00402791
          • SetBkColor.GDI32(?,00FFFFFF), ref: 0040279F
          • SetTextColor.GDI32(?,00C00000), ref: 004027AD
          • GetStockObject.GDI32(00000000), ref: 004027B5
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Color$ClassModeNameObjectStockText_stricmpmemset
          • String ID:
          • API String ID: 1412957716-0
          • Opcode ID: 31688615ce41f1f23b71f10a780bee348b510d4980943a459489b4df03f5ec30
          • Instruction ID: 00b1f1ed83d2abfca551c5ce8c54ad90864e0f0cb1f907095ff4be0094b59536
          • Opcode Fuzzy Hash: 31688615ce41f1f23b71f10a780bee348b510d4980943a459489b4df03f5ec30
          • Instruction Fuzzy Hash: 64F0AF31100208BBDF212FB4DE0AE8A3B21AF04B25F10853AF914B55E1CBB59C649B58
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 68%
          			E00406D54(intOrPtr* __eax, void* __edi, void* __eflags) {
          				void* __esi;
          				void** _t10;
          				intOrPtr* _t14;
          				intOrPtr* _t21;
          				intOrPtr _t24;
          				intOrPtr _t25;
          				intOrPtr _t26;
          				intOrPtr* _t27;
          
          				_t21 = __eax;
          				 *__eax = 0x40ff70;
          				E0040685A(__eax);
          				_t23 =  *((intOrPtr*)(_t21 + 0x14));
          				if( *((intOrPtr*)(_t21 + 0x14)) != 0) {
          					__eax = E00408540(__esi);
          					_push(__esi);
          					L0040109E();
          				}
          				_t24 =  *((intOrPtr*)(_t21 + 0x10));
          				if(_t24 != 0) {
          					E00408540(_t24);
          					_push(_t24);
          					L0040109E();
          				}
          				_t25 =  *((intOrPtr*)(_t21 + 0xc));
          				if(_t25 != 0) {
          					E00408540(_t25);
          					_push(_t25);
          					L0040109E();
          				}
          				_t26 =  *((intOrPtr*)(_t21 + 8));
          				if(_t26 != 0) {
          					E00408540(_t26);
          					_push(_t26);
          					L0040109E();
          				}
          				_t14 = _t21;
          				_pop(_t23);
          				_t27 = _t14;
          				E004060D9(_t27);
          				_t10 =  *((intOrPtr*)( *_t27))(_t23);
          				free( *_t10);
          				return _t10;
          			}











          0x00406d56
          0x00406d58
          0x00406d5e
          0x00406d63
          0x00406d68
          0x00406d6a
          0x00406d6f
          0x00406d70
          0x00406d75
          0x00406d76
          0x00406d7b
          0x00406d7d
          0x00406d82
          0x00406d83
          0x00406d88
          0x00406d89
          0x00406d8e
          0x00406d90
          0x00406d95
          0x00406d96
          0x00406d9b
          0x00406d9c
          0x00406da1
          0x00406da3
          0x00406da8
          0x00406da9
          0x00406dae
          0x00406daf
          0x00406db2
          0x00406841
          0x00406845
          0x0040684e
          0x00406852
          0x00406859

          APIs
            • Part of subcall function 0040685A: ??3@YAXPAX@Z.MSVCRT ref: 00406862
            • Part of subcall function 0040685A: ??3@YAXPAX@Z.MSVCRT ref: 00406870
            • Part of subcall function 0040685A: ??3@YAXPAX@Z.MSVCRT ref: 00406881
            • Part of subcall function 0040685A: ??3@YAXPAX@Z.MSVCRT ref: 0040689B
          • ??3@YAXPAX@Z.MSVCRT ref: 00406D70
          • ??3@YAXPAX@Z.MSVCRT ref: 00406D83
          • ??3@YAXPAX@Z.MSVCRT ref: 00406D96
          • ??3@YAXPAX@Z.MSVCRT ref: 00406DA9
            • Part of subcall function 00408540: free.MSVCRT(00000000,00408AF8,74714DE0,?,00000000), ref: 00408547
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ??3@$free
          • String ID:
          • API String ID: 2241099983-0
          • Opcode ID: 2894e20ff8e62f276ee57ea6bb544e549afc407e7d8dd5995aaef9341981b0db
          • Instruction ID: df29a6d271cedee1696c46cad330ee315263fd56498c9677d61263166b1cb08b
          • Opcode Fuzzy Hash: 2894e20ff8e62f276ee57ea6bb544e549afc407e7d8dd5995aaef9341981b0db
          • Instruction Fuzzy Hash: B1F0B433B02D3027C225BB37551162E93545C41B2832A413FF945776C19F3CBD5141EE
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 79%
          			E0040685A(void* __edi) {
          				void* __esi;
          				intOrPtr _t11;
          				signed int _t12;
          				signed int _t13;
          				signed int* _t15;
          				void* _t21;
          				signed int _t23;
          
          				_t21 = __edi;
          				_t11 =  *((intOrPtr*)(__edi + 0x28));
          				if(_t11 != 0) {
          					_push(_t11);
          					L0040109E();
          				}
          				_t12 =  *(_t21 + 0x38);
          				if(_t12 != 0) {
          					_push(_t12);
          					L0040109E();
          				}
          				_t13 =  *(_t21 + 0x1c0);
          				if(_t13 != 0) {
          					_push(_t13);
          					L0040109E();
          				}
          				_t15 = _t21 + 0x1ac;
          				_t23 =  *_t15;
          				if(_t23 != 0) {
          					_t13 = E00405581(_t23);
          					_push(_t23);
          					L0040109E();
          				}
          				 *_t15 =  *_t15 & 0x00000000;
          				 *(_t21 + 0x28) =  *(_t21 + 0x28) & 0x00000000;
          				 *(_t21 + 0x38) =  *(_t21 + 0x38) & 0x00000000;
          				 *(_t21 + 0x1c0) =  *(_t21 + 0x1c0) & 0x00000000;
          				return _t13;
          			}










          0x0040685a
          0x0040685a
          0x0040685f
          0x00406861
          0x00406862
          0x00406867
          0x00406868
          0x0040686d
          0x0040686f
          0x00406870
          0x00406875
          0x00406876
          0x0040687e
          0x00406880
          0x00406881
          0x00406886
          0x00406888
          0x0040688f
          0x00406893
          0x00406895
          0x0040689a
          0x0040689b
          0x004068a0
          0x004068a1
          0x004068a4
          0x004068a8
          0x004068ac
          0x004068b5

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ??3@
          • String ID:
          • API String ID: 613200358-0
          • Opcode ID: 9e56819af0c9e55bd4e5d9054ae5035dcc265fa0f17b8fae4b7232c98c92e0e5
          • Instruction ID: cd8ee3a7cc00217037cade8279bffa076b23806d7c1e17a483c0b38baf5ae4d8
          • Opcode Fuzzy Hash: 9e56819af0c9e55bd4e5d9054ae5035dcc265fa0f17b8fae4b7232c98c92e0e5
          • Instruction Fuzzy Hash: B0F0BB73701B116BEB14AA76D585BA67398BF04336F15052BF444F75C1CB7CE8A08698
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00402FB0(void* __eflags, intOrPtr _a4) {
          				void* _v12;
          				intOrPtr _v16;
          				char _v24;
          				char _v28;
          				long _t21;
          				void* _t26;
          
          				_t26 = __eflags;
          				if(E00402F05(_a4, _t26, GetCurrentProcess(),  &_v12) != 0) {
          					E00402ED0(_a4, __eflags,  &_v24);
          					_v28 = 1;
          					_v16 = 2;
          					E00402E99(_a4, __eflags, _v12,  &_v28);
          					_t21 = GetLastError();
          					CloseHandle(_v12);
          					return _t21;
          				}
          				return GetLastError();
          			}









          0x00402fb0
          0x00402fcc
          0x00402fdd
          0x00402fec
          0x00402ff3
          0x00402ffa
          0x00402fff
          0x0040300a
          0x00000000
          0x00403010
          0x00000000

          APIs
          • GetCurrentProcess.KERNEL32(?), ref: 00402FBB
            • Part of subcall function 00402F05: GetProcAddress.KERNEL32(?,OpenProcessToken), ref: 00402F1B
          • GetLastError.KERNEL32(00000000), ref: 00402FCE
          • GetLastError.KERNEL32(?,?,?,00000000), ref: 00402FFF
          • CloseHandle.KERNEL32(?), ref: 0040300A
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ErrorLast$AddressCloseCurrentHandleProcProcess
          • String ID:
          • API String ID: 3634693636-0
          • Opcode ID: a9fc471257d1a20b8f49f8081f5c8cb21eebaaec4fcfcdc0de4831cbb862a1aa
          • Instruction ID: 34acb41d2df045902c634c00220dc9942ce6b6e387b24a23f4b3dcd42e2d252e
          • Opcode Fuzzy Hash: a9fc471257d1a20b8f49f8081f5c8cb21eebaaec4fcfcdc0de4831cbb862a1aa
          • Instruction Fuzzy Hash: 5EF0F975900108ABCB10EFA4DD499DE7BBCAB08355F008036F905F2292D7749A89DBA9
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 72%
          			E0040789D() {
          				intOrPtr _t1;
          				intOrPtr _t2;
          				intOrPtr _t3;
          				intOrPtr _t4;
          
          				_t1 =  *0x412b50; // 0xbc36f0
          				if(_t1 != 0) {
          					_push(_t1);
          					L0040109E();
          				}
          				_t2 =  *0x412b58; // 0xbcb6f8
          				if(_t2 != 0) {
          					_push(_t2);
          					L0040109E();
          				}
          				_t3 =  *0x412b54; // 0xbcbf08
          				if(_t3 != 0) {
          					_push(_t3);
          					L0040109E();
          				}
          				_t4 =  *0x412b5c; // 0xbcbb00
          				if(_t4 != 0) {
          					_push(_t4);
          					L0040109E();
          					return _t4;
          				}
          				return _t4;
          			}







          0x0040789d
          0x004078a4
          0x004078a6
          0x004078a7
          0x004078ac
          0x004078ad
          0x004078b4
          0x004078b6
          0x004078b7
          0x004078bc
          0x004078bd
          0x004078c4
          0x004078c6
          0x004078c7
          0x004078cc
          0x004078cd
          0x004078d4
          0x004078d6
          0x004078d7
          0x00000000
          0x004078dc
          0x004078dd

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ??3@
          • String ID:
          • API String ID: 613200358-0
          • Opcode ID: 17192fd809e84997641e4d20b4cd1796795e486df5e14e6998d4c48ab6d5ed33
          • Instruction ID: 06877ca6ad83b2ae15728561cf9c9a314d41464e766c8cbe8ded0b5179ca3d6f
          • Opcode Fuzzy Hash: 17192fd809e84997641e4d20b4cd1796795e486df5e14e6998d4c48ab6d5ed33
          • Instruction Fuzzy Hash: DEE01262B0824216DA24BE3AEA58E23239C5A00300314843BB400EBAE0CABCEC91813C
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 88%
          			E00403315(struct HWND__* _a4, int _a8, int _a12, unsigned int _a16) {
          				void* __esi;
          				intOrPtr _t25;
          				intOrPtr _t32;
          				intOrPtr* _t38;
          				int _t40;
          				intOrPtr* _t58;
          				intOrPtr* _t59;
          
          				_t40 = _a12;
          				if(_a8 != 0x401) {
          					L3:
          					if(_a8 != 0x402) {
          						L8:
          						if(_a8 == 0x403) {
          							_t58 = E00408342(0x41213c, _t40);
          							if(_t58 != 0 &&  *(_t58 + 0xc) == _t40) {
          								_t25 =  *((intOrPtr*)(_t58 + 8));
          								if(_t25 != 0) {
          									 *((intOrPtr*)( *_t58 + 0x20))(_t25, _a16 >> 0x10);
          									E00403147(_t58);
          									E00403231(_t58);
          									 *(_t58 + 0xc) =  *(_t58 + 0xc) & 0x00000000;
          								}
          							}
          						}
          						L13:
          						L14:
          						return DefWindowProcA(_a4, _a8, _t40, _a16);
          					}
          					_t59 = E00408342(0x41213c, _t40);
          					if(_t59 == 0 ||  *(_t59 + 0xc) != _t40) {
          						goto L13;
          					} else {
          						_t32 =  *((intOrPtr*)(_t59 + 8));
          						if(_t32 == 0) {
          							goto L13;
          						} else {
          							 *((intOrPtr*)( *_t59 + 0x1c))(_t32, _a16 >> 0x10);
          							E00403147(_t59);
          							E00403231(_t59);
          							 *(_t59 + 0xc) =  *(_t59 + 0xc) & 0x00000000;
          							goto L8;
          						}
          					}
          				}
          				_t38 = E00408342(0x412130, _t40);
          				if(_t38 == 0) {
          					goto L14;
          				} else {
          					 *((intOrPtr*)( *_t38))(_a16, _a16 >> 0x10);
          					goto L3;
          				}
          			}










          0x00403320
          0x00403323
          0x00403348
          0x00403356
          0x00403391
          0x00403398
          0x004033a2
          0x004033a6
          0x004033ad
          0x004033b2
          0x004033c0
          0x004033c3
          0x004033ca
          0x004033cf
          0x004033cf
          0x004033b2
          0x004033a6
          0x004033d3
          0x004033d5
          0x004033e7
          0x004033e7
          0x00403360
          0x00403364
          0x00000000
          0x0040336b
          0x0040336b
          0x00403370
          0x00000000
          0x00403372
          0x0040337e
          0x00403381
          0x00403388
          0x0040338d
          0x00000000
          0x0040338d
          0x00403370
          0x00403364
          0x0040332b
          0x00403332
          0x00000000
          0x00403338
          0x00403346
          0x00000000
          0x00403346

          APIs
          • DefWindowProcA.USER32(?,00000403,?,?), ref: 004033DF
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ProcWindow
          • String ID: 0!A$<!A
          • API String ID: 181713994-319397182
          • Opcode ID: ee33a22eb326f24c6a4119c2dc7f766755136b8b31b7c9b5d2ab51c1e863fbbd
          • Instruction ID: 3904bead1f95de25cbebf5ae52961d06e28e25bd1637153991ab2715d5a1410c
          • Opcode Fuzzy Hash: ee33a22eb326f24c6a4119c2dc7f766755136b8b31b7c9b5d2ab51c1e863fbbd
          • Instruction Fuzzy Hash: 472183757001059BDB209F16D884A6F7B9DEF44726B00803EFD86F6681CB78ED11CB69
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 88%
          			E00403DEE(void* __ebx, intOrPtr _a4) {
          				void _v267;
          				char _v268;
          				char _v535;
          				char _v796;
          				char _v804;
          				void* __edi;
          				void* __esi;
          				char* _t22;
          				char _t23;
          				void* _t32;
          				void* _t39;
          
          				_t32 = __ebx;
          				if( *((intOrPtr*)(__ebx + 0x17c)) == 0) {
          					_v268 = 0;
          					memset( &_v267, 0, 0x104);
          					E00409370( &_v268);
          					_t22 = strrchr( &_v268, 0x2e);
          					if(_t22 != 0) {
          						 *_t22 = 0;
          					}
          					_t39 =  &_v268 - 1;
          					do {
          						_t23 =  *((intOrPtr*)(_t39 + 1));
          						_t39 = _t39 + 1;
          					} while (_t23 != 0);
          					asm("movsd");
          					_v796 = _t23;
          					_v535 = _t23;
          					asm("movsb");
          					_v804 = 0x410500;
          					E0040202F(_a4,  &_v804,  &_v268);
          					E0040B277( *((intOrPtr*)(_t32 + 0x28c)),  &_v804);
          					E0040D7F5(_t32,  &_v804);
          					return E004067C5( &_v804,  *((intOrPtr*)(_t32 + 0x290)),  &_v804);
          				}
          				return E0040385F();
          			}














          0x00403dee
          0x00403e00
          0x00403e1a
          0x00403e21
          0x00403e30
          0x00403e3f
          0x00403e48
          0x00403e4a
          0x00403e4a
          0x00403e53
          0x00403e54
          0x00403e54
          0x00403e57
          0x00403e58
          0x00403e61
          0x00403e62
          0x00403e68
          0x00403e7d
          0x00403e7e
          0x00403e88
          0x00403e99
          0x00403ea0
          0x00000000
          0x00403eab
          0x00000000

          APIs
          • memset.MSVCRT ref: 00403E21
          • strrchr.MSVCRT ref: 00403E3F
            • Part of subcall function 0040385F: RegDeleteKeyA.ADVAPI32(80000001,Software\NirSoft\ProduKey), ref: 00403869
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Deletememsetstrrchr
          • String ID: .cfg
          • API String ID: 1270183253-3410578098
          • Opcode ID: c2f7d7d7a2ba31ef9d5c8a1ef3851614d45877552c3972299e6f54d17043b12b
          • Instruction ID: 1244f09b322500d040489ad60c7a5431e0eaf5b8084ed082cf6da73c540f3780
          • Opcode Fuzzy Hash: c2f7d7d7a2ba31ef9d5c8a1ef3851614d45877552c3972299e6f54d17043b12b
          • Instruction Fuzzy Hash: B01193318042588ADB21EA55CC45BC97B789F15308F0400FBA5887B1C3DAB86FC98FA9
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004037D9(void* __eax, void* __edx, void* _a4) {
          				void* _t13;
          
          				 *((intOrPtr*)(_t13 + __eax + 0x33)) =  *((intOrPtr*)(_t13 + __eax + 0x33)) + __edx;
          			}




          0x004037df

          APIs
          • GetModuleHandleA.KERNEL32(00000000), ref: 0040380E
          • DialogBoxParamA.USER32 ref: 00403822
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: DialogHandleModuleParam
          • String ID: X$A
          • API String ID: 3900296288-1843214010
          • Opcode ID: 190c32b13782fbbd67d3afd2f9774f7b5b2822113380fd680c4b3f8b70792bdc
          • Instruction ID: 90c0d700be8bfb353f8be0158d94e75308fb27c7c645674bd8d0e1a7a0188528
          • Opcode Fuzzy Hash: 190c32b13782fbbd67d3afd2f9774f7b5b2822113380fd680c4b3f8b70792bdc
          • Instruction Fuzzy Hash: F3F0E232648221ABD7208F14BE08B873BA4FB45722F124076F600EB6E0C3F94891D788
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00401A57(void* __eflags, void* _a4) {
          				void _v267;
          				char _v268;
          				void* _t20;
          
          				_t20 = __eflags;
          				_v268 = 0;
          				memset( &_v267, 0, 0x104);
          				if(E0040197B( &_v268, _t20) == 0) {
          					__eflags = 0;
          					return 0;
          				} else {
          					return 0 | ShellExecuteA(_a4, 0,  &_v268, "http://www.nirsoft.net/utils/product_cd_key_viewer.html", 0, 1) - 0x00000020 > 0x00000000;
          				}
          			}






          0x00401a57
          0x00401a6e
          0x00401a75
          0x00401a8a
          0x00401ab3
          0x00401ab6
          0x00401a8c
          0x00401ab2
          0x00401ab2

          APIs
          • memset.MSVCRT ref: 00401A75
            • Part of subcall function 0040197B: memset.MSVCRT ref: 0040199F
            • Part of subcall function 0040197B: strchr.MSVCRT ref: 004019E4
          • ShellExecuteA.SHELL32(?,00000000,00000000,http://www.nirsoft.net/utils/product_cd_key_viewer.html,00000000,00000001), ref: 00401AA1
          Strings
          • http://www.nirsoft.net/utils/product_cd_key_viewer.html, xrefs: 00401A90
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: memset$ExecuteShellstrchr
          • String ID: http://www.nirsoft.net/utils/product_cd_key_viewer.html
          • API String ID: 3249029333-3976276414
          • Opcode ID: 7910c29580df3ed6ac07a51e23887044d115204bc072dcbdba1745a0440d67a0
          • Instruction ID: 8db647bd59944366810ad3b0aef2d40b760e56b7f40e1eb93739e24e72902cbc
          • Opcode Fuzzy Hash: 7910c29580df3ed6ac07a51e23887044d115204bc072dcbdba1745a0440d67a0
          • Instruction Fuzzy Hash: CBF09B7174420866EB60E731DC83FC977A85B14704F1400B5B685F61D0EAF4EAC88A95
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004037DA(void* __eax, void* __edx, void* _a4) {
          				void* _t13;
          
          				 *((intOrPtr*)(_t13 + __eax + 0x33)) =  *((intOrPtr*)(_t13 + __eax + 0x33)) + __edx;
          			}




          0x004037df

          APIs
          • GetModuleHandleA.KERNEL32(00000000), ref: 0040380E
          • DialogBoxParamA.USER32 ref: 00403822
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: DialogHandleModuleParam
          • String ID: X$A
          • API String ID: 3900296288-1843214010
          • Opcode ID: b60036e23f27f118f55a4f1539dc6153b523afbcc56c089bdf2f11581cb3cf0e
          • Instruction ID: e8a0d1a2185aab55c80aaa6428992dcbcbb91e032915ca81eb7b28d26a32c44b
          • Opcode Fuzzy Hash: b60036e23f27f118f55a4f1539dc6153b523afbcc56c089bdf2f11581cb3cf0e
          • Instruction Fuzzy Hash: 1CF05E32648261ABE7208B54BE48B8A7B90AB45761F55407AEA04EB5E0C2F988519789
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 84%
          			E0040A4CC(void* __eflags) {
          				intOrPtr _v8;
          				char _v12;
          				struct HWND__* _t5;
          
          				_push(_t10);
          				_v12 = 8;
          				_v8 = 0xff;
          				_t5 = E0040A22E( &_v12);
          				if(_t5 != 0) {
          					return 1;
          				} else {
          					MessageBoxA(_t5, "Error: Cannot load the common control classes.", "Error", 0x30);
          					return 0;
          				}
          			}






          0x0040a4d0
          0x0040a4d5
          0x0040a4dc
          0x0040a4e3
          0x0040a4eb
          0x0040a508
          0x0040a4ed
          0x0040a4fa
          0x0040a503
          0x0040a503

          APIs
            • Part of subcall function 0040A22E: LoadLibraryA.KERNEL32(comctl32.dll,74714DE0,?,00000000,0040A4E8,?,?,?,?,00404E3B,74714DE0), ref: 0040A23A
            • Part of subcall function 0040A22E: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 0040A24C
            • Part of subcall function 0040A22E: FreeLibrary.KERNEL32(00000000,?,00000000,0040A4E8,?,?,?,?,00404E3B,74714DE0), ref: 0040A260
          • MessageBoxA.USER32 ref: 0040A4FA
          Strings
          • Error: Cannot load the common control classes., xrefs: 0040A4F4
          • Error, xrefs: 0040A4EF
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: Library$AddressFreeLoadMessageProc
          • String ID: Error$Error: Cannot load the common control classes.
          • API String ID: 2780580303-1911744384
          • Opcode ID: 347022e2b0151828456a403b813ba8db09a8fa32962488bdcb6763e1a7d1da83
          • Instruction ID: b0344fcad59fbfba750fb188898cd5756b8df2bccf6c29a37ac4ddfc63068f63
          • Opcode Fuzzy Hash: 347022e2b0151828456a403b813ba8db09a8fa32962488bdcb6763e1a7d1da83
          • Instruction Fuzzy Hash: 88E0CD7165030576DB109BE0DC06F5B3EFC9B0070CF100079B001F55C0E9B8E5085719
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 58%
          			E00402ED0(struct HINSTANCE__** __eax, void* __eflags, intOrPtr _a4) {
          				void* __esi;
          				_Unknown_base(*)()* _t5;
          				void* _t7;
          				struct HINSTANCE__** _t8;
          
          				_t8 = __eax;
          				_t7 = 0;
          				if(E00402E44(__eax) != 0) {
          					_t5 = GetProcAddress( *_t8, "LookupPrivilegeValueA");
          					if(_t5 != 0) {
          						_t7 =  *_t5(0, "SeRestorePrivilege", _a4);
          					}
          				}
          				return _t7;
          			}







          0x00402ed2
          0x00402ed4
          0x00402edd
          0x00402ee6
          0x00402eee
          0x00402efc
          0x00402efc
          0x00402eee
          0x00402f02

          APIs
            • Part of subcall function 00402E44: LoadLibraryA.KERNEL32(advapi32.dll,00402F10,?,?,00402FCA,00000000), ref: 00402E4E
          • GetProcAddress.KERNEL32(?,LookupPrivilegeValueA), ref: 00402EE6
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: AddressLibraryLoadProc
          • String ID: LookupPrivilegeValueA$SeRestorePrivilege
          • API String ID: 2574300362-3629819652
          • Opcode ID: 89ce0f7b4f126065a1c7a65b511489be535fb811c086fb336b13717148c78a6e
          • Instruction ID: 1fe47dd537e7bcc40188d022c6eaf6a30b01017463a59bf03c137842652037d1
          • Opcode Fuzzy Hash: 89ce0f7b4f126065a1c7a65b511489be535fb811c086fb336b13717148c78a6e
          • Instruction Fuzzy Hash: F9D02B3238000477C261662ADE04A5B69976BD07603190037F418F21E5CAB88C016168
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040A136(intOrPtr __eax, struct HWND__* _a4, int _a8, char _a12) {
          				intOrPtr _v12;
          				intOrPtr _v16;
          				intOrPtr _v20;
          				intOrPtr _v28;
          				intOrPtr _v32;
          				intOrPtr _v36;
          				void* _v40;
          
          				_v32 = __eax;
          				_v36 = 0;
          				_v28 = 0;
          				_v20 = 0;
          				_v16 = 0;
          				_t6 =  &_a12; // 0x406824
          				_v12 =  *_t6;
          				_v40 = 0x22;
          				return SendMessageA(_a4, 0x101a, _a8,  &_v40);
          			}










          0x0040a13c
          0x0040a141
          0x0040a144
          0x0040a147
          0x0040a14a
          0x0040a14d
          0x0040a150
          0x0040a15a
          0x0040a170

          APIs
          • SendMessageA.USER32(00000000,0000101A,?,?), ref: 0040A169
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: MessageSend
          • String ID: "$$h@
          • API String ID: 3850602802-3067084051
          • Opcode ID: de56f724fb9ae890c66ab502fb9fa9fe2f3facd50323fd4bb32e755243d8e3ab
          • Instruction ID: acf931b6209f60bcc2457a210b08fcf43fa9132fe176111a53f0c577b6300f7a
          • Opcode Fuzzy Hash: de56f724fb9ae890c66ab502fb9fa9fe2f3facd50323fd4bb32e755243d8e3ab
          • Instruction Fuzzy Hash: 8DE0CAB4D0020DAFCF40CFA8D845ADEBBF8FB08300F00806AE819F2240E3759A418F94
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00408B01(intOrPtr _a4) {
          				struct _SHELLEXECUTEINFOA _v64;
          
          				memset( &(_v64.fMask), 0, 0x38);
          				_v64.lpParameters = _v64.lpParameters & 0x00000000;
          				_v64.lpFile = _a4;
          				_v64.cbSize = 0x3c;
          				_v64.lpVerb = "RunAs";
          				_v64.nShow = 5;
          				return ShellExecuteExA( &_v64);
          			}




          0x00408b0f
          0x00408b17
          0x00408b1b
          0x00408b25
          0x00408b2c
          0x00408b33
          0x00408b41

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ExecuteShellmemset
          • String ID: <
          • API String ID: 3297275784-4251816714
          • Opcode ID: 7e5e6608a09380d2bd148108facc68ecf56d6020417a3b692463236840ad4062
          • Instruction ID: c198d35da42c218bcd810d9e50396ccbe93a7ad46f5a8d194a4f324d7ca2a9b2
          • Opcode Fuzzy Hash: 7e5e6608a09380d2bd148108facc68ecf56d6020417a3b692463236840ad4062
          • Instruction Fuzzy Hash: B3E09270D0020CABDB00EFD5E849BCD7BBCBB04345F404425F514FA291D7B855598F99
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004093AB(struct HWND__* _a4, long _a8) {
          				int _t7;
          
          				_t7 = SendMessageA(_a4, 0x143, 0, _a8);
          				SendMessageA(_a4, 0x151, _t7, 0);
          				return _t7;
          			}




          0x004093c6
          0x004093d2
          0x004093d8

          APIs
          • SendMessageA.USER32(?,00000143,00000000,?), ref: 004093C2
          • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 004093D2
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: MessageSend
          • String ID: Windows
          • API String ID: 3850602802-744143879
          • Opcode ID: 5c012a00be2d7bd9015f11c1a330e23239ffca2387d3ffb02c142c258d5ad922
          • Instruction ID: 41ba91bf11372e2e2ddc00ea00c4f305c4c6c6a22ea4369fd248fc56a941c4a1
          • Opcode Fuzzy Hash: 5c012a00be2d7bd9015f11c1a330e23239ffca2387d3ffb02c142c258d5ad922
          • Instruction Fuzzy Hash: 86D0A73638431077DA114A05FC01F8B3FA5EBC4B50F04043AF300AA1F0C1A18C0A8BD0
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 86%
          			E004073F7(void* __eflags, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12) {
          				void* _v8;
          				signed int _v12;
          				void* _v16;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				signed int _t80;
          				signed int _t81;
          				signed int _t82;
          				signed int _t83;
          				void* _t85;
          				signed int _t89;
          				intOrPtr _t90;
          				intOrPtr _t96;
          				intOrPtr* _t98;
          				signed int _t113;
          				signed int _t116;
          				signed int _t126;
          				signed int _t128;
          				void* _t130;
          				signed int _t131;
          				intOrPtr* _t142;
          				signed int _t143;
          				signed int _t147;
          				signed int _t148;
          				void* _t150;
          				void* _t151;
          				void* _t155;
          
          				_t151 = __eflags;
          				_t98 = _a4;
          				 *((intOrPtr*)(_t98 + 4)) =  *((intOrPtr*)( *_t98 + 0x60))();
          				E0040685A(_t98);
          				 *(_t98 + 0x30) =  *(_t98 + 0x30) & 0x00000000;
          				_t143 = 7;
          				 *((intOrPtr*)(_t98 + 0x190)) = _a8;
          				_t126 = 0x14;
          				_t80 = _t143 * _t126;
          				 *(_t98 + 0x1bc) = _t143;
          				_push( ~(0 | _t151 > 0x00000000) | _t80);
          				L004010A4();
          				 *(_t98 + 0x1c0) = _t80;
          				_t81 = _t143;
          				_t128 = 0x10;
          				_t82 = _t81 * _t128;
          				_push( ~(0 | _t151 > 0x00000000) | _t82);
          				L004010A4();
          				_t130 = 0x412018;
          				 *(_t98 + 0x38) = _t82;
          				_v8 = 0x412018;
          				do {
          					_t83 =  *_t130;
          					_v12 = _t83;
          					_t113 = 5;
          					_t85 = memcpy( *(_t98 + 0x1c0) + _t83 * 0x14, _t130, _t113 << 2);
          					_t150 = _t150 + 0xc;
          					_t116 = _v12 << 4;
          					asm("movsd");
          					asm("movsd");
          					asm("movsd");
          					asm("movsd");
          					_t147 =  *( *(_t98 + 0x1c0) + _t85 + 0x10);
          					_v16 = _t85;
          					_v12 = _t116;
          					 *(_t116 +  *(_t98 + 0x38) + 0xc) = _t147;
          					if((_t147 & 0xffff0000) == 0) {
          						_t96 = E00407C3F(_t147 & 0x0000ffff);
          						_t142 = _a4;
          						 *((intOrPtr*)( *((intOrPtr*)(_t142 + 0x1c0)) + _v16 + 0x10)) = _t96;
          						 *((intOrPtr*)(_v12 +  *((intOrPtr*)(_t142 + 0x38)) + 0xc)) = E00407C3F(_t147 | 0x00010000);
          						_t130 = _v8;
          						_t98 = _t142;
          					}
          					_t130 = _t130 + 0x24;
          					_t155 = _t130 - 0x412114;
          					_v8 = _t130;
          				} while (_t155 < 0);
          				 *(_t98 + 0x3c) =  *(_t98 + 0x3c) & 0x00000000;
          				_t148 = 7;
          				 *((intOrPtr*)(_t98 + 0x40)) = _a12;
          				_t131 = 4;
          				_t89 = _t148 * _t131;
          				 *(_t98 + 0x24) = _t148;
          				 *((intOrPtr*)(_t98 + 0x20)) = 0x20;
          				_push( ~(0 | _t155 > 0x00000000) | _t89);
          				L004010A4();
          				_push(0xc);
          				 *(_t98 + 0x28) = _t89;
          				L004010A4();
          				_t149 = _t89;
          				if(_t89 == 0) {
          					_t90 = 0;
          					__eflags = 0;
          				} else {
          					_t90 = E00405596(_a8,  *((intOrPtr*)(_t98 + 0x4c)), _t149);
          				}
          				 *(_t98 + 0x1a8) =  *(_t98 + 0x1a8) & 0x00000000;
          				 *((intOrPtr*)(_t98 + 0x1ac)) = _t90;
          				 *((intOrPtr*)(_t98 + 0x44)) = 1;
          				 *((intOrPtr*)(_t98 + 0x1a4)) = 1;
          				 *((intOrPtr*)(_t98 + 0x1b0)) = 1;
          				 *((intOrPtr*)(_t98 + 0x1b4)) = 1;
          				 *((intOrPtr*)(_t98 + 0x1d0)) = 0x32;
          				 *((intOrPtr*)(_t98 + 0x50)) = 0xffffff;
          				return E00406CEB(_t98);
          			}































          0x004073f7
          0x004073fe
          0x0040740c
          0x0040740f
          0x00407417
          0x0040741d
          0x0040741e
          0x00407428
          0x0040742b
          0x00407430
          0x0040743a
          0x0040743b
          0x00407441
          0x00407447
          0x0040744c
          0x0040744d
          0x00407456
          0x00407457
          0x0040745d
          0x00407463
          0x00407466
          0x00407469
          0x00407469
          0x00407471
          0x0040747b
          0x0040747e
          0x0040747e
          0x00407486
          0x0040748e
          0x0040748f
          0x00407490
          0x00407491
          0x00407498
          0x004074a2
          0x004074a8
          0x004074ab
          0x004074af
          0x004074b4
          0x004074b9
          0x004074cd
          0x004074dc
          0x004074e0
          0x004074e3
          0x004074e3
          0x004074e5
          0x004074e8
          0x004074ee
          0x004074ee
          0x004074fa
          0x00407500
          0x00407501
          0x00407508
          0x0040750b
          0x00407510
          0x00407513
          0x0040751e
          0x0040751f
          0x00407524
          0x00407526
          0x00407529
          0x0040752e
          0x00407534
          0x00407543
          0x00407543
          0x00407536
          0x0040753c
          0x0040753c
          0x00407545
          0x0040754c
          0x00407555
          0x00407558
          0x0040755e
          0x00407564
          0x0040756c
          0x00407576
          0x00407586

          APIs
            • Part of subcall function 0040685A: ??3@YAXPAX@Z.MSVCRT ref: 00406862
            • Part of subcall function 0040685A: ??3@YAXPAX@Z.MSVCRT ref: 00406870
            • Part of subcall function 0040685A: ??3@YAXPAX@Z.MSVCRT ref: 00406881
            • Part of subcall function 0040685A: ??3@YAXPAX@Z.MSVCRT ref: 0040689B
          • ??2@YAPAXI@Z.MSVCRT ref: 0040743B
          • ??2@YAPAXI@Z.MSVCRT ref: 00407457
          • ??2@YAPAXI@Z.MSVCRT ref: 0040751F
          • ??2@YAPAXI@Z.MSVCRT ref: 00407529
            • Part of subcall function 00407C3F: GetModuleHandleA.KERNEL32(00000000,?,?,?,004074B9,?,00000000), ref: 00407C68
            • Part of subcall function 00407C3F: LoadStringA.USER32 ref: 00407CF2
            • Part of subcall function 00407C3F: memcpy.MSVCRT ref: 00407D31
            • Part of subcall function 00407C3F: GetModuleHandleA.KERNEL32(00000000,?,?,004074B9,?,00000000), ref: 00407CC7
          Memory Dump Source
          • Source File: 00000000.00000002.580357064.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.580349012.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580373729.000000000040F000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580390611.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.580396905.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_ProduKey.jbxd
          Similarity
          • API ID: ??2@??3@$HandleModule$LoadStringmemcpy
          • String ID:
          • API String ID: 3735328086-0
          • Opcode ID: e1956fb1710e1b637097be39055978df204d476d01dd7b53b542abee966fe4ae
          • Instruction ID: 2f9dee61db984c53b1155ff23c31f763096d0de7566c4a88c8be15059e7efcd5
          • Opcode Fuzzy Hash: e1956fb1710e1b637097be39055978df204d476d01dd7b53b542abee966fe4ae
          • Instruction Fuzzy Hash: 0C413A72A012009FDB18DF29C48169A7BA5BF48314F1581BFED09EF386D7B5E8418B94
          Uniqueness

          Uniqueness Score: -1.00%